Methods and systems for authentication using zero-knowledge code
First Claim
1. A method comprising:
- receiving, at an accessory to a communication device, an accessory-access-request event associated with authenticating a connection between the accessory and the communication device;
generating an access sequence within the accessory, the access sequence to enable the communication device to exchange encrypted data with the accessory;
performing an authentication protocol including;
generating a seed sequence having a plurality of seed-sequence elements;
the accessory, responsive to detecting the accessory-access-request event, outputting, via a user interface of the accessory, an indication of at least one seed-sequence element of the generated seed sequence;
receiving, at the accessory from the communication device, at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements associated with an outputted indication;
modifying, at the accessory, the seed sequence in accordance with the at least one received seed-sequence-element-modifier signal;
comparing, at the accessory, the modified seed sequence with the access sequence;
if the modified seed sequence matches the access sequence, the accessory granting the communication device operational access to the accessory and responsive to operational access being granted, the accessory exchanging encrypted data with the communication device; and
if the modified seed sequence does not match the access sequence, the accessory denying the communication device operational access to the accessory.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein are methods and systems for authentication using zero-knowledge code. One embodiment takes the form of a process that includes detecting an accessory-access-request event associated with a trusted accessory. The process includes generating a seed sequence having a first number of seed-sequence elements. The process includes outputting an indication of at least one seed-sequence element. The process includes receiving at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements. The process includes modifying the generated seed sequence in accordance with the at least one received seed-sequence-element-modifier signal. The process includes comparing the modified seed sequence with a stored access sequence. The process includes granting operational access to the trusted accessory when the modified seed sequence matches the stored access sequence. The process includes denying operational access to the trusted accessory when the modified seed sequence does not match the stored access sequence.
12 Citations
19 Claims
-
1. A method comprising:
-
receiving, at an accessory to a communication device, an accessory-access-request event associated with authenticating a connection between the accessory and the communication device; generating an access sequence within the accessory, the access sequence to enable the communication device to exchange encrypted data with the accessory; performing an authentication protocol including; generating a seed sequence having a plurality of seed-sequence elements; the accessory, responsive to detecting the accessory-access-request event, outputting, via a user interface of the accessory, an indication of at least one seed-sequence element of the generated seed sequence; receiving, at the accessory from the communication device, at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements associated with an outputted indication; modifying, at the accessory, the seed sequence in accordance with the at least one received seed-sequence-element-modifier signal; comparing, at the accessory, the modified seed sequence with the access sequence; if the modified seed sequence matches the access sequence, the accessory granting the communication device operational access to the accessory and responsive to operational access being granted, the accessory exchanging encrypted data with the communication device; and if the modified seed sequence does not match the access sequence, the accessory denying the communication device operational access to the accessory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising a non-transitory computer-readable medium having instructions stored thereon that when executed cause a processor to:
-
receive, at an accessory to a communication device, an accessory-access-request event associated with authenticating a connection between the accessory the communication device; generate an access sequence within the accessory, the access sequence to enable the communication device to exchange encrypted data with the accessory; performing an authentication protocol including; generating a seed sequence having a plurality of seed-sequence elements; output, via a user interface of the accessory, an indication of at least one seed-sequence element of seed sequence; receive, at the accessory from the communication device, at least one seed-sequence-element-modifier signal for at least one of the seed-sequence elements associated with an outputted indication; modify, at the accessory, the seed sequence in accordance with the at least one received seed-sequence-element-modifier signal; compare, at the accessory, the modified seed sequence with the access sequence; if the modified seed sequence matches the access sequence, the accessory to grant the communication device operational access to the accessory and responsive to operational access being granted, the accessory exchanging encrypted data with the communication device; and if the modified seed sequence does not match the access sequence, the accessory to deny the communication device operational access to the accessory.
-
Specification