Wireless memory device authentication
First Claim
Patent Images
1. A wireless memory device comprising:
- a memory unit; and
at least one processor configured to;
receive a challenge comprising a plurality of bits from a communications device; and
in an instance where the challenge is a first challenge from the communications device;
form a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the challenge, wherein a plurality of pairs of public and private keys are stored by the memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit;
cause the signature to be sent to the communications device;
receive a key stream from the communications device; and
destroy the private key, wherein the signature was formed with a private key associated with each bit of the plurality of bits of the challenge; and
the private key further comprises a pair of random numbers in accordance with a value of a respective bit of the plurality of bits of the challenge; and
in an instance where the challenge is not the first challenge from the communications device;
cause at least a portion of the key stream to be sent to the communications device to make certain that the wireless memory device is authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for wireless memory device authentication is provided, wherein a communications device receives a certified public key from a wireless memory device. The communications device validates the public key and send a challenge to the wireless memory device. The wireless memory device sends a signature to the communications device and the communications device validates the signature in order to authenticate the wireless memory device.
-
Citations
17 Claims
-
1. A wireless memory device comprising:
-
a memory unit; and at least one processor configured to; receive a challenge comprising a plurality of bits from a communications device; and in an instance where the challenge is a first challenge from the communications device; form a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the challenge, wherein a plurality of pairs of public and private keys are stored by the memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit; cause the signature to be sent to the communications device; receive a key stream from the communications device; and destroy the private key, wherein the signature was formed with a private key associated with each bit of the plurality of bits of the challenge; and
the private key further comprises a pair of random numbers in accordance with a value of a respective bit of the plurality of bits of the challenge; andin an instance where the challenge is not the first challenge from the communications device; cause at least a portion of the key stream to be sent to the communications device to make certain that the wireless memory device is authenticated. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
receiving a challenge comprising a plurality of bits from a communications device; and in an instance where the challenge is a first challenge from the communications device; forming a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the challenge, wherein a plurality of pairs of public and private keys are stored by a memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit; causing the signature to be sent to the communications device; receive a key stream from the communications device; and destroying the private key, wherein the signature was formed with a private key associated with each bit of the plurality of bits of the challenge; and
the private key further comprises a pair of random numbers in accordance with a value of a respective bit of the plurality of bits of the challenge; andin an instance where the challenge is not the first challenge from the communications device; causing at least a portion of the key stream to be sent to the communications device. - View Dependent Claims (6, 7)
-
8. An apparatus, comprising:
at least one processor and at least one memory including a computer program code, wherein the at least one memory including the computer program code is configured, with the at least one processor, at least to; receive a challenge comprising a plurality of bits from a communications device; and in an instance where the challenge is a first challenge from the communications device; form a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the plurality of bits of the challenge, wherein a plurality of pairs of public and private keys are stored on a memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit; cause the signature to be sent to the communications device; receive a key stream from the communications device; and destroy the private key, wherein the signature was formed with a private key associated with each bit of the plurality of bits of the challenge; and
the private key further comprises a pair of random numbers in accordance with a value of a respective bit of the plurality of bits of the challenge; andin an instance where the challenge is not the first challenge from the communications device; cause at least a portion of the key stream to be sent to the communications device to make certain the wireless memory device is authenticated. - View Dependent Claims (9, 10)
-
11. A computer program product comprising:
at least one non-transitory computer-readable storage medium having computer-readable program instructions stored therein with the computer-readable program instructions comprising program instructions configured to; receive a challenge comprising a plurality of bits from a communications device; and in an instance where the challenge is a first challenge from the communications device; form a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the plurality of bits of the challenge, wherein a plurality of pairs of public and private keys are stored on a memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit; cause the signature to be sent to the communications device; receive a key stream from the communications device; and destroy the private key, wherein the signature was formed with a private key associated with each bit of the plurality of bits of the challenge; and
the private key further comprises a pair of random numbers in accordance with a value of a respective bit of the plurality of bits of the challenge; andin an instance where the challenge is not the first challenge from the communications device; cause at least a portion of the key stream to be sent to the communications device. - View Dependent Claims (12, 13)
-
14. A method comprising:
-
receiving a challenge comprising a plurality of bits from a communications device; and in an instance where the challenge is a first challenge from the communications device; forming a signature comprising a plurality of numbers from a public key and a private key based on the challenge by looking up the challenge in a table and, for each bit of the plurality of bits of the challenge, forming the signature from either a first or second number of a pair of numbers in accordance with a value of the respective bit of the plurality of bits of the challenge, wherein a plurality of pairs of public and private keys are stored by a memory unit and each pair of the plurality of pairs of the public key and the private key are used only once to form the signature and never sent out or copied from the memory unit; causing the signature to be sent to the communications device; and receiving a key stream from the communications device; and in an instance where the challenge is not a first challenge from the communications device; causing at least a portion of the key stream to be sent to the communications device to make certain that communications with the communications device is authenticated. - View Dependent Claims (15, 16, 17)
-
Specification