Challenge-response method and associated computing device
First Claim
1. A challenge-response method for a computing device, the method being implemented by one or more processors and comprising steps of:
- receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce;
the secured module recovering the image content through decryption using one or more keys associated with the encryption key;
the secured module of the computing device outputting the recovered image content;
capturing the image content as output by the secured module;
processing the captured image content so as to obtain the nonce; and
providing the nonce as a response.
3 Assignments
0 Petitions
Accused Products
Abstract
There is described a challenge-response method for a computing device. The method comprises steps of: (a) receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce; (b) the secured module recovering the image content through decryption using one or more keys associated with the encryption key; (c) the secured module of the computing device outputting the recovered image content; (d) capturing the image content as output by the secured module; (e) processing the captured image content so as to obtain the nonce; and (f) providing the nonce as a response. There is also described a computing device arranged to carry out the challenge-response method, a computer program for causing a processor to carry out the challenge-response method, and a computer readable medium storing such a computer program.
23 Citations
17 Claims
-
1. A challenge-response method for a computing device, the method being implemented by one or more processors and comprising steps of:
-
receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce; the secured module recovering the image content through decryption using one or more keys associated with the encryption key; the secured module of the computing device outputting the recovered image content;
capturing the image content as output by the secured module;processing the captured image content so as to obtain the nonce; and providing the nonce as a response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing device comprising a secured module and one or more processors arranged to carry out a challenge-response method by:
-
receiving challenge data at the secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce; the secured module recovering the image content through decryption using one or more keys associated with the encryption key; the secured module of the computing device outputting the recovered image content; capturing the image content as output by the secured module; processing the captured image content so as to obtain the nonce; and providing the nonce as a response.
-
-
17. One or more non-transitory tangible computer readable media comprising computer program code which, when executed by a processor, causes the processor to carry out a challenge-response method for a computing by:
-
receiving challenge data at a secured module of the computing device, the challenge data comprising image content encrypted using an encryption key, and the image content including a nonce; the secured module recovering the image content through decryption using one or more keys associated with the encryption key; the secured module of the computing device outputting the recovered image content; capturing the image content as output by the secured module; processing the captured image content so as to obtain the nonce; and providing the nonce as a response.
-
Specification