×

Systems and methods for device authentication

  • US 10,542,002 B2
  • Filed: 05/31/2018
  • Issued: 01/21/2020
  • Est. Priority Date: 09/12/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for authenticating a first computing device to a second computing device through interaction with a third computing device, comprising:

  • the first computing device, comprising;

    a communication interface; and

    a processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    obtaining a first transitory identity at the first computing device;

    sending the first transitory identity to the second computing device and to the third computing device;

    receiving a second transitory identity from the second computing device;

    sending an authentication query including the second transitory identity to the third computing device; and

    receiving from the third computing device an indication of whether the second computing device is authenticated;

    the second computing device, comprising;

    a communication interface; and

    a processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    obtaining a second transitory identity at the second computing device;

    sending the second transitory identity to the first computing device and to the third computing device;

    receiving the first transitory identity from the first computing device;

    sending an authentication query including the first transitory identity to the third computing device; and

    receiving from the third computing device an indication of whether the first computing device is authenticated; and

    the third computing device, comprising;

    a communication interface; and

    a processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    receiving the first transitory identity from the first computing device;

    receiving an authentication query comprising the first transitory identity from the second computing device;

    determining whether the first transitory identity from the second computing device matches the first transitory identity from the first computing device;

    sending to the second computing device an indication of whether the first computing device is authenticated based on the determination of whether the first transitory identity from the second computing device matches the first transitory identity from the first computing device;

    receiving the second transitory identity from the second computing device;

    receiving an authentication query comprising the second transitory identity from the first computing device;

    determining whether the second transitory identity from the first computing device matches the second transitory identity from the second computing device; and

    sending to the first computing device an indication of whether the second computing device is authenticated based on the determination of whether the second transitory identity from the first computing device matches the second transitory identity from the second computing device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×