CREATING AND VERIFYING GLOBALLY UNIQUE DEVICE-SPECIFIC IDENTIFIERS
First Claim
1. A method comprising:
- receiving, by a server, a plurality of identifiers associated with a client device;
encrypting, by the server, a plurality of encoding values associated with the plurality of identifiers using a first key of a key pair of the server; and
generating, by the server, a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, and articles for receiving, by a server, a plurality of identifiers associated with a client device are described herein. The server may also encrypt a plurality of encoding values associated with the plurality of identifiers using a first key of a key pair of the server, and generate a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values. In other embodiments, the server may receive a token along with the plurality of identifiers. In such embodiments, the server may further verify the validity of the received token, including attempting to decrypt a body of the received token with a key associated with a second server, the second server having generated the received token, and, if decryption succeeds, comparing ones of the plurality of identifiers with second identifiers found in the decrypted body to check for inconsistencies.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, by a server, a plurality of identifiers associated with a client device; encrypting, by the server, a plurality of encoding values associated with the plurality of identifiers using a first key of a key pair of the server; and generating, by the server, a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, by a first server, a token associated with a client device, the token acting as a unique identifier of the client device, and a plurality of first identifiers; and verifying, by the first server, validity of the token, including attempting to decrypt a body of the token with a key associated with a second server, the second server having generated the token, and if decryption succeeds, comparing ones of the plurality of first identifiers with second identifiers found in the decrypted body to check for inconsistencies. - View Dependent Claims (10, 11, 12, 13, 14, 16)
-
-
15. The method of claim 15, wherein the one or more factors include at least one of success or failure of decryption, inconsistencies between ones of the first and second identifiers, presence of a device identifier of the client device on a list of suspect devices, a count of a number of times the token has been received, association of the client device to evidence of fraud, or a level of risk associated with the client device.
-
17. A first server comprising:
-
a processor; and logic to be operated by the processor to receive a token associated with a client device, the token acting as a unique identifier of the client device, and a plurality of first identifiers, and verify validity of the token, including attempting to decrypt a body of the token with a key associated with a second server, the second server having generated the token, and if decryption succeeds, comparing ones of the plurality of first identifiers with second identifiers found in the decrypted body to check for inconsistencies. - View Dependent Claims (18, 19)
-
-
20. An article of manufacture comprising:
-
a storage medium; and a plurality of programming instructions stored on the storage medium and configured to program a server to receive a plurality of identifiers associated with a client device, encrypt a plurality of encoding values associated with the plurality of identifiers using a private key of the server, and generate a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values. - View Dependent Claims (21, 22, 23)
-
Specification