One-way communication apparatus with dynamic key generation
First Claim
1. A one-way communication apparatus for communicating with a slave computing device for invoking services provided by said slave computing device, said one-way communication apparatus comprising:
- a shared secret data retention device to retain a shared identifying cipher associated uniquely with said one-way communication apparatus and retained within said slave computing device and known only to said one-way communication apparatus and said slave computing device;
a dynamic key generation device for generating a dynamic non-reusable key;
a user authentication device connected to receive a current user identification data for generating a user verification code that said user is authorized to communicate with said slave computing device;
an encryption device connected to receive a command instruction code, said command instruction code indicating a service to be invoked on said slave computing system, and connected to said shared secret retention device to extract said shared identifying cipher, said dynamic key generation device to receive said dynamic non-reusable key, and said user authentication device to receive said user verification code and if said user verification code indicates that said user is a known user of said one-way communication apparatus, encrypting said command instruction code, said shared identifying cipher, and said dynamic non-reusable key together to form a authenticated command message that is transmitted to said slave computing device to invoke said services provided by said slave computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
A remote control device is coupled with a computing device such as a set top computing device using wired or wireless connectivity for the purpose of invoking services provided by the computing device. The remote control device uses biometric methods such as fingerprint scanning to identify the user of the remote control device who is also a previously authorized user of the computing device. The remote control device possesses a unique identifying serial number. Identity of the user of the remote control device is communicated to the computing device and used by the computing device to authenticate the remote control device user as a previously authorized user of both devices. Once a remote control user is authenticated, all signals from the remote control device to the set top computing device are encrypted in such a way as to prevent impersonation using a similar remote control device or man-in-the-middle attacks.
93 Citations
76 Claims
-
1. A one-way communication apparatus for communicating with a slave computing device for invoking services provided by said slave computing device, said one-way communication apparatus comprising:
-
a shared secret data retention device to retain a shared identifying cipher associated uniquely with said one-way communication apparatus and retained within said slave computing device and known only to said one-way communication apparatus and said slave computing device; a dynamic key generation device for generating a dynamic non-reusable key; a user authentication device connected to receive a current user identification data for generating a user verification code that said user is authorized to communicate with said slave computing device; an encryption device connected to receive a command instruction code, said command instruction code indicating a service to be invoked on said slave computing system, and connected to said shared secret retention device to extract said shared identifying cipher, said dynamic key generation device to receive said dynamic non-reusable key, and said user authentication device to receive said user verification code and if said user verification code indicates that said user is a known user of said one-way communication apparatus, encrypting said command instruction code, said shared identifying cipher, and said dynamic non-reusable key together to form a authenticated command message that is transmitted to said slave computing device to invoke said services provided by said slave computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A one-way communication system for communicating from a remote location to a slave computing system for communicating from said remote location authenticated command messages for invoking services provided by said slave computing device, said one-way communication system comprising:
-
a one-way communication apparatus comprising; a shared secret data retention device to retain a shared identifying cipher associated uniquely with said one-way communication apparatus and retained within said slave computing device and known only to said one-way communication apparatus and said slave computing device; a dynamic key generation device for generating a dynamic non-reusable key; a user authentication device connected to receive a current user identification data for generating a user verification code that said user is authorized to communicate with said slave computing device; an encryption device connected to receive a command instruction code, said command instruction code indicating a service to be invoked on said slave computing system, and connected to said shared secret retention device to extract said shared identifying cipher, said dynamic key generation device to receive said dynamic non-reusable key, and said user authentication device to receive said user verification code and if said user verification code indicates that said user is a known user of said one-way communication apparatus, encrypting said command instruction code, said shared identifying cipher, and said dynamic non-reusable key together to form a authenticated command message that is transmitted to said slave computing device to invoke said services provided by said slave computing device; and a receiving device in communication with said slave computing device and said one-way communication apparatus for receiving a transmission message including said authenticated command message and decrypting said authenticated command message to develop a command invocation code to invoke said services provided by said slave computing device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for communicating from a remote control device to a slave computing system using authenticated command messages for invoking services provided by said slave computing device, said method comprising the steps of:
transmitting by way of a one-way communication path an authenticated command message by the steps of; retaining in a shared secret data retention device a shared identifying cipher associated uniquely with said remote control device, retaining within said slave computing device said shared identifying cipher such that said shared identifying cipher is known only to said remote control device and said slave computing device, generating a dynamic non-reusable key, generating a user verification code that said user is authorized to communicate with said slave computing device from a current user identification data, receiving a command instruction code indicating a service to be invoked on said slave computing system, if said user verification code indicates that said user is a known user of said remote control device, encrypting said command instruction code, said shared identifying cipher, and said dynamic non-reusable key together to form said authenticated command message, and transmitting said authenticated command message to said slave computing device to invoke said services provided by said slave computing device; and receiving a transmission message including said authenticated command message; and decrypting said authenticated command message to develop a command invocation code to invoke said services provided by said slave computing device. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
57. A computer readable medium containing program instruction code readable by and executable on a computing system which, when executed on the computing system comprising a remote control and a slave computing system, performs a computer program process for communicating from said remote control device to said slave computing system using authenticated command messages for invoking services provided by said slave computing device, said program process comprising the steps of:
-
transmitting by way of a one-way communication path an authenticated command message by the steps of; retaining in a shared secret data retention device a shared identifying cipher associated uniquely with said remote control device, retaining within said slave computing device said shared identifying cipher such that said shared identifying cipher is known only to said remote control device and said slave computing device, generating a dynamic non-reusable key, generating a user verification code that said user is authorized to communicate with said slave computing device from a current user identification data, receiving a command instruction code indicating a service to be invoked on said slave computing system, if said user verification code indicates that said user is a known user of said remote control device, encrypting said command instruction code, said shared identifying cipher, and said dynamic non-reusable key together to form said authenticated command message, and transmitting said authenticated command message to said slave computing device to invoke said services provided by said slave computing device; and receiving a transmission message including said authenticated command message; and decrypting said authenticated command message to develop a command invocation code to invoke said services provided by said slave computing device. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
Specification