CLIENT AUTHENTICATION DEVICE AND METHODS THEREOF
First Claim
1. A method, comprising:
- receiving a request to authenticate a client device via a network;
in response to receiving the request;
retrieving an authentication key from a storage module at the client device, the storage module located at a first integrated circuit package;
determining at a tamper detection module if a memory of the client device has been accessed;
in response to determining the memory of the client device has not been accessed, using the authentication key at an authentication module to determine an authentication result for the client device, the authentication module located at the first integrated circuit package; and
communicating the authentication result via the network.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating a data processing device includes receiving a request to authenticate the data processing device. In response, an authentication key is accessed an authenticated at an authentication module. The authentication key is stored at a storage module that is located within the same integrated circuit package as the authentication module, so that the authentication key can be communicated to the module without exposing the key to unauthorized probing. The integrated circuit package also includes a tamper detection module to determine whether a memory of the data processing device has been accessed. In response to determining the memory has been accessed, the tamper detection module instructs the authentication module to not authenticate the data processing device.
62 Citations
20 Claims
-
1. A method, comprising:
-
receiving a request to authenticate a client device via a network; in response to receiving the request; retrieving an authentication key from a storage module at the client device, the storage module located at a first integrated circuit package; determining at a tamper detection module if a memory of the client device has been accessed; in response to determining the memory of the client device has not been accessed, using the authentication key at an authentication module to determine an authentication result for the client device, the authentication module located at the first integrated circuit package; and communicating the authentication result via the network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
receiving a request to authenticate a client device via a network; in response to receiving the request; retrieving an authentication key from a storage module at the client device via an interconnect that is protected from external probing; using the authentication key to determine an authentication result; and communicating the authentication result via the network. - View Dependent Claims (8, 9)
-
-
10. A device, comprising:
-
a network interface module configured to receive an authentication request from a network; a processor; a memory coupled to the processor via a bus, the memory comprising a write enable input configured to place the memory in a writeable state based on a signal at the write enable input; and a first integrated circuit package, comprising; a storage module configured to store an authentication key; and an authentication module configured to access the authentication key and to determine an authentication result based on the authentication key in response to the authentication request; and a tamper module coupled to the authentication module, the tamper module configured to detect tampering of the memory, and further configured to provide control information to the authentication module indicating if the memory has been tampered. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A device, comprising:
-
a network interface configured to receive an authentication request via a network; a processor coupled to the network interface, the processor configured to execute authentication software in response to the authentication request, the authentication software configured to determine an authentication result based on an authentication key; an interconnect coupled to the processor, the interconnect configured to be shielded from external probing; and a storage module coupled to the interconnect, the storage module configured to store the authentication key. - View Dependent Claims (19, 20)
-
Specification