PROTECTING AGAINST COUNTERFEIT ELECTRONIC DEVICES
First Claim
Patent Images
1. A method of authenticating a second device connected to a first device comprising:
- transmitting a first data string from the first device to the second device;
receiving a second data string at the first device from the second device, wherein the second data string is an altered copy of the first data string;
generating a third data string using an alteration key at the first device, wherein the third data string is an altered copy of the first data string;
comparing the third data string and the second data string; and
authenticating the second device if the third data string and the second data string match.
5 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of the invention includes a method of authenticating a second device connected to a first device. The method includes transmitting a first data string from the first device to the second device and receiving a second data string at the first device from the second device. The method also includes generating a third data string using an alteration key at the first device and comparing the third data string and either the first data string or the second data string. The method further includes authenticating the second device if the compared data strings match.
-
Citations
20 Claims
-
1. A method of authenticating a second device connected to a first device comprising:
-
transmitting a first data string from the first device to the second device; receiving a second data string at the first device from the second device, wherein the second data string is an altered copy of the first data string; generating a third data string using an alteration key at the first device, wherein the third data string is an altered copy of the first data string; comparing the third data string and the second data string; and authenticating the second device if the third data string and the second data string match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of authenticating a second device connected to a first device comprising:
-
providing a first data string to the first device; generating a second data string using an alteration key at the first device, wherein the second data string is an altered copy of the first data string; transmitting the second data string from the first device to the second device; receiving a third data string at the first device from the second device, wherein the third data string is an altered copy of the second data string; comparing the first data string and the third data string; and authenticating the second device if the first data string and the third data string match. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A first device to be connected to a second device comprising:
-
a transmit module for transmitting signals to the second device; a receive module for receiving signals from the first device; a data string generator, wherein the data string generator creates a data string; an alteration key; an alteration module, wherein the alteration module creates an altered data string by implementing the alteration key to alter the data string; and a comparison module for authenticating the second device by comparing data strings. - View Dependent Claims (17, 18, 19, 20)
-
Specification