Method And System For Using Location Information Acquired From GPS For Secure Authentication
First Claim
1. A method for processing data in a communication system, the method comprising:
- authenticating access to one or more secure functions controlled by a device, using a password that is unique per location of a chip and per challenge, wherein said chip is integrated within said device.
7 Assignments
0 Petitions
Accused Products
Abstract
Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per challenge and/or per chip. The location of the chip may be determined based on GPS information and securely stored and securely communicated to an external entity. Two or more of the chip location, a generated random number sample and a key from a table of keys may be passed to a hash function that may generate a password. An external entity attempting access may be challenged to respond with a password that matches the password generated by the hash function. The response may be compared with the password generated by the hash function and access to one or more secure functions may be granted based on the comparison.
-
Citations
24 Claims
-
1. A method for processing data in a communication system, the method comprising:
- authenticating access to one or more secure functions controlled by a device, using a password that is unique per location of a chip and per challenge, wherein said chip is integrated within said device.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A system for processing data in a communication system, the system comprising:
- one or more circuits that authenticate access to one or more secure functions controlled by a device, using a password that is unique per location of a chip and per challenge, wherein said chip is integrated within said device.
- View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
Specification