System and Method for Device Authentication with Built-In Tolerance
First Claim
1. A method for building tolerance into authentication of a device, comprising:
- receiving and storing first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint being based on a first set of device components;
receiving a second digital fingerprint from the device at a subsequent time;
comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices;
in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components;
sending the request code to the remote device;
receiving the third digital fingerprint from the remote device in response to the request code; and
authenticating the device based on a comparison of the first and third digital fingerprints.
8 Assignments
0 Petitions
Accused Products
Abstract
A system for building tolerance into authentication of a computing device includes a means for executing, from a computer-readable medium, computer-implementable steps of: (a) receiving and storing a first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint based on a first set of device components, (b) receiving a second digital fingerprint from the device at a subsequent time, (c) comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices, (d) in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components, (e) sending the request code to the remote device, (f) receiving the third digital fingerprint from the remote device in response to the request code, and (g) authenticating the device based on a comparison of the first and third digital fingerprints.
-
Citations
20 Claims
-
1. A method for building tolerance into authentication of a device, comprising:
-
receiving and storing first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint being based on a first set of device components; receiving a second digital fingerprint from the device at a subsequent time; comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices; in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components; sending the request code to the remote device; receiving the third digital fingerprint from the remote device in response to the request code; and authenticating the device based on a comparison of the first and third digital fingerprints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for building tolerance into authentication of a device, comprising steps of:
-
receiving a digital fingerprint from the device, the digital fingerprint having a plurality of fingerprint portions, each fingerprint portion being associated with a component of the device; comparing the received digital fingerprint with stored digital fingerprints of known devices; flagging each fingerprint portion that creates an error during the comparing step; categorizing the associated component of each flagged fingerprint portion as a typical-upgrade component or a non-typical-upgrade component; and authenticating the received digital fingerprint when, for any single comparison between fingerprints, a ratio of non-typical-upgrade components to typical upgrade components exceeds a predetermined acceptance value. - View Dependent Claims (10, 11, 12)
-
-
13. A computer readable medium having stored thereon computer executable instructions that, when executed by a server, cause the server to perform a method comprising steps of:
-
receiving a digital fingerprint from a client device having a plurality of fingerprint portions, each fingerprint portion being associated with a component of the client device; comparing the received digital fingerprint to each of many stored digital fingerprints; flagging each fingerprint portion creating a mismatch error during the comparing step; categorizing the associated component of each fingerprint portion as a typical-upgrade component or a non-typical-upgrade component; and authenticating the received digital fingerprint when, for any single comparison between fingerprints, a ratio of non-typical-upgrade components to typical upgrade components exceeds a predetermined acceptance value. - View Dependent Claims (14, 15, 16)
-
-
17. An apparatus for authenticating a remote device, the apparatus comprising:
-
means for receiving and storing a first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint being based on a first set of device components; means for receiving a second digital fingerprint from the device at a subsequent time; means for comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices; means for generating a request code in response to a comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, the request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components; means for sending the request code to the remote device; means for receiving the third digital fingerprint from the remote device in response to the request code; and means for authenticating the device based on a comparison of the first and third digital fingerprints. - View Dependent Claims (18, 19, 20)
-
Specification