SECURE AUTHENTICATION OF IDENTIFICATION FOR COMPUTING DEVICES
First Claim
1. A method of determining a signature of an identifier of a computing device, comprising the acts of:
- receiving the identifier at a port;
storing the identifier in a first computer readable storage medium coupled to the port;
providing a value;
at a processor coupled to the first computer readable memory, applying a hash function to a combination of the identifier and the value, thereby generating a hash value;
applying a cryptographic process which is secure in an untrusted computing environment to the hash value;
combining a result of the cryptographic process and the value thereby, to define a signature; and
storing the signature in a second computer readable medium which is coupled to the processor.
1 Assignment
0 Petitions
Accused Products
Abstract
In the field of computer and data security, the identifier (ID) of a computing device is protected by providing a secure signature used to verify the ID. The signature is computed from the ID using a “White Box” cryptographic process and a hash function. This provides a signature that is computationally easy to verify but difficult or impossible to generate by a hacker (unauthorized user). This method of first creating the signature and later verifying the identifier using the signature and the associated computing apparatus are thereby useful for protection against hacking of such identifiers of computing devices.
-
Citations
19 Claims
-
1. A method of determining a signature of an identifier of a computing device, comprising the acts of:
-
receiving the identifier at a port; storing the identifier in a first computer readable storage medium coupled to the port; providing a value; at a processor coupled to the first computer readable memory, applying a hash function to a combination of the identifier and the value, thereby generating a hash value; applying a cryptographic process which is secure in an untrusted computing environment to the hash value; combining a result of the cryptographic process and the value thereby, to define a signature; and storing the signature in a second computer readable medium which is coupled to the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for determining a signature for an identifier of a computing device, comprising:
-
a port adapted for receiving the identifier; a first computer readable storage coupled to the port and adapted to store the identifier; a processor coupled to the first computer readable memory and which applies a hash function to the identifier and a value, thereby generating a hash value; the processor applying a cryptographic process which is secure in an untrusted computing environment to the hash value and combining a result of the cryptographic process and the value, thereby to define a signature; and a second computer readable storage coupled to the processor and adapted to store the signature.
-
-
18. A method of verifying an identifier of a computing device, comprising the acts of:
-
receiving a signature and the identifier at a port; storing the signature and identifier in a first computer readable storage medium coupled to the port; at a processor coupled to the first computer readable storage medium, partitioning the signature into at least two portions; applying at the processor a cryptographic process to one of the portions; applying at the processor a hash function to a combination of the other portion and the identifier thereby to generate a hash value; and verifying the identifier by comparing the hash value to a result of the cryptographic process. - View Dependent Claims (19)
-
Specification