Device Verification for Dynamic Re-Certificating
First Claim
1. A method for authenticating a device, the method comprising:
- receiving, by a network component, from the device, an access request and an encryption key;
sending, by the network component, to the device, a request for at least one of information based upon a current location of the device and an identification number associated with the device;
receiving, by the network component, a response from the device;
comparing, by the network component, the response with information obtained independently of the response; and
determining, by the network component, whether the access request is authentic based at least in part upon one of;
whether the information about the current location is consistent with the information obtained independently of the response, andwhether the identification number included in the response is consistent with the information obtained independently of the response.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a device is provided. The method comprises receiving, by a network component, from the device, an access request and an encryption key; sending, by the network component, to the device, a request for at least one of current information associated with the device and an identification number associated with the device; receiving, by the network component, a response from the device; comparing, by the network component, the response with a known version of the at least one of current information associated with the device and identification number associated with the device; and determining, by the network component, that the device has passed an authenticity test when at least one of: current information included in the response matches the known version of the current information, and the identification number included in the response matches the known version of the identification number.
-
Citations
46 Claims
-
1. A method for authenticating a device, the method comprising:
-
receiving, by a network component, from the device, an access request and an encryption key; sending, by the network component, to the device, a request for at least one of information based upon a current location of the device and an identification number associated with the device; receiving, by the network component, a response from the device; comparing, by the network component, the response with information obtained independently of the response; and determining, by the network component, whether the access request is authentic based at least in part upon one of; whether the information about the current location is consistent with the information obtained independently of the response, and whether the identification number included in the response is consistent with the information obtained independently of the response. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network component, comprising:
a processor configured such that the network component receives, from a device, an access request and an encryption key, further configured such that the network component sends, to the device, a request for at least one of information based upon a current location of the device and an identification number associated with the device, further configured such that the network component receives a response from the device, further configured such that the network component compares the response with information obtained independently of the response, and further configured such that the network component determines whether the access request is authentic based at least in part upon one of whether the information about the current location is consistent with the information obtained independently of the response, and whether the identification number included in the response is consistent with the information obtained independently of the response. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A method for authentication of a device, the method comprising:
-
sending, by the device, to a network component, an access request and an encryption key; receiving, by the device, from the network component, a request for at least one of information based upon a current location of the device and an identification number associated with the device; and returning, by the device, to the network component, a response that includes at least one of the information based upon the current location of the device and the identification number associated with the device. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A device, comprising:
a processor configured such that the device sends, to a network component, an access request and an encryption key, further configured such that the device receives, from the network component, a request for at least one of information based upon a current location of the device and an identification number associated with the device, and further configured such that the device returns, to the network component, a response that includes at least one of the information based upon a current location of the device and the identification number associated with the device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
33. A method for a database manager for transmissions within a television white space to authenticate a device adapted for television band transmissions, the method comprising:
-
sending, by the device, to the database manager, an access request and an encryption key; sending, by the database manager, to the device, a request for additional information; returning, by the device, to the database manager, a response that includes at least one of information associated with a current location of the device and the identification number associated with the device; comparing, by the database manager, the response with information obtained independent of the device; and determining, by the database manager, whether the access request is authentic based at least in part upon one of; whether the current information included in the response is consistent with the independent information, and whether the identification number included in the response is consistent with the independent information. - View Dependent Claims (34, 35, 36, 37, 38, 39)
-
-
40. A database manager for transmissions within a television white space, the database manager comprising:
a processor configured such that the database manager receives, from a device adapted for television band transmissions, an access request and an encryption key, further configured such that the database manager sends, to the device, a request for additional information, further configured such that the database manager receives, from the device, a response that includes at least one of information associated with a current location of the device and the identification number associated with the device, further configured such that the database manager compares the response with information obtained independent of the device, and further configured such that the database manager determines whether the access request is authentic based at least in part upon one of;
whether the current information included in the response is consistent with the independent information, and whether the identification number included in the response is consistent with the independent information.- View Dependent Claims (41, 42, 43, 44, 45, 46)
Specification