METHOD AND SYSTEM FOR STATE MACHINE SECURITY DEVICE
First Claim
1. A method for authenticating a transaction or access via a security device, comprising:
- communicating an authentication request by the security device to an authentication server;
receiving by the security device, a sequence of information requests from the authentication server, wherein the authentication server generates the sequence of information requests in response to the authentication request; and
generating by the security device in response to the received sequence of information requests, a sequence of responses that are sent to the authentication server, wherein the sequence of responses comprise a sequence of reported values;
whereinthe security device is authenticated by the authentication server based on comparing of the sequence of reported values with a sequence of expected values used by the authentication server in uniquely identifying the security device.
1 Assignment
0 Petitions
Accused Products
Abstract
A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The security measures may comprise authentication (e.g., authentication of devices, users, or activities), and/or encryption measures (e.g., encrypting or decrypting exchanged data). A transaction or access via the security device may be authenticated by communicating an authentication request by the security device to an authentication server, which may generate, in response, a sequence of information requests that are sent to the security device. The security device may then generate, in response, a sequence of responses that are sent to the authentication server, with the sequence of responses comprising a sequence of reported values each of which are unique. The authentication server may then authenticate the security device based on comparing of the sequence of reported values with a sequence of expected values that identifies the security device.
23 Citations
32 Claims
-
1. A method for authenticating a transaction or access via a security device, comprising:
-
communicating an authentication request by the security device to an authentication server; receiving by the security device, a sequence of information requests from the authentication server, wherein the authentication server generates the sequence of information requests in response to the authentication request; and generating by the security device in response to the received sequence of information requests, a sequence of responses that are sent to the authentication server, wherein the sequence of responses comprise a sequence of reported values;
whereinthe security device is authenticated by the authentication server based on comparing of the sequence of reported values with a sequence of expected values used by the authentication server in uniquely identifying the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 22)
-
-
15. A system, comprising:
one or more circuits for use in a security device, the one or more circuits being operable to; communicate an authentication request to an authentication server; receive from the authentication server, a sequence of information requests that are generated by the authentication server in response to the authentication request; generate in response to the sequences of information requests, a sequence of responses, wherein the sequence of responses comprise a sequence of reported values; and communicate the sequence of responses to the authentication server to enable authenticating the security device by the authentication server by uniquely identifying the security device based on comparison in the authentication server of the sequence of reported values with a sequence of expected values. - View Dependent Claims (16, 17, 18, 19, 20, 21, 23, 24)
-
25. A system, comprising:
one or more circuits for use in an authentication server, the one or more circuits being operable to; receive an authentication request sent by a security device; generate, in response to the authentication request, a sequence of information requests; communicate the sequence of information requests to the security device; receiver from the security device a sequence of responses that are generated in response to the sequence of information requests, wherein the sequence of responses comprise a sequence of reported values; and authenticate the security device by the authentication server based on comparing of the sequence of reported values with a sequence of expected values used by the authentication server in uniquely identifying the security device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
Specification