SYSTEM AND METHOD FOR VERIFYING THE AUTHENTICITY OF AN ELECTRONIC DEVICE
First Claim
1. A method for verifying the authenticity of an electronic device by a security server comprising a processor, the method comprising:
- receiving, from the electronic device, a unique identifier associated with the electronic device;
determining, by the processor, a public key corresponding to the unique identifier;
generating, by the processor, a message;
encrypting, by the processor, the message with the determined public key;
transmitting, to the electronic device, the encrypted message;
receiving, from the electronic device, a response message to the encrypted message;
comparing the response message to the generated message; and
authorizing the electronic device based upon the comparison.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for verifying the authenticity of an electronic device by a security server comprising a processor and a memory. The method, for example, may include, but is not limited to, receiving, from the electronic device, a unique identifier associated with the electronic device, determining, by the processor, a public key corresponding to the unique identifier, generating, by the processor, a message, encrypting, by the processor, the message with the determined public key, transmitting, to the electronic device, the encrypted message; receiving, from the electronic device, a response message, comparing the response message to the generated message, and authorizing the electronic device based upon the comparison.
-
Citations
20 Claims
-
1. A method for verifying the authenticity of an electronic device by a security server comprising a processor, the method comprising:
-
receiving, from the electronic device, a unique identifier associated with the electronic device; determining, by the processor, a public key corresponding to the unique identifier; generating, by the processor, a message; encrypting, by the processor, the message with the determined public key; transmitting, to the electronic device, the encrypted message; receiving, from the electronic device, a response message to the encrypted message; comparing the response message to the generated message; and authorizing the electronic device based upon the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security server, comprising:
-
a memory configured to store a database identifying a plurality of electronic devices based upon a unique identifier associated with each electronic device and a public key associated with each electronic device; a communication system; and a processor communicatively coupled to the communication system and the memory, wherein the processor is configured to; receive, from the communication system, the unique identifier associated with one of the plurality of electronic devices; determine the public key corresponding to the unique identifier; generate a message; encrypting the message with the determined public key; transmit the encrypted message to the respective electronic device via the communication system; receive, from the communication system, a response message to the encrypted message; compare the response message to the generated message; and authorize the electronic device based upon the comparison. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification