CONTROLLED SECURE CODE AUTHENTICATION
First Claim
1. A non-transitory computer-readable storage medium having instructions stored thereon which, when executed by one or more processors, cause the one or more processors to perform operations comprising:
- transmitting, from a host device, a request to a client device, the request including a challenge for a property of a code stored within the client device;
receiving, at the host device, a response to the request, the response comprising information associated with the property of the code;
verifying correctness of the response based on the received information; and
based on the verifying of the correctness of the response, determining that the code is an authorized code.
15 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, circuits and computer-readable mediums for controlled secure code authentication are provided. In one aspect, a method performed by a host device includes transmitting a request to a client device, the request including a challenge for a property of a code stored within the client device, receiving a response to the request, the response comprising information associated with the property of the code, verifying correctness of the response based on the received information, and based on the verifying of the correctness of the response, determining that the code is an authorized code.
28 Citations
23 Claims
-
1. A non-transitory computer-readable storage medium having instructions stored thereon which, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
transmitting, from a host device, a request to a client device, the request including a challenge for a property of a code stored within the client device; receiving, at the host device, a response to the request, the response comprising information associated with the property of the code; verifying correctness of the response based on the received information; and based on the verifying of the correctness of the response, determining that the code is an authorized code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A host device controller comprising:
-
a processor; and one or more storage media coupled to the processor and storing logic configured to cause the processor, when executed by the processor, to; transmit a request to a client device, the request including a challenge for a property of a code stored within the client device; receive a response to the request, the response comprising information associated with the property of the code; verify correctness of the response based on the received information; and based on the verifying of the correctness of the response, determine that the code is an authorized code. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
transmitting, by a host device, a request to a client device, the request including a challenge for a property of a code stored within the client device; receiving, by the host device, a response to the request, the response comprising information associated with the property of the code; verifying, by the host device, correctness of the response based on the received information; and based on the verifying of the correctness of the response, determining, by the host device, that the code is an authorized code.
-
Specification