AUTHENTICATION TECHNIQUES INCLUDING SPEECH AND/OR LIP MOVEMENT ANALYSIS
First Claim
1. An apparatus comprising:
- a processor to execute an app; and
an authenticator to generate a first authentication key and to securely store the first authentication key,the authenticator to generate an attestation object usable by a relying party to confirm authenticity of the authenticator, the attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components.
3 Assignments
0 Petitions
Accused Products
Abstract
A system, apparatus, method, and machine readable medium are described for attesting an authenticator. For example, one embodiment of an apparatus comprises: a processor to execute an app; and an authenticator to generate a first authentication key and to securely store the first authentication key, the authenticator to generate an attestation object usable by a relying party to confirm authenticity of the authenticator, the attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components.
88 Citations
29 Claims
-
1. An apparatus comprising:
-
a processor to execute an app; and an authenticator to generate a first authentication key and to securely store the first authentication key, the authenticator to generate an attestation object usable by a relying party to confirm authenticity of the authenticator, the attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a client device comprising; a processor to execute an app; and an authenticator to generate a first authentication key and to securely store the first authentication key, the authenticator to generate an attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components; and a relying party comprising an object verification module to confirm authenticity of the authenticator using the signature. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method comprising:
-
executing an app on a client device; generating and securely storing a first authentication key; generating an attestation object including a first component provided by an authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components; and confirming authenticity of the authenticator at a relying party using the signature. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification