METHOD FOR AUTHENTICATING AN INTEGRATED CIRCUIT DEVICE
First Claim
1. A method comprising:
- provisioning an integrated circuit (IC) device with a unique identification number (UID);
configuring the IC device to calculate a device-specific key (DSK) using the UID;
using the UID and a secure application separate from the IC device, calculating a DSK for the IC device;
providing the UID and the DSK calculated with the secure application separate from the IC device to a provider of an online service; and
enabling the provider of the online service to authenticate the IC device using the UID and the DSK calculated with the secure application in response to the IC device contacting the online service.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided for authenticating an IC device. The method includes provisioning an integrated circuit (IC) device with a unique identification number (UID). The IC device is configured to calculate a device-specific key (DSK) using the UID. The UID is used with a secure application separate from the IC device to calculate the DSK. The DSK calculated by the IC device is the same as the DSK calculated by the secure application. The UID and the DSK calculated by the secure application is provided to a provider of an online service. The provider of the online service is enabled to authenticate the IC device using the UID and the DSK calculated with the secure application in response to the IC device contacting the online service. The provider may authenticate the device using a standard cryptographic challenge-response protocol. If the IC device has knowledge of a particular DSK, then the IC device is a legitimate authorized device.
26 Citations
20 Claims
-
1. A method comprising:
-
provisioning an integrated circuit (IC) device with a unique identification number (UID); configuring the IC device to calculate a device-specific key (DSK) using the UID; using the UID and a secure application separate from the IC device, calculating a DSK for the IC device; providing the UID and the DSK calculated with the secure application separate from the IC device to a provider of an online service; and enabling the provider of the online service to authenticate the IC device using the UID and the DSK calculated with the secure application in response to the IC device contacting the online service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
provisioning a plurality of integrated circuit (IC) devices with unique identification numbers, each of the plurality of IC devices being provided with a unique identification number (UID); configuring each of the plurality of IC devices to calculate a device-specific key (DSK) using the UID; using the UID and a secure application separate from the IC device, calculating a DSK for each of the plurality of IC devices; providing the UIDs and the DSKs calculated with the secure application separate from the IC device to a provider of an online service; and enabling the provider of the online service to authenticate an IC device using the UIDs and the DSKs calculated with the secure application in response to the IC device contacting the online service. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
provisioning a plurality of integrated circuit (IC) devices with unique identification numbers, each of the plurality of IC devices being provided with a unique identification number (UID); configuring each of the plurality of IC devices to calculate a device-specific key (DSK) using the UID; using the UID and a secure application separate from the IC device, calculating a DSK for each of the plurality of IC devices; creating a log file of a UID and corresponding DSK for each of the plurality of IC devices; providing the log file of UIDs and DSKs calculated with the secure application separate from the IC device to a provider of an online service; and enabling the provider of the online service to authenticate an IC device using the UIDs and the DSKs calculated with the secure application in response to the IC device contacting the online service. - View Dependent Claims (19, 20)
-
Specification