Method and apparatus for verifying the legitimacy of an untrusted mechanism
First Claim
1. A method for verifying the legitimacy of an untrusted signature verification mechanism, comprising:
- submitting a first signature and a second signature to an untrusted signature verification mechanism in a sequence that is unpredictable to the untrusted mechanism, said first signature being known to be verifiable, and said second signature being known to be unverifiable;
receiving a response from the untrusted mechanism for each submission of either said first signature or said second signature;
determining whether each response received from the untrusted mechanism is a correct response; and
in response to a determination that any of the responses from the untrusted mechanism is an incorrect response, determining the untrusted mechanism to not be legitimate.
2 Assignments
0 Petitions
Accused Products
Abstract
The legitimacy of an untrusted mechanism is verified by submitting a first set of information and a second set of information to the untrusted mechanism in an unpredictable sequence. For each submission of either the first set or the second set of information, a response is received from the untrusted mechanism. Each response is tested to determine if the response is correct for the information set submitted. If any of the responses from the untrusted mechanism is incorrect, then it is determined that the untrusted mechanism is not legitimate. Because the submission sequence is unpredictable, it is highly difficult if not impossible for an illegitimate untrusted mechanism to “fake” proper responses. As a result, this verification process provides an effective means for testing and verifying the legitimacy of the untrusted mechanism.
22 Citations
15 Claims
-
1. A method for verifying the legitimacy of an untrusted signature verification mechanism, comprising:
-
submitting a first signature and a second signature to an untrusted signature verification mechanism in a sequence that is unpredictable to the untrusted mechanism, said first signature being known to be verifiable, and said second signature being known to be unverifiable; receiving a response from the untrusted mechanism for each submission of either said first signature or said second signature; determining whether each response received from the untrusted mechanism is a correct response; and in response to a determination that any of the responses from the untrusted mechanism is an incorrect response, determining the untrusted mechanism to not be legitimate. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for verifying the legitimacy of an untrusted signature verification mechanism, comprising:
-
a mechanism for submitting a first signature and a second signature to an untrusted signature verification mechanism in a sequence that is unpredictable to the untrusted mechanism, said first signature being known to be verifiable, and said second signature being known to be unverifiable; a mechanism for receiving a response from the untrusted mechanism for each submission of either said first signature or said second signature; a mechanism for determining whether each response received from the untrusted mechanism is a correct response; and a mechanism for determining, in response to a determination that any of the responses from the untrusted mechanism is an incorrect response, the untrusted mechanism to not be legitimate. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer readable medium having stored thereon instructions which, when executed by one or more processors, cause the one or more processors to verify the legitimacy of an untrusted signature verification mechanism, said computer readable medium comprising:
-
instructions for causing one or more processors to submit a first signature and a second signature to an untrusted signature verification mechanism in a sequence that is unpredictable to the untrusted mechanism, said first signature being known to be verifiable, and said second signature being known to be unverifiable; instructions for causing one or more processors to receive a response from the untrusted mechanism for each submission of either said first signature or said second signature; instructions for causing one or more processors to determine whether each response received from the untrusted mechanism is a correct response; and instructions for causing one or more processors to determine, in response to a determination that any of the responses from the untrusted mechanism is an incorrect response, the untrusted mechanism to not be legitimate. - View Dependent Claims (12, 13, 14, 15)
-
Specification