Self-monitoring and trending service system with a cascaded pipeline with enhanced authentication and registration
First Claim
1. A computer implemented method for authenticating a relay with a service provide system using an encrypted key file, comprising:
- generating the encrypted key file wherein generating comprises the steps of;
receiving an identifier associated with the relay;
generating a registration key data set;
recording the registration key data set in a database;
encrypting the registration key data set forming an encrypted registration key data set; and
making the encrypted registration key data set available to the relay as the encrypted key file;
transmitting the encrypted key file from the relay to the service provider system when the relay is instantiated;
transmitting the identifier that identifies the relay with the encrypted key file;
decrypting the encrypted key file received at the service provider system to derive a first random number and a second random number;
searching the database to determine whether there is an unbound key data set matching the first random number, the second random number, and the identifier associated with the relay;
responsive to determining that the database fails to include the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, terminating authentication of the relay with the service provider; and
responsive to determining that the database includes the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, searching the database to determine whether there is a bound key data set matching the first random number, the second random number, and the identifier associated with a relay, wherein when the bound key data set match is present in the database, authenticating the relay with the service provider system.
2 Assignments
0 Petitions
Accused Products
Abstract
A registration and authentication scheme that may be used in conjunction with a computer-based system for monitoring other computer systems is disclosed. A monitored relay transmits a unique identifier to a server in the monitoring system. The server generates a random number pair, ensures the random number pair is unique, and associates the unique relay identifier with the random number pair to form an unbound key, which is registered in a database associated with the server. The unbound key is encrypted and made available to the relay. Subsequently, when the relay is instantiated it transmits the contents of the unbound key file to the monitoring system. The monitoring system decrypts the unbound key file and searches associated databases to determine whether the relay is registered and authenticates the relay.
26 Citations
7 Claims
-
1. A computer implemented method for authenticating a relay with a service provide system using an encrypted key file, comprising:
-
generating the encrypted key file wherein generating comprises the steps of; receiving an identifier associated with the relay; generating a registration key data set; recording the registration key data set in a database; encrypting the registration key data set forming an encrypted registration key data set; and making the encrypted registration key data set available to the relay as the encrypted key file; transmitting the encrypted key file from the relay to the service provider system when the relay is instantiated; transmitting the identifier that identifies the relay with the encrypted key file; decrypting the encrypted key file received at the service provider system to derive a first random number and a second random number; searching the database to determine whether there is an unbound key data set matching the first random number, the second random number, and the identifier associated with the relay; responsive to determining that the database fails to include the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, terminating authentication of the relay with the service provider; and responsive to determining that the database includes the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, searching the database to determine whether there is a bound key data set matching the first random number, the second random number, and the identifier associated with a relay, wherein when the bound key data set match is present in the database, authenticating the relay with the service provider system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. At least one computer-readable memory containing a computer program product for use in connection with a processor for authenticating a relay with a service provider system using an encrypted key file, the computer program product comprising:
-
program code for generating the encrypted key file wherein generating comprises the steps of; receiving an identifier associated with the relay; generating a registration key data set; recording the registration key data set in a database; encrypting the registration key data set forming an encrypted registration key data set; and making the encrypted registration key data set available to the relay as the encrypted key file; program code for transmitting the encrypted key file from the relay to the service provider system when the relay is instantiated; program code for transmitting the identifier that identifies the relay with the encrypted key file; program code for decrypting the encrypted key file received at the service provider system to derive a first random number and a second random number; and program code for searching the database to determine whether there is an unbound key data set matching the first random number, the second random number, and the identifier associated with the relay; responsive to determining that the database fails to include the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, program code for terminating authentication of the relay with the service provider; and responsive to determining that the database includes the unbound key data set matching the first random number, the second random number, and the identifier associated with the relay, program code for searching the database to determine whether there is a bound key data set matching the first random number, the second random number, and the identifier associated with a relay, wherein when the bound key data set match is present in the database, authenticating the relay with the service provider system.
-
Specification