Method and apparatus for simplified audio authentication
First Claim
1. An authentication apparatus operable to produce a secure identifier, the apparatus comprising:
- a processor;
a clock coupled to the processor configurable to generate a time element;
a memory element coupled to the processor configurable to store a private key and public key information, the private key associated with a user;
at least one actuator coupled to the processor, the actuator configured to activate the private key;
a signature generator coupled to the processor operable to generate a digital signature when the actuator is activated, the digital signature being a function of the private key and the time element; and
an emitter coupled to the signature generator operable to emit the secure identifier to authenticate the user to an external authentication receiver, the secure identifier comprising the digital signature, time element, and public key information.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for authentication having a processor and at least one activator coupled to the processor is claimed. A signature generator is coupled to the processor and capable of generating a secure identifier. An emitter coupled to the signal generator capable of emitting the secure identifier. A receiver receives the emitted secure identifier and verifies that the secure identifier was appropriately transmitted. The public key corresponding to the key identifier transmitted is accessed to determine the validity of the secure identifier using the accessed key and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
53 Citations
38 Claims
-
1. An authentication apparatus operable to produce a secure identifier, the apparatus comprising:
-
a processor; a clock coupled to the processor configurable to generate a time element; a memory element coupled to the processor configurable to store a private key and public key information, the private key associated with a user; at least one actuator coupled to the processor, the actuator configured to activate the private key; a signature generator coupled to the processor operable to generate a digital signature when the actuator is activated, the digital signature being a function of the private key and the time element; and an emitter coupled to the signature generator operable to emit the secure identifier to authenticate the user to an external authentication receiver, the secure identifier comprising the digital signature, time element, and public key information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating, comprising;
-
generating a time element; identifying a key identifier, the key identifier associated with a user; generating a digital signature; generating a secure identifier as a function of the time element, the key identifier, the digital signature; and emitting the secure identifier to authenticate the user to an external authentication receiver. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An authentication receiver, comprising:
-
a receiver configurable to receive a secure identifier for authentication of a sender, the secure identifier comprising; a digital signature, the digital signature comprising information derived from a private key, a public key identifier corresponding to a public key associated with the sender being authenticated; and a time identifier; and a verifier configurable to verify the secure identifier, the verifier comprising; memory comprising information corresponding to the public key information received and time tolerance information; a key retriever coupled to the memory and configurable to retrieve the pubic key corresponding to the public key identifier; and a time verifier coupled to the memory and configurable to verify that the received time identifier falls within acceptable time tolerances. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A method of authenticating, comprising:
-
receiving a secure identifier for authentication of a sender, the secure identifier comprising a digital signature, a public key identifier, and a time identifier, wherein the public key identifier corresponds to a public key associated with the sender being authenticated; and verifying the secure identifier, verifying comprising; verifying that the public key identifier received corresponds to known information regarding the public key identifier received; and verifying the time identifier such that the time identifier received is within predetermined time tolerances. - View Dependent Claims (27, 28, 29)
-
-
30. Apparatus for authenticating, comprising:
-
means for generating a tune element; means for identifying a key identifier, the key identifier associated with a user; means for generating a digital signature; means for generating a secure identifier as a function of the time element, the key identifier, the digital signature; and means toy emitting the secure identifier to authenticate the user to an external authentication means. - View Dependent Claims (31, 32, 33, 34)
-
-
35. Apparatus for authenticating, comprising:
-
means for receiving a secure identifier for authentication of a sender, the secure identifier comprising a digital signature, a public key identifier, and a time identifier, wherein the public key identifier corresponds to a public key associated with the sender being authenticated; and means for verifying the secure identifier, the means for verifying comprising; means for verifying that the public key identifier received corresponds to known information regarding the public key identifier received; and means for verifying the time identifier such that the time identifier received is within predetermined time tolerances. - View Dependent Claims (36, 37, 38)
-
Specification