System and method for generating secured authentication image files for use in device authentication
First Claim
1. A method for authentication of a peripheral in communication with a device, comprising:
- generating a secure authentication image file comprising;
reserving key address locations in a raw memory image file that includes data for an array of regularly spaced locations, wherein the key address locations are non-contiguous and randomly distributed in the array;
filling the raw memory image file with test data; and
merging secure key data into the key address locations of the raw memory image file, wherein merging the secure key data includes replacing the portion of the test data that is located in the key address locations;
storing the secure authentication image file in the peripheral that is to be authenticated by the device;
wherein the device concurrently stores multiple plaintext/cyphertext pairs and each pair includes a plaintext string associated with a cyphertext string; and
further comprising;
transmitting one of the plaintext strings from the device to the peripheral; and
the peripheral using the received plaintext string and the secure authentication image file to generate a proposed cyphertext string.
5 Assignments
0 Petitions
Accused Products
Abstract
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. The secure authentication image file is pre-generated in a secure environment. A plurality of key address locations are reserved in a raw memory image file. A key merger application merges the secure key data into the raw memory image file to generate a secure authentication image file. A test set of plaintext/cyphertext pairs are generated using the newly created secure authentication image file. To maintain security of the secure authentication image file, the secure key data and the raw memory image file are erased from a working memory. The test set of plaintext/cyphertext pairs are used to verify a production device containing the secure authentication image file.
-
Citations
11 Claims
-
1. A method for authentication of a peripheral in communication with a device, comprising:
-
generating a secure authentication image file comprising; reserving key address locations in a raw memory image file that includes data for an array of regularly spaced locations, wherein the key address locations are non-contiguous and randomly distributed in the array; filling the raw memory image file with test data; and merging secure key data into the key address locations of the raw memory image file, wherein merging the secure key data includes replacing the portion of the test data that is located in the key address locations; storing the secure authentication image file in the peripheral that is to be authenticated by the device; wherein the device concurrently stores multiple plaintext/cyphertext pairs and each pair includes a plaintext string associated with a cyphertext string; and
further comprising;transmitting one of the plaintext strings from the device to the peripheral; and the peripheral using the received plaintext string and the secure authentication image file to generate a proposed cyphertext string. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authenticating peripherals that are each configured to be in communication with a device, comprising:
-
electronics configured to generate a secure authentication image file by, reserving key address locations in a raw memory image file that includes data for an array of regularly spaced locations, wherein the key address locations are non-contiguous and randomly distributed in the array, filling the raw memory image file with test data; and merging secure key data into the key address locations of the raw memory image file, wherein merging the secure key data includes replacing the portion of the test data that is located in the key address locations; wherein the electronics store the secure authentication image file in the peripherals that are to be authenticated by the device; wherein the device concurrently stores multiple plaintext/cyphertext pairs and each pair includes a plaintext string associated with a cyphertext string; wherein the device transmits one of the plaintext strings from the device to one of the peripherals being authenticated by the device; and wherein the peripheral being authenticated uses the received plaintext string and the secure authentication image file to generate a proposed cyphertext string. - View Dependent Claims (11)
-
Specification