Cryptographically secure authentication device, system and method
First Claim
1. An electronic device comprising:
- a private key generator for generating a private key;
a non-volatile memory for storing at least the private key;
an index source;
a hash engine; and
a logical interconnection between the private key generator, the non-volatile memory, the index source, and the hash engine;
said hash engine receiving the private key via the logical interconnection and performing a number of hashes on the private key to generate an identifying value provided via the logical interconnection,wherein the identifying value is for use in authenticating said device,wherein the number of hashes is based on the difference between a reference number stored in the non-volatile memory and a selected index number selected from a series of decreasing index numbers indicated by the index source, and wherein a first selected index number at a first time is greater than a second selected index number at a second time later than the first time.
9 Assignments
0 Petitions
Accused Products
Abstract
An electronic device generates identifying values which are used in authenticating the electronic device. The device comprises an interface, a private key generator for generating a private key, a non-volatile memory for storing at least the private key, an index source, a hash engine, and a logical interconnection between the private key generator, the non-volatile memory, the index source, the hash engine and the interface. The hash engine generates identifying values provided to the interface via the logical interconnection. The identifying values are provided to a verifying device for use in authenticating the electronic device. Alternatively or in addition, devices may be paired to share a root key to cryptographically communicate between each other and/or to authenticate each other.
-
Citations
21 Claims
-
1. An electronic device comprising:
-
a private key generator for generating a private key; a non-volatile memory for storing at least the private key; an index source; a hash engine; and a logical interconnection between the private key generator, the non-volatile memory, the index source, and the hash engine; said hash engine receiving the private key via the logical interconnection and performing a number of hashes on the private key to generate an identifying value provided via the logical interconnection, wherein the identifying value is for use in authenticating said device, wherein the number of hashes is based on the difference between a reference number stored in the non-volatile memory and a selected index number selected from a series of decreasing index numbers indicated by the index source, and wherein a first selected index number at a first time is greater than a second selected index number at a second time later than the first time. - View Dependent Claims (2, 3, 10)
-
-
4. A device comprising:
-
a logical interconnection; a non-volatile memory connected to the logical interconnection; a private key generator generating a private key, said private key generator connected to the logical interconnection and providing the private key via the logical interconnection to the non-volatile memory for storing the private key in the non-volatile memory; a hash engine connected to the logical interconnection, said hash engine receiving the private key via the logical interconnection and performing a number of hashes on the private key to generate an identifying value, wherein the number of hashes is based on the difference between a clock number indicated by an index source comprising a clock source and a reference time stored in the non-volatile memory; and wherein the logical interconnection provides the identifying value for use in authenticating said device. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
11. An electronic device comprising:
-
a private key generator for generating a private key; a non-volatile memory for storing at least the private key; an index source comprising a clock source; a hash engine; a logical interconnection between the private key generator, the non-volatile memory, the index source, and the hash engine; and a processor for transmitting information; said hash engine receiving the private key via the logical interconnection and performing a number of hashes on the private key to generate an identifying value provided via the logical interconnection, wherein the number of hashes is based on the difference between an clock number indicated by the index source and a reference time stored in the non-volatile memory and wherein the identifying value is for use in authenticating said device. - View Dependent Claims (12)
-
-
13. A system comprising:
-
a verifying device; and a plurality of electronic devices, each device comprising; a logical interconnection; a non-volatile memory connected to the logical interconnection; a private key generator generating a private key, said private key generator connected to the logical interconnection and providing the private key via the logical interconnection to the non-volatile memory for storing the private key in the non-volatile memory; an index source indicating a clock number; a hash engine connected to the logical interconnection, said hash engine receiving the private key via the logical interconnection and performing a number of hashes on the private key to generate an identifying value, the number of hashes based on the clock number; and wherein the logical interconnection provides the identifying value and the clock number to the verifying device for use in authenticating said device; wherein the verifying device receives the identifying value and the clock number, said verifying device performing a number of hashes on the received identifying value based on the received clock number to determine whether the device should be authenticated. - View Dependent Claims (14, 15)
-
-
16. A method for pairing devices for cryptographic communication, comprising:
-
identifying a first device and a second device wherein each device comprises; a private key generator for generating a private key; a non-volatile memory for storing at least the private key; a hash engine using a root key and the private key; an index source comprising a clock source for use by the hash engine; and a logical interconnection between the private key generator, the non-volatile memory, and the hash engine; connecting the first device and the second device; generating, by the connected first and second devices, a common root key for use by each hash engine; and
wherein the first device uses the common root key via its hash engine to cryptographically communicate with the second device and vice versa;wherein each hash engine performs a number of hashes on the private key to generate an identifying value based on the private key and the common root key; wherein the number of hashes is based on the difference between clock number indicated by the index source and a reference time stored in the non-volatile memory; and wherein the generated identifying value provided via the logical interconnection is for use in authenticating said device. - View Dependent Claims (17)
-
-
18. A cryptographic electronic device comprising:
-
a private key generator for generating a private key; a non-volatile memory for storing at least the private key; a hash engine using the private key and using a common root key used by at least one other device to which this device is paired; an index source comprising a clock source for use by the hash engine; and a logical interconnection between the private key generator, the non-volatile memory and the hash engine; said hash engine performing a number of hashes on the private key to generate an identifying value based on the private key and the common root key, wherein the number of hashes is based on the difference between an clock number which is one of a series of decreasing numbers indicated by the index source and a reference time stored in the non-volatile memory; said identifying value provided via the logical interconnection for use in authenticating said device with the other device and wherein the common root key is used to cryptographically communicate with the other device. - View Dependent Claims (19)
-
-
20. A system for cryptographic communication, comprising:
-
a plurality of devices, wherein each device comprises; a private key generator for generating a private key; a non-volatile memory for storing at least the private key; a hash engine using a common root key and the private key; an index source comprising a clock source for use by the hash engine; and a logical interconnection between the private key generator, the non-volatile memory, and the hash engine; wherein each of the devices shares the common root key which is generated by connecting the devices together; and wherein each of the hash engines of each of the devices is configured to use the common root key to cryptographically communicate with other devices of the plurality of devices; wherein each hash engine performs a number of hashes on the private key to generate an identifying value based on the private key and the common root key; wherein the number of hashes is based on the difference between an clock number indicated by the index source and a reference time stored in the non-volatile memory; and wherein the generated identifying value provided via the logical interconnection is for use in authenticating said device. - View Dependent Claims (21)
-
Specification