Creating and verifying globally unique device-specific identifiers
First Claim
1. A method performed by a computing system comprising a key pair, the method comprising:
- receiving a plurality of first identifiers associated with a client device;
generating a plurality of encoding values based on the plurality of first identifiers;
encrypting the plurality of encoding values using a first key of the key pair;
generating a token uniquely identifying the client device, the token comprising the encrypted plurality of encoding values;
after the token has been generated, receiving a plurality of second identifiers associated with the client device, and the token uniquely identifying the client device;
attempting to decrypt the encrypted plurality of encoding values of the token with a second key of the key pair to obtain a decrypted plurality of encoding values;
when the attempt to decrypt the encrypted plurality of encoding values of the token is successful, decoding the decrypted plurality of encoding values to obtain a decloded plurality of first identifiers, and comparing ones of the decloded plurality of first identifiers with corresponding ones of the plurality of second identifiers to identify any inconsistencies therebetween; and
determining token verification has failed when the attempt to decrypt the encrypted plurality of encoding values is unsuccessful, or inconsistencies between the ones of the decloded plurality of first identifiers and corresponding ones of the second plurality of identifiers are identified.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses, and articles for receiving, by a server, a plurality of identifiers associated with a client device are described herein. The server may also encrypt a plurality of encoding values associated with the plurality of identifiers using a first key of a key pair of the server, and generate a token uniquely identifying the client device, a body of the token including the encrypted plurality of encoding values. In other embodiments, the server may receive a token along with the plurality of identifiers. In such embodiments, the server may further verify the validity of the received token, including attempting to decrypt a body of the received token with a key associated with a second server, the second server having generated the received token, and, if decryption succeeds, comparing ones of the plurality of identifiers with second identifiers found in the decrypted body to check for inconsistencies.
141 Citations
21 Claims
-
1. A method performed by a computing system comprising a key pair, the method comprising:
-
receiving a plurality of first identifiers associated with a client device; generating a plurality of encoding values based on the plurality of first identifiers; encrypting the plurality of encoding values using a first key of the key pair; generating a token uniquely identifying the client device, the token comprising the encrypted plurality of encoding values; after the token has been generated, receiving a plurality of second identifiers associated with the client device, and the token uniquely identifying the client device; attempting to decrypt the encrypted plurality of encoding values of the token with a second key of the key pair to obtain a decrypted plurality of encoding values; when the attempt to decrypt the encrypted plurality of encoding values of the token is successful, decoding the decrypted plurality of encoding values to obtain a decloded plurality of first identifiers, and comparing ones of the decloded plurality of first identifiers with corresponding ones of the plurality of second identifiers to identify any inconsistencies therebetween; and determining token verification has failed when the attempt to decrypt the encrypted plurality of encoding values is unsuccessful, or inconsistencies between the ones of the decloded plurality of first identifiers and corresponding ones of the second plurality of identifiers are identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 17)
-
-
10. A method performed by a computing system comprising a first server and a second server, the second server being associated with a key, the method comprising:
-
receiving, at the second server, a plurality of second identifiers associated with a client device; generating, by the second server, a token comprising an encrypted body comprising the plurality of second identifiers, the plurality of second identifiers being encrypted in the encrypted body, the token acting as a unique identifier of the client device; receiving, at the fist server, a plurality of first identifiers associated with the client device, and the token associated with the client device; attempting, by the first server, to decrypt the encrypted body of the token with the key associated with the second server to thereby decrypt the plurality of second identifiers; when the attempt to decrypt the encrypted body of the token is successful, comparing, by the first server, ones of the plurality of first identifiers with corresponding ones of the plurality of second identifiers to identify any inconsistencies therebetween; and determining, by the first server, token verification has failed when the attempt to decrypt the encrypted body of the token is unsuccessful, or inconsistencies between the ones of the plurality of first identifiers and the corresponding ones of the second plurality of identifiers are identified. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
18. A method performed by a computing system associated with a key, the method comprising:
-
receiving a plurality of second identifiers associated with a client device; generating a token comprising an encrypted body comprising the plurality of second identifiers, the plurality of second identifiers being encrypted in the encrypted body, the token acting as a unique identifier of the client device; receiving a plurality of first identifiers associated with the client device, and the token associated with the client device; attempting to decrypt the encrypted body of the token with the key to thereby decrypt the plurality of second identifiers; when the attempt to decrypt the encrypted body of the token is successful, comparing ones of the plurality of first identifiers with corresponding ones of the plurality of second identifiers to identify any inconsistencies therebetween; and determining token verification has failed when the attempt to decrypt the encrypted body of the token is unsuccessful, or inconsistencies between the ones of the plurality of first identifiers and the corresponding ones of the second plurality of identifiers are identified. - View Dependent Claims (19, 20, 21)
-
Specification