×

Protecting against counterfeit electronics devices

  • US 8,762,714 B2
  • Filed: 04/24/2007
  • Issued: 06/24/2014
  • Est. Priority Date: 04/24/2007
  • Status: Active Grant
First Claim
Patent Images

1. One or more non-transitory computer readable media having encoded thereon computer-executable instructions which, when executed by one or more computers, cause the one or more computers to perform the following acts:

  • generating, by a host device, a first data string, wherein the first data string differs each time the first data string is generated and has a first cryptographic state generated using a first cryptographic key programmed into the host device by a first manufacturer;

    writing, by the host device, the first data string having the first cryptographic state to a first predetermined memory location on an optical transceiver;

    accessing a second predetermined memory location on the optical transceiver, wherein the first and the second predetermined memory locations are known and accessible to the host device such that the host device can write to and retrieve data from the first and the second predetermined memory locations;

    detecting, by the host device, whether the first data string having a second cryptographic state is in the second predetermined memory location, wherein the first cryptographic state of the first data string has been changed to the second cryptographic state using a second cryptographic key programmed to the optical transceiver by a second manufacturer and the first and second predetermined memory locations are agreed upon by the first and second manufactures;

    in response to not detecting the first data string having the second cryptographic state in the second predetermined memory location, deactivating the optical transceiver; and

    in response to detecting the first data string having the second cryptographic state in the second predetermined memory location;

    retrieving, by the host device, the first data string having the second cryptographic state from the second predetermined memory location;

    changing the second cryptographic state of the first data string to a third cryptographic state using the first cryptographic key;

    determining whether the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string; and

    in response to determining that the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string, authorizing the optical transceiver for operational use with the host device.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×