Protecting against counterfeit electronics devices
First Claim
1. One or more non-transitory computer readable media having encoded thereon computer-executable instructions which, when executed by one or more computers, cause the one or more computers to perform the following acts:
- generating, by a host device, a first data string, wherein the first data string differs each time the first data string is generated and has a first cryptographic state generated using a first cryptographic key programmed into the host device by a first manufacturer;
writing, by the host device, the first data string having the first cryptographic state to a first predetermined memory location on an optical transceiver;
accessing a second predetermined memory location on the optical transceiver, wherein the first and the second predetermined memory locations are known and accessible to the host device such that the host device can write to and retrieve data from the first and the second predetermined memory locations;
detecting, by the host device, whether the first data string having a second cryptographic state is in the second predetermined memory location, wherein the first cryptographic state of the first data string has been changed to the second cryptographic state using a second cryptographic key programmed to the optical transceiver by a second manufacturer and the first and second predetermined memory locations are agreed upon by the first and second manufactures;
in response to not detecting the first data string having the second cryptographic state in the second predetermined memory location, deactivating the optical transceiver; and
in response to detecting the first data string having the second cryptographic state in the second predetermined memory location;
retrieving, by the host device, the first data string having the second cryptographic state from the second predetermined memory location;
changing the second cryptographic state of the first data string to a third cryptographic state using the first cryptographic key;
determining whether the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string; and
in response to determining that the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string, authorizing the optical transceiver for operational use with the host device.
5 Assignments
0 Petitions
Accused Products
Abstract
An optical transceiver module is authenticated in a host system. A host generates a data string and writes the data string to a first predetermined memory location known to the transceiver. The data string is cryptographically altered (either encrypted or decrypted) by the transceiver and written to a second predetermined memory location known to the host. The host retrieves the cryptographically altered data string and performs a complementary cryptographic operation (either a decryption or encryption, respectively) thereon, creating a resulting data string. If the resulting data string is equal to the data string written to the first predetermined memory location, the transceiver is authenticated. The host and the transceiver may switch roles, with the transceiver generating the data string, the host cryptographically altering it, and so on. The host encrypts data strings when the transceiver decrypts data strings, and vice versa.
-
Citations
13 Claims
-
1. One or more non-transitory computer readable media having encoded thereon computer-executable instructions which, when executed by one or more computers, cause the one or more computers to perform the following acts:
-
generating, by a host device, a first data string, wherein the first data string differs each time the first data string is generated and has a first cryptographic state generated using a first cryptographic key programmed into the host device by a first manufacturer; writing, by the host device, the first data string having the first cryptographic state to a first predetermined memory location on an optical transceiver; accessing a second predetermined memory location on the optical transceiver, wherein the first and the second predetermined memory locations are known and accessible to the host device such that the host device can write to and retrieve data from the first and the second predetermined memory locations; detecting, by the host device, whether the first data string having a second cryptographic state is in the second predetermined memory location, wherein the first cryptographic state of the first data string has been changed to the second cryptographic state using a second cryptographic key programmed to the optical transceiver by a second manufacturer and the first and second predetermined memory locations are agreed upon by the first and second manufactures; in response to not detecting the first data string having the second cryptographic state in the second predetermined memory location, deactivating the optical transceiver; and in response to detecting the first data string having the second cryptographic state in the second predetermined memory location; retrieving, by the host device, the first data string having the second cryptographic state from the second predetermined memory location; changing the second cryptographic state of the first data string to a third cryptographic state using the first cryptographic key; determining whether the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string; and in response to determining that the first cryptographic state of the first data string is identical to the third cryptographic state of the first data string, authorizing the optical transceiver for operational use with the host device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. One or more non-transitory computer readable media having encoded thereon computer-executable instructions which, when executed by one or more computers, cause the one or more computers to perform the following acts:
-
receiving a data string in a first predetermined memory location, wherein the data string has a first cryptographic state generated by using a first cryptographic key that is programmed by a first manufacturer; in response to not detecting the data string having the first cryptographic state in the first predetermined memory location, deactivating an optical transceiver; in response to detecting the data string having the first cryptographic state in the first predetermined memory location, changing the first cryptographic state of the data string to a second cryptographic state with a second cryptographic key that is programmed by a second manufacturer; writing the data string having the second cryptographic state to a second predetermined memory location, wherein the first and the second predetermined memory locations exist in persistent memory of the optical transceiver or a host device and are known and accessible to the other of the optical transceiver or the host device such that the optical transceiver or the host device can write to and retrieve data from the first and second predetermined memory locations and the first and second predetermined memory locations are agreed upon by the first and second manufactures; retrieving the data string having the second cryptographic state from the second predetermined memory location; changing the second cryptographic state of the data string retrieved from the second predetermined memory location to a third cryptographic state using the first cryptographic key; determining whether the third cryptographic state of the data string is identical to the first cryptographic state of the data string; and in response to determining that the third cryptographic state of the data string is identical to the first cryptographic state of the data string, permitting the optical transceiver to be operationally used with the host device, wherein the second cryptographic key is complementary to the first cryptographic key if the first and the second manufacturers agree to permit the optical transceiver to be operationally used with the host device or the second cryptographic key is non-complementary to the first cryptographic key if the first and the second manufacturers do not agree to permit the optical transceiver to be operationally used with the host device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
Specification