Cryptographically secure authentication device, system and method
First Claim
1. A device comprising:
- a processor;
a non-volatile memory connected to the processor;
a private key generator generating a private key, said private key generator connected to the processor, said processor storing the private key in the non-volatile memory;
an index source indicating an index number to the processor;
said processor performing a number of hashes on the private key to generate an identifying value, the number of hashes based on the index number stored in the non-volatile memory, said processor providing the identifying value for use in authenticating said device, said identifying value generated as a function of the private key stored only on the non-volatile memory, wherein the number of hashes is based on the difference between the index number and a reference number.
10 Assignments
0 Petitions
Accused Products
Abstract
An electronic device generates identifying values which are used in authenticating the electronic device. The device comprises an interface, a private key generator for generating a private key, a non-volatile memory for storing at least the private key, an index source, a hash engine, and a logical interconnection between the private key generator, the non-volatile memory, the index source, the hash engine and the interface. The hash engine generates identifying values provided to the interface via the logical interconnection. The identifying values are provided to a verifying device for use in authenticating the electronic device. Alternatively or in addition, devices may be paired to share a root key to cryptographically communicate between each other and/or to authenticate each other.
27 Citations
19 Claims
-
1. A device comprising:
-
a processor; a non-volatile memory connected to the processor; a private key generator generating a private key, said private key generator connected to the processor, said processor storing the private key in the non-volatile memory; an index source indicating an index number to the processor; said processor performing a number of hashes on the private key to generate an identifying value, the number of hashes based on the index number stored in the non-volatile memory, said processor providing the identifying value for use in authenticating said device, said identifying value generated as a function of the private key stored only on the non-volatile memory, wherein the number of hashes is based on the difference between the index number and a reference number. - View Dependent Claims (2, 3)
-
-
4. A device comprising:
-
a processor; a non-volatile memory connected to the processor; a private key generator generating its own private key, said private key generator connected to the processor, said processor storing the private key in the non-volatile memory; an index source indicating an index number to the processor; said processor performing a number of hashes on the private key to generate an identifying value, the number of hashes based on the index number stored in the non-volatile memory, said processor providing the identifying value for use in authenticating said device, said identifying value generated as a function of the private key stored only on the non-volatile memory wherein the index number is the current date/time and the number of hashes is based on the difference between the current date/time and a future date/time. - View Dependent Claims (5, 6)
-
-
7. A system for authenticating a secure authentication device having a device identifier, the system comprising:
-
a memory to store a prior timestamp and a prior hash value associated with the device identifier; a logical interconnection operatively connected to the memory, the logical interconnection operative to communicate with the device; and a processor operatively connected to the memory and the logical interconnection , the processor operative to receive, via the logical interconnection , the device identifier, a current hash value and a current timestamp, said processor retrieving from the memory the prior timestamp and the prior hash value associated with the device identifier, said processor determining an amount of time between the current timestamp and the prior timestamp, said processor performing a number of hashes on the current hash value to generate an identifying value, wherein the number of hashes is based on the amount of time between the current timestamp and the prior timestamp, and said processor determining whether the identifying value equals the prior hash value, wherein the device is authenticated if the identifying value equals the prior hash value, otherwise the device is not authenticated. - View Dependent Claims (8)
-
-
9. A method for authenticating a secure identification device, comprising:
-
receiving a device identifier, a hash value and a current timestamp; retrieving a prior timestamp and a prior hash value associated with a prior authentication of a device identified by the device identifier; determining an amount of time between the current timestamp and the prior timestamp; performing a number of hashes on the hash value, the number of hashes based on the amount of time between the current timestamp and the prior timestamp; and determining whether a resulting value of the performing the number of hashes equals the prior hash value, wherein the device is authenticated if the resulting value equals the prior hash value, otherwise the device is not authenticated. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification