Protected resource access control utilizing intermediate values of a hash chain
First Claim
1. A method comprising:
- obtaining an intermediate value of a hash chain associated with a given access control interval;
utilizing at least a portion of the intermediate value to access a protected resource via an access control module during the given access control interval, an initial value of the hash chain being stored in a secure manner inaccessible to the access control module; and
repeating the obtaining and utilizing for one or more additional access control intervals using respective different intermediate values of the hash chain;
wherein the method is performed at least in part by a processing device comprising a processor coupled to a memory.
2 Assignments
0 Petitions
Accused Products
Abstract
A processing device comprises a processor coupled to a memory and is configured to obtain an intermediate value of a hash chain associated with a given access control interval, to utilize at least a portion of the intermediate value to access a protected resource during the given access control interval, and to repeat the obtaining and utilizing for one or more additional access control intervals using respective different intermediate values of the hash chain. The hash chain may comprise one of a plurality of hash chains derived from a common key, where the plurality of hash chains are associated with corresponding distinct resources and initial values of the plurality of hash chains are determined as respective functions of the common key and identifying information for corresponding ones of the protected resources.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining an intermediate value of a hash chain associated with a given access control interval; utilizing at least a portion of the intermediate value to access a protected resource via an access control module during the given access control interval, an initial value of the hash chain being stored in a secure manner inaccessible to the access control module; and repeating the obtaining and utilizing for one or more additional access control intervals using respective different intermediate values of the hash chain; wherein the method is performed at least in part by a processing device comprising a processor coupled to a memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
at least one processing device comprising a processor coupled to a memory; the processing device being configured; to obtain an intermediate value of a hash chain associated with a given access control interval; to utilize at least a portion of the intermediate value to access a protected resource via an access control module during the given access control interval, an initial value of the hash chain being stored in a secure manner inaccessible to the access control module; and to repeat the obtaining and utilizing for one or more additional access control intervals using respective different intermediate values of the hash chain. - View Dependent Claims (15, 16)
-
-
17. A method comprising:
-
receiving at least a portion of an intermediate value of a hash chain associated with a given access control interval in an access control module, an initial value of the hash chain being stored in a secure manner inaccessible to the access control module; authenticating the at least a portion of the intermediate value to control access to a protected resource via the access control module during the given access control interval; and repeating the receiving and authenticating for one or more additional access control intervals using respective different intermediate values of the hash chain; wherein the method is performed at least in part by a processing device comprising a processor coupled to a memory. - View Dependent Claims (18, 19)
-
-
20. An apparatus comprising:
-
at least one processing device comprising a processor coupled to a memory; the processing device being configured; to receive at least a portion of an intermediate value of a hash chain associated with a given access control interval in an access control module, an initial value of the hash chain being stored in a secure manner inaccessible to the access control module; to authenticate the at least a portion of the intermediate value to control access to a protected resource via the access control module during the given access control interval; and to repeat the receiving and authenticating for one or more additional access control intervals using respective different intermediate values of the hash chain.
-
Specification