Communicating an identity to a server
First Claim
Patent Images
1. A method to be performed by a client device, the method comprising:
- receiving, via a hardware-implemented communication interface of the client device, a unique subset of M client-identifying keys from a provisioning server;
upon determining a need to communicate an identity of the client device to a server, calculating for each of the M client-identifying keys a hash of a combination comprising the client-identifying key and a current instance of a modulating value; and
communicating the identity of the client device to the server by communicating to the server, via the communication interface, a message comprising a hash-dependent value for each hash, where each hash-dependent value comprises one of the respective hash, a portion of the respective hash, or a value dependent on the respective hash,wherein the need is determined in response to the client device requesting access to one or more services from the server, the server requiring identification of the client device.
4 Assignments
0 Petitions
Accused Products
Abstract
An identity is communicated by a client device to a server without requiring the identity to be disclosed to eavesdroppers and without requiring the use of symmetric or asymmetric cryptography. In one example, the identity is an identity of the client device, where the identity has been assigned to the client device by the server through the provisioning of a unique subset of client-identifying keys. In another example, the identity is an identity of a group shared secret that has been provisioned by the server to the client device.
21 Citations
20 Claims
-
1. A method to be performed by a client device, the method comprising:
-
receiving, via a hardware-implemented communication interface of the client device, a unique subset of M client-identifying keys from a provisioning server; upon determining a need to communicate an identity of the client device to a server, calculating for each of the M client-identifying keys a hash of a combination comprising the client-identifying key and a current instance of a modulating value; and communicating the identity of the client device to the server by communicating to the server, via the communication interface, a message comprising a hash-dependent value for each hash, where each hash-dependent value comprises one of the respective hash, a portion of the respective hash, or a value dependent on the respective hash, wherein the need is determined in response to the client device requesting access to one or more services from the server, the server requiring identification of the client device. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
2. A client device operative:
-
to receive, via a hardware-implemented communication interface of the client device, a unique subset of M client-identifying keys from a provisioning server; upon determining a need to communicate an identity of the client device to a server, to calculate for each of the M client-identifying keys a hash of a combination comprising the client-identifying key and a current instance of a modulating value; and to communicate the identity of the client device to the server by communicating to the server, via the communication interface, a message comprising a hash-dependent value for each hash, where each hash-dependent value comprises one of the respective hash, a portion of the respective hash, or a value dependent on the respective hash, wherein the need is determined in response to the client device requesting access to one or more services from the server the server requiring identification of the client device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
3. A non-transitory computer-readable medium storing code which, when executed by a processor of a client device, causes the client device to:
-
upon determining a need to communicate an identity of the client device to a server, calculate for each of a unique subset of M client-identifying keys received from a provisioning server via a communication interface of the client device a hash of a combination comprising the client-identifying key and a current instance of a modulating value; and communicate the identity of the client device to the server by communicating to the server, via the communication interface, a message comprising a hash-dependent value for each hash, where each hash-dependent value comprises one of the respective hash, a portion of the respective hash, or a value dependent on the respective, hash, wherein the need is determined in response to the client device requesting access to one or more services from the server, the server requiring identification of the client device. - View Dependent Claims (18, 19, 20)
-
Specification