×

Secure authentication of identification for computing devices

  • US 9,264,234 B2
  • Filed: 01/24/2012
  • Issued: 02/16/2016
  • Est. Priority Date: 06/03/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of generating a signature for a computing device, the method comprising:

  • receiving a particular value and a plurality of identifiers that each uniquely identifies the computing device, wherein each identifier is used to generate a different signature;

    applying a hash function using a combination of a received first identifier of the plurality of identifiers and the particular value to generate a hash value;

    applying a symmetric cryptographic operation to the hash value to generate a result;

    combining the result and the particular value to determine the signature for the computing device, wherein a received second identifier of the plurality of identifiers is used to generate a second signature by applying at least one of a different hash function and a different symmetricic operation; and

    storing the signatures for the computing device for later use by other devices in verifying the received identifier.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×