Secure authentication of identification for computing devices
First Claim
Patent Images
1. A method of generating a signature for a computing device, the method comprising:
- receiving a particular value and a plurality of identifiers that each uniquely identifies the computing device, wherein each identifier is used to generate a different signature;
applying a hash function using a combination of a received first identifier of the plurality of identifiers and the particular value to generate a hash value;
applying a symmetric cryptographic operation to the hash value to generate a result;
combining the result and the particular value to determine the signature for the computing device, wherein a received second identifier of the plurality of identifiers is used to generate a second signature by applying at least one of a different hash function and a different symmetricic operation; and
storing the signatures for the computing device for later use by other devices in verifying the received identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
In the field of computer and data security, the identifier (ID) of a computing device is protected by providing a secure signature used to verify the ID. The signature is computed from the ID using a “White Box” cryptographic process and a hash function. This provides a signature that is computationally easy to verify but difficult or impossible to generate by a hacker (unauthorized user). This method of first creating the signature and later verifying the identifier using the signature and the associated computing apparatus are thereby useful for protection against hacking of such identifiers of computing devices.
-
Citations
19 Claims
-
1. A method of generating a signature for a computing device, the method comprising:
-
receiving a particular value and a plurality of identifiers that each uniquely identifies the computing device, wherein each identifier is used to generate a different signature; applying a hash function using a combination of a received first identifier of the plurality of identifiers and the particular value to generate a hash value; applying a symmetric cryptographic operation to the hash value to generate a result; combining the result and the particular value to determine the signature for the computing device, wherein a received second identifier of the plurality of identifiers is used to generate a second signature by applying at least one of a different hash function and a different symmetricic operation; and storing the signatures for the computing device for later use by other devices in verifying the received identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for verifying a plurality of identifiers of a computing device, the method comprising:
-
receiving a plurality of signatures and the plurality of identifiers of the computing device, each identifier associated with a different signature; partitioning a first signature, associated with a first identifier, into a first portion and a second portion; applying a symmetric cryptographic operation on the first portion to generate a result; applying a hash function using a combination of the second portion and the first identifier to generate a hash value; and verifying the first identifier by comparing the hash value to the result of the cryptographic process, wherein a second identifier that is associated with a second signature is verified by applying at least one of a different symmetric cryptographic operation and a different hash function. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory machine-readable medium storing a program which when executed by at least one processing unit generates a signature for a computing device, the program comprising sets of instructions for:
-
receiving (i) a plurality of identifiers that each uniquely identifies the computing device and (ii) a particular value, wherein each identifier is used to generate a different signature; applying a hash function using a combination of a received first identifier of the plurality of identifiers and the particular value to generate a hash value; applying a symmetric cryptographic operation to the hash value to generate a result; combining the result and the particular value to determine the signature for the computing device, wherein a received second identifier of the plurality of identifiers is used to generate a second signature by applying at least one of a different hash function and a different symmetric cryptographic operation; and storing the signatures for the computing device for later use by other devices in verifying the received identifier. - View Dependent Claims (18, 19)
-
Specification