Registration and authentication of computing devices using a digital skeleton key
First Claim
1. A non-transitory computer readable medium useful in association with a skeleton key server which includes one or more processors, and a memory, the computer readable medium including computer instructions which are configured to cause the skeleton key server, by execution of the computer instructions in the one or more processors from the memory, to implement authentication of a first device associated with a user account using at least one second device accessible by the first device, wherein the second device is user-selected and fingerprintable, by:
- transmitting an authentication information request to the first device;
receiving an encrypted identification data from the first device which has been encrypted by at least one device fingerprint of at least one second device accessible by the first device, wherein the second device is user-selected and fingerprintable;
decrypting the encrypted identification data using a skeleton key associated with the user account;
wherein the skeleton key includes at least one stored device fingerprint, and the decrypting step further comprises using the at least one stored device fingerprint to decrypt the encrypted identification data;
comparing the decrypted identification data with a primary identification data associated with the user account; and
authenticating the computing device when the decrypted identification data matches the primary identification data.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing device including transmitting a registration information request to the computing device, receiving at least one device fingerprint of the at least one user-selected fingerprintable device accessible by the computing device, and primary identification data of the computing device, generating a skeleton key, recording the primary identification data, and associating the skeleton key and the primary identification data with the user account. A method for authenticating the computing device including transmitting an authentication information request to the computing device, receiving an encrypted identification data from the computing device, decrypting the encrypted identification data using a skeleton key associated with the user account, comparing the decrypted identification data with a primary identification data associated with the user account, and authenticating the computing device.
109 Citations
7 Claims
-
1. A non-transitory computer readable medium useful in association with a skeleton key server which includes one or more processors, and a memory, the computer readable medium including computer instructions which are configured to cause the skeleton key server, by execution of the computer instructions in the one or more processors from the memory, to implement authentication of a first device associated with a user account using at least one second device accessible by the first device, wherein the second device is user-selected and fingerprintable, by:
-
transmitting an authentication information request to the first device; receiving an encrypted identification data from the first device which has been encrypted by at least one device fingerprint of at least one second device accessible by the first device, wherein the second device is user-selected and fingerprintable; decrypting the encrypted identification data using a skeleton key associated with the user account; wherein the skeleton key includes at least one stored device fingerprint, and the decrypting step further comprises using the at least one stored device fingerprint to decrypt the encrypted identification data; comparing the decrypted identification data with a primary identification data associated with the user account; and authenticating the computing device when the decrypted identification data matches the primary identification data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification