×

Randomly skewing secret values as a countermeasure to compromise

  • US 9,525,551 B1
  • Filed: 09/29/2011
  • Issued: 12/20/2016
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of authenticating a first cryptographic device by second cryptographic device, the method comprising the steps of:

  • storing in the second cryptographic device an alternative version of a secret value associated with the first cryptographic device in place of the secret value itself as a countermeasure to compromise of the secret value;

    in conjunction with a protocol carried out between the first cryptographic device and the second cryptographic device, determining in the second cryptographic device the secret value based at least in part on the alternative version of the secret value; and

    authenticating the first cryptographic device utilizing the determined secret value in the second cryptographic device;

    wherein the first cryptographic device comprises a time-synchronous authentication token and the second cryptographic device comprises an authentication server;

    wherein the secret value comprises a randomized clock drift vector of the time-synchronous authentication token;

    wherein the randomized clock drift vector is randomized by selection of said clock drift vector from a range between a minimum clock drift vector and a maximum clock drift vector; and

    wherein the alternative version of the secret value comprising the randomized clock drift vector comprises information specifying the minimum clock drift vector and the maximum clock drift vector.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×