×

Method and apparatus for disabling algorithms in a device

  • US 9,698,983 B2
  • Filed: 10/09/2012
  • Issued: 07/04/2017
  • Est. Priority Date: 10/09/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, at a network management device, an indication of one or more cryptographic modules each implementing a cryptographic algorithm residing on a communication device;

    determining, at the network management device, whether a cryptographic module of the one or more cryptographic modules is identified as a weak cryptographic module, wherein the weak cryptographic module is at least susceptible to a security breach;

    generating, at the network management device, a message that comprises at least one shared key and input challenge data and that, when processed by the weak cryptographic module, results in the generation of predefined output values that signify that the weak cryptographic module should remove or disable itself;

    instructing, by the network management device, the communication device to execute the detected weak cryptographic module to process the message comprising the at least one shared key and the input challenge data, wherein the weak cryptographic module removes or disables itself in response to detecting that its generated output values comprise the predefined output values; and

    determining, by the network management device, that the weak cryptographic module has been removed or disabled based on receiving an authentication value from an authentication attempt with the communication device that produces an invalid response.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×