Registration and authentication of computing devices using a digital skeleton key
First Claim
1. A method for registering a first computing device to a user account using at least one user-selected fingerprintable second device externally accessible to the first computing device comprising:
- transmitting a registration information request to the first computing device;
receiving at least one device fingerprint of the at least one user-selected fingerprintable second device accessible by the first computing device, and primary identification data of the first computing device;
generating a skeleton key using the at least one device fingerprint of the at least one user-selected fingerprintable second computing device;
recording the primary identification data; and
associating the skeleton key and the primary identification data with the user account;
wherein the receiving step further comprises receiving device fingerprints of a plurality of user-selected fingerprintable second computing devices accessible by the first computing device; and
wherein the generating step includes generating the skeleton key based on an order in which the device fingerprints of the plurality of user-selected fingerprintable second computing devices accessible by the first computing device are received.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing device including transmitting a registration information request to the computing device, receiving at least one device fingerprint of the at least one user-selected fingerprintable device accessible by the computing device, and primary identification data of the computing device, generating a skeleton key, recording the primary identification data, and associating the skeleton key and the primary identification data with the user account. A method for authenticating the computing device including transmitting an authentication information request to the computing device, receiving an encrypted identification data from the computing device, decrypting the encrypted identification data using a skeleton key associated with the user account, comparing the decrypted identification data with a primary identification data associated with the user account, and authenticating the computing device.
156 Citations
21 Claims
-
1. A method for registering a first computing device to a user account using at least one user-selected fingerprintable second device externally accessible to the first computing device comprising:
-
transmitting a registration information request to the first computing device; receiving at least one device fingerprint of the at least one user-selected fingerprintable second device accessible by the first computing device, and primary identification data of the first computing device; generating a skeleton key using the at least one device fingerprint of the at least one user-selected fingerprintable second computing device; recording the primary identification data; and associating the skeleton key and the primary identification data with the user account; wherein the receiving step further comprises receiving device fingerprints of a plurality of user-selected fingerprintable second computing devices accessible by the first computing device; and wherein the generating step includes generating the skeleton key based on an order in which the device fingerprints of the plurality of user-selected fingerprintable second computing devices accessible by the first computing device are received. - View Dependent Claims (2, 3)
-
-
4. A non-transitory computer readable medium useful in association with a skeleton key server which includes one or more processors, and a memory, the computer readable medium including computer instructions which are configured to cause the skeleton key server, by execution of the computer instructions in the one or more processors from the memory, to implement registration of a first computing device to a user account using at least one user-selectable fingerprintable second computing device externally accessible to the first computing device by:
-
transmitting a registration information request to the first computing device; receiving at least one device fingerprint of the at least one user-selected fingerprintable second computing device accessible by the first computing device, and primary identification data of the first computing device; generating a skeleton key using the at least one device fingerprint of the at least one user-selected fingerprintable second computing device; recording the primary identification data; and associating the skeleton key and the primary identification data with the user account; wherein the receiving step further comprises receiving device fingerprints of a plurality of user-selected fingerprintable second computing devices accessible by the first computing device; and wherein the generating step includes generating the skeleton key based on an order in which the device fingerprints of the plurality of user-selected fingerprintable second computing devices accessible by the first computing device are received. - View Dependent Claims (5, 6)
-
-
7. A computer system comprising:
-
at least one hardware processor; a non-transitory computer readable medium that is operatively coupled to the hardware processor; and
a first computing device registration logic that (i) executes in the processor from the computer readable medium and (ii) when executed by the processor causes the computer system to implement registration of a first computing device to a user account using at least one user-selected fingerprintable second computing device externally accessible to the first computing device by;transmitting a registration information request to the first computing device; receiving at least one device fingerprint of the at least one user-selected fingerprintable second computing device accessible by the first computing device, and primary identification data of the first computing device; generating a skeleton key using the at least one device fingerprint of the at least one user-selected fingerprintable second computing device; recording the primary identification data; and associating the skeleton key and the primary identification data with the user account; wherein the receiving step further comprises receiving device fingerprints of a plurality of user-selected fingerprintable second computing devices accessible by the first computing device; and wherein the generating step includes generating the skeleton key based on an order in which the device fingerprints of the plurality of user-selected fingerprintable second computing devices accessible by the first computing device are received. - View Dependent Claims (8, 9)
-
-
10. A method for authenticating a first computing device associated with a user account using at least one user-selected fingerprintable second computing device accessible by the first computing device, the method comprising:
-
transmitting an authentication information request to the first computing device; receiving an encrypted identification data from the first computing device wherein the encrypted identification data has been encrypted by device fingerprints device fingerprints of a plurality of second computing devices accessible by the first computing device; decrypting the encrypted identification data using a skeleton key associated with the user account; wherein the skeleton key is generated based on an order in which the device fingerprints of the plurality of user selected fingerprintable second computing devices accessible by the first computing device are received and includes at least one stored device fingerprint, and the decrypting step further comprises using the at least one stored device fingerprint to decrypt the encrypted identification data; comparing the decrypted identification data with a primary identification data associated with the user account; and authenticating the first computing device when the decrypted identification data matches the primary identification data. - View Dependent Claims (11, 12, 19, 20, 21)
-
-
13. A non-transitory computer readable medium useful in association with a skeleton key server which includes one or more processors, and a memory, the computer readable medium including computer instructions which are configured to cause the skeleton key server, by execution of the computer instructions in the one or more processors from the memory, to implement authentication of a first computing device associated with a user account using at least one second computing device accessible by the first computing device by:
-
transmitting an authentication information request to the first computing device; receiving an encrypted identification data from the first computing device wherein the encrypted identification data has been encrypted by device fingerprints device fingerprints of a plurality of second computing devices accessible by the first computing device; decrypting the encrypted identification data using a skeleton key associated with the user account; wherein the skeleton key is generated based on an order in which the device fingerprints of the plurality of user selected fingerprintable second computing devices accessible by the first computing device are received and includes at least one stored device fingerprint, and the decrypting step further comprises using the at least one stored device fingerprint to decrypt the encrypted identification data; comparing the decrypted identification data with a primary identification data associated with the user account; and authenticating the first computing device when the decrypted identification data matches the primary identification data. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification