Method and apparatus for simplified audio authentication
First Claim
1. An authentication apparatus operable to produce a secure identifier, the apparatus comprising:
- a processor;
a clock coupled to the processor configurable to generate a time element;
a memory element coupled to the processor configurable to store a private key and public key information;
at least one actuator coupled to the processor;
a signature generator coupled to the processor operable to generate a digital signature, the digital signature being a function of the private key and the time element; and
an emitter coupled to the signal generator operable to emit the secure identifier, the secure identifier comprising the digital signature, time element, and public key information.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for authentication having a processor and at least one activator coupled to the processor is claimed. A signature generator is coupled to the processor and capable of generating a secure identifier. An emitter coupled to the signal generator capable of emitting the secure identifier. A receiver receives the emitted secure identifier and verifies that the secure identifier was appropriately transmitted. The public key corresponding to the key identifier transmitted is accessed to determine the validity of the secure identifier using the accessed key and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
72 Citations
58 Claims
-
1. An authentication apparatus operable to produce a secure identifier, the apparatus comprising:
-
a processor;
a clock coupled to the processor configurable to generate a time element;
a memory element coupled to the processor configurable to store a private key and public key information;
at least one actuator coupled to the processor;
a signature generator coupled to the processor operable to generate a digital signature, the digital signature being a function of the private key and the time element; and
an emitter coupled to the signal generator operable to emit the secure identifier, the secure identifier comprising the digital signature, time element, and public key information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of authenticating, comprising:
-
generating a time element;
identifying a key identifier;
generating a digital signature;
generating a secure identifier as a function of the time element, the key identifier, the digital signature; and
emitting the secure identifier. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An authentication receiver, comprising:
a receiver configurable to receive a secure identifier, the secure identifier comprising;
a digital signature, the digital signature comprising information derived from a private key, a public key identifier; and
a time identifier; and
a verifier configurable to verify the secure identifier, the verifier comprising;
memory comprising information corresponding to the public key information received and time tolerance information;
a key retriever coupled to the memory and configurable to retrieve a public key corresponding to the public key identifier; and
a time verifier coupled to the memory and configurable to verify that the received time identifier falls within acceptable time tolerances. - View Dependent Claims (21, 22, 23, 24, 25)
-
26. A method of authenticating, comprising:
-
receiving a secure identifier, the secure identifier comprising a digital signature, a key identifier, and a time identifier; and
verifying the secure identifier, verifying comprising;
verifying that the public key identifier received corresponds to known information regarding the public key identifier received; and
verifying the time identifier such that the time identifier received is within predetermined time tolerances. - View Dependent Claims (27, 28, 29)
-
-
30. An authentication apparatus operable to produce a secure identifier, the apparatus comprising:
-
a processor means;
a clock means coupled to the processor configurable to generate a time element;
a memory element means coupled to the processor means configurable to store a private key means and public key information means;
at least one actuator means coupled to the processor means;
a signature generator means coupled to the processor means operable to generate a digital signature means, the digital signature means being a function of the private key means and the time element means; and
an emitter means coupled to the signal generator means operable to emit the secure identifier, the secure identifier comprising the digital signature, time element, and public key information. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A method of authenticating, comprising:
-
means for generating a time element;
means for identifying a key identifier;
means for generating a digital signature;
means for generating a secure identifier as a function of the time element, the key identifier, the digital signature; and
means for emitting the secure identifier. - View Dependent Claims (45, 46, 47, 48)
-
-
49. An authentication receiver, comprising:
a receiver means configurable to receive a secure identifier means, the secure identifier means comprising;
a digital signature means, the digital signature means comprising information derived from a private key means, a public key identifier means; and
a time identifier means; and
a verifier means configurable to verify the secure identifier means, the verifier means comprising;
memory means comprising information corresponding to the public key information means received and time tolerance information means;
a key retriever means coupled to the memory means and configurable to retrieve a public key means corresponding to the public key identifier means; and
a time verifier means coupled to the memory means and configurable to verify that the received time identifier means falls within acceptable time tolerances. - View Dependent Claims (50, 51, 52, 53, 54)
-
55. A method of authenticating, comprising:
-
means for receiving a secure identifier, the secure identifier comprising a digital signature, a key identifier, and a time identifier; and
means for verifying the secure identifier, verifying comprising;
means for verifying that the public key identifier received corresponds to known information regarding the public key identifier received; and
means for verifying the time identifier such that the time identifier received is within predetermined time tolerances. - View Dependent Claims (56, 57, 58)
-
Specification