CRYPTOGRAPHIC SECURITY FUNCTIONS BASED ON ANTICIPATED CHANGES IN DYNAMIC MINUTIAE
First Claim
1. A method for dynamic key cryptography, the method comprising:
- selecting a combination of minutia from a plurality of dynamically changing minutia comprising hardware minutia, firmware minutia, software minutia, geo-location data, calling app data, user secrets, or biometric information;
for a particular device, sending a challenge to the device, wherein;
the challenge includes information from which the device can collect actual values of minutia corresponding to the selected combination of minutia chosen from the plurality of dynamically changing minutia and, based on the challenge and the collected actual values, compute an actual response to the challenge;
pre-processing a set of responses to the challenge based on anticipating changes to the plurality of dynamically changing minutia from which the selected combination of minutia is chosen, wherein;
the set of pre-processed responses covers a range of all actual responses possible to be received from the particular device, whether or not an anticipated change has occurred to one or more of the collected actual values, if the combination of the particular device with collected actual values of minutia is valid;
comparing the actual response from the particular device to the set of pre-processed responses; and
validating the combination of the particular device with the collected actual values if the actual response is included in the set of pre-processed responses for the particular device.
1 Assignment
0 Petitions
Accused Products
Abstract
Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user'"'"'s electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely identifying and validating the device include: selecting a subset of minutia from a plurality of minutia types; computing a challenge from which the user device can form a response based on the selected combination of minutia; computing a set of pre-processed responses that covers a range of all actual responses possible to be received from the device if the combination of the particular device with the device'"'"'s collected actual values of minutia is valid; receiving an actual response to the challenge from the device; determining whether the actual response matches any of the pre-processed responses; and providing validation, enabling authentication, data protection, and digital signatures.
-
Citations
21 Claims
-
1. A method for dynamic key cryptography, the method comprising:
-
selecting a combination of minutia from a plurality of dynamically changing minutia comprising hardware minutia, firmware minutia, software minutia, geo-location data, calling app data, user secrets, or biometric information; for a particular device, sending a challenge to the device, wherein; the challenge includes information from which the device can collect actual values of minutia corresponding to the selected combination of minutia chosen from the plurality of dynamically changing minutia and, based on the challenge and the collected actual values, compute an actual response to the challenge; pre-processing a set of responses to the challenge based on anticipating changes to the plurality of dynamically changing minutia from which the selected combination of minutia is chosen, wherein; the set of pre-processed responses covers a range of all actual responses possible to be received from the particular device, whether or not an anticipated change has occurred to one or more of the collected actual values, if the combination of the particular device with collected actual values of minutia is valid; comparing the actual response from the particular device to the set of pre-processed responses; and validating the combination of the particular device with the collected actual values if the actual response is included in the set of pre-processed responses for the particular device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for identifying a device, comprising:
-
selecting a varying combination of minutia from a plurality of dynamically changing minutia reflecting user personalization associated with the device; for a particular device, sending a challenge to the device, wherein the challenge includes information from which the device can collect actual values of minutia corresponding to the selected combination of minutia chosen from the plurality of dynamically changing minutia and, based on the challenge and the collected actual values, compute an actual response to the challenge; pre-processing a set of responses to the challenge based on anticipating changes to the plurality of dynamically changing minutia from which the selected combination of minutia is chosen, wherein; the set of pre-processed responses covers a range of all actual responses possible to be received from the particular device if the combination of the particular device with collected actual values of minutia is valid; comparing the actual response from the particular device to the set of pre-processed responses; and validating the combination of the particular device with the collected actual values if the actual response is included in the set of pre-processed responses for the particular device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising a server configured to communicate with a device, wherein:
-
the server variably selects a combination of minutia from a plurality of dynamically changing minutia comprising hardware minutia, firmware minutia, software minutia, geo-location data, calling app data, user secrets, or biometric information; for a particular device, the server sends a challenge to the device, wherein; the challenge includes information from which the device can collect actual values of minutia corresponding to the selected combination of minutia chosen from the plurality of dynamically changing minutia and, based on the challenge and the collected actual values, compute an actual response to the challenge; the server pre-processes a set of responses to the challenge based on anticipating changes to the plurality of dynamically changing minutia from which the selected combination of minutia is chosen, wherein; the set of pre-processed responses covers a range of all actual responses possible to be received from the particular device if the combination of the particular device with collected actual values of minutia is valid; and processing the set of pre-processed responses applies knowledge from tracking all known or projected updates so that changes in the collected actual values are detected from the actual response without the actual response carrying any information about the actual values; the server compares the actual response from the particular device to the set of pre-processed responses; and the server validates the combination of the particular device with the collected actual values if the actual response is included in the set of pre-processed responses for the particular device, wherein the actual response contains no information as to what are the collected actual values.
-
Specification