Identity authentication system and method
First Claim
Patent Images
1. A method of generating an identity authentication code associated with an authentication device, comprising:
- providing event state data that specifies an operating condition of the authentication device, the operating condition specifying information on the likelihood that the authentication device has or will develop an operational problem; and
generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device;
wherein the operating condition of the authentication device includes information about whether a battery supplying power to the authentication device has fallen below an expected power level.
14 Assignments
0 Petitions
Accused Products
Abstract
A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.
385 Citations
69 Claims
-
1. A method of generating an identity authentication code associated with an authentication device, comprising:
-
providing event state data that specifies an operating condition of the authentication device, the operating condition specifying information on the likelihood that the authentication device has or will develop an operational problem; and generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device; wherein the operating condition of the authentication device includes information about whether a battery supplying power to the authentication device has fallen below an expected power level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of generating an identity authentication code associated with an authentication device, comprising:
-
providing event state data that is a security indicator for an authentication system of which the authentication device is a component; and
,generating an identity authentication code that depends on (ii the event state data, and (ii) a secret associated with the device; wherein the security indicator includes information regarding a length of time the authentication device has been inserted into a device reader. - View Dependent Claims (21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35, 62, 63)
-
-
27. A method of generating an identity authentication code associated with an authentication device, comprising:
-
providing event state data that is a security indicator for an authentication system of which the authentication device is a component; and
,generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device; wherein the security indicator includes information regarding a protection level of the secret associated with the device.
-
-
36. A method of generating an identity authentication code associated with an authentication device, comprising:
-
providing event state data that specifies information about environmental conditions associated with the authentication device; and
,generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device; wherein the information includes temperature characteristics associated with the authentication device - View Dependent Claims (37, 38, 39, 40, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
41. A method of generating an identity authentication code associated with an authentication device. comprising:
-
providing event state data that specifies information about environmental conditions associated with the authentication device; and
,generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device; wherein the information includes radiation levels to which the authentication device has been exposed.
-
-
42. method of generating an identity authentication code associated with an authentication device. comprising:
-
providing event state data that specifies information about environmental conditions associated with the authentication device; and
,generating an identity authentication code that depends on (i) the event state data, and (ii) a secret associated with the device; wherein the information indicates whether static discharge to the device has occurred.
-
-
51. A method for verifying the correctness of an identity authentication code, comprising:
-
receiving authentication information including the identity authentication code generated by an authentication device that depends on (i) a secret associated with the device, and (ii) event state data that specifies an operating condition of the authentication device, the operating condition specifying information on the likelihood that the authentication device has or will develop an operational problem; and verifying the correctness of the identity authentication code, and determining the condition of the authentication device in response to the received identity authentication code; wherein the operating condition of the authentication device includes information about whether a battery supplying power to the authentication device has fallen below an expected power level. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59)
-
-
60. A method for verifying the correctness of an identity authentication code, comprising:
-
receiving authentication information including the identity authentication code generated by an authentication device that depends on (i) a secret associated with the device, and (ii) event state data that is a security indicator for an authentication system of which the authentication device is a component and verifying the correctness of the identity authentication code, and determining the event state data in response to the received identity authentication code; wherein the security indicator includes information about whether the device has been subjected to tampering; and
wherein the event state data was generated using a funkspiel scheme. - View Dependent Claims (64, 65)
-
-
61. A method for verifying the correctness of an identity authentication code, comprising:
-
receiving authentication information including an identity authentication code generated by an authentication device that depends on (i) a secret associated with the device, and (ii) event state data that specifies information about environmental conditions associated with the authentication device; and verifying the correctness of an identity authentication code, and determining the event state data in response to the received identity authentication codes; wherein the information includes temperature characteristics associated with the authentication device. - View Dependent Claims (66, 67, 68, 69)
-
Specification