Simple authentication of messages
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing device, a set of at least two synchronization messages, wherein each synchronization message of the at least two synchronization message comprises a respective authentication token for comparison with a respective corresponding trusted bit string associated with the respective unique sender;
applying, by the computing device, a hash function to the authentication token of each received synchronization message of the set at least one time to generate a corresponding hash result for each received synchronization message;
determining, by the computing device, whether the hash result for each received synchronization message matches the corresponding trusted bit string for the unique sender associated with the received synchronization message;
defining, by the computing device, a time point boundary between a first time synchronization period and a second time synchronization period using a value that is determined based at least in part on receipt times of each received synchronization message of the set whose corresponding hash result matched its corresponding trusted bit string; and
for each received synchronization message whose respective corresponding hash result matched its respective corresponding trusted bit string, replacing, by the computing device, the corresponding trusted bit string with the corresponding authentication token of the received synchronization message, wherein the unhashed authentication token replaces the corresponding trusted bit string.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for using simple authenticated messages are disclosed for use with implementing (i) synchronization schemes, (ii) encoded control messaging schemes, and (iii) encrypted data communication schemes. Messages are authenticated by applying a secure hash function to one or more authentication tokens to produce hash results which are compared to stored trusted bit strings, wherein the stored trusted bit strings are replaced with the most-recently received authentication token whose corresponding hash result matched the stored bit string.
28 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing device, a set of at least two synchronization messages, wherein each synchronization message of the at least two synchronization message comprises a respective authentication token for comparison with a respective corresponding trusted bit string associated with the respective unique sender; applying, by the computing device, a hash function to the authentication token of each received synchronization message of the set at least one time to generate a corresponding hash result for each received synchronization message; determining, by the computing device, whether the hash result for each received synchronization message matches the corresponding trusted bit string for the unique sender associated with the received synchronization message; defining, by the computing device, a time point boundary between a first time synchronization period and a second time synchronization period using a value that is determined based at least in part on receipt times of each received synchronization message of the set whose corresponding hash result matched its corresponding trusted bit string; and for each received synchronization message whose respective corresponding hash result matched its respective corresponding trusted bit string, replacing, by the computing device, the corresponding trusted bit string with the corresponding authentication token of the received synchronization message, wherein the unhashed authentication token replaces the corresponding trusted bit string. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a computing device, a first message and a second message from a sender, the first and second messages each comprising a first authentication token and a second authentication token that are each associated with the sender, and wherein each of the first and second authentication tokens is comparable with multiple trusted bit strings associated with the sender; applying a hash function to the first authentication token at least one time to generate a first hash result; determining whether the first hash result matches a first trusted bit string of the multiple trusted bit strings; when the first hash result matches the first trusted bit string, then (i) setting a first bit to a first logic value, wherein the first bit corresponds to one of a state machine and an entry in an index of actions, and (ii) replacing the first trusted bit string with the first authentication token, wherein the unhashed first authentication token replaces the first trusted bit string; when the first hash result does not match the first trusted bit string, then determining whether the first hash result matches a second trusted bit string of the multiple trusted bit strings; and when the first hash result matches the second trusted bit string, the (i) setting the first bit to a second logic value, and (ii) replacing the second trusted bit string with the first authentication token, wherein the unhashed first authentication token replaces the second trusted bit string. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification