IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0343268
(2008-12-23)
|
등록번호 |
US-8412638
(2013-04-02)
|
발명자
/ 주소 |
- Yeap, Tet Hin
- O'Brien, William G.
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
26 |
초록
▼
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signatu
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signature based on a comparison of the currently received signature to the set of previously received signatures associated with the candidate identifier. Also, a method that comprises obtaining a currently received signature from a device; decrypting the currently received signature to obtain a candidate identifier; and a candidate scrambling code; consulting a database to obtain a set of previously received scrambling codes associated with the candidate identifier; and validating the currently received signature based on a comparison of the candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier.
대표청구항
▼
1. A method for execution by a processing entity of a reader, the method comprising: receiving a first signature from a device over a communication pathway;decrypting the first signature with a computing apparatus to obtain a candidate identifier and a candidate scrambling code;consulting a storage
1. A method for execution by a processing entity of a reader, the method comprising: receiving a first signature from a device over a communication pathway;decrypting the first signature with a computing apparatus to obtain a candidate identifier and a candidate scrambling code;consulting a storage entity to obtain a set of other scrambling codes associated with the candidate identifier, the other scrambling codes having been encoded in signatures received before the first signature;validating the first signature based on a comparison of the candidate scrambling code to the set of other scrambling codes associated with the candidate identifier; andupdating the set of other scrambling codes associated with the candidate identifier to include the candidate scrambling code. 2. The method defined in claim 1, wherein decrypting the first signature is performed using a decryption key, the method further comprising receiving an index accompanying the first signature; and consulting a database that stores potential keys associated with respective indexes to identify the decryption key as the potential key associated with the index accompanying the first signature. 3. The method defined in claim 1, further comprising consulting a database comprising a plurality of potential keys; wherein the decrypting is performed using a first one of the potential keys. 4. The method defined in claim 3, further comprising comparing the candidate identifier to a set of expected identifiers and, if there is no match, repeating the decrypting using another one of the potential keys until occurrence of: (i) a match between the candidate identifier and one of the expected identifiers; and (ii) exhaustion of all potential keys without finding a match between the candidate identifier and any of the expected identifiers. 5. The method defined in claim 4, further comprising concluding that the validation is unsuccessful in the case of exhaustion of all potential keys without finding a match between the candidate identifier and any of the expected identifiers. 6. The method defined in claim 1, wherein validating comprises determining whether the candidate scrambling code is a member of the set of other scrambling codes associated with the candidate identifier. 7. The method defined in claim 6, further comprising concluding that the validating is unsuccessful if the determining indicates that the candidate scrambling code is a member of the set of other scrambling codes associated with the candidate identifier. 8. The method defined in claim 6, further comprising concluding that the validating is not unsuccessful if the determining indicates that the candidate scrambling code is not a member of the set of other scrambling codes associated with the candidate identifier. 9. The method defined in claim 6, further comprising updating the set of other scrambling codes associated with the candidate identifier to include the candidate scrambling code. 10. The method defined in claim 1, wherein validating comprises determining a number of times that a signature encoding the candidate scrambling code was received before the first signature. 11. The method defined in claim 10, further comprising concluding that the validating is unsuccessful if the determining indicates that the number of times that a signature encoding the candidate scrambling code was received before the first signature is more than a pre-determined number of times. 12. The method defined in claim 1, wherein validating comprises determining how long ago the candidate scrambling code was first received. 13. The method defined in claim 12, further comprising concluding that the validating is unsuccessful if the determining indicates that the candidate scrambling code was first received more than a pre-determined time interval ago. 14. The method defined in claim 1, wherein the communication pathway comprises a contact-less channel, further comprising issuing a read request to the device over the contact-less channel, wherein receiving the first signature occurs over the contact-less channel subsequent to issuing of the read request. 15. The method defined in claim 1, wherein the communication pathway is non-secure pathway. 16. The method defined in claim 1, wherein the non-secure pathway traverses the Internet. 17. The method defined in claim 1, wherein if the validating is successful, the method further comprises granting access to a resource and wherein if the validating is unsuccessful, the method further comprises denying access to the resource. 18. The method defined in claim 17, wherein the resource comprises at least one of: computing equipment, a computer network, a building, a portion of a building, an entrance, an exit and a vehicle. 19. The method defined in claim 17, wherein the resource comprises at least one of an online resource and a financial resource. 20. The method defined in claim 1, wherein if the validating is successful, the method further comprises authorizing an attempted transaction and wherein if the validating is unsuccessful, the method further comprises denying the attempted transaction. 21. The method defined in claim 20, wherein the transaction comprises a financial transaction. 22. A computer-readable storage medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method that includes: receiving a first signature from a device;decrypting the first signature to obtain a candidate identifier and a candidate scrambling code;consulting a database to obtain a set of other scrambling codes associated with the candidate identifier, the other scrambling codes having been encoded in signatures received before the first signature;validating the first signature based on a comparison of the candidate scrambling code to the set of other scrambling codes associated with the candidate identifier; andupdating the set of other scrambling codes associated with the candidate identifier to include the candidate scrambling code. 23. A system for processing signatures received from devices, comprising: an interrogation portion configured to receive a first signature from a particular device; anda processing portion configured to: decrypt the first signature in order to obtain a candidate identifier and a candidate scrambling code;consult a database in order to obtain a set of other scrambling codes associated with the candidate identifier, the other scrambling codes having been encoded in signatures received before the first signature;validate the first signature based on a comparison of the candidate scrambling code to the set of other scrambling codes associated with the candidate identifier; andupdate the set of other scrambling codes associated with the candidate identifier to include the candidate scrambling code. 24. The system defined in claim 23, further comprising a network controller communicatively coupled to the interrogation portion and configured to implement the processing portion. 25. The system defined in claim 23, wherein to validate the first signature, the processing portion is configured to carry out a determination of whether the candidate scrambling code is a member of the set of other scrambling codes associated with the candidate identifier. 26. The system defined in claim 25, wherein the processing portion is further configured to conclude that validation of the first signature is unsuccessful if the determination indicates that the candidate scrambling code is a member of the set of other scrambling codes associated with the candidate identifier. 27. The system defined in claim 25, wherein the processing portion is further configured to conclude that the validation of the first signature is not unsuccessful if the determination indicates that the candidate scrambling code is not a member of the set of other scrambling codes associated with the candidate identifier. 28. The system defined in claim 25, wherein the processing portion is one among a plurality of processing portions spatially distributed over a plurality of sites, the processing portions being communicatively coupled to one another to enable the determination to be made jointly by the plurality of processing portions. 29. The system defined in claim 23, wherein the processing portion is distributed among a plurality of spatially distributed sites. 30. The system defined in claim 23, wherein the interrogation portion is one among a plurality of interrogation portions spatially distributed over a plurality of sites. 31. The system defined in claim 23, wherein to validate the first signature, the processing portion is configured to effect a determination of a number of times that a signature encoding the candidate scrambling code was received before the first signature. 32. The system defined in claim 31, wherein the processing portion is further configured to conclude that validation of the first signature is unsuccessful if the determination is indicative that the number of times that a signature encoding the candidate scrambling code was received before the first signature is more than a pre-determined number of times. 33. The system defined in claim 23, wherein to validate the first signature, the processing portion is configured to effect a determination of how long ago the candidate scrambling code was first received. 34. The system defined in claim 33, wherein the processing portion is further configured to conclude that validation of the first signature is unsuccessful if the determination is indicative of the candidate scrambling code having been first received more than a pre-determined time interval ago. 35. The system defined in claim 23, wherein if the validating is successful, the processing portion is configured to grant access to a resource and wherein if the validating is unsuccessful, the processing portion is configured to deny access to the resource. 36. The system defined in claim 35, wherein the resource comprises at least one of: computing equipment, a computer network, a building, a portion of a building, an entrance, an exit and a vehicle. 37. The system defined in claim 35, wherein the resource comprises at least one of an online resource and a financial resource. 38. The system defined in claim 23, wherein if the validating is successful, the processing portion is configured to authorize an attempted transaction and wherein if the validating is unsuccessful, the processing portion is configured to deny the attempted transaction. 39. The system defined in claim 38, wherein the transaction comprises a financial transaction.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.