Method and system for validating a device that uses a dynamic identifier
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-010/08
G06F-021/43
G06F-021/79
G06Q-020/02
G06Q-020/34
G06Q-020/38
G06Q-020/40
G06Q-020/42
G07F-007/10
H04L-029/06
H04L-009/32
G06F-009/445
H04W-012/10
H04W-012/08
출원번호
US-0852352
(2013-03-28)
등록번호
US-9971986
(2018-05-15)
발명자
/ 주소
Yeap, Tet Hin
O'Brien, William G.
출원인 / 주소
BCE INC.
인용정보
피인용 횟수 :
0인용 특허 :
48
초록▼
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signatu
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signature based on a comparison of the currently received signature to the set of previously received signatures associated with the candidate identifier. Also, a method that comprises obtaining a currently received signature from a device; decrypting the currently received signature to obtain a candidate identifier; and a candidate scrambling code; consulting a database to obtain a set of previously received scrambling codes associated with the candidate identifier; and validating the currently received signature based on a comparison of the candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier.
대표청구항▼
1. A method, comprising: receiving, by an interrogation portion of a network entity, a currently received signature over a wireless connection from a device;determining, by the interrogation portion, a dynamic parameter from a clock module that emulates a corresponding clock module at the device use
1. A method, comprising: receiving, by an interrogation portion of a network entity, a currently received signature over a wireless connection from a device;determining, by the interrogation portion, a dynamic parameter from a clock module that emulates a corresponding clock module at the device used in generating the currently received signature;determining, by the interrogation portion, a decryption key for the currently received signature based on the determined dynamic parameter;decrypting, by the interrogation portion, the currently received signature to obtain a candidate identifier and a candidate scrambling code, encoded within the currently received signature, associated with the device;consulting, by a processing portion of the network entity, a database to obtain a set of previously received scrambling codes associated with the candidate identifier, the previously received scrambling codes having been encoded in a set of previously received signatures, the set of previously received signatures associated with the candidate identifier comprising an integer number of members greater than or equal to zero; andvalidating, by the processing portion, the currently received signature based on a comparison of candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier. 2. The method defined in claim 1, wherein validating comprises determining whether the currently received scrambling code is a member of the set of previously received scrambling codes associated with the candidate identifier. 3. The method defined in claim 2, further comprising concluding that the validating is unsuccessful when the determining indicates that the currently received scrambling code is a member of the set of previously received scrambling codes associated with the candidate identifier. 4. The method defined in claim 2, further comprising concluding that the validating is potentially successful when the determining indicates that the currently received scrambling code is not a member of the set of previously received scrambling codes associated with the candidate identifier. 5. The method defined in claim 2, further comprising updating the set of previously received scrambling codes associated with the candidate identifier to include the currently received scrambling code. 6. The method defined in claim 1, wherein validating comprises determining a number of times that the currently received scrambling code has been previously received. 7. The method defined in claim 6, further comprising concluding that the validating is unsuccessful when the determining indicates that the currently received scrambling code has been previously received more than a pre-determined number of times. 8. The method defined in claim 1, wherein validating comprises determining how long ago the currently received scrambling code was first received. 9. The method defined in claim 8, further comprising concluding that the validating is unsuccessful when the determining indicates that the currently received scrambling code was first received more than a pre-determined time interval ago. 10. The method defined in claim 1, further comprising issuing a read request to the device over a contact-less channel, wherein receiving the currently received signature occurs over the contact-less channel subsequent to issuing of the read request. 11. The method defined in claim 1, wherein the currently received signature is received over a non-secure pathway. 12. The method defined in claim 1, wherein the non-secure pathway traverses the Internet. 13. The method defined in claim 1, wherein when the validating is successful, the method further comprises granting access to a resource and wherein when the validating is unsuccessful, the method further comprises denying access to the resource. 14. The method defined in claim 13, wherein the resource comprises at least one of: computing equipment, a computer network, a building, a portion of a building, an entrance, an exit and a vehicle. 15. The method defined in claim 13, wherein the resource comprises at least one of an online resource and a financial resource. 16. The method defined, in claim 1, wherein when the validating is successful, the method further comprises authorizing an attempted transaction and wherein when the validating is unsuccessful, the method further comprises denying the attempted transaction. 17. The method defined in claim 16, wherein the transaction comprises a financial transaction. 18. A non-transitory computer-readable storage medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method that includes: receiving, by an interrogation portion of a network entity, a currently received signature over a wireless connection from a device;determining, by the interrogation portion, a dynamic parameter from a clock module that emulates a corresponding clock module at the device used in generating the currently received signature;determining, by the interrogation portion, a decryption key for the currently received signature based on the determined dynamic parameter;decrypting, by the interrogation portion, the currently received signature to obtain a candidate identifier and a candidate scrambling code, encoded within the currently received signature, associated with the device;consulting, by a processing portion of the network entity, a database to obtain a set of previously received scrambling codes associated with the candidate identifier, the previously received scrambling codes having been encoded in a set of previously received signatures, the set of previously received signatures associated with the candidate identifier comprising an integer number of members greater than or equal to zero; andvalidating, by the processing portion, the currently received signature based on a comparison of candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier. 19. A network entity for processing signatures received from devices, the network entity configured to execute a method that includes: receiving currently received signature from a particular device over a wireless connection; anddetermining a dynamic parameter from a clock module that emulates a corresponding clock module at the device used in generating the currently received signature; determining a decryption key for the currently received signature based on the determined dynamic parameter;decrypting the currently received signature to obtain a candidate identifier and a candidate scrambling code, encoded within the currently received signature, associated with the particular device; anda processing portion configured to: consulting a database in order to obtain a set of previously received scrambling codes associated with the candidate identifier, the previously received scrambling codes having been encoded in a set of previously received signatures, the set of previously received signatures associated with the candidate identifier comprising an integer number of members greater than or equal to zero; andvalidating the currently received signature based on a comparison of candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier. 20. The network entity defined in claim 19, wherein to validate the currently received signature, the network entity is further configured to carry out a determination of whether the currently received scrambling code is a member of the set of previously received scrambling codes associated with the candidate identifier. 21. The network entity defined in claim 20, wherein the network entity is further configured to conclude that validation of the currently received scrambling code is unsuccessful when the determination indicates that the currently received signature is a member of the set of previously received scrambling codes associated with the candidate identifier. 22. The network entity defined in claim 20, wherein the network entity is further configured to conclude that the validation of the currently received scrambling code is potentially successful when the determination indicates that the currently received scrambling code is not a member of the set of previously received scrambling codes associated with the candidate identifier. 23. The network entity defined in claim 20, further configured to update the set of previously received scrambling codes associated with the candidate identifier to include the currently received scrambling code. 24. The network entity defined in claim 20, wherein the network entity is one among a plurality of network entities spatially distributed over a plurality of sites, the network entities being communicatively coupled to one another to enable the determination to be made jointly by the plurality of network entities. 25. The network entity defined in claim 19, wherein the network entity is distributed among a plurality of spatially distributed sites. 26. The network entity defined in claim 19, wherein the network entity is one among a plurality of network entities spatially distributed over a plurality of sites. 27. The network entity defined in claim 19, wherein to validate the currently received scrambling code, the network entity is configured to effect a determination of a number of times that the currently received scrambling code has been previously received. 28. The network entity defined in claim 27, wherein the network entity is further configured to conclude that validation of the currently received scrambling code is unsuccessful when the determination is indicative of the currently received scrambling code having been previously received more than a pre-determined number of times. 29. The network entity defined in claim 19, wherein to validate the currently received scrambling code, the network entity is further configured to effect a determination of how long ago the currently received scrambling code was first received. 30. The network entity defined in claim 29, further configured to conclude that validation of the currently received scrambling code is unsuccessful when the determination is indicative of the currently received scrambling code having been first received more than a pre-determined time interval ago. 31. The network entity defined in claim 18, wherein when the validating is successful, the network entity is configured to grant access to a resource and wherein when the validating is unsuccessful, the network entity is configured to deny access to the resource. 32. The network entity defined in claim 31, wherein the resource comprises at least one of: computing equipment, a computer network, a building, a portion of a building, an entrance, an exit and a vehicle. 33. The network entity defined in claim 31, wherein the resource comprises at least one of an online resource and a financial resource. 34. The network entity defined in claim 18, wherein when the validating is successful, the network entity is further configured to authorize an attempted transaction and wherein when the validating is unsuccessful, the network entity is further configured to deny the attempted transaction. 35. The network entity defined in claim 34, wherein the transaction comprises a financial transaction.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (48)
Hasebe,Takayuki; Kotani,Seigo; Akiyama,Ryota; Sasaki,Takaoki, Apparatus to create and/or verify digital signatures having a secure time element and an identifier of the apparatus.
Ganesan, Ravi; Sandhu, Ravi Singh; Cottrell, Andrew Paul; Austin, Kyle, Augmented single factor split key asymmetric cryptography-key generation and distributor.
Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A., Digital data storage systems, computers, and data verification methods.
Barrett Steven T. (Plantation FL) Laird Kevin M. (Haltom City TX) Murray Richard E. (Coral Springs FL) O\Connor James M. (N. Richland Hills TX), Dynamic encryption key selection for encrypted radio transmissions.
Sekiguchi Kenzou,JPX ; Maeda Toru,JPX, Email system converts email data to a different format according to processing mode information set in memory in correspondence with post office information.
Bellare Mihir M. (New York NY) Rogaway Phillip W. (Austin TX), Method and apparatus for three-party entity authentication and key distribution using message authentication codes.
Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mount Prospect IL) Sgrignoli Gary J. (Mount Prospect IL), Secure data packet transmission system and method.
Hamilton,Dave; Brinkman,John; Longawa,John; Randall,Charles Corris; Rampley,Rob; Ryle,Marcus, System and method of secure electronic commerce transactions including tracking and recording the distribution and usage of assets.
Beenau, Blayn W; Bonalle, David S; Fields, Seth W; Gray, William J; Larkin, Carl; Montgomery, Joshua L; Saunders, Peter D, System for biometric security using a fob.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.