+

US20150372825A1 - Per-Device Authentication - Google Patents

Per-Device Authentication Download PDF

Info

Publication number
US20150372825A1
US20150372825A1 US14/311,377 US201414311377A US2015372825A1 US 20150372825 A1 US20150372825 A1 US 20150372825A1 US 201414311377 A US201414311377 A US 201414311377A US 2015372825 A1 US2015372825 A1 US 2015372825A1
Authority
US
United States
Prior art keywords
hardware
certificate
computing device
hardware key
serial number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/311,377
Inventor
Keun Young Park
Rakesh Narayan Iyer
Nicholas Julian Pelly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLC filed Critical Google LLC
Priority to US14/311,377 priority Critical patent/US20150372825A1/en
Assigned to GOOGLE INC. reassignment GOOGLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PELLY, NICHOLAS JULIAN, IYER, RAKESH NARAYAN, PARK, KEUN-YOUNG
Publication of US20150372825A1 publication Critical patent/US20150372825A1/en
Assigned to GOOGLE LLC reassignment GOOGLE LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: GOOGLE INC.
Priority to US15/923,784 priority patent/US10225089B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user

Definitions

  • Converting the hardware serial number to a hardware key may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded.
  • the hardware component may be a USB chip or network interface card.
  • the signature may be generated for use with SSL.
  • a second hardware serial number associated with a second hardware component of a second computing device may be received.
  • the second hardware component may be of the same type as the hardware component of the first computing device.
  • the second hardware serial number may be converted to a second hardware key check.
  • a second hardware key associated with a second certificate from the second computing device may be received.
  • the second hardware key may be compared to the second hardware key check to obtain a verification of the second certificate.
  • the second certificate may be verified when the second hardware key check matches the second hardware key and the second certificate may not be verified when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
  • the second signature may be authenticated. Access may be permitted to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
  • FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 3 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 7 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 9 shows a computer according to an embodiment of the disclosed subject matter.
  • FIG. 10 shows a network configuration according to an embodiment of the disclosed subject matter.
  • Per-device authentication using a hardware key to be used with certificates using duplicate signatures on mobile computing devices may allow for authentication of the mobile computing devices on a per-device basis without requiring the generation of a unique signature for each certificate.
  • Mobile computing devices such as smartphones and tablets, may use certificates to authenticate themselves to other computing devices, for example, vehicle computing devices such as the head unit of a car's audio/visual system. Different mobile computing devices may be given certificates that have the same signature.
  • the certificate may also include a hardware key. The hardware key in a certificate may be generated based on the serial number of a hardware component of the mobile computing device to which the certificate was issued.
  • Two mobile computing devices may have certificates with the same signature, but differing hardware keys.
  • the vehicle computing device may retrieve the hardware serial number that was used to generate the hardware key, and may generate another hardware key, which may be used as a hardware key check, in the same manner. If the hardware key generated by the vehicle computing device matches the hardware key stored in the certificate of the mobile computing device, the vehicle computing device may proceed to authenticate the signature in the certificate. Otherwise, if the hardware keys do not match, the mobile computing device may not be authenticated, and may be prevented from accessing the vehicle computing device, as the mobile computing device may be using a certificate stolen from a different mobile computing device.
  • a mobile computing device such as a smartphone or tablet, may be used in conjunction with a vehicle computing device, such as the head unit of a cars audio/visual system or other on-board computer system.
  • a vehicle computing device such as the head unit of a cars audio/visual system or other on-board computer system.
  • a smartphone may be connected to a car's head unit to allow playback of media, such as music, from the smartphone, or use of other suitable features of the smartphone.
  • the vehicle computing device may need to authenticate the mobile computing device, for example, to ensure the mobile computing device is authorized to access the vehicle computing device.
  • the mobile computing device may include a certificate that may uniquely identify the mobile computing device, allowing the vehicle computing device to determine the identity of the mobile computing device and whether the mobile computing device is authorized to access the vehicle computing device.
  • the certificate may be issued to the mobile computing device during manufacture of the mobile computing device, and may be obtained from, for example, a manufacturer of the vehicle computing device or party responsible for the operating system or platform used by the vehicle computing device. Thus, the certificates may only be issued to mobile computing device that have been certified to work with the vehicle computing device.
  • each of the 16 signatures may be used in the certificates 16 different mobile computing devices apiece.
  • 16 of the mobile computing device may have a certificate with the signature “0001”.
  • the signature may be associated with a public key.
  • any suitable cryptographic system, such as SSL, may be used to generate both the signatures and the public keys that may be used to authenticate the signatures.
  • the mobile computing device including the certificate with the non-unique signature and the unique hardware key, may be connected to a vehicle computing device in any suitable manner.
  • a smartphone may be plugged into a car's head unit using a USB cable.
  • the vehicle computing device may authenticate the mobile computing device based on the certificate stored on the mobile computing device.
  • the vehicle computing device may use the public key, which may have been stored on the vehicle computing device during configuration by the manufacturer, to validate the non-unique signature in the mobile computing device's certificate.
  • the vehicle computing device may ensure that the certificate on the mobile computing device was issued to that mobile computing device, and not stolen or otherwise obtained from a different mobile computing device, using the hardware key.
  • the vehicle computing device may receive the hardware serial number from the hardware component of the mobile computing device.
  • a smartphone may be issued a certificate with a signature of 0101.
  • the signature may be a shared among a number of different smartphones.
  • the smartphone may have a USB chip with a serial number of 842A480FG17P521N033Q2BV7.
  • the hardware serial number may be hashed, for example, using MD5, to 3b22442436f8f85d01fe145e26b40d6d, which may be reduced to a 32 bit representation by discarding all but the last four characters, resulting in a hardware key 0d6d.
  • This hardware key may be stored in the certificate issued to the smartphone along with the non-unique signature with a binary representation of 0101.
  • the smartphone may be connected to the head unit in a car, for example, using a USB cable.
  • the hardware key check may not match that hardware key, indicating that the second smartphone is using a certificate that was not issued to the second smartphone.
  • the head unit may not authenticate the second smartphone, even though the second smartphone's certificate has a valid signature of 0101.
  • the second smartphone may be prevented from accessing the head unit due to the use of a certificate that was not issued to the second smartphone.
  • the hardware key may be stored in the certificate in any suitable format.
  • the hardware key may be stored as a character string using any number of bits for each character.
  • the hardware key may be any suitable number of bits in length.
  • the hardware serial number may be used as the hardware key without hashing or discarding any portion of the hardware serial number.
  • a hashed hardware serial number may be used as the hardware key without discarding any portion of the hash.
  • FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • a computing device 100 may include a certificate generator 110 and a storage 140 .
  • the computing device 100 may be any suitable device, such as, for example, a computer 20 as described in FIG. 9 .
  • the computing device 100 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a server system used by a manufacturer of mobile computing devices.
  • the certificate generator 110 may generate a certificate 142 , including a signature 143 and a hardware key 144 , for issuance to and use on a mobile computing device.
  • the storage 140 may store the certificate 142 in any suitable manner.
  • the certificate generator 110 may be any suitable hardware and software on the computing device 100 for generating the certificate 142 .
  • the certificate generator 110 may include cryptographic, hashing, and conversion hardware and software for generating a number of signatures, hashing hardware serial numbers, and converting the resulting hash into a hardware key.
  • the certificate generator 110 may also, for example, receive a batch of signatures from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in generating the certificate 142 .
  • the mobile computing device 200 may receive the certificate 142 from the computing device 100 during, for example, initial configuration of the mobile computing device 100 by its manufacturer.
  • the storage 240 may store the certificate 142 , including the signature 143 and hardware key 144 , in any suitable manner.
  • the storage 240 may be secure storage, which may prevent tampering with the certificate 142 .
  • the signature 143 may be non-unique, and may be used in certificates issued to computing device other than the mobile computing device 100 .
  • the hardware key 144 may be generated by the certificate generator 110 from the hardware serial number of the hardware component in the external interface 220 .
  • the hardware component of the external interface 220 may be accessible to other devices connected to the mobile computing device 200 , for example, allowing the computing device 100 to read the hardware serial number to generate the hardware key 144 , and allowing a vehicle computing device to access the hardware serial number to check the hardware key 144 .
  • the certificate authenticator 310 may be any suitable hardware and software on the vehicle computing device 300 for authenticating the certificate 142 .
  • the certificate authenticator 310 may include cryptographic, hashing, and conversion hardware and software which may be the same or similar to that used by the certificate generator 110 .
  • the certificate authenticator 310 may use SSL to authenticate the signature 143 .
  • the certificate generator 310 may be able to authenticate the signature 143 , hash hardware serial numbers, convert the resulting hash into a hardware key check, and compare that generated hardware key check to the hardware key 144 to check that the certificate 142 was issued to the mobile computing device 200 , and was not taken from a different mobile computing device.
  • the certificate generator 110 of the computing device 100 may generate the hardware key 144 using the hardware serial number, for example, hashing the hardware serial number and reducing the number of bits used by discarding part of the hash.
  • the hardware key 144 may be stored as part of the certificate 142 .
  • the signature 143 may also be stored in the certificate 142 by the certificate generator 110 .
  • the signature 143 may be generated by the certificate generator 110 using any suitable cryptographic system, or may be selected from a number of signatures provided to the computing device 100 by, for example, the manufacturer or party responsible for the operating system or platform of the vehicle computing device 300 .
  • the signature 143 may be non-unique.
  • FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • the mobile computing device 200 may be connected to the vehicle computing device 300 by establishing a connection between the external interface 220 and the external interface 320 .
  • a user may bring smartphone into a car and connect the smartphone to the car's head unit using a USB cable.
  • the vehicle computing device 300 may receive the hardware serial number from the external interface 220 of the mobile computing device 200 , for example, by reading the hardware serial number directly from the hardware component.
  • the head unit may read the USB serial number off of the USB chip in the smartphone that was used to establish the USB connection with the head unit.
  • the certificate authenticator 310 of the vehicle computing device 300 may attempt verify that the certificate 142 was issued to the mobile computing device 200 , and was not obtained, for example, stolen, from another mobile computing device.
  • the certificate authenticator 310 may hash the hardware serial number, reduce the number of bits in the resulting hash through discarding of parts of the hash, and convert the remaining portion of the hash to a hardware key check, all in the same manner as the certificate generator 110 when the hardware key 144 was first generated.
  • the vehicle computing device 320 may receive the hardware key 144 from the certificate 142 on the mobile computing device 200 , and the certificate generator 320 may compare the hardware key 144 to the hardware key check generated on the vehicle computing device 300 .
  • the certificate 142 may have been issued to the mobile computing device 200 , and the vehicle computing device 200 may authenticate the mobile computing device 200 , for example, using a public key to authenticate the signature 143 .
  • the certificate authenticator 310 may authenticate the signature 143 of the certificate 142 before, during, or while verifying the certificate 142 based on the hardware key 144 .
  • the mobile computing device 200 may be permitted access to the vehicle computing device 300 .
  • a smartphone may playback music or implement other functionality using the head unit of the car's audio/visual system.
  • the hardware key check does not match the hardware key 144 , this may indicate that the certificate 142 was taken from a different mobile computing device, which had a different hardware serial number than the mobile computing device 200 .
  • the certificate authenticator 310 may not authenticate the mobile computing device 200 , preventing the mobile computing device 200 from accessing the vehicle computing device 300 .
  • the hardware key 144 may only be verified with a hardware key check generated using that first serial number.
  • a second smartphone, with a USB chip with a second serial number may be unable to use the certificate 142 with the vehicle computing device 300 , as the second serial number may result in a hardware key check that does not match the hardware key 144 .
  • the certificate may be issued.
  • the computing device 100 may issue the certificate 142 to the mobile computing device 200 .
  • the certificate 142 including the signature 143 and the hardware key 144 , may be moved from the storage 140 on the computing device 100 to the storage 240 on the mobile computing device 200 .
  • the storage 240 may be, for example, secure storage for certificates.
  • the computing device 100 may issue the certificate 142 as part of the initial setup and configuration of the mobile computing device 200 to prepare the mobile computing device 200 for distribution and sale after manufacture.
  • a hardware key may be received.
  • the hardware key 144 from the certificate 142 on the mobile computing device 200 may be received by the vehicle computing device 300 .
  • the hardware key 144 may be received in response to a request, for example, from the certificate authenticator 310 , or may be received automatically whenever a connection is established between the mobile computing device 200 and the vehicle computing device 300 .
  • a hardware key check may be generated.
  • the certificate authenticator 310 on the vehicle computing device 300 may use the hardware serial number to generate the hardware key check.
  • the hardware key check may be generated in the same manner as the hardware key 144 , for example, hashing of the hardware serial number with the same hashing algorithm used by the certificate generator 110 and discarding of the same portion of the resulting hash.
  • the hardware key check may be matched to the hardware key.
  • the hardware key check may be compared with the hardware key 144 to determine if they match.
  • the hardware key check may match the hardware key 144 when both were generated from the same hardware serial number, which may occur when the hardware serial number was received from the same hardware component by both the certificate generator 110 and the certificate authenticator 310 .
  • a match between the hardware key check and the hardware key 144 may indicate that the certificate 142 was issued to the mobile computing device 200 , and was not taken from a different a mobile computing device.
  • a match may verify the certificate 142 .
  • a mismatch between the hardware key check and the hardware key 144 may indicate that the certificate 142 was not issued to the mobile computing device 200 , and may be stolen from another mobile computing device or otherwise illegitimately obtained.
  • a mismatch may occur because the hardware key 144 was generated from a hardware serial number of a hardware component on some other mobile computing device, and the certificate 142 was issued to the other mobile computing device.
  • the vehicle computing device 300 may have received the hardware serial number for the hardware component of the mobile computing device on which the certificate 142 is now stored, and that hardware serial number may not match the hardware serial number of the other mobile computing device, leading to the hardware key check being different from the hardware key 144 .
  • a certificate may be received.
  • the vehicle computing device 300 may receive the entirety of the certificate 142 , including the signature 143 , from the mobile computing device 300 .
  • the certificate 142 may be received after a match has been found between the hardware key check and the hardware key 144 , or, for example, may be received when a connection is established between the mobile computing device 200 and the vehicle computing device 300 .
  • the signature may be authenticated.
  • the certificate authenticator 310 may authenticate the signature 143 from the certificate 142 using a public key.
  • the public key may have been provided to the vehicle computing device 300 by, for example, the manufacturer of the vehicle computing device 300 or by a party responsible for the operating system or platform used by the vehicle computing device 300 .
  • the signature 143 may be authenticated using any suitable cryptographic system, such as, for example, SSL.
  • the mobile computing device 200 may be permitted access to the vehicle computing device 300 , for example, to play back music through a vehicle's stereo system or implement any other suitable functionality.
  • FIG. 9 is an example computer system 20 suitable for implementing embodiments of the presently disclosed subject matter.
  • the computer 20 includes a bus 21 which interconnects major components of the computer 20 , such as one or more processors 24 , memory 27 such as RAM, ROM, flash RAM, or the like, an input/output controller 28 , and fixed storage 23 such as a hard drive, flash storage, SAN device, or the like.
  • a user display such as a display screen via a display adapter
  • user input interfaces such as controllers and associated user input devices
  • keyboard, mouse, touchscreen, or the like and other components known in the art to use in or in conjunction with general-purpose computing systems.
  • the bus 21 allows data communication between the central processor 24 and the memory 27 .
  • the RAM is generally the main memory into which the operating system and application programs are loaded.
  • the ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components.
  • BIOS Basic Input-Output system
  • Applications resident with the computer 20 are generally stored on and accessed via a computer readable medium, such as the fixed storage 23 and/or the memory 27 , an optical drive, external storage mechanism, or the like.
  • Each component shown may be integral with the computer 20 or may be separate and accessed through other interfaces.
  • Other interfaces such as a network interface 29 , may provide a connection to remote systems and devices via a telephone link, wired or wireless local- or wide-area network connection, proprietary network connections, or the like.
  • the network interface 29 may allow the computer to communicate with other computers via one or more local, wide-area, or other networks, as shown in FIG. 10 .
  • an analysis system 5 may provide back-end processing, such as where stored or acquired data is pre-processed by the analysis system 5 before delivery to the processing unit 14 , database 15 , and/or user interface 13 .
  • a machine learning system 5 may provide various prediction models, data analysis, or the like to one or more other systems 13 , 14 , 15 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Telephone Function (AREA)

Abstract

Systems and techniques are provided for per-device authentication. A hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may be converted to a hardware key check. A hardware key associated with a certificate from the computing device may be received. The hardware key may be compared to the hardware check key to obtain a verification of the certificate. The certificate may be verified when the hardware key check matches the hardware key and the certificate may not be verified when the hardware key check does not match the hardware key. A signature associated with the certificate may be verified. Access to the data processing apparatus by the computing device may be permitted when the certificate is verified and the signature is determined to be authentic.

Description

    BACKGROUND
  • A smartphone, tablet, or other mobile computing device may be connected to the head unit of a car's audio/visual system or other vehicle computing device. The head unit may need to authenticate any smartphone that connects to it, to ensure that the smartphone is authorized to connect to and interact with the head unit. This may be done by issuing every smartphone, tablet, or other mobile computing device its own unique certificate. Issuing a unique certificate to every authorized mobile computing device may prevent certificates from being stolen and used on any other authorized or non-authorized mobile computing devices. The number of certificates required to ensure that every mobile computing device may be very large, and it may difficult to generate unique signatures for that many certificates.
  • BRIEF SUMMARY
  • According to an embodiment of the disclosed subject matter, a hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may converted to a hardware key. The hardware key may be stored as part of a certificate. The certificate may include a signature. The certificate may be sent to the computing device. A second hardware serial number associated with second hardware component of a second computing device may be received. The second hardware component may be of the same type as the hardware component. The second hardware serial number may be converted to a second hardware key. The second hardware key may be stored as part of a second certificate. The second certificate may include a second signature equivalent to the signature. The second certificate may be sent to the second computing device.
  • Converting the hardware serial number to a hardware key may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded. The hardware component may be a USB chip or network interface card. The signature may be generated for use with SSL.
  • A hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may be converted to a hardware key check. A hardware key associated with a certificate from the computing device may be received. The hardware key may be compared to the hardware check key to obtain a verification of the certificate. The certificate may be verified when the hardware key check matches the hardware key and the certificate may not be verified when the hardware key check does not match the hardware key. A signature associated with the certificate may be verified. Access to the data processing apparatus by the computing device may be permitted when the certificate is verified and the signature is determined to be authentic.
  • A second hardware serial number associated with a second hardware component of a second computing device may be received. The second hardware component may be of the same type as the hardware component of the first computing device. The second hardware serial number may be converted to a second hardware key check. A second hardware key associated with a second certificate from the second computing device may be received. The second hardware key may be compared to the second hardware key check to obtain a verification of the second certificate. The second certificate may be verified when the second hardware key check matches the second hardware key and the second certificate may not be verified when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate. The second signature may be authenticated. Access may be permitted to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
  • Converting the hardware serial number to a hardware key check may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded. Converting the hardware serial number to a hardware key check may be performed based on a manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device. The hardware component may be a USB chip or network interface card. The data processing apparatus may be a vehicle computing device and the computing device may be a mobile computing device.
  • According to an embodiment of the disclosed subject matter, a means for receiving a hardware serial number associated with a hardware component of a computing device, a means for converting the hardware serial number to a hardware key, a means for storing the hardware key as part of a certificate, where the certificate may include a signature, a means for sending the certificate to the computing device, a means for receiving a second hardware serial number associated with second hardware component of a second computing device, where the second hardware component may be of the same type as the hardware component, a means for converting the second hardware serial number to a second hardware key, a means for storing the second hardware key as part of a second certificate, where the second certificate may include a second signature equivalent to the signature, a means for sending the second certificate to the second computing device, a means for converting the hardware serial number to a hardware key including a means for hashing the hardware serial number to obtain a hash, and a means for discarding a portion of the hash, are included.
  • A means for receiving a hardware serial number associated with a hardware component of a computing device, a means for converting the hardware serial number to a hardware key check, a means for receiving a hardware key associated with a certificate from the computing device, a means for comparing the hardware key to the hardware check key to obtain a verification of the certificate, a means for verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key, a means for authenticating a signature associated with the certificate, a means for permitting access to the data processing apparatus by the computing device when the certificate is verified and the signature is determined to be authentic, a means for receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device, a means for converting the second hardware serial number to a second hardware key check, a means for receiving a second hardware key associated with a second certificate from the second computing device, a means for comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate, and a means for verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate, a means for authenticating the second signature, a means for permitting access to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic, means for converting the hardware serial number to a hardware key check including a means for hashing the hardware serial number to obtain a hash, and a means for discarding a portion of the hash, are also included.
  • Systems and techniques disclosed herein may allow for per-device authentication. Additional features, advantages, and embodiments of the disclosed subject matter may be set forth or apparent from consideration of the following detailed description, drawings, and claims. Moreover, it is to be understood that both the foregoing summary and the following detailed description are examples and are intended to provide further explanation without limiting the scope of the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are included to provide a further understanding of the disclosed subject matter, are incorporated in and constitute a part of this specification. The drawings also illustrate embodiments of the disclosed subject matter and together with the detailed description serve to explain the principles of embodiments of the disclosed subject matter. No attempt is made to show structural details in more detail than may be necessary for a fundamental understanding of the disclosed subject matter and various ways in which it may be practiced.
  • FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 3 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 5 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 7 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
  • FIG. 9 shows a computer according to an embodiment of the disclosed subject matter.
  • FIG. 10 shows a network configuration according to an embodiment of the disclosed subject matter.
  • DETAILED DESCRIPTION
  • Per-device authentication using a hardware key to be used with certificates using duplicate signatures on mobile computing devices may allow for authentication of the mobile computing devices on a per-device basis without requiring the generation of a unique signature for each certificate. Mobile computing devices, such as smartphones and tablets, may use certificates to authenticate themselves to other computing devices, for example, vehicle computing devices such as the head unit of a car's audio/visual system. Different mobile computing devices may be given certificates that have the same signature. To ensure that the certificates cannot be taken off of the mobile computing device's they were issued to and used on other mobile computing devices, the certificate may also include a hardware key. The hardware key in a certificate may be generated based on the serial number of a hardware component of the mobile computing device to which the certificate was issued. Two mobile computing devices may have certificates with the same signature, but differing hardware keys. When authenticating a mobile computing device's certificate, the vehicle computing device may retrieve the hardware serial number that was used to generate the hardware key, and may generate another hardware key, which may be used as a hardware key check, in the same manner. If the hardware key generated by the vehicle computing device matches the hardware key stored in the certificate of the mobile computing device, the vehicle computing device may proceed to authenticate the signature in the certificate. Otherwise, if the hardware keys do not match, the mobile computing device may not be authenticated, and may be prevented from accessing the vehicle computing device, as the mobile computing device may be using a certificate stolen from a different mobile computing device.
  • A mobile computing device, such as a smartphone or tablet, may be used in conjunction with a vehicle computing device, such as the head unit of a cars audio/visual system or other on-board computer system. For example, a smartphone may be connected to a car's head unit to allow playback of media, such as music, from the smartphone, or use of other suitable features of the smartphone. When a mobile computing device is connected to a vehicle computing device, the vehicle computing device may need to authenticate the mobile computing device, for example, to ensure the mobile computing device is authorized to access the vehicle computing device. The mobile computing device may include a certificate that may uniquely identify the mobile computing device, allowing the vehicle computing device to determine the identity of the mobile computing device and whether the mobile computing device is authorized to access the vehicle computing device. The certificate may be issued to the mobile computing device during manufacture of the mobile computing device, and may be obtained from, for example, a manufacturer of the vehicle computing device or party responsible for the operating system or platform used by the vehicle computing device. Thus, the certificates may only be issued to mobile computing device that have been certified to work with the vehicle computing device.
  • The certificate may include a signature, which may be any suitable and verifiable signature for establishing the identity of the mobile computing device. For example, the signature may be an SSL signature which may be verified using a public key stored on the vehicle computing device. Generating a unique signature for every mobile computing device that may be authorized to access a vehicle computing device may be difficult, as there may be many millions of such devices. The number of certificate signatures generated may be fewer than the number of mobile computing devices to which the certificates will be issued, with different mobile computing devise having certificates with the same signature. For example, for 256 mobile computing devices, instead of generating 256 unique signatures, requiring a minimum of 8 bits to represent, only 16 signatures may be generated, requiring a minimum of 4 bits to represent, although more bits may be used to ensure the signature is complex enough that unauthorized parties cannot generate valid signatures. Each of the 16 signatures may be used in the certificates 16 different mobile computing devices apiece. For example, 16 of the mobile computing device may have a certificate with the signature “0001”. The signature may be associated with a public key. For example, any suitable cryptographic system, such as SSL, may be used to generate both the signatures and the public keys that may be used to authenticate the signatures.
  • Because more than one mobile computing device may use the same signature in its certificate, it may be difficult for a vehicle computing device to verify whether a mobile computing device is authorized or is using a stolen certificate. To prevent the use of stolen certificates, a hardware key may be added to each certificate issued to each mobile computing device. The hardware key in a mobile computing device's certificate may be based on a hardware serial number taken from any suitable hardware component of the mobile computing device. For example, a USB chip on the mobile computing device may have a serial number, which may unique for every USB chip on every computing device. A network interface, such as a WiFi radio, may have a MAC address which is unique to every network interface on every computing device and may serve as a hardware serial number.
  • When a certificate, with non-unique signature, is issued to a mobile computing device, for example, during initial setup of the mobile computing device by the manufacturer, the hardware serial number of the selected hardware component of the mobile computing device may be used to generate the hardware key, which may be stored in the certificate before the certificate is issued. The hardware key may be generated from the hardware serial number in any suitable manner. For example, a hashing algorithm may be used to hash the hardware serial number, reducing, for example a USB serial number of 192 bits to a hardware key of 32 bits. The hardware key may be stored in the certificate in any suitable manner, for example, in a section of the certificate reserved for “extra” data. Each mobile computing device may have a unique hardware key stored in its certificate, even when the signature in the certificate is a duplicate, due to the uniqueness of the hardware serial number and the use of an appropriate hashing algorithm.
  • The mobile computing device, including the certificate with the non-unique signature and the unique hardware key, may be connected to a vehicle computing device in any suitable manner. For example, a smartphone may be plugged into a car's head unit using a USB cable. The vehicle computing device may authenticate the mobile computing device based on the certificate stored on the mobile computing device. For example, the vehicle computing device may use the public key, which may have been stored on the vehicle computing device during configuration by the manufacturer, to validate the non-unique signature in the mobile computing device's certificate. The vehicle computing device may ensure that the certificate on the mobile computing device was issued to that mobile computing device, and not stolen or otherwise obtained from a different mobile computing device, using the hardware key. The vehicle computing device may receive the hardware serial number from the hardware component of the mobile computing device. For example, the vehicle computing device may read the USB serial number off of the USB chip that is part of the connection between the vehicle computing device and the mobile computing device. The vehicle computing device may generate a hardware key, which may be used as a hardware key check, from the hardware serial number in the same manner, for example, by using the same hashing algorithm, as was used to generate the hardware key that is stored in the certificate of the mobile computing device. The hardware key check generated by the vehicle computing device may be compared to the hardware key stored in the certificate on the mobile computing device. If the hardware key check matches the hardware key, the certificate may belong to the mobile computing device, which may be authenticated by the vehicle computing device if the vehicle computing device can also authenticate the signature. If the hardware key check does not match that hardware key, the certificate may not belong to the mobile computing device, and may have been stolen from a different mobile computing device. The vehicle computing device may not authenticate the mobile computing device, even if the signature in the certificate can be validated.
  • For example, a smartphone may be issued a certificate with a signature of 0101. The signature may be a shared among a number of different smartphones. The smartphone may have a USB chip with a serial number of 842A480FG17P521N033Q2BV7. The hardware serial number may be hashed, for example, using MD5, to 3b22442436f8f85d01fe145e26b40d6d, which may be reduced to a 32 bit representation by discarding all but the last four characters, resulting in a hardware key 0d6d. This hardware key may be stored in the certificate issued to the smartphone along with the non-unique signature with a binary representation of 0101. The smartphone may be connected to the head unit in a car, for example, using a USB cable. The head unit in the car may receive the serial number of the USB chip in the smartphone, for example, reading the serial number directly off of the USB chip. The head unit may then hash the retrieved serial number of 842A480FG17P521N033Q2BV7 using MD5, and reduce the result to a 32 bit by discarding all but the last four characters in the hash, resulting in a hardware key check of 0d6d. This may match the hardware key stored in the smartphone's certificate, allowing the head unit to continue authenticating the smartphone, for example, authenticating the non-unique certificate of 0101 using SSL and a public key stored on the head unit.
  • The smartphone's certificate may be stolen, or otherwise moved, to a second smartphone. When the second smartphone is connected to the head unit in the car, the head unit may retrieve the serial number from the second smartphone's USB chip. The second smartphone's USB chip may have a serial number of O3NG6389DGD144511FWTN983. The head unit may hash this hardware serial number using MD5, resulting in a hash of f29ccbb3c5b6d5fead63a096f9ab65fe. Discarding all but the last four characters may result in a hardware key check of 65fe. The head unit may compare this generated hardware key check to the hardware key stored in the second's smartphone certificate, which may be 0d6d. The hardware key check may not match that hardware key, indicating that the second smartphone is using a certificate that was not issued to the second smartphone. The head unit may not authenticate the second smartphone, even though the second smartphone's certificate has a valid signature of 0101. The second smartphone may be prevented from accessing the head unit due to the use of a certificate that was not issued to the second smartphone.
  • The hardware key may be stored in the certificate in any suitable format. For example, the hardware key may be stored as a character string using any number of bits for each character. The hardware key may be any suitable number of bits in length. For example, the hardware serial number may be used as the hardware key without hashing or discarding any portion of the hardware serial number. Further, a hashed hardware serial number may be used as the hardware key without discarding any portion of the hash.
  • FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. A computing device 100 may include a certificate generator 110 and a storage 140. The computing device 100 may be any suitable device, such as, for example, a computer 20 as described in FIG. 9. The computing device 100 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a server system used by a manufacturer of mobile computing devices. The certificate generator 110 may generate a certificate 142, including a signature 143 and a hardware key 144, for issuance to and use on a mobile computing device. The storage 140 may store the certificate 142 in any suitable manner.
  • The certificate generator 110 may be any suitable hardware and software on the computing device 100 for generating the certificate 142. For example, the certificate generator 110 may include cryptographic, hashing, and conversion hardware and software for generating a number of signatures, hashing hardware serial numbers, and converting the resulting hash into a hardware key. The certificate generator 110 may also, for example, receive a batch of signatures from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in generating the certificate 142. The certificate 142 may be generated for a mobile computing device, using the signature 143, which may be non-unique and used in certificates for other mobile computing devices, and the hardware key 144, which may be generated based on a hardware serial number of a hardware component of the mobile computing device.
  • FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. A mobile computing device 200 may include an external interface 220, and a storage 240. The mobile computing device 200 may be any suitable device, such as, for example, a computer 20 as described in FIG. 9. The mobile computing device 200 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a mobile computing device, such as a tablet, smartphone, or laptop. The external interface 220 may be allow the mobile computing device 100 to communicate with other computing devices, for example, a vehicle computing device, and include a hardware component that has a unique serial number. For example, the mobile computing device 200 may receive the certificate 142 from the computing device 100 during, for example, initial configuration of the mobile computing device 100 by its manufacturer. The storage 240 may store the certificate 142, including the signature 143 and hardware key 144, in any suitable manner. For example, the storage 240 may be secure storage, which may prevent tampering with the certificate 142. The signature 143 may be non-unique, and may be used in certificates issued to computing device other than the mobile computing device 100. The hardware key 144 may be generated by the certificate generator 110 from the hardware serial number of the hardware component in the external interface 220.
  • The external interface 220 may be any suitable combination of hardware and software on the mobile computing device 200 for connecting, using wires or wirelessly to a local area network or other local device. For example, the external interface 220 may use a WiFi radio to connect to a router that has created a local area network, or to connect directly to another device, may use a Bluetooth radio to connect directly to another device, or may use a USB cable to connect to another device. The external interface 220 may include a hardware component, such as a USB chip or network interface card, that may include a unique hardware serial number, such as a USB serial number or MAC address, that may be used by the certificate generator 110 to generate the hardware key 144 for inclusion in the certificate 142 issued from the computing device 100 to the mobile computing device 200. The hardware component of the external interface 220 may be accessible to other devices connected to the mobile computing device 200, for example, allowing the computing device 100 to read the hardware serial number to generate the hardware key 144, and allowing a vehicle computing device to access the hardware serial number to check the hardware key 144.
  • FIG. 3 shows an example system suitable for an interface for multiple media applications according to an implementation of the disclosed subject matter. A vehicle computing device 300 may include a certificate authenticator 310, an external interface 320, and a storage 340. The vehicle computing device 300 may be any suitable device, such as, for example, a computer 20 as described in FIG. 9. The vehicle computing device 300 may be a single computing device, or may include multiple connected computing devices, and may be, for example, part of the head unit of a vehicle's audio/visual system. The certificate authenticator 310 may check the certificate 142 of the mobile computing device 200 for authenticity, determining whether the mobile computing device 200 may access the vehicle computing device 300. The external interface 320 may allow the vehicle computing device 300 to communicate with other devices, such as the mobile computing device 100. A certificate 342 may include signature 343, which may allow the vehicle computing device 300 to be authenticated by the mobile computing device 200. The storage 340 may store the certificate 342 in any suitable manner.
  • The certificate authenticator 310 may be any suitable hardware and software on the vehicle computing device 300 for authenticating the certificate 142. For example, the certificate authenticator 310 may include cryptographic, hashing, and conversion hardware and software which may be the same or similar to that used by the certificate generator 110. For example, if the signature 143 was generated using SSL, the certificate authenticator 310 may use SSL to authenticate the signature 143. The certificate generator 310 may be able to authenticate the signature 143, hash hardware serial numbers, convert the resulting hash into a hardware key check, and compare that generated hardware key check to the hardware key 144 to check that the certificate 142 was issued to the mobile computing device 200, and was not taken from a different mobile computing device. The certificate authenticator 310 may, for example, receive a public key from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in authenticating the signature 143 from the certificate 142. The certificate authenticator 310 may generate the hardware key check that may be compared to the hardware key 144 based on the hardware serial number of the same hardware component of the external interface 220 used by the certificate generator 110 to generate the hardware key 144. For example, if the hardware key 144 was generated based on the serial number of a USB chip in the external interface 220 of the mobile computing device 200, the certificate authenticator 310 may retrieve the serial number of the USB chip in the external interface 220 of the mobile computing device 200 when generating a hardware key check to compare to the hardware key 144.
  • The external interface 320 may be any suitable combination of hardware and software on the vehicle computing device 200 for establishing a wired or wireless connection to a local area network or other local device, such as the mobile computing device 200. For example, the external interface 320 may use a USB connection to connect directly to another device.
  • FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. The computing device 100 may issue certificate, such as the certificate 142, to mobile computing devices, such as the mobile computing device 200. For example, the mobile computing device 200 may be configured after being manufactured, which may include issuing certificates to the mobile computing device 200. The computing device 100, which may be, for example, part of the server system used by a manufacturer to configure devices, may receive the hardware serial number from the external interface 220 of the mobile computing device 200. The hardware serial number may be, for example, the serial number of a USB chip.
  • The certificate generator 110 of the computing device 100 may generate the hardware key 144 using the hardware serial number, for example, hashing the hardware serial number and reducing the number of bits used by discarding part of the hash. The hardware key 144 may be stored as part of the certificate 142. The signature 143 may also be stored in the certificate 142 by the certificate generator 110. The signature 143 may be generated by the certificate generator 110 using any suitable cryptographic system, or may be selected from a number of signatures provided to the computing device 100 by, for example, the manufacturer or party responsible for the operating system or platform of the vehicle computing device 300. The signature 143 may be non-unique.
  • The certificate 142 may be issued to the mobile computing device 200. Once the certificate generator 110 has generated the certificate 142, including the signature 143 and the hardware key 144, the certificate 142 may be transferred to the mobile computing device 200. For example, the certificate 142 may be copied from the storage 140 on the computing device 100 into the storage 240 on the mobile computing device 200.
  • FIG. 5 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. The computing device 100 may be used to issue certificates, such as the certificate 142, to a number of mobile computing devices, some of which may be issued certificates that use the same signature. For example, the computing device 100 may issue the certificate 542 to the mobile computing device 500. The certificate 542 may include the same non-unique signature as the certificate 142, the signature 143. The hardware key 544 may be based on a hardware serial number of a hardware component of the external interface 540 of the mobile computing device 500, and may be different from the hardware key 144. Each certificate issued to a mobile computing device by the computing device 100 may include a unique hardware key, even when the signature is non-unique.
  • FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. The mobile computing device 200 may be connected to the vehicle computing device 300 by establishing a connection between the external interface 220 and the external interface 320. For example, a user may bring smartphone into a car and connect the smartphone to the car's head unit using a USB cable. The vehicle computing device 300 may receive the hardware serial number from the external interface 220 of the mobile computing device 200, for example, by reading the hardware serial number directly from the hardware component. For example, the head unit may read the USB serial number off of the USB chip in the smartphone that was used to establish the USB connection with the head unit.
  • The certificate authenticator 310 of the vehicle computing device 300 may attempt verify that the certificate 142 was issued to the mobile computing device 200, and was not obtained, for example, stolen, from another mobile computing device. The certificate authenticator 310 may hash the hardware serial number, reduce the number of bits in the resulting hash through discarding of parts of the hash, and convert the remaining portion of the hash to a hardware key check, all in the same manner as the certificate generator 110 when the hardware key 144 was first generated. The vehicle computing device 320 may receive the hardware key 144 from the certificate 142 on the mobile computing device 200, and the certificate generator 320 may compare the hardware key 144 to the hardware key check generated on the vehicle computing device 300. If the hardware key check matches the hardware key 144, the certificate 142 may have been issued to the mobile computing device 200, and the vehicle computing device 200 may authenticate the mobile computing device 200, for example, using a public key to authenticate the signature 143. The certificate authenticator 310 may authenticate the signature 143 of the certificate 142 before, during, or while verifying the certificate 142 based on the hardware key 144. When both the hardware key 144 and the signature 143 have been authenticated, the mobile computing device 200 may be permitted access to the vehicle computing device 300. For example, a smartphone may playback music or implement other functionality using the head unit of the car's audio/visual system.
  • If the hardware key check does not match the hardware key 144, this may indicate that the certificate 142 was taken from a different mobile computing device, which had a different hardware serial number than the mobile computing device 200. The certificate authenticator 310 may not authenticate the mobile computing device 200, preventing the mobile computing device 200 from accessing the vehicle computing device 300. For example, if the certificate 142 was generated for a first smartphone, having a USB chip with a first serial number, the hardware key 144 may only be verified with a hardware key check generated using that first serial number. A second smartphone, with a USB chip with a second serial number, may be unable to use the certificate 142 with the vehicle computing device 300, as the second serial number may result in a hardware key check that does not match the hardware key 144.
  • FIG. 7 shows an example of a process per-device authentication according to an implementation of the disclosed subject matter. At 700, a hardware serial number may be received. For example, the computing device 100 may receive a hardware serial number for a hardware component of the external interface 220 of the mobile computing device 200. The hardware serial number may be, for example, a USB serial number for a USB chip, or a MAC address for a network interface card.
  • At 702, a hardware key may be generated. For example, the certificate generator 110 on the computing device 100 may use the hardware serial number to generate the hardware key 144. The hardware key may be generated in any suitable manner, such as, for example, hashing of the hardware serial number with a suitable hashing algorithm and discarding of a portion of the resulting hash. The hardware key 144 may be unique to the mobile computing device 200, as the hardware key 144 may be based on the unique hardware serial number.
  • At 704, the hardware key may be stored in a certificate. For example, the certificate generator 110 may store the hardware key 144 in the certificate 142 on the computing device 100. The certificate 142 may also include the signature 143, which may be any suitable signature for a cryptographic system, such as SSL. The signature 143 may be non-unique, and may be used in certificates other than the certificate 142 issued to mobile computing devices other than the mobile computing device 200. The certificate generator 110 may generate the signature 143 using any suitable cryptographic system, or may have obtained the signature 143 from an outside party, such as, for example, a manufacturer of the vehicle computing device 300 or party responsible for the operating system or platform used by the vehicle computing device 300.
  • At 706, the certificate may be issued. For example, the computing device 100 may issue the certificate 142 to the mobile computing device 200. The certificate 142, including the signature 143 and the hardware key 144, may be moved from the storage 140 on the computing device 100 to the storage 240 on the mobile computing device 200. The storage 240 may be, for example, secure storage for certificates. The computing device 100 may issue the certificate 142 as part of the initial setup and configuration of the mobile computing device 200 to prepare the mobile computing device 200 for distribution and sale after manufacture.
  • FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter. At 800, a hardware serial number may be received. For example, the mobile computing device 200 may be connected to the vehicle computing device 300. A connection may be established between the external interface 220 and the external interface 320, for example, using a USB cable. The vehicle computing device 300 may receive a hardware serial number for a hardware component of the external interface 220 of the mobile computing device 200. The hardware serial number may be, for example, a USB serial number for a USB chip, or a MAC address for a network interface card.
  • At 802, a hardware key may be received. For example, the hardware key 144 from the certificate 142 on the mobile computing device 200 may be received by the vehicle computing device 300. The hardware key 144 may be received in response to a request, for example, from the certificate authenticator 310, or may be received automatically whenever a connection is established between the mobile computing device 200 and the vehicle computing device 300.
  • At 804, a hardware key check may be generated. For example, the certificate authenticator 310 on the vehicle computing device 300 may use the hardware serial number to generate the hardware key check. The hardware key check may be generated in the same manner as the hardware key 144, for example, hashing of the hardware serial number with the same hashing algorithm used by the certificate generator 110 and discarding of the same portion of the resulting hash.
  • At 806, the hardware key check may be matched to the hardware key. For example, the hardware key check may be compared with the hardware key 144 to determine if they match. The hardware key check may match the hardware key 144 when both were generated from the same hardware serial number, which may occur when the hardware serial number was received from the same hardware component by both the certificate generator 110 and the certificate authenticator 310. A match between the hardware key check and the hardware key 144 may indicate that the certificate 142 was issued to the mobile computing device 200, and was not taken from a different a mobile computing device. A match may verify the certificate 142. A mismatch between the hardware key check and the hardware key 144 may indicate that the certificate 142 was not issued to the mobile computing device 200, and may be stolen from another mobile computing device or otherwise illegitimately obtained. A mismatch may occur because the hardware key 144 was generated from a hardware serial number of a hardware component on some other mobile computing device, and the certificate 142 was issued to the other mobile computing device. The vehicle computing device 300 may have received the hardware serial number for the hardware component of the mobile computing device on which the certificate 142 is now stored, and that hardware serial number may not match the hardware serial number of the other mobile computing device, leading to the hardware key check being different from the hardware key 144.
  • At 808, a certificate may be received. For example, the vehicle computing device 300 may receive the entirety of the certificate 142, including the signature 143, from the mobile computing device 300. The certificate 142 may be received after a match has been found between the hardware key check and the hardware key 144, or, for example, may be received when a connection is established between the mobile computing device 200 and the vehicle computing device 300.
  • At 810, the signature may be authenticated. For example, the certificate authenticator 310 may authenticate the signature 143 from the certificate 142 using a public key. The public key may have been provided to the vehicle computing device 300 by, for example, the manufacturer of the vehicle computing device 300 or by a party responsible for the operating system or platform used by the vehicle computing device 300. The signature 143 may be authenticated using any suitable cryptographic system, such as, for example, SSL. When both the signature 143 is authenticated and the hardware key check verifies the certificate 142 by matching the hardware key 144, the mobile computing device 200 may be permitted access to the vehicle computing device 300, for example, to play back music through a vehicle's stereo system or implement any other suitable functionality.
  • Embodiments of the presently disclosed subject matter may be implemented in and used with a variety of component and network architectures. FIG. 9 is an example computer system 20 suitable for implementing embodiments of the presently disclosed subject matter. The computer 20 includes a bus 21 which interconnects major components of the computer 20, such as one or more processors 24, memory 27 such as RAM, ROM, flash RAM, or the like, an input/output controller 28, and fixed storage 23 such as a hard drive, flash storage, SAN device, or the like. It will be understood that other components may or may not be included, such as a user display such as a display screen via a display adapter, user input interfaces such as controllers and associated user input devices such as a keyboard, mouse, touchscreen, or the like, and other components known in the art to use in or in conjunction with general-purpose computing systems.
  • The bus 21 allows data communication between the central processor 24 and the memory 27. The RAM is generally the main memory into which the operating system and application programs are loaded. The ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components. Applications resident with the computer 20 are generally stored on and accessed via a computer readable medium, such as the fixed storage 23 and/or the memory 27, an optical drive, external storage mechanism, or the like.
  • Each component shown may be integral with the computer 20 or may be separate and accessed through other interfaces. Other interfaces, such as a network interface 29, may provide a connection to remote systems and devices via a telephone link, wired or wireless local- or wide-area network connection, proprietary network connections, or the like. For example, the network interface 29 may allow the computer to communicate with other computers via one or more local, wide-area, or other networks, as shown in FIG. 10.
  • Many other devices or components (not shown) may be connected in a similar manner, such as document scanners, digital cameras, auxiliary, supplemental, or backup systems, or the like. Conversely, all of the components shown in FIG. 9 need not be present to practice the present disclosure. The components can be interconnected in different ways from that shown. The operation of a computer such as that shown in FIG. 9 is readily known in the art and is not discussed in detail in this application. Code to implement the present disclosure can be stored in computer-readable storage media such as one or more of the memory 27, fixed storage 23, remote storage locations, or any other storage mechanism known in the art.
  • FIG. 10 shows an example arrangement according to an embodiment of the disclosed subject matter. One or more clients 10, 11, such as local computers, smart phones, tablet computing devices, remote services, and the like may connect to other devices via one or more networks 7. The network may be a local network, wide-area network, the Internet, or any other suitable communication network or networks, and may be implemented on any suitable platform including wired and/or wireless networks. The clients 10, 11 may communicate with one or more computer systems, such as processing units 14, databases 15, and user interface systems 13. In some cases, clients 10, 11 may communicate with a user interface system 13, which may provide access to one or more other systems such as a database 15, a processing unit 14, or the like. For example, the user interface 13 may be a user-accessible web page that provides data from one or more other computer systems. The user interface 13 may provide different interfaces to different clients, such as where a human-readable web page is provided to web browser clients 10, and a computer-readable API or other interface is provided to remote service clients 11. The user interface 13, database 15, and processing units 14 may be part of an integral system, or may include multiple computer systems communicating via a private network, the Internet, or any other suitable network. Processing units 14 may be, for example, part of a distributed system such as a cloud-based computing system, search engine, content delivery system, or the like, which may also include or communicate with a database 15 and/or user interface 13. In some arrangements, an analysis system 5 may provide back-end processing, such as where stored or acquired data is pre-processed by the analysis system 5 before delivery to the processing unit 14, database 15, and/or user interface 13. For example, a machine learning system 5 may provide various prediction models, data analysis, or the like to one or more other systems 13, 14, 15.
  • The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit embodiments of the disclosed subject matter to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to explain the principles of embodiments of the disclosed subject matter and their practical applications, to thereby enable others skilled in the art to utilize those embodiments as well as various embodiments with various modifications as may be suited to the particular use contemplated.

Claims (28)

1. A computer-implemented method performed by a data processing apparatus, the method comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key;
storing the hardware key as part of a certificate, wherein the certificate further comprises a signature; and
sending the certificate to the computing device.
2. The computer-implemented method of claim 1, further comprising:
receiving a second hardware serial number associated with second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component;
converting the second hardware serial number to a second hardware key;
storing the second hardware key as part of a second certificate, wherein the second certificate further comprises a second signature equivalent to the signature; and
sending the second certificate to the second computing device.
3. The computer-implemented method of claim 2, wherein converting the hardware serial number to a hardware key further comprises:
hashing the hardware serial number to obtain a hash.
4. The computer-implemented method of claim 3, further comprising:
discarding a portion of the hash.
5. The computer-implemented method of claim 1, wherein the hardware component is a USB chip or network interface card.
6. The computer-implemented method of claim 2, wherein the signature is generated for use with SSL.
7. A computer-implemented method performed by a data processing apparatus, the method comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key check;
receiving a hardware key associated with a certificate from the computing device;
comparing the hardware key to the hardware check key to obtain a verification of the certificate; and
verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key.
8. The computer-implemented method of claim 7, further comprising:
authenticating a signature associated with the certificate.
9. The computer-implemented method of claim 8, further comprising permitting access to the data processing apparatus by the computing device when the certificate is verified and the signature is determined to be authentic.
10. The computer-implemented method of claim 8, further comprising:
receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device;
converting the second hardware serial number to a second hardware key check;
receiving a second hardware key associated with a second certificate from the second computing device;
comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate; and
verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
11. The computer-implemented method of claim 10, further comprising:
authenticating the second signature; and
permitting access to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
12. The computer-implemented method of claim 7, wherein converting the hardware serial number to a hardware key check further comprises:
hashing the hardware serial number to obtain a hash.
13. The computer-implemented method of claim 12, further comprising:
discarding a portion of the hash.
14. The computer-implemented method of claim 7, wherein converting the hardware serial number to a hardware key check is performed based on a manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device.
15. The computer-implemented method of claim 7, wherein the hardware component is a USB chip or network interface card.
16. The computer-implemented method of claim 7, wherein the data processing apparatus comprises a vehicle computing device and the computing device comprises a mobile computing device.
17. A computer-implemented system for per-device authentication comprising:
a storage, the storage comprising two certificates, each certificate comprising a signature and a hardware key, the hardware key of a first certificate being different from the hardware key of a second certificate, and the signature of the first certificate being the same as the signature of the second certificate;
a certificate generator adapted to generate the hardware key of the first certificate from a hardware serial number associated with a hardware component of a first computing device, generate the hardware key of the second certificate from a hardware serial number associated with a hardware component of the second computing device, store the hardware key of the first certificate with the first certificate, store the hardware key of the second with the second certificate, send the first certificate to the first computing device, and send the second certificate to the second computing device.
18. The computer implemented system of claim 17, wherein the hardware component of the first computing device and the hardware component of the second computing device are of the same type.
19. The computer-implemented system of claim 17, wherein sending the first certificate to the first computing device comprises issuing the first certificate to the first computing device.
20. The computer-implemented system of claim 17, wherein the certificate generator is further adapted to generate the hardware key of the first certificate by hashing the hardware serial number of the hardware component of the first computing device.
21. A computer-implemented system for per-device authentication comprising:
a certificate authenticator adapted to receive hardware serial number associated with a hardware component of a computing device, receive a hardware key from a certificate of the computing device, generate a hardware key check from the hardware serial number, match the hardware key check with the hardware key to verify the certificate, receive a signature from the certificate, authenticate the signature, permit access by the computing device when the certificate is verified and the signature is authenticated, and deny access by the computing device when the certificate is not verified or the signature is not authenticated.
22. The computer-implemented system of claim 21, wherein the certificate authenticator is adapted to generate the hardware key check based on the manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device.
23. The computer-implemented system of claim 21, wherein the certificate authenticator is further adapted generate the hardware key check by hashing the hardware serial number.
24. The computer-implemented system of claim 21, wherein certificate authenticator is further adapted to receive a second hardware serial number associated with a second hardware component of a second computing device, receive a second hardware key from a second certificate of the second computing device, generate a second hardware key check from the second hardware serial number, match the second hardware key check with the second hardware key to verify the second certificate, receive a second signature from the second certificate wherein the second signature is equivalent to the signature from the certificate, authenticate the second signature, permit access by the second computing device when the second certificate is verified and the second signature is authenticated, and deny access by the second computing device when the second certificate is not verified or the second signature is not authenticated.
25. A system comprising: one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key;
storing the hardware key as part of a certificate, wherein the certificate further comprises a signature; and
sending the certificate to the computing device.
26. The system of claim 25, wherein the instructions further cause the one or more computers to perform operations further comprising:
receiving a second hardware serial number associated with second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component;
converting the second hardware serial number to a second hardware key;
storing the second hardware key as part of a second certificate, wherein the second certificate further comprises a second signature equivalent to the signature; and
sending the second certificate to the second computing device.
27. A system comprising: one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key check;
receiving a hardware key associated with a certificate from the computing device;
comparing the hardware key to the hardware check key to obtain a verification of the certificate; and
verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key.
28. The system of claim 27, wherein the instructions further cause the one or more computers to perform operations further comprising:
authenticating a signature associated with the certificate;
receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device;
converting the second hardware serial number to a second hardware key check;
receiving a second hardware key associated with a second certificate from the second computing device;
comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate; and
verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
US14/311,377 2014-06-23 2014-06-23 Per-Device Authentication Abandoned US20150372825A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/311,377 US20150372825A1 (en) 2014-06-23 2014-06-23 Per-Device Authentication
US15/923,784 US10225089B2 (en) 2014-06-23 2018-03-16 Per-device authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/311,377 US20150372825A1 (en) 2014-06-23 2014-06-23 Per-Device Authentication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/923,784 Continuation US10225089B2 (en) 2014-06-23 2018-03-16 Per-device authentication

Publications (1)

Publication Number Publication Date
US20150372825A1 true US20150372825A1 (en) 2015-12-24

Family

ID=54870641

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/311,377 Abandoned US20150372825A1 (en) 2014-06-23 2014-06-23 Per-Device Authentication
US15/923,784 Expired - Fee Related US10225089B2 (en) 2014-06-23 2018-03-16 Per-device authentication

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/923,784 Expired - Fee Related US10225089B2 (en) 2014-06-23 2018-03-16 Per-device authentication

Country Status (1)

Country Link
US (2) US20150372825A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9807615B2 (en) * 2016-03-17 2017-10-31 International Business Machines Corporation Disabling a mobile device that has stolen hardware components
US10225089B2 (en) 2014-06-23 2019-03-05 Google Llc Per-device authentication
CN109446787A (en) * 2018-10-07 2019-03-08 上海酷信息科技有限公司 A kind of method that APP binds, unbinds equipment
US10356081B2 (en) * 2016-01-29 2019-07-16 Cable Television Laboratories, Inc. Systems and methods for secure automated network attachment
CN111404955A (en) * 2020-03-25 2020-07-10 周晓明 Method and system for transmitting multipoint control channel for issuing information
US10733272B2 (en) * 2015-08-05 2020-08-04 Sony Corporation Control apparatus, authentication apparatus, control system, and control method
US11057195B2 (en) * 2015-10-16 2021-07-06 Volkswagen Aktiengesellschaft Method and system for providing security for the first time a mobile device makes contact with a device
US11424921B2 (en) 2015-11-09 2022-08-23 Dealerware, Llc Vehicle access systems and methods
US20230009032A1 (en) * 2021-07-12 2023-01-12 Dell Products, L.P. Systems and methods for authenticating the identity of an information handling system
US20240004984A1 (en) * 2022-06-29 2024-01-04 Lennox Industries, Inc. Security Token Provisioning for a Product

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112533195B (en) 2019-09-19 2023-03-10 华为技术有限公司 A device authentication method and device
US11609980B2 (en) 2020-05-08 2023-03-21 Hewlett Packard Enterprise Development Lp Memory module authentication extension
US11650936B2 (en) * 2020-05-08 2023-05-16 Hewlett Packard Enterprise Development Lp Field-replaceable unit (FRU) secure component binding
US12147524B2 (en) * 2020-11-27 2024-11-19 EMC IP Holding Company LLC Hardware system protection using verification of hardware digital identity values
US12147509B2 (en) 2021-03-24 2024-11-19 EMC IP Holding Company LLC System protection using verification of software digital identity values

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141027A1 (en) * 2006-12-06 2008-06-12 Samsung Electronics Co., Ltd. System and method of providing security
US20120254610A1 (en) * 2011-03-31 2012-10-04 Microsoft Corporation Remote disabling of applications
US20130339740A1 (en) * 2012-03-08 2013-12-19 Omer Ben-Shalom Multi-factor certificate authority
US20140337950A1 (en) * 2013-05-07 2014-11-13 Futurewei Technologies, Inc. Method and Apparatus for Secure Communications in a Wireless Network

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6792113B1 (en) * 1999-12-20 2004-09-14 Microsoft Corporation Adaptable security mechanism for preventing unauthorized access of digital data
US7117376B2 (en) * 2000-12-28 2006-10-03 Intel Corporation Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
US20050086468A1 (en) * 2003-10-17 2005-04-21 Branislav Meandzija Digital certificate related to user terminal hardware in a wireless network
JP2006246272A (en) * 2005-03-07 2006-09-14 Fuji Xerox Co Ltd Certificate acquisition system
KR100948384B1 (en) * 2006-11-29 2010-03-22 삼성전자주식회사 A device capable of moving a rights object, a portable storage device, and a method of moving a rights object
KR101366243B1 (en) * 2006-12-04 2014-02-20 삼성전자주식회사 Method for transmitting data through authenticating and apparatus therefor
JP2008181295A (en) * 2007-01-24 2008-08-07 Sony Corp Authentication system, information processor and method, program and recording medium
US8776169B2 (en) * 2010-03-30 2014-07-08 Authentic8, Inc. Disposable browsers and authentication techniques for a secure online user environment
US20150372825A1 (en) 2014-06-23 2015-12-24 Google Inc. Per-Device Authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141027A1 (en) * 2006-12-06 2008-06-12 Samsung Electronics Co., Ltd. System and method of providing security
US20120254610A1 (en) * 2011-03-31 2012-10-04 Microsoft Corporation Remote disabling of applications
US20130339740A1 (en) * 2012-03-08 2013-12-19 Omer Ben-Shalom Multi-factor certificate authority
US20140337950A1 (en) * 2013-05-07 2014-11-13 Futurewei Technologies, Inc. Method and Apparatus for Secure Communications in a Wireless Network

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10225089B2 (en) 2014-06-23 2019-03-05 Google Llc Per-device authentication
US10733272B2 (en) * 2015-08-05 2020-08-04 Sony Corporation Control apparatus, authentication apparatus, control system, and control method
US11057195B2 (en) * 2015-10-16 2021-07-06 Volkswagen Aktiengesellschaft Method and system for providing security for the first time a mobile device makes contact with a device
US11451384B2 (en) 2015-11-09 2022-09-20 Dealerware, Llc Vehicle access systems and methods
US11424921B2 (en) 2015-11-09 2022-08-23 Dealerware, Llc Vehicle access systems and methods
US11463246B2 (en) * 2015-11-09 2022-10-04 Dealerware, Llc Vehicle access systems and methods
US20220060468A1 (en) * 2016-01-29 2022-02-24 Cable Television Laboratories, Inc. Systems and methods for secure automated network attachment
US11171944B2 (en) * 2016-01-29 2021-11-09 Cable Television Laboratories, Inc. Systems and methods for secure automated network attachment
US10356081B2 (en) * 2016-01-29 2019-07-16 Cable Television Laboratories, Inc. Systems and methods for secure automated network attachment
US11924192B2 (en) * 2016-01-29 2024-03-05 Cable Television Laboratories, Inc. Systems and methods for secure automated network attachment
US10750370B2 (en) 2016-03-17 2020-08-18 International Business Machines Corporation Disabling a mobile device that has stolen hardware components
US10582387B2 (en) 2016-03-17 2020-03-03 International Business Machines Corporation Disabling a mobile device that has stolen hardware components
US9807615B2 (en) * 2016-03-17 2017-10-31 International Business Machines Corporation Disabling a mobile device that has stolen hardware components
CN109446787A (en) * 2018-10-07 2019-03-08 上海酷信息科技有限公司 A kind of method that APP binds, unbinds equipment
CN111404955A (en) * 2020-03-25 2020-07-10 周晓明 Method and system for transmitting multipoint control channel for issuing information
US20230009032A1 (en) * 2021-07-12 2023-01-12 Dell Products, L.P. Systems and methods for authenticating the identity of an information handling system
US11977640B2 (en) * 2021-07-12 2024-05-07 Dell Products, L.P. Systems and methods for authenticating the identity of an information handling system
US20240004984A1 (en) * 2022-06-29 2024-01-04 Lennox Industries, Inc. Security Token Provisioning for a Product
US12158942B2 (en) * 2022-06-29 2024-12-03 Lennox Industries Inc. Security token provisioning for a product

Also Published As

Publication number Publication date
US20180205560A1 (en) 2018-07-19
US10225089B2 (en) 2019-03-05

Similar Documents

Publication Publication Date Title
US10225089B2 (en) Per-device authentication
US20220058655A1 (en) Authentication system
CN105763521B (en) Device verification method and device
US20190036692A1 (en) System and method for generating a recovery key and managing credentials using a smart blockchain contract
US8584224B1 (en) Ticket based strong authentication with web service
CN101527633B (en) Method for intelligent key devices to obtain digital certificates
CN110958118A (en) Certificate authentication management method, device, equipment and computer readable storage medium
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
US11509655B2 (en) Authentication system and authentication method
CN109361697B (en) Method for realizing credible identity authentication based on SIM card loading PKI
WO2017054304A1 (en) Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information
CN109274652A (en) Identity information verifies system, method and device and computer storage medium
CN110795126A (en) A firmware security upgrade system
CN106936772A (en) A kind of access method, the apparatus and system of cloud platform resource
CN113221128A (en) Account and password storage method and registration management system
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN103684797A (en) Subscriber and subscriber terminal equipment correlation authentication method and system
CN113709115B (en) Authentication method and device
CN108964921A (en) Verification System, authentication method and service server
CN114365134A (en) Secure ID using unclonable functions
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
CN108616362A (en) Vote information generation method and device
TWM594186U (en) Device and system combining online rapid authentication and public key infrastructure to identify identity
CN115086090A (en) Network login authentication method and device based on UKey
CN115935318B (en) Information processing method, device, server, client and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: GOOGLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PARK, KEUN-YOUNG;IYER, RAKESH NARAYAN;PELLY, NICHOLAS JULIAN;SIGNING DATES FROM 20141230 TO 20150119;REEL/FRAME:034822/0166

AS Assignment

Owner name: GOOGLE LLC, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044695/0115

Effective date: 20170929

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载