US20150372825A1 - Per-Device Authentication - Google Patents
Per-Device Authentication Download PDFInfo
- Publication number
- US20150372825A1 US20150372825A1 US14/311,377 US201414311377A US2015372825A1 US 20150372825 A1 US20150372825 A1 US 20150372825A1 US 201414311377 A US201414311377 A US 201414311377A US 2015372825 A1 US2015372825 A1 US 2015372825A1
- Authority
- US
- United States
- Prior art keywords
- hardware
- certificate
- computing device
- hardware key
- serial number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 17
- 238000012795 verification Methods 0.000 claims abstract description 9
- 238000003860 storage Methods 0.000 claims description 26
- 230000000007 visual effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Definitions
- Converting the hardware serial number to a hardware key may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded.
- the hardware component may be a USB chip or network interface card.
- the signature may be generated for use with SSL.
- a second hardware serial number associated with a second hardware component of a second computing device may be received.
- the second hardware component may be of the same type as the hardware component of the first computing device.
- the second hardware serial number may be converted to a second hardware key check.
- a second hardware key associated with a second certificate from the second computing device may be received.
- the second hardware key may be compared to the second hardware key check to obtain a verification of the second certificate.
- the second certificate may be verified when the second hardware key check matches the second hardware key and the second certificate may not be verified when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
- the second signature may be authenticated. Access may be permitted to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
- FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 3 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 7 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter.
- FIG. 9 shows a computer according to an embodiment of the disclosed subject matter.
- FIG. 10 shows a network configuration according to an embodiment of the disclosed subject matter.
- Per-device authentication using a hardware key to be used with certificates using duplicate signatures on mobile computing devices may allow for authentication of the mobile computing devices on a per-device basis without requiring the generation of a unique signature for each certificate.
- Mobile computing devices such as smartphones and tablets, may use certificates to authenticate themselves to other computing devices, for example, vehicle computing devices such as the head unit of a car's audio/visual system. Different mobile computing devices may be given certificates that have the same signature.
- the certificate may also include a hardware key. The hardware key in a certificate may be generated based on the serial number of a hardware component of the mobile computing device to which the certificate was issued.
- Two mobile computing devices may have certificates with the same signature, but differing hardware keys.
- the vehicle computing device may retrieve the hardware serial number that was used to generate the hardware key, and may generate another hardware key, which may be used as a hardware key check, in the same manner. If the hardware key generated by the vehicle computing device matches the hardware key stored in the certificate of the mobile computing device, the vehicle computing device may proceed to authenticate the signature in the certificate. Otherwise, if the hardware keys do not match, the mobile computing device may not be authenticated, and may be prevented from accessing the vehicle computing device, as the mobile computing device may be using a certificate stolen from a different mobile computing device.
- a mobile computing device such as a smartphone or tablet, may be used in conjunction with a vehicle computing device, such as the head unit of a cars audio/visual system or other on-board computer system.
- a vehicle computing device such as the head unit of a cars audio/visual system or other on-board computer system.
- a smartphone may be connected to a car's head unit to allow playback of media, such as music, from the smartphone, or use of other suitable features of the smartphone.
- the vehicle computing device may need to authenticate the mobile computing device, for example, to ensure the mobile computing device is authorized to access the vehicle computing device.
- the mobile computing device may include a certificate that may uniquely identify the mobile computing device, allowing the vehicle computing device to determine the identity of the mobile computing device and whether the mobile computing device is authorized to access the vehicle computing device.
- the certificate may be issued to the mobile computing device during manufacture of the mobile computing device, and may be obtained from, for example, a manufacturer of the vehicle computing device or party responsible for the operating system or platform used by the vehicle computing device. Thus, the certificates may only be issued to mobile computing device that have been certified to work with the vehicle computing device.
- each of the 16 signatures may be used in the certificates 16 different mobile computing devices apiece.
- 16 of the mobile computing device may have a certificate with the signature “0001”.
- the signature may be associated with a public key.
- any suitable cryptographic system, such as SSL, may be used to generate both the signatures and the public keys that may be used to authenticate the signatures.
- the mobile computing device including the certificate with the non-unique signature and the unique hardware key, may be connected to a vehicle computing device in any suitable manner.
- a smartphone may be plugged into a car's head unit using a USB cable.
- the vehicle computing device may authenticate the mobile computing device based on the certificate stored on the mobile computing device.
- the vehicle computing device may use the public key, which may have been stored on the vehicle computing device during configuration by the manufacturer, to validate the non-unique signature in the mobile computing device's certificate.
- the vehicle computing device may ensure that the certificate on the mobile computing device was issued to that mobile computing device, and not stolen or otherwise obtained from a different mobile computing device, using the hardware key.
- the vehicle computing device may receive the hardware serial number from the hardware component of the mobile computing device.
- a smartphone may be issued a certificate with a signature of 0101.
- the signature may be a shared among a number of different smartphones.
- the smartphone may have a USB chip with a serial number of 842A480FG17P521N033Q2BV7.
- the hardware serial number may be hashed, for example, using MD5, to 3b22442436f8f85d01fe145e26b40d6d, which may be reduced to a 32 bit representation by discarding all but the last four characters, resulting in a hardware key 0d6d.
- This hardware key may be stored in the certificate issued to the smartphone along with the non-unique signature with a binary representation of 0101.
- the smartphone may be connected to the head unit in a car, for example, using a USB cable.
- the hardware key check may not match that hardware key, indicating that the second smartphone is using a certificate that was not issued to the second smartphone.
- the head unit may not authenticate the second smartphone, even though the second smartphone's certificate has a valid signature of 0101.
- the second smartphone may be prevented from accessing the head unit due to the use of a certificate that was not issued to the second smartphone.
- the hardware key may be stored in the certificate in any suitable format.
- the hardware key may be stored as a character string using any number of bits for each character.
- the hardware key may be any suitable number of bits in length.
- the hardware serial number may be used as the hardware key without hashing or discarding any portion of the hardware serial number.
- a hashed hardware serial number may be used as the hardware key without discarding any portion of the hash.
- FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter.
- a computing device 100 may include a certificate generator 110 and a storage 140 .
- the computing device 100 may be any suitable device, such as, for example, a computer 20 as described in FIG. 9 .
- the computing device 100 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a server system used by a manufacturer of mobile computing devices.
- the certificate generator 110 may generate a certificate 142 , including a signature 143 and a hardware key 144 , for issuance to and use on a mobile computing device.
- the storage 140 may store the certificate 142 in any suitable manner.
- the certificate generator 110 may be any suitable hardware and software on the computing device 100 for generating the certificate 142 .
- the certificate generator 110 may include cryptographic, hashing, and conversion hardware and software for generating a number of signatures, hashing hardware serial numbers, and converting the resulting hash into a hardware key.
- the certificate generator 110 may also, for example, receive a batch of signatures from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in generating the certificate 142 .
- the mobile computing device 200 may receive the certificate 142 from the computing device 100 during, for example, initial configuration of the mobile computing device 100 by its manufacturer.
- the storage 240 may store the certificate 142 , including the signature 143 and hardware key 144 , in any suitable manner.
- the storage 240 may be secure storage, which may prevent tampering with the certificate 142 .
- the signature 143 may be non-unique, and may be used in certificates issued to computing device other than the mobile computing device 100 .
- the hardware key 144 may be generated by the certificate generator 110 from the hardware serial number of the hardware component in the external interface 220 .
- the hardware component of the external interface 220 may be accessible to other devices connected to the mobile computing device 200 , for example, allowing the computing device 100 to read the hardware serial number to generate the hardware key 144 , and allowing a vehicle computing device to access the hardware serial number to check the hardware key 144 .
- the certificate authenticator 310 may be any suitable hardware and software on the vehicle computing device 300 for authenticating the certificate 142 .
- the certificate authenticator 310 may include cryptographic, hashing, and conversion hardware and software which may be the same or similar to that used by the certificate generator 110 .
- the certificate authenticator 310 may use SSL to authenticate the signature 143 .
- the certificate generator 310 may be able to authenticate the signature 143 , hash hardware serial numbers, convert the resulting hash into a hardware key check, and compare that generated hardware key check to the hardware key 144 to check that the certificate 142 was issued to the mobile computing device 200 , and was not taken from a different mobile computing device.
- the certificate generator 110 of the computing device 100 may generate the hardware key 144 using the hardware serial number, for example, hashing the hardware serial number and reducing the number of bits used by discarding part of the hash.
- the hardware key 144 may be stored as part of the certificate 142 .
- the signature 143 may also be stored in the certificate 142 by the certificate generator 110 .
- the signature 143 may be generated by the certificate generator 110 using any suitable cryptographic system, or may be selected from a number of signatures provided to the computing device 100 by, for example, the manufacturer or party responsible for the operating system or platform of the vehicle computing device 300 .
- the signature 143 may be non-unique.
- FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter.
- the mobile computing device 200 may be connected to the vehicle computing device 300 by establishing a connection between the external interface 220 and the external interface 320 .
- a user may bring smartphone into a car and connect the smartphone to the car's head unit using a USB cable.
- the vehicle computing device 300 may receive the hardware serial number from the external interface 220 of the mobile computing device 200 , for example, by reading the hardware serial number directly from the hardware component.
- the head unit may read the USB serial number off of the USB chip in the smartphone that was used to establish the USB connection with the head unit.
- the certificate authenticator 310 of the vehicle computing device 300 may attempt verify that the certificate 142 was issued to the mobile computing device 200 , and was not obtained, for example, stolen, from another mobile computing device.
- the certificate authenticator 310 may hash the hardware serial number, reduce the number of bits in the resulting hash through discarding of parts of the hash, and convert the remaining portion of the hash to a hardware key check, all in the same manner as the certificate generator 110 when the hardware key 144 was first generated.
- the vehicle computing device 320 may receive the hardware key 144 from the certificate 142 on the mobile computing device 200 , and the certificate generator 320 may compare the hardware key 144 to the hardware key check generated on the vehicle computing device 300 .
- the certificate 142 may have been issued to the mobile computing device 200 , and the vehicle computing device 200 may authenticate the mobile computing device 200 , for example, using a public key to authenticate the signature 143 .
- the certificate authenticator 310 may authenticate the signature 143 of the certificate 142 before, during, or while verifying the certificate 142 based on the hardware key 144 .
- the mobile computing device 200 may be permitted access to the vehicle computing device 300 .
- a smartphone may playback music or implement other functionality using the head unit of the car's audio/visual system.
- the hardware key check does not match the hardware key 144 , this may indicate that the certificate 142 was taken from a different mobile computing device, which had a different hardware serial number than the mobile computing device 200 .
- the certificate authenticator 310 may not authenticate the mobile computing device 200 , preventing the mobile computing device 200 from accessing the vehicle computing device 300 .
- the hardware key 144 may only be verified with a hardware key check generated using that first serial number.
- a second smartphone, with a USB chip with a second serial number may be unable to use the certificate 142 with the vehicle computing device 300 , as the second serial number may result in a hardware key check that does not match the hardware key 144 .
- the certificate may be issued.
- the computing device 100 may issue the certificate 142 to the mobile computing device 200 .
- the certificate 142 including the signature 143 and the hardware key 144 , may be moved from the storage 140 on the computing device 100 to the storage 240 on the mobile computing device 200 .
- the storage 240 may be, for example, secure storage for certificates.
- the computing device 100 may issue the certificate 142 as part of the initial setup and configuration of the mobile computing device 200 to prepare the mobile computing device 200 for distribution and sale after manufacture.
- a hardware key may be received.
- the hardware key 144 from the certificate 142 on the mobile computing device 200 may be received by the vehicle computing device 300 .
- the hardware key 144 may be received in response to a request, for example, from the certificate authenticator 310 , or may be received automatically whenever a connection is established between the mobile computing device 200 and the vehicle computing device 300 .
- a hardware key check may be generated.
- the certificate authenticator 310 on the vehicle computing device 300 may use the hardware serial number to generate the hardware key check.
- the hardware key check may be generated in the same manner as the hardware key 144 , for example, hashing of the hardware serial number with the same hashing algorithm used by the certificate generator 110 and discarding of the same portion of the resulting hash.
- the hardware key check may be matched to the hardware key.
- the hardware key check may be compared with the hardware key 144 to determine if they match.
- the hardware key check may match the hardware key 144 when both were generated from the same hardware serial number, which may occur when the hardware serial number was received from the same hardware component by both the certificate generator 110 and the certificate authenticator 310 .
- a match between the hardware key check and the hardware key 144 may indicate that the certificate 142 was issued to the mobile computing device 200 , and was not taken from a different a mobile computing device.
- a match may verify the certificate 142 .
- a mismatch between the hardware key check and the hardware key 144 may indicate that the certificate 142 was not issued to the mobile computing device 200 , and may be stolen from another mobile computing device or otherwise illegitimately obtained.
- a mismatch may occur because the hardware key 144 was generated from a hardware serial number of a hardware component on some other mobile computing device, and the certificate 142 was issued to the other mobile computing device.
- the vehicle computing device 300 may have received the hardware serial number for the hardware component of the mobile computing device on which the certificate 142 is now stored, and that hardware serial number may not match the hardware serial number of the other mobile computing device, leading to the hardware key check being different from the hardware key 144 .
- a certificate may be received.
- the vehicle computing device 300 may receive the entirety of the certificate 142 , including the signature 143 , from the mobile computing device 300 .
- the certificate 142 may be received after a match has been found between the hardware key check and the hardware key 144 , or, for example, may be received when a connection is established between the mobile computing device 200 and the vehicle computing device 300 .
- the signature may be authenticated.
- the certificate authenticator 310 may authenticate the signature 143 from the certificate 142 using a public key.
- the public key may have been provided to the vehicle computing device 300 by, for example, the manufacturer of the vehicle computing device 300 or by a party responsible for the operating system or platform used by the vehicle computing device 300 .
- the signature 143 may be authenticated using any suitable cryptographic system, such as, for example, SSL.
- the mobile computing device 200 may be permitted access to the vehicle computing device 300 , for example, to play back music through a vehicle's stereo system or implement any other suitable functionality.
- FIG. 9 is an example computer system 20 suitable for implementing embodiments of the presently disclosed subject matter.
- the computer 20 includes a bus 21 which interconnects major components of the computer 20 , such as one or more processors 24 , memory 27 such as RAM, ROM, flash RAM, or the like, an input/output controller 28 , and fixed storage 23 such as a hard drive, flash storage, SAN device, or the like.
- a user display such as a display screen via a display adapter
- user input interfaces such as controllers and associated user input devices
- keyboard, mouse, touchscreen, or the like and other components known in the art to use in or in conjunction with general-purpose computing systems.
- the bus 21 allows data communication between the central processor 24 and the memory 27 .
- the RAM is generally the main memory into which the operating system and application programs are loaded.
- the ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components.
- BIOS Basic Input-Output system
- Applications resident with the computer 20 are generally stored on and accessed via a computer readable medium, such as the fixed storage 23 and/or the memory 27 , an optical drive, external storage mechanism, or the like.
- Each component shown may be integral with the computer 20 or may be separate and accessed through other interfaces.
- Other interfaces such as a network interface 29 , may provide a connection to remote systems and devices via a telephone link, wired or wireless local- or wide-area network connection, proprietary network connections, or the like.
- the network interface 29 may allow the computer to communicate with other computers via one or more local, wide-area, or other networks, as shown in FIG. 10 .
- an analysis system 5 may provide back-end processing, such as where stored or acquired data is pre-processed by the analysis system 5 before delivery to the processing unit 14 , database 15 , and/or user interface 13 .
- a machine learning system 5 may provide various prediction models, data analysis, or the like to one or more other systems 13 , 14 , 15 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Telephone Function (AREA)
Abstract
Systems and techniques are provided for per-device authentication. A hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may be converted to a hardware key check. A hardware key associated with a certificate from the computing device may be received. The hardware key may be compared to the hardware check key to obtain a verification of the certificate. The certificate may be verified when the hardware key check matches the hardware key and the certificate may not be verified when the hardware key check does not match the hardware key. A signature associated with the certificate may be verified. Access to the data processing apparatus by the computing device may be permitted when the certificate is verified and the signature is determined to be authentic.
Description
- A smartphone, tablet, or other mobile computing device may be connected to the head unit of a car's audio/visual system or other vehicle computing device. The head unit may need to authenticate any smartphone that connects to it, to ensure that the smartphone is authorized to connect to and interact with the head unit. This may be done by issuing every smartphone, tablet, or other mobile computing device its own unique certificate. Issuing a unique certificate to every authorized mobile computing device may prevent certificates from being stolen and used on any other authorized or non-authorized mobile computing devices. The number of certificates required to ensure that every mobile computing device may be very large, and it may difficult to generate unique signatures for that many certificates.
- According to an embodiment of the disclosed subject matter, a hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may converted to a hardware key. The hardware key may be stored as part of a certificate. The certificate may include a signature. The certificate may be sent to the computing device. A second hardware serial number associated with second hardware component of a second computing device may be received. The second hardware component may be of the same type as the hardware component. The second hardware serial number may be converted to a second hardware key. The second hardware key may be stored as part of a second certificate. The second certificate may include a second signature equivalent to the signature. The second certificate may be sent to the second computing device.
- Converting the hardware serial number to a hardware key may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded. The hardware component may be a USB chip or network interface card. The signature may be generated for use with SSL.
- A hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may be converted to a hardware key check. A hardware key associated with a certificate from the computing device may be received. The hardware key may be compared to the hardware check key to obtain a verification of the certificate. The certificate may be verified when the hardware key check matches the hardware key and the certificate may not be verified when the hardware key check does not match the hardware key. A signature associated with the certificate may be verified. Access to the data processing apparatus by the computing device may be permitted when the certificate is verified and the signature is determined to be authentic.
- A second hardware serial number associated with a second hardware component of a second computing device may be received. The second hardware component may be of the same type as the hardware component of the first computing device. The second hardware serial number may be converted to a second hardware key check. A second hardware key associated with a second certificate from the second computing device may be received. The second hardware key may be compared to the second hardware key check to obtain a verification of the second certificate. The second certificate may be verified when the second hardware key check matches the second hardware key and the second certificate may not be verified when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate. The second signature may be authenticated. Access may be permitted to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
- Converting the hardware serial number to a hardware key check may include hashing the hardware serial number to obtain a hash. A portion of the hash may discarded. Converting the hardware serial number to a hardware key check may be performed based on a manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device. The hardware component may be a USB chip or network interface card. The data processing apparatus may be a vehicle computing device and the computing device may be a mobile computing device.
- According to an embodiment of the disclosed subject matter, a means for receiving a hardware serial number associated with a hardware component of a computing device, a means for converting the hardware serial number to a hardware key, a means for storing the hardware key as part of a certificate, where the certificate may include a signature, a means for sending the certificate to the computing device, a means for receiving a second hardware serial number associated with second hardware component of a second computing device, where the second hardware component may be of the same type as the hardware component, a means for converting the second hardware serial number to a second hardware key, a means for storing the second hardware key as part of a second certificate, where the second certificate may include a second signature equivalent to the signature, a means for sending the second certificate to the second computing device, a means for converting the hardware serial number to a hardware key including a means for hashing the hardware serial number to obtain a hash, and a means for discarding a portion of the hash, are included.
- A means for receiving a hardware serial number associated with a hardware component of a computing device, a means for converting the hardware serial number to a hardware key check, a means for receiving a hardware key associated with a certificate from the computing device, a means for comparing the hardware key to the hardware check key to obtain a verification of the certificate, a means for verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key, a means for authenticating a signature associated with the certificate, a means for permitting access to the data processing apparatus by the computing device when the certificate is verified and the signature is determined to be authentic, a means for receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device, a means for converting the second hardware serial number to a second hardware key check, a means for receiving a second hardware key associated with a second certificate from the second computing device, a means for comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate, and a means for verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate, a means for authenticating the second signature, a means for permitting access to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic, means for converting the hardware serial number to a hardware key check including a means for hashing the hardware serial number to obtain a hash, and a means for discarding a portion of the hash, are also included.
- Systems and techniques disclosed herein may allow for per-device authentication. Additional features, advantages, and embodiments of the disclosed subject matter may be set forth or apparent from consideration of the following detailed description, drawings, and claims. Moreover, it is to be understood that both the foregoing summary and the following detailed description are examples and are intended to provide further explanation without limiting the scope of the claims.
- The accompanying drawings, which are included to provide a further understanding of the disclosed subject matter, are incorporated in and constitute a part of this specification. The drawings also illustrate embodiments of the disclosed subject matter and together with the detailed description serve to explain the principles of embodiments of the disclosed subject matter. No attempt is made to show structural details in more detail than may be necessary for a fundamental understanding of the disclosed subject matter and various ways in which it may be practiced.
-
FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 3 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 5 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 7 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter. -
FIG. 9 shows a computer according to an embodiment of the disclosed subject matter. -
FIG. 10 shows a network configuration according to an embodiment of the disclosed subject matter. - Per-device authentication using a hardware key to be used with certificates using duplicate signatures on mobile computing devices may allow for authentication of the mobile computing devices on a per-device basis without requiring the generation of a unique signature for each certificate. Mobile computing devices, such as smartphones and tablets, may use certificates to authenticate themselves to other computing devices, for example, vehicle computing devices such as the head unit of a car's audio/visual system. Different mobile computing devices may be given certificates that have the same signature. To ensure that the certificates cannot be taken off of the mobile computing device's they were issued to and used on other mobile computing devices, the certificate may also include a hardware key. The hardware key in a certificate may be generated based on the serial number of a hardware component of the mobile computing device to which the certificate was issued. Two mobile computing devices may have certificates with the same signature, but differing hardware keys. When authenticating a mobile computing device's certificate, the vehicle computing device may retrieve the hardware serial number that was used to generate the hardware key, and may generate another hardware key, which may be used as a hardware key check, in the same manner. If the hardware key generated by the vehicle computing device matches the hardware key stored in the certificate of the mobile computing device, the vehicle computing device may proceed to authenticate the signature in the certificate. Otherwise, if the hardware keys do not match, the mobile computing device may not be authenticated, and may be prevented from accessing the vehicle computing device, as the mobile computing device may be using a certificate stolen from a different mobile computing device.
- A mobile computing device, such as a smartphone or tablet, may be used in conjunction with a vehicle computing device, such as the head unit of a cars audio/visual system or other on-board computer system. For example, a smartphone may be connected to a car's head unit to allow playback of media, such as music, from the smartphone, or use of other suitable features of the smartphone. When a mobile computing device is connected to a vehicle computing device, the vehicle computing device may need to authenticate the mobile computing device, for example, to ensure the mobile computing device is authorized to access the vehicle computing device. The mobile computing device may include a certificate that may uniquely identify the mobile computing device, allowing the vehicle computing device to determine the identity of the mobile computing device and whether the mobile computing device is authorized to access the vehicle computing device. The certificate may be issued to the mobile computing device during manufacture of the mobile computing device, and may be obtained from, for example, a manufacturer of the vehicle computing device or party responsible for the operating system or platform used by the vehicle computing device. Thus, the certificates may only be issued to mobile computing device that have been certified to work with the vehicle computing device.
- The certificate may include a signature, which may be any suitable and verifiable signature for establishing the identity of the mobile computing device. For example, the signature may be an SSL signature which may be verified using a public key stored on the vehicle computing device. Generating a unique signature for every mobile computing device that may be authorized to access a vehicle computing device may be difficult, as there may be many millions of such devices. The number of certificate signatures generated may be fewer than the number of mobile computing devices to which the certificates will be issued, with different mobile computing devise having certificates with the same signature. For example, for 256 mobile computing devices, instead of generating 256 unique signatures, requiring a minimum of 8 bits to represent, only 16 signatures may be generated, requiring a minimum of 4 bits to represent, although more bits may be used to ensure the signature is complex enough that unauthorized parties cannot generate valid signatures. Each of the 16 signatures may be used in the certificates 16 different mobile computing devices apiece. For example, 16 of the mobile computing device may have a certificate with the signature “0001”. The signature may be associated with a public key. For example, any suitable cryptographic system, such as SSL, may be used to generate both the signatures and the public keys that may be used to authenticate the signatures.
- Because more than one mobile computing device may use the same signature in its certificate, it may be difficult for a vehicle computing device to verify whether a mobile computing device is authorized or is using a stolen certificate. To prevent the use of stolen certificates, a hardware key may be added to each certificate issued to each mobile computing device. The hardware key in a mobile computing device's certificate may be based on a hardware serial number taken from any suitable hardware component of the mobile computing device. For example, a USB chip on the mobile computing device may have a serial number, which may unique for every USB chip on every computing device. A network interface, such as a WiFi radio, may have a MAC address which is unique to every network interface on every computing device and may serve as a hardware serial number.
- When a certificate, with non-unique signature, is issued to a mobile computing device, for example, during initial setup of the mobile computing device by the manufacturer, the hardware serial number of the selected hardware component of the mobile computing device may be used to generate the hardware key, which may be stored in the certificate before the certificate is issued. The hardware key may be generated from the hardware serial number in any suitable manner. For example, a hashing algorithm may be used to hash the hardware serial number, reducing, for example a USB serial number of 192 bits to a hardware key of 32 bits. The hardware key may be stored in the certificate in any suitable manner, for example, in a section of the certificate reserved for “extra” data. Each mobile computing device may have a unique hardware key stored in its certificate, even when the signature in the certificate is a duplicate, due to the uniqueness of the hardware serial number and the use of an appropriate hashing algorithm.
- The mobile computing device, including the certificate with the non-unique signature and the unique hardware key, may be connected to a vehicle computing device in any suitable manner. For example, a smartphone may be plugged into a car's head unit using a USB cable. The vehicle computing device may authenticate the mobile computing device based on the certificate stored on the mobile computing device. For example, the vehicle computing device may use the public key, which may have been stored on the vehicle computing device during configuration by the manufacturer, to validate the non-unique signature in the mobile computing device's certificate. The vehicle computing device may ensure that the certificate on the mobile computing device was issued to that mobile computing device, and not stolen or otherwise obtained from a different mobile computing device, using the hardware key. The vehicle computing device may receive the hardware serial number from the hardware component of the mobile computing device. For example, the vehicle computing device may read the USB serial number off of the USB chip that is part of the connection between the vehicle computing device and the mobile computing device. The vehicle computing device may generate a hardware key, which may be used as a hardware key check, from the hardware serial number in the same manner, for example, by using the same hashing algorithm, as was used to generate the hardware key that is stored in the certificate of the mobile computing device. The hardware key check generated by the vehicle computing device may be compared to the hardware key stored in the certificate on the mobile computing device. If the hardware key check matches the hardware key, the certificate may belong to the mobile computing device, which may be authenticated by the vehicle computing device if the vehicle computing device can also authenticate the signature. If the hardware key check does not match that hardware key, the certificate may not belong to the mobile computing device, and may have been stolen from a different mobile computing device. The vehicle computing device may not authenticate the mobile computing device, even if the signature in the certificate can be validated.
- For example, a smartphone may be issued a certificate with a signature of 0101. The signature may be a shared among a number of different smartphones. The smartphone may have a USB chip with a serial number of 842A480FG17P521N033Q2BV7. The hardware serial number may be hashed, for example, using MD5, to 3b22442436f8f85d01fe145e26b40d6d, which may be reduced to a 32 bit representation by discarding all but the last four characters, resulting in a hardware key 0d6d. This hardware key may be stored in the certificate issued to the smartphone along with the non-unique signature with a binary representation of 0101. The smartphone may be connected to the head unit in a car, for example, using a USB cable. The head unit in the car may receive the serial number of the USB chip in the smartphone, for example, reading the serial number directly off of the USB chip. The head unit may then hash the retrieved serial number of 842A480FG17P521N033Q2BV7 using MD5, and reduce the result to a 32 bit by discarding all but the last four characters in the hash, resulting in a hardware key check of 0d6d. This may match the hardware key stored in the smartphone's certificate, allowing the head unit to continue authenticating the smartphone, for example, authenticating the non-unique certificate of 0101 using SSL and a public key stored on the head unit.
- The smartphone's certificate may be stolen, or otherwise moved, to a second smartphone. When the second smartphone is connected to the head unit in the car, the head unit may retrieve the serial number from the second smartphone's USB chip. The second smartphone's USB chip may have a serial number of O3NG6389DGD144511FWTN983. The head unit may hash this hardware serial number using MD5, resulting in a hash of f29ccbb3c5b6d5fead63a096f9ab65fe. Discarding all but the last four characters may result in a hardware key check of 65fe. The head unit may compare this generated hardware key check to the hardware key stored in the second's smartphone certificate, which may be 0d6d. The hardware key check may not match that hardware key, indicating that the second smartphone is using a certificate that was not issued to the second smartphone. The head unit may not authenticate the second smartphone, even though the second smartphone's certificate has a valid signature of 0101. The second smartphone may be prevented from accessing the head unit due to the use of a certificate that was not issued to the second smartphone.
- The hardware key may be stored in the certificate in any suitable format. For example, the hardware key may be stored as a character string using any number of bits for each character. The hardware key may be any suitable number of bits in length. For example, the hardware serial number may be used as the hardware key without hashing or discarding any portion of the hardware serial number. Further, a hashed hardware serial number may be used as the hardware key without discarding any portion of the hash.
-
FIG. 1 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. Acomputing device 100 may include acertificate generator 110 and astorage 140. Thecomputing device 100 may be any suitable device, such as, for example, acomputer 20 as described inFIG. 9 . Thecomputing device 100 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a server system used by a manufacturer of mobile computing devices. Thecertificate generator 110 may generate acertificate 142, including asignature 143 and ahardware key 144, for issuance to and use on a mobile computing device. Thestorage 140 may store thecertificate 142 in any suitable manner. - The
certificate generator 110 may be any suitable hardware and software on thecomputing device 100 for generating thecertificate 142. For example, thecertificate generator 110 may include cryptographic, hashing, and conversion hardware and software for generating a number of signatures, hashing hardware serial numbers, and converting the resulting hash into a hardware key. Thecertificate generator 110 may also, for example, receive a batch of signatures from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in generating thecertificate 142. Thecertificate 142 may be generated for a mobile computing device, using thesignature 143, which may be non-unique and used in certificates for other mobile computing devices, and thehardware key 144, which may be generated based on a hardware serial number of a hardware component of the mobile computing device. -
FIG. 2 shows an example system suitable for per-device authentication according to an implementation of the disclosed subject matter. Amobile computing device 200 may include anexternal interface 220, and astorage 240. Themobile computing device 200 may be any suitable device, such as, for example, acomputer 20 as described inFIG. 9 . Themobile computing device 200 may be a single computing device, or may include multiple connected computing devices, and may be, for example, a mobile computing device, such as a tablet, smartphone, or laptop. Theexternal interface 220 may be allow themobile computing device 100 to communicate with other computing devices, for example, a vehicle computing device, and include a hardware component that has a unique serial number. For example, themobile computing device 200 may receive thecertificate 142 from thecomputing device 100 during, for example, initial configuration of themobile computing device 100 by its manufacturer. Thestorage 240 may store thecertificate 142, including thesignature 143 andhardware key 144, in any suitable manner. For example, thestorage 240 may be secure storage, which may prevent tampering with thecertificate 142. Thesignature 143 may be non-unique, and may be used in certificates issued to computing device other than themobile computing device 100. Thehardware key 144 may be generated by thecertificate generator 110 from the hardware serial number of the hardware component in theexternal interface 220. - The
external interface 220 may be any suitable combination of hardware and software on themobile computing device 200 for connecting, using wires or wirelessly to a local area network or other local device. For example, theexternal interface 220 may use a WiFi radio to connect to a router that has created a local area network, or to connect directly to another device, may use a Bluetooth radio to connect directly to another device, or may use a USB cable to connect to another device. Theexternal interface 220 may include a hardware component, such as a USB chip or network interface card, that may include a unique hardware serial number, such as a USB serial number or MAC address, that may be used by thecertificate generator 110 to generate thehardware key 144 for inclusion in thecertificate 142 issued from thecomputing device 100 to themobile computing device 200. The hardware component of theexternal interface 220 may be accessible to other devices connected to themobile computing device 200, for example, allowing thecomputing device 100 to read the hardware serial number to generate thehardware key 144, and allowing a vehicle computing device to access the hardware serial number to check thehardware key 144. -
FIG. 3 shows an example system suitable for an interface for multiple media applications according to an implementation of the disclosed subject matter. Avehicle computing device 300 may include acertificate authenticator 310, anexternal interface 320, and astorage 340. Thevehicle computing device 300 may be any suitable device, such as, for example, acomputer 20 as described inFIG. 9 . Thevehicle computing device 300 may be a single computing device, or may include multiple connected computing devices, and may be, for example, part of the head unit of a vehicle's audio/visual system. Thecertificate authenticator 310 may check thecertificate 142 of themobile computing device 200 for authenticity, determining whether themobile computing device 200 may access thevehicle computing device 300. Theexternal interface 320 may allow thevehicle computing device 300 to communicate with other devices, such as themobile computing device 100. Acertificate 342 may includesignature 343, which may allow thevehicle computing device 300 to be authenticated by themobile computing device 200. Thestorage 340 may store thecertificate 342 in any suitable manner. - The
certificate authenticator 310 may be any suitable hardware and software on thevehicle computing device 300 for authenticating thecertificate 142. For example, thecertificate authenticator 310 may include cryptographic, hashing, and conversion hardware and software which may be the same or similar to that used by thecertificate generator 110. For example, if thesignature 143 was generated using SSL, thecertificate authenticator 310 may use SSL to authenticate thesignature 143. Thecertificate generator 310 may be able to authenticate thesignature 143, hash hardware serial numbers, convert the resulting hash into a hardware key check, and compare that generated hardware key check to thehardware key 144 to check that thecertificate 142 was issued to themobile computing device 200, and was not taken from a different mobile computing device. Thecertificate authenticator 310 may, for example, receive a public key from, for example, the manufacturer of or party responsible for the operating system or platform used by vehicle computing devices, for use in authenticating thesignature 143 from thecertificate 142. Thecertificate authenticator 310 may generate the hardware key check that may be compared to thehardware key 144 based on the hardware serial number of the same hardware component of theexternal interface 220 used by thecertificate generator 110 to generate thehardware key 144. For example, if thehardware key 144 was generated based on the serial number of a USB chip in theexternal interface 220 of themobile computing device 200, thecertificate authenticator 310 may retrieve the serial number of the USB chip in theexternal interface 220 of themobile computing device 200 when generating a hardware key check to compare to thehardware key 144. - The
external interface 320 may be any suitable combination of hardware and software on thevehicle computing device 200 for establishing a wired or wireless connection to a local area network or other local device, such as themobile computing device 200. For example, theexternal interface 320 may use a USB connection to connect directly to another device. -
FIG. 4 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. Thecomputing device 100 may issue certificate, such as thecertificate 142, to mobile computing devices, such as themobile computing device 200. For example, themobile computing device 200 may be configured after being manufactured, which may include issuing certificates to themobile computing device 200. Thecomputing device 100, which may be, for example, part of the server system used by a manufacturer to configure devices, may receive the hardware serial number from theexternal interface 220 of themobile computing device 200. The hardware serial number may be, for example, the serial number of a USB chip. - The
certificate generator 110 of thecomputing device 100 may generate thehardware key 144 using the hardware serial number, for example, hashing the hardware serial number and reducing the number of bits used by discarding part of the hash. Thehardware key 144 may be stored as part of thecertificate 142. Thesignature 143 may also be stored in thecertificate 142 by thecertificate generator 110. Thesignature 143 may be generated by thecertificate generator 110 using any suitable cryptographic system, or may be selected from a number of signatures provided to thecomputing device 100 by, for example, the manufacturer or party responsible for the operating system or platform of thevehicle computing device 300. Thesignature 143 may be non-unique. - The
certificate 142 may be issued to themobile computing device 200. Once thecertificate generator 110 has generated thecertificate 142, including thesignature 143 and thehardware key 144, thecertificate 142 may be transferred to themobile computing device 200. For example, thecertificate 142 may be copied from thestorage 140 on thecomputing device 100 into thestorage 240 on themobile computing device 200. -
FIG. 5 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. Thecomputing device 100 may be used to issue certificates, such as thecertificate 142, to a number of mobile computing devices, some of which may be issued certificates that use the same signature. For example, thecomputing device 100 may issue thecertificate 542 to themobile computing device 500. Thecertificate 542 may include the same non-unique signature as thecertificate 142, thesignature 143. Thehardware key 544 may be based on a hardware serial number of a hardware component of theexternal interface 540 of themobile computing device 500, and may be different from thehardware key 144. Each certificate issued to a mobile computing device by thecomputing device 100 may include a unique hardware key, even when the signature is non-unique. -
FIG. 6 shows an example arrangement for per-device authentication according to an implementation of the disclosed subject matter. Themobile computing device 200 may be connected to thevehicle computing device 300 by establishing a connection between theexternal interface 220 and theexternal interface 320. For example, a user may bring smartphone into a car and connect the smartphone to the car's head unit using a USB cable. Thevehicle computing device 300 may receive the hardware serial number from theexternal interface 220 of themobile computing device 200, for example, by reading the hardware serial number directly from the hardware component. For example, the head unit may read the USB serial number off of the USB chip in the smartphone that was used to establish the USB connection with the head unit. - The
certificate authenticator 310 of thevehicle computing device 300 may attempt verify that thecertificate 142 was issued to themobile computing device 200, and was not obtained, for example, stolen, from another mobile computing device. Thecertificate authenticator 310 may hash the hardware serial number, reduce the number of bits in the resulting hash through discarding of parts of the hash, and convert the remaining portion of the hash to a hardware key check, all in the same manner as thecertificate generator 110 when thehardware key 144 was first generated. Thevehicle computing device 320 may receive thehardware key 144 from thecertificate 142 on themobile computing device 200, and thecertificate generator 320 may compare thehardware key 144 to the hardware key check generated on thevehicle computing device 300. If the hardware key check matches thehardware key 144, thecertificate 142 may have been issued to themobile computing device 200, and thevehicle computing device 200 may authenticate themobile computing device 200, for example, using a public key to authenticate thesignature 143. Thecertificate authenticator 310 may authenticate thesignature 143 of thecertificate 142 before, during, or while verifying thecertificate 142 based on thehardware key 144. When both thehardware key 144 and thesignature 143 have been authenticated, themobile computing device 200 may be permitted access to thevehicle computing device 300. For example, a smartphone may playback music or implement other functionality using the head unit of the car's audio/visual system. - If the hardware key check does not match the
hardware key 144, this may indicate that thecertificate 142 was taken from a different mobile computing device, which had a different hardware serial number than themobile computing device 200. Thecertificate authenticator 310 may not authenticate themobile computing device 200, preventing themobile computing device 200 from accessing thevehicle computing device 300. For example, if thecertificate 142 was generated for a first smartphone, having a USB chip with a first serial number, thehardware key 144 may only be verified with a hardware key check generated using that first serial number. A second smartphone, with a USB chip with a second serial number, may be unable to use thecertificate 142 with thevehicle computing device 300, as the second serial number may result in a hardware key check that does not match thehardware key 144. -
FIG. 7 shows an example of a process per-device authentication according to an implementation of the disclosed subject matter. At 700, a hardware serial number may be received. For example, thecomputing device 100 may receive a hardware serial number for a hardware component of theexternal interface 220 of themobile computing device 200. The hardware serial number may be, for example, a USB serial number for a USB chip, or a MAC address for a network interface card. - At 702, a hardware key may be generated. For example, the
certificate generator 110 on thecomputing device 100 may use the hardware serial number to generate thehardware key 144. The hardware key may be generated in any suitable manner, such as, for example, hashing of the hardware serial number with a suitable hashing algorithm and discarding of a portion of the resulting hash. Thehardware key 144 may be unique to themobile computing device 200, as thehardware key 144 may be based on the unique hardware serial number. - At 704, the hardware key may be stored in a certificate. For example, the
certificate generator 110 may store thehardware key 144 in thecertificate 142 on thecomputing device 100. Thecertificate 142 may also include thesignature 143, which may be any suitable signature for a cryptographic system, such as SSL. Thesignature 143 may be non-unique, and may be used in certificates other than thecertificate 142 issued to mobile computing devices other than themobile computing device 200. Thecertificate generator 110 may generate thesignature 143 using any suitable cryptographic system, or may have obtained thesignature 143 from an outside party, such as, for example, a manufacturer of thevehicle computing device 300 or party responsible for the operating system or platform used by thevehicle computing device 300. - At 706, the certificate may be issued. For example, the
computing device 100 may issue thecertificate 142 to themobile computing device 200. Thecertificate 142, including thesignature 143 and thehardware key 144, may be moved from thestorage 140 on thecomputing device 100 to thestorage 240 on themobile computing device 200. Thestorage 240 may be, for example, secure storage for certificates. Thecomputing device 100 may issue thecertificate 142 as part of the initial setup and configuration of themobile computing device 200 to prepare themobile computing device 200 for distribution and sale after manufacture. -
FIG. 8 shows an example of a process for per-device authentication according to an implementation of the disclosed subject matter. At 800, a hardware serial number may be received. For example, themobile computing device 200 may be connected to thevehicle computing device 300. A connection may be established between theexternal interface 220 and theexternal interface 320, for example, using a USB cable. Thevehicle computing device 300 may receive a hardware serial number for a hardware component of theexternal interface 220 of themobile computing device 200. The hardware serial number may be, for example, a USB serial number for a USB chip, or a MAC address for a network interface card. - At 802, a hardware key may be received. For example, the
hardware key 144 from thecertificate 142 on themobile computing device 200 may be received by thevehicle computing device 300. Thehardware key 144 may be received in response to a request, for example, from thecertificate authenticator 310, or may be received automatically whenever a connection is established between themobile computing device 200 and thevehicle computing device 300. - At 804, a hardware key check may be generated. For example, the
certificate authenticator 310 on thevehicle computing device 300 may use the hardware serial number to generate the hardware key check. The hardware key check may be generated in the same manner as thehardware key 144, for example, hashing of the hardware serial number with the same hashing algorithm used by thecertificate generator 110 and discarding of the same portion of the resulting hash. - At 806, the hardware key check may be matched to the hardware key. For example, the hardware key check may be compared with the
hardware key 144 to determine if they match. The hardware key check may match thehardware key 144 when both were generated from the same hardware serial number, which may occur when the hardware serial number was received from the same hardware component by both thecertificate generator 110 and thecertificate authenticator 310. A match between the hardware key check and thehardware key 144 may indicate that thecertificate 142 was issued to themobile computing device 200, and was not taken from a different a mobile computing device. A match may verify thecertificate 142. A mismatch between the hardware key check and thehardware key 144 may indicate that thecertificate 142 was not issued to themobile computing device 200, and may be stolen from another mobile computing device or otherwise illegitimately obtained. A mismatch may occur because thehardware key 144 was generated from a hardware serial number of a hardware component on some other mobile computing device, and thecertificate 142 was issued to the other mobile computing device. Thevehicle computing device 300 may have received the hardware serial number for the hardware component of the mobile computing device on which thecertificate 142 is now stored, and that hardware serial number may not match the hardware serial number of the other mobile computing device, leading to the hardware key check being different from thehardware key 144. - At 808, a certificate may be received. For example, the
vehicle computing device 300 may receive the entirety of thecertificate 142, including thesignature 143, from themobile computing device 300. Thecertificate 142 may be received after a match has been found between the hardware key check and thehardware key 144, or, for example, may be received when a connection is established between themobile computing device 200 and thevehicle computing device 300. - At 810, the signature may be authenticated. For example, the
certificate authenticator 310 may authenticate thesignature 143 from thecertificate 142 using a public key. The public key may have been provided to thevehicle computing device 300 by, for example, the manufacturer of thevehicle computing device 300 or by a party responsible for the operating system or platform used by thevehicle computing device 300. Thesignature 143 may be authenticated using any suitable cryptographic system, such as, for example, SSL. When both thesignature 143 is authenticated and the hardware key check verifies thecertificate 142 by matching thehardware key 144, themobile computing device 200 may be permitted access to thevehicle computing device 300, for example, to play back music through a vehicle's stereo system or implement any other suitable functionality. - Embodiments of the presently disclosed subject matter may be implemented in and used with a variety of component and network architectures.
FIG. 9 is anexample computer system 20 suitable for implementing embodiments of the presently disclosed subject matter. Thecomputer 20 includes a bus 21 which interconnects major components of thecomputer 20, such as one ormore processors 24,memory 27 such as RAM, ROM, flash RAM, or the like, an input/output controller 28, and fixedstorage 23 such as a hard drive, flash storage, SAN device, or the like. It will be understood that other components may or may not be included, such as a user display such as a display screen via a display adapter, user input interfaces such as controllers and associated user input devices such as a keyboard, mouse, touchscreen, or the like, and other components known in the art to use in or in conjunction with general-purpose computing systems. - The bus 21 allows data communication between the
central processor 24 and thememory 27. The RAM is generally the main memory into which the operating system and application programs are loaded. The ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components. Applications resident with thecomputer 20 are generally stored on and accessed via a computer readable medium, such as the fixedstorage 23 and/or thememory 27, an optical drive, external storage mechanism, or the like. - Each component shown may be integral with the
computer 20 or may be separate and accessed through other interfaces. Other interfaces, such as anetwork interface 29, may provide a connection to remote systems and devices via a telephone link, wired or wireless local- or wide-area network connection, proprietary network connections, or the like. For example, thenetwork interface 29 may allow the computer to communicate with other computers via one or more local, wide-area, or other networks, as shown inFIG. 10 . - Many other devices or components (not shown) may be connected in a similar manner, such as document scanners, digital cameras, auxiliary, supplemental, or backup systems, or the like. Conversely, all of the components shown in
FIG. 9 need not be present to practice the present disclosure. The components can be interconnected in different ways from that shown. The operation of a computer such as that shown inFIG. 9 is readily known in the art and is not discussed in detail in this application. Code to implement the present disclosure can be stored in computer-readable storage media such as one or more of thememory 27, fixedstorage 23, remote storage locations, or any other storage mechanism known in the art. -
FIG. 10 shows an example arrangement according to an embodiment of the disclosed subject matter. One ormore clients 10, 11, such as local computers, smart phones, tablet computing devices, remote services, and the like may connect to other devices via one ormore networks 7. The network may be a local network, wide-area network, the Internet, or any other suitable communication network or networks, and may be implemented on any suitable platform including wired and/or wireless networks. Theclients 10, 11 may communicate with one or more computer systems, such asprocessing units 14,databases 15, anduser interface systems 13. In some cases,clients 10, 11 may communicate with auser interface system 13, which may provide access to one or more other systems such as adatabase 15, aprocessing unit 14, or the like. For example, theuser interface 13 may be a user-accessible web page that provides data from one or more other computer systems. Theuser interface 13 may provide different interfaces to different clients, such as where a human-readable web page is provided to web browser clients 10, and a computer-readable API or other interface is provided toremote service clients 11. Theuser interface 13,database 15, andprocessing units 14 may be part of an integral system, or may include multiple computer systems communicating via a private network, the Internet, or any other suitable network.Processing units 14 may be, for example, part of a distributed system such as a cloud-based computing system, search engine, content delivery system, or the like, which may also include or communicate with adatabase 15 and/oruser interface 13. In some arrangements, ananalysis system 5 may provide back-end processing, such as where stored or acquired data is pre-processed by theanalysis system 5 before delivery to theprocessing unit 14,database 15, and/oruser interface 13. For example, amachine learning system 5 may provide various prediction models, data analysis, or the like to one or moreother systems - The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit embodiments of the disclosed subject matter to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to explain the principles of embodiments of the disclosed subject matter and their practical applications, to thereby enable others skilled in the art to utilize those embodiments as well as various embodiments with various modifications as may be suited to the particular use contemplated.
Claims (28)
1. A computer-implemented method performed by a data processing apparatus, the method comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key;
storing the hardware key as part of a certificate, wherein the certificate further comprises a signature; and
sending the certificate to the computing device.
2. The computer-implemented method of claim 1 , further comprising:
receiving a second hardware serial number associated with second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component;
converting the second hardware serial number to a second hardware key;
storing the second hardware key as part of a second certificate, wherein the second certificate further comprises a second signature equivalent to the signature; and
sending the second certificate to the second computing device.
3. The computer-implemented method of claim 2 , wherein converting the hardware serial number to a hardware key further comprises:
hashing the hardware serial number to obtain a hash.
4. The computer-implemented method of claim 3 , further comprising:
discarding a portion of the hash.
5. The computer-implemented method of claim 1 , wherein the hardware component is a USB chip or network interface card.
6. The computer-implemented method of claim 2 , wherein the signature is generated for use with SSL.
7. A computer-implemented method performed by a data processing apparatus, the method comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key check;
receiving a hardware key associated with a certificate from the computing device;
comparing the hardware key to the hardware check key to obtain a verification of the certificate; and
verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key.
8. The computer-implemented method of claim 7 , further comprising:
authenticating a signature associated with the certificate.
9. The computer-implemented method of claim 8 , further comprising permitting access to the data processing apparatus by the computing device when the certificate is verified and the signature is determined to be authentic.
10. The computer-implemented method of claim 8 , further comprising:
receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device;
converting the second hardware serial number to a second hardware key check;
receiving a second hardware key associated with a second certificate from the second computing device;
comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate; and
verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
11. The computer-implemented method of claim 10 , further comprising:
authenticating the second signature; and
permitting access to the data processing apparatus by the second computing device when the second certificate is verified and the second signature is determined to be authentic.
12. The computer-implemented method of claim 7 , wherein converting the hardware serial number to a hardware key check further comprises:
hashing the hardware serial number to obtain a hash.
13. The computer-implemented method of claim 12 , further comprising:
discarding a portion of the hash.
14. The computer-implemented method of claim 7 , wherein converting the hardware serial number to a hardware key check is performed based on a manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device.
15. The computer-implemented method of claim 7 , wherein the hardware component is a USB chip or network interface card.
16. The computer-implemented method of claim 7 , wherein the data processing apparatus comprises a vehicle computing device and the computing device comprises a mobile computing device.
17. A computer-implemented system for per-device authentication comprising:
a storage, the storage comprising two certificates, each certificate comprising a signature and a hardware key, the hardware key of a first certificate being different from the hardware key of a second certificate, and the signature of the first certificate being the same as the signature of the second certificate;
a certificate generator adapted to generate the hardware key of the first certificate from a hardware serial number associated with a hardware component of a first computing device, generate the hardware key of the second certificate from a hardware serial number associated with a hardware component of the second computing device, store the hardware key of the first certificate with the first certificate, store the hardware key of the second with the second certificate, send the first certificate to the first computing device, and send the second certificate to the second computing device.
18. The computer implemented system of claim 17 , wherein the hardware component of the first computing device and the hardware component of the second computing device are of the same type.
19. The computer-implemented system of claim 17 , wherein sending the first certificate to the first computing device comprises issuing the first certificate to the first computing device.
20. The computer-implemented system of claim 17 , wherein the certificate generator is further adapted to generate the hardware key of the first certificate by hashing the hardware serial number of the hardware component of the first computing device.
21. A computer-implemented system for per-device authentication comprising:
a certificate authenticator adapted to receive hardware serial number associated with a hardware component of a computing device, receive a hardware key from a certificate of the computing device, generate a hardware key check from the hardware serial number, match the hardware key check with the hardware key to verify the certificate, receive a signature from the certificate, authenticate the signature, permit access by the computing device when the certificate is verified and the signature is authenticated, and deny access by the computing device when the certificate is not verified or the signature is not authenticated.
22. The computer-implemented system of claim 21 , wherein the certificate authenticator is adapted to generate the hardware key check based on the manner in which the hardware key was generated from the hardware serial number when the certificate was issued to the computing device.
23. The computer-implemented system of claim 21 , wherein the certificate authenticator is further adapted generate the hardware key check by hashing the hardware serial number.
24. The computer-implemented system of claim 21 , wherein certificate authenticator is further adapted to receive a second hardware serial number associated with a second hardware component of a second computing device, receive a second hardware key from a second certificate of the second computing device, generate a second hardware key check from the second hardware serial number, match the second hardware key check with the second hardware key to verify the second certificate, receive a second signature from the second certificate wherein the second signature is equivalent to the signature from the certificate, authenticate the second signature, permit access by the second computing device when the second certificate is verified and the second signature is authenticated, and deny access by the second computing device when the second certificate is not verified or the second signature is not authenticated.
25. A system comprising: one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key;
storing the hardware key as part of a certificate, wherein the certificate further comprises a signature; and
sending the certificate to the computing device.
26. The system of claim 25 , wherein the instructions further cause the one or more computers to perform operations further comprising:
receiving a second hardware serial number associated with second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component;
converting the second hardware serial number to a second hardware key;
storing the second hardware key as part of a second certificate, wherein the second certificate further comprises a second signature equivalent to the signature; and
sending the second certificate to the second computing device.
27. A system comprising: one or more computers and one or more storage devices storing instructions which are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising:
receiving a hardware serial number associated with a hardware component of a computing device;
converting the hardware serial number to a hardware key check;
receiving a hardware key associated with a certificate from the computing device;
comparing the hardware key to the hardware check key to obtain a verification of the certificate; and
verifying the certificate when the hardware key check matches the hardware key and not verifying the certificate when the hardware key check does not match the hardware key.
28. The system of claim 27 , wherein the instructions further cause the one or more computers to perform operations further comprising:
authenticating a signature associated with the certificate;
receiving a second hardware serial number associated with a second hardware component of a second computing device, wherein the second hardware component is of the same type as the hardware component of the first computing device;
converting the second hardware serial number to a second hardware key check;
receiving a second hardware key associated with a second certificate from the second computing device;
comparing the second hardware key to the second hardware key check to obtain a verification of the second certificate; and
verifying the second certificate when the second hardware key check matches the second hardware key and not verifying the second certificate when the second hardware key check does not match the second hardware key, and wherein a second signature equivalent to the signature is associated with the second certificate.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/311,377 US20150372825A1 (en) | 2014-06-23 | 2014-06-23 | Per-Device Authentication |
US15/923,784 US10225089B2 (en) | 2014-06-23 | 2018-03-16 | Per-device authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/311,377 US20150372825A1 (en) | 2014-06-23 | 2014-06-23 | Per-Device Authentication |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/923,784 Continuation US10225089B2 (en) | 2014-06-23 | 2018-03-16 | Per-device authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150372825A1 true US20150372825A1 (en) | 2015-12-24 |
Family
ID=54870641
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/311,377 Abandoned US20150372825A1 (en) | 2014-06-23 | 2014-06-23 | Per-Device Authentication |
US15/923,784 Expired - Fee Related US10225089B2 (en) | 2014-06-23 | 2018-03-16 | Per-device authentication |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/923,784 Expired - Fee Related US10225089B2 (en) | 2014-06-23 | 2018-03-16 | Per-device authentication |
Country Status (1)
Country | Link |
---|---|
US (2) | US20150372825A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9807615B2 (en) * | 2016-03-17 | 2017-10-31 | International Business Machines Corporation | Disabling a mobile device that has stolen hardware components |
US10225089B2 (en) | 2014-06-23 | 2019-03-05 | Google Llc | Per-device authentication |
CN109446787A (en) * | 2018-10-07 | 2019-03-08 | 上海酷信息科技有限公司 | A kind of method that APP binds, unbinds equipment |
US10356081B2 (en) * | 2016-01-29 | 2019-07-16 | Cable Television Laboratories, Inc. | Systems and methods for secure automated network attachment |
CN111404955A (en) * | 2020-03-25 | 2020-07-10 | 周晓明 | Method and system for transmitting multipoint control channel for issuing information |
US10733272B2 (en) * | 2015-08-05 | 2020-08-04 | Sony Corporation | Control apparatus, authentication apparatus, control system, and control method |
US11057195B2 (en) * | 2015-10-16 | 2021-07-06 | Volkswagen Aktiengesellschaft | Method and system for providing security for the first time a mobile device makes contact with a device |
US11424921B2 (en) | 2015-11-09 | 2022-08-23 | Dealerware, Llc | Vehicle access systems and methods |
US20230009032A1 (en) * | 2021-07-12 | 2023-01-12 | Dell Products, L.P. | Systems and methods for authenticating the identity of an information handling system |
US20240004984A1 (en) * | 2022-06-29 | 2024-01-04 | Lennox Industries, Inc. | Security Token Provisioning for a Product |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112533195B (en) | 2019-09-19 | 2023-03-10 | 华为技术有限公司 | A device authentication method and device |
US11609980B2 (en) | 2020-05-08 | 2023-03-21 | Hewlett Packard Enterprise Development Lp | Memory module authentication extension |
US11650936B2 (en) * | 2020-05-08 | 2023-05-16 | Hewlett Packard Enterprise Development Lp | Field-replaceable unit (FRU) secure component binding |
US12147524B2 (en) * | 2020-11-27 | 2024-11-19 | EMC IP Holding Company LLC | Hardware system protection using verification of hardware digital identity values |
US12147509B2 (en) | 2021-03-24 | 2024-11-19 | EMC IP Holding Company LLC | System protection using verification of software digital identity values |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080141027A1 (en) * | 2006-12-06 | 2008-06-12 | Samsung Electronics Co., Ltd. | System and method of providing security |
US20120254610A1 (en) * | 2011-03-31 | 2012-10-04 | Microsoft Corporation | Remote disabling of applications |
US20130339740A1 (en) * | 2012-03-08 | 2013-12-19 | Omer Ben-Shalom | Multi-factor certificate authority |
US20140337950A1 (en) * | 2013-05-07 | 2014-11-13 | Futurewei Technologies, Inc. | Method and Apparatus for Secure Communications in a Wireless Network |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6792113B1 (en) * | 1999-12-20 | 2004-09-14 | Microsoft Corporation | Adaptable security mechanism for preventing unauthorized access of digital data |
US7117376B2 (en) * | 2000-12-28 | 2006-10-03 | Intel Corporation | Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations |
US20050086468A1 (en) * | 2003-10-17 | 2005-04-21 | Branislav Meandzija | Digital certificate related to user terminal hardware in a wireless network |
JP2006246272A (en) * | 2005-03-07 | 2006-09-14 | Fuji Xerox Co Ltd | Certificate acquisition system |
KR100948384B1 (en) * | 2006-11-29 | 2010-03-22 | 삼성전자주식회사 | A device capable of moving a rights object, a portable storage device, and a method of moving a rights object |
KR101366243B1 (en) * | 2006-12-04 | 2014-02-20 | 삼성전자주식회사 | Method for transmitting data through authenticating and apparatus therefor |
JP2008181295A (en) * | 2007-01-24 | 2008-08-07 | Sony Corp | Authentication system, information processor and method, program and recording medium |
US8776169B2 (en) * | 2010-03-30 | 2014-07-08 | Authentic8, Inc. | Disposable browsers and authentication techniques for a secure online user environment |
US20150372825A1 (en) | 2014-06-23 | 2015-12-24 | Google Inc. | Per-Device Authentication |
-
2014
- 2014-06-23 US US14/311,377 patent/US20150372825A1/en not_active Abandoned
-
2018
- 2018-03-16 US US15/923,784 patent/US10225089B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080141027A1 (en) * | 2006-12-06 | 2008-06-12 | Samsung Electronics Co., Ltd. | System and method of providing security |
US20120254610A1 (en) * | 2011-03-31 | 2012-10-04 | Microsoft Corporation | Remote disabling of applications |
US20130339740A1 (en) * | 2012-03-08 | 2013-12-19 | Omer Ben-Shalom | Multi-factor certificate authority |
US20140337950A1 (en) * | 2013-05-07 | 2014-11-13 | Futurewei Technologies, Inc. | Method and Apparatus for Secure Communications in a Wireless Network |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10225089B2 (en) | 2014-06-23 | 2019-03-05 | Google Llc | Per-device authentication |
US10733272B2 (en) * | 2015-08-05 | 2020-08-04 | Sony Corporation | Control apparatus, authentication apparatus, control system, and control method |
US11057195B2 (en) * | 2015-10-16 | 2021-07-06 | Volkswagen Aktiengesellschaft | Method and system for providing security for the first time a mobile device makes contact with a device |
US11451384B2 (en) | 2015-11-09 | 2022-09-20 | Dealerware, Llc | Vehicle access systems and methods |
US11424921B2 (en) | 2015-11-09 | 2022-08-23 | Dealerware, Llc | Vehicle access systems and methods |
US11463246B2 (en) * | 2015-11-09 | 2022-10-04 | Dealerware, Llc | Vehicle access systems and methods |
US20220060468A1 (en) * | 2016-01-29 | 2022-02-24 | Cable Television Laboratories, Inc. | Systems and methods for secure automated network attachment |
US11171944B2 (en) * | 2016-01-29 | 2021-11-09 | Cable Television Laboratories, Inc. | Systems and methods for secure automated network attachment |
US10356081B2 (en) * | 2016-01-29 | 2019-07-16 | Cable Television Laboratories, Inc. | Systems and methods for secure automated network attachment |
US11924192B2 (en) * | 2016-01-29 | 2024-03-05 | Cable Television Laboratories, Inc. | Systems and methods for secure automated network attachment |
US10750370B2 (en) | 2016-03-17 | 2020-08-18 | International Business Machines Corporation | Disabling a mobile device that has stolen hardware components |
US10582387B2 (en) | 2016-03-17 | 2020-03-03 | International Business Machines Corporation | Disabling a mobile device that has stolen hardware components |
US9807615B2 (en) * | 2016-03-17 | 2017-10-31 | International Business Machines Corporation | Disabling a mobile device that has stolen hardware components |
CN109446787A (en) * | 2018-10-07 | 2019-03-08 | 上海酷信息科技有限公司 | A kind of method that APP binds, unbinds equipment |
CN111404955A (en) * | 2020-03-25 | 2020-07-10 | 周晓明 | Method and system for transmitting multipoint control channel for issuing information |
US20230009032A1 (en) * | 2021-07-12 | 2023-01-12 | Dell Products, L.P. | Systems and methods for authenticating the identity of an information handling system |
US11977640B2 (en) * | 2021-07-12 | 2024-05-07 | Dell Products, L.P. | Systems and methods for authenticating the identity of an information handling system |
US20240004984A1 (en) * | 2022-06-29 | 2024-01-04 | Lennox Industries, Inc. | Security Token Provisioning for a Product |
US12158942B2 (en) * | 2022-06-29 | 2024-12-03 | Lennox Industries Inc. | Security token provisioning for a product |
Also Published As
Publication number | Publication date |
---|---|
US20180205560A1 (en) | 2018-07-19 |
US10225089B2 (en) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10225089B2 (en) | Per-device authentication | |
US20220058655A1 (en) | Authentication system | |
CN105763521B (en) | Device verification method and device | |
US20190036692A1 (en) | System and method for generating a recovery key and managing credentials using a smart blockchain contract | |
US8584224B1 (en) | Ticket based strong authentication with web service | |
CN101527633B (en) | Method for intelligent key devices to obtain digital certificates | |
CN110958118A (en) | Certificate authentication management method, device, equipment and computer readable storage medium | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
US11509655B2 (en) | Authentication system and authentication method | |
CN109361697B (en) | Method for realizing credible identity authentication based on SIM card loading PKI | |
WO2017054304A1 (en) | Method and apparatus for storing fingerprint template information, and performing authentication by adopting fingerprint information | |
CN109274652A (en) | Identity information verifies system, method and device and computer storage medium | |
CN110795126A (en) | A firmware security upgrade system | |
CN106936772A (en) | A kind of access method, the apparatus and system of cloud platform resource | |
CN113221128A (en) | Account and password storage method and registration management system | |
CN113360868A (en) | Application program login method and device, computer equipment and storage medium | |
CN103684797A (en) | Subscriber and subscriber terminal equipment correlation authentication method and system | |
CN113709115B (en) | Authentication method and device | |
CN108964921A (en) | Verification System, authentication method and service server | |
CN114365134A (en) | Secure ID using unclonable functions | |
JP2017102842A (en) | Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program | |
CN108616362A (en) | Vote information generation method and device | |
TWM594186U (en) | Device and system combining online rapid authentication and public key infrastructure to identify identity | |
CN115086090A (en) | Network login authentication method and device based on UKey | |
CN115935318B (en) | Information processing method, device, server, client and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PARK, KEUN-YOUNG;IYER, RAKESH NARAYAN;PELLY, NICHOLAS JULIAN;SIGNING DATES FROM 20141230 TO 20150119;REEL/FRAME:034822/0166 |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044695/0115 Effective date: 20170929 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |