Unlock instant, AI-driven research and patent intelligence for your innovation.

Per-Device Authentication

Inactive Publication Date: 2015-12-24
GOOGLE LLC
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a system and technique for authenticating hardware components of a computing device. The system receives a hardware serial number associated with a hardware component and converts it to a hardware key. The hardware key is then stored as part of a certificate, which includes a signature. The certificate is sent to the computing device and verified if the hardware key matches the hardware key in the certificate. The system also allows for per-device authentication, which means that each device can be authenticated separately. The technical effect of this system is to enhance security and prevent unauthorized access to the computing device.

Problems solved by technology

The number of certificates required to ensure that every mobile computing device may be very large, and it may difficult to generate unique signatures for that many certificates.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Per-Device Authentication
  • Per-Device Authentication
  • Per-Device Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]Per-device authentication using a hardware key to be used with certificates using duplicate signatures on mobile computing devices may allow for authentication of the mobile computing devices on a per-device basis without requiring the generation of a unique signature for each certificate. Mobile computing devices, such as smartphones and tablets, may use certificates to authenticate themselves to other computing devices, for example, vehicle computing devices such as the head unit of a car's audio / visual system. Different mobile computing devices may be given certificates that have the same signature. To ensure that the certificates cannot be taken off of the mobile computing device's they were issued to and used on other mobile computing devices, the certificate may also include a hardware key. The hardware key in a certificate may be generated based on the serial number of a hardware component of the mobile computing device to which the certificate was issued. Two mobile co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and techniques are provided for per-device authentication. A hardware serial number associated with a hardware component of a computing device may be received. The hardware serial number may be converted to a hardware key check. A hardware key associated with a certificate from the computing device may be received. The hardware key may be compared to the hardware check key to obtain a verification of the certificate. The certificate may be verified when the hardware key check matches the hardware key and the certificate may not be verified when the hardware key check does not match the hardware key. A signature associated with the certificate may be verified. Access to the data processing apparatus by the computing device may be permitted when the certificate is verified and the signature is determined to be authentic.

Description

BACKGROUND[0001]A smartphone, tablet, or other mobile computing device may be connected to the head unit of a car's audio / visual system or other vehicle computing device. The head unit may need to authenticate any smartphone that connects to it, to ensure that the smartphone is authorized to connect to and interact with the head unit. This may be done by issuing every smartphone, tablet, or other mobile computing device its own unique certificate. Issuing a unique certificate to every authorized mobile computing device may prevent certificates from being stolen and used on any other authorized or non-authorized mobile computing devices. The number of certificates required to ensure that every mobile computing device may be very large, and it may difficult to generate unique signatures for that many certificates.BRIEF SUMMARY[0002]According to an embodiment of the disclosed subject matter, a hardware serial number associated with a hardware component of a computing device may be rece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W12/06H04L9/08H04L29/06G06F21/44
CPCH04L9/3268H04L63/0823G06F21/44G06F2221/2129H04L9/0866H04W12/06H04L9/3247H04W12/069
Inventor PARK, KEUN YOUNGIYER, RAKESH NARAYANPELLY, NICHOLAS JULIAN
Owner GOOGLE LLC