The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 13, 2021

Filed:

Feb. 22, 2017
Applicant:

Nxp Usa, Inc., Austin, TX (US);

Inventor:

Paul A. Lambert, Mountain View, CA (US);

Assignee:

NXP USA, Inc., Austin, TX (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04W 8/24 (2009.01); H04W 12/06 (2021.01); H04W 12/04 (2021.01);
U.S. Cl.
CPC ...
H04L 63/08 (2013.01); H04L 9/0844 (2013.01); H04L 9/32 (2013.01); H04L 9/3236 (2013.01); H04L 9/3242 (2013.01); H04L 9/3273 (2013.01); H04L 63/0853 (2013.01); H04L 63/0876 (2013.01); H04W 8/24 (2013.01); H04W 12/06 (2013.01); H04L 9/0841 (2013.01); H04L 2209/80 (2013.01); H04L 2209/805 (2013.01); H04L 2463/062 (2013.01); H04W 12/04071 (2019.01);
Abstract

The present disclosure describes apparatuses and techniques for secure device authentication. In some aspects, a public ephemeral key of a device is exposed. A message received from a remote device to authenticate includes a hash of the public ephemeral key of the device, a public ephemeral key and an encrypted public key of the remote device, and an encrypted hash value useful to prove ownership of the public key received from the remote device. An encryption key is generated based on the public ephemeral key of the remote device and a private ephemeral key of the device. The device then decrypts, with the encryption key, the encrypted public key of the remote device and the encrypted hash value. The remote device is then authenticated by verifying, based on the decrypted hash value, that the remote device owns the decrypted public key.


Find Patent Forward Citations

Loading…