Hardware cryptographic authentication
摘要:
An example method of establishing an authenticated session between two communicating devices includes establishing, by a first processor of a first device, a secure connection with a second device over the network using a communications protocol; receiving, by the first processor, an identity authentication request from the second device; passing, by the first processor, the identity authentication request to a second processor located on an authentication chip of the first device; generating, by the second processor using one or more authentication code functions stored on the authentication chip, one or more authentication codes using a unique serial number of the first device and an authentication key, both stored on the authentication chip; providing, by the second processor, the one or more generated authentication codes to the first processor; and sending, by the first processor, a response to the second device that includes the one or more generated authentication codes.
公开/授权文献
信息查询
0/0