SECRET SHARING-BASED ONBOARDING AUTHENTICATION

    公开(公告)号:US20200059469A1

    公开(公告)日:2020-02-20

    申请号:US16200134

    申请日:2018-11-26

    Abstract: A technique includes receiving a request from a first electronic device to connect to a network and receiving a first part from the first electronic device. The technique includes regulating onboarding of the first electronic device. Regulating the onboarding includes authenticating the first electronic device. Authenticating the first electronic device includes communicating with a plurality of electronic devices that are connected to the network to receive a set of second secret parts; constructing a first secret from the first secret part and the set of second secret parts; and comparing the first secret to a second secret. Regulating the onboarding of the first electronic device includes allowing the first electronic device to connect to the network based on a result of the comparison.

    Secret sharing-based onboarding authentication

    公开(公告)号:US11171953B2

    公开(公告)日:2021-11-09

    申请号:US16200134

    申请日:2018-11-26

    Abstract: A technique includes receiving a request from a first electronic device to connect to a network and receiving a first part from the first electronic device. The technique includes regulating onboarding of the first electronic device. Regulating the onboarding includes authenticating the first electronic device. Authenticating the first electronic device includes communicating with a plurality of electronic devices that are connected to the network to receive a set of second secret parts; constructing a first secret from the first secret part and the set of second secret parts; and comparing the first secret to a second secret. Regulating the onboarding of the first electronic device includes allowing the first electronic device to connect to the network based on a result of the comparison.

    Transposed passwords
    3.
    发明授权

    公开(公告)号:US11449597B2

    公开(公告)日:2022-09-20

    申请号:US16166337

    申请日:2018-10-22

    Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.

Patent Agency Ranking