CPC G06F 21/44 (2013.01) [G06F 21/64 (2013.01); G06F 21/71 (2013.01); G06F 21/74 (2013.01); H04L 9/3226 (2013.01)] | 21 Claims |
1. A system for generating an encrypted and authenticated message for authenticating a first component of the system as an originator of the message, the system comprising:
a processor;
a touch screen controller;
a non-transitory computer-readable medium comprising instructions;
the first component comprising a first memory, the first component being operatively connected to the processor;
a second component comprising a second memory, the second component being operatively connected to the processor and the first component;
the processor, upon executing the instructions being configured to cause:
receiving noise information collected from an environment of the touch screen controller;
generating a block of information comprising the noise information;
encrypting, at the first component, the block of information based on a first encryption key acquired from the first memory associated with a second decryption key in the second memory of the second component so as to generate an encrypted block of information;
accessing, from the first memory, a first previous version of a first dynamic unique key, the first previous version of the first dynamic unique key being at least partially based on a first original unique key;
generating, at the first component, a first current version of the first dynamic unique key based on the first previous version of the first dynamic unique key;
generating, at the first component, a message authentication code (MAC) based on the encrypted block of information and the first current version of the first dynamic unique key;
transmitting, by the first component to the second component, the encrypted block of information and the MAC;
receiving, at the second component, the message comprising the encrypted block of information and the message authentication code;
accessing, from a second memory of the second component, a second previous version of a second dynamic unique key, the second previous version of the second dynamic unique key being at least partially based on a second original unique key and a previous version of the noise information;
generating a second current version of the second dynamic unique key based on the second previous version of the dynamic unique key;
generating, at the second component, a control MAC based on the received encrypted block of information and the second current version of the second dynamic unique key; and
upon determining that the control MAC matches the MAC, determining that the message is authentic and that therefore the first component originated the message.
|