Thoughts about my Security Implementation

So the basic idea is that I have a device that's able to connect to WiFi and talk to a server that I have. The overall goal is to have the device be able to authenticate a user while offline using signed access file of two levels. When a connection is requested, if the device detects its RTC to be out of date or compromised, it attempts to connect to WiFi, the my server to obtain a signed Timestamp (also contains some noise). If it can't connect to the server, it prompts the user for valid wifi credentials. The devices contain the public Root OEM key in their program memory (later implementations may use a permanent data chip and a secure EC crypto chip) that they use to verify access 1, which contains another public key, the intermediate key, along with some parameters like expiration, permissions, and noise signed by the OEM key. Access 2 is signed by the intermediate key, and is formatted the same except contains the connecting user's public key. The permissions are then validated (intermediate cannot provide permissions in access 2 not given in access 1), and a challenge is sent to the device encrypted by the user public key. The user must then send the challenge back in plain text, but signed by the user private key. If all goes well, the user is then given secure access.
5 Replies
JavaBot
JavaBot4w ago
This post has been reserved for your question.
Hey @The Next Guy! Please use /close or the Close Post button above when your problem is solved. Please remember to follow the help guidelines. This post will be automatically marked as dormant after 300 minutes of inactivity.
TIP: Narrow down your issue to simple and precise questions to maximize the chance that others will reply in here.
dan1st
dan1st4w ago
What's RTC in that context? Can you elaborate on your exact requirements?
The Next Guy
The Next GuyOP4w ago
RTC means real time clock, used to compare against the expiration dates. The requirement is that a user is able to be authenticated via chain of signatures
dan1st
dan1st4w ago
and is the fact that it's wifi actually important for the authentication?
JavaBot
JavaBot4w ago
💤 Post marked as dormant
This post has been inactive for over 300 minutes, thus, it has been archived. If your question was not answered yet, feel free to re-open this post or create a new one. In case your post is not getting any attention, you can try to use /help ping. Warning: abusing this will result in moderative actions taken against you.

Did you find this page helpful?