top of page

Enhancing Authentication with Timestamp‑Based Device Verification

Beyond traditional user ID and password authentication, verifying the login device adds a critical layer of protection. This approach uses a timestamp‑based algorithm to ensure that only authorized devices can access the system—without requiring any user action.

How It Works

  • Clock Synchronization: The authentication server and the client PC both synchronize their clocks with a trusted time source.

  • Timestamp Generation: Each side uses the current timestamp down to the second, reducing one level of precision to account for network latency.

  • Shared Transformation: Both the server and client apply the same transformation to the timestamp (for example, add 5, then multiply by 2).

  • Value Verification: The client sends the transformed value; the server independently computes and verifies it.

  • Algorithm Array: A shared array of transformation methods is stored on both ends. These methods can vary widely in complexity.

  • Method Selection: After each successful login, the server randomly selects a method from the shared array for the next login and notifies the client of the new method.

  • No User Intervention: The entire process is handled automatically by the authentication system—no passwords and no user interaction required.

  • Initial Provisioning: Corporate IT configures the initial method during authorized device provisioning.

  • Customizable Arrays: Each organization can define its own transformation‑method array based on its security policies.

Benefits of This Algorithm

  • The end user does not need to remember any password or take any action.

  • No additional hardware is required.

  • Hackers cannot steal a password to gain access.

  • The method supports password‑less authentication.

  • Brute‑force attacks are ineffective.

  • It can be used in IoT environments for device‑to‑device verification.

Additional Considerations for National Security

A device may be equipped with two separate clocks. The clock used for this verification method does not need to follow UTC standards and may operate at a different speed. A built‑in safety feature can also be added: if the device is stolen and cannot synchronize with the trusted time source, it will enter a self‑protective shutdown mode.

​​

US Patents: 10,826,912, and 10,848,489

Japanese Patent No. 7309880

European (EP) Patent No. EP3895043

Future Innovations:

 

Seeking business partners to develop this solution.

For inquiries, please send a USPS registered mail to

ChienSEC LLC

12400 SE 38TH ST #40151

Bellevue, WA 98015

bottom of page