摘要 |
A method for discovering emulated clients. A verifier (20) sends (206) a cryptographic challenge C to a client (10) and starts (208) a timer (22). The client (10) uses (210) a deterministic key search algorithm to find the correct key and returns (212) the result as a number of tries needed. The verifier (20) then stops (214) the timer (22) and verifies (216) that the result is correct and (218) that the response was timely. Also provided is a verifier (20). |