Authentication in data communication

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07472273

ABSTRACT:
Method of authenticating a client comprising the steps of sending a subscriber identity to an authentication server; obtaining at least one challenge and at least one first secret to the authentication server based on a client's secret specific to the client; forming first credentials; forming a first authentication key using the at least one first secret; encrypting the first credentials using the first authentication key; sending the at least one challenge and the encrypted first credentials to the client; forming an own version of the first authentication key at the client; decrypting the encrypted first credentials using the own version of the first authentication key. In the method, the encrypted credentials are sent together with the at least one challenge to the client so that the client can proceed authentication only if it can derive the first secret from the at least one challenge.

REFERENCES:
patent: 5535276 (1996-07-01), Ganesan
patent: 5737419 (1998-04-01), Ganesan
patent: 5778065 (1998-07-01), Hauser et al.
patent: 6064736 (2000-05-01), Davis et al.
patent: 6973671 (2005-12-01), Hsing et al.
patent: WO-99/31841 (1999-06-01), None
patent: WO-00/02406 (2000-01-01), None
patent: WO-00/30285 (2000-05-01), None
patent: WO-00/64088 (2000-10-01), None
Steiner et al. “Kerberos: An Authentication Services for Open Network System”, Proceeding of the USENIX Winter Conference, Feb. 1988, pp. 191-202.
Bellovin et al. “Limitations of the Kerberos Authentication System”, Proceeding of Winter 1991 USENIX Conference, 1991, pp. 119-132.
3GPP TS 33.101 V.3.6.0. (Oct. 2000) “Security Architecture (Release 1999)”, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security, pp. 1-61.
3GPP, Security Architecture (Release 1999), TS 33.102 V3.6.0 (Oct. 2000).
M. Swift, J. Trostle, B. Aboba, G. Zorn; Intitial Authentication & Pass Through.
J. Kohl, C. Neuman; Kerberos Network Authentication Svc (V5).
J. Linn, Generic Security Svc Application Program Interface (V 2, U 1).
William Stallings; Cryptography and Network Security: Principles and Practice (2ndEdition), Chapter 11—Authentication Applications, pp. 323-340.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication in data communication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication in data communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication in data communication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4020474

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.