Authentication protocols in communication networks

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 24, 380 25, 380 48, H04K 100, H04K 900

Patent

active

051484790

ABSTRACT:
An arrangement of authenticating communications network users and means for carrying out the arrangement. A first challenge N1 is transmitted from a first user A to a second user B. In response to the first challenge, B transmits a first response and second challenge N2 to A. A verifies the first response. A then generates and transmits a second response to the second challenge to B, where the second response is verified. The first response must be of a minimum form

REFERENCES:
patent: 4193131 (1980-03-01), Lennon et al.
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4386233 (1983-05-01), Smid et al.
patent: 4549075 (1985-10-01), Saada et al.
patent: 4649233 (1987-03-01), Bass et al.
patent: 4890323 (1989-12-01), Beker et al.
patent: 4919545 (1990-04-01), Yu
patent: 4926480 (1990-05-01), Chaum
R. M. Needham et al, "Using Encryption for Authentication in Large Networks of Computers", CACM, vol. 21, No. 12, Dec. 1978.
R. M. Needham et al, "Authentication Revisited", Operating Systems Review, vol. 21, No. 1, Jan. 1987.
"Banking-Key Management (Wholesale)", Int'l Organization for Standardization, 1987.
D. Otway et al, "Efficient and Timely Mutual Authentication", The ANSA Project, U.K.
Steiner et al, "Kerberos: An Authentication Service for Open Network Systems", Proj. Athena, M.I.T., Mar. 1988.
M. Burrows et al, "A Logic of Authentication", Feb. 1989, Digital, Systems Research Center.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication protocols in communication networks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication protocols in communication networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication protocols in communication networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-742815

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.