Authentication using random challenges

Electric lamp and discharge devices: systems – Plural series connected load devices – Condenser in the supply circuit

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, 39520059, G06F 1100

Patent

active

058729178

ABSTRACT:
A method is disclosed for authenticating one or both of two parties, for example, a user and a host computer. The first party and second party each know the same password. The first party sends a challenge to the second party. The second party generates and sends to the first party a response based on a first function of the password, the first party's challenge, and an extra value unknown to the first party. The first party, which knows only the length of the extra value, then attempts to match the response by using the same function, password, and challenge by cycling through the possible values for the extra value of known format. A method of bi-directional authentication may be achieved by having the first party return to the second party a response using a different function of the password, a preferably different challenge, and the extra value. The second party already knows the input values, including the extra value, and therefore, does not incur the costs associated with learning the extra value. The identity of the first party is confirmed by matching the transmitted response with a value generated locally.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4264782 (1981-04-01), Konheim
patent: 4351982 (1982-09-01), Miller et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4567600 (1986-01-01), Massey et al.
patent: 4590470 (1986-05-01), Koenig
patent: 4723284 (1988-02-01), Munck et al.
patent: 4779224 (1988-10-01), Moseley et al.
patent: 4964164 (1990-10-01), Fiat
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5428745 (1995-06-01), de Bruijn et al.
patent: 5491752 (1996-02-01), Kaufman et al.
A User Authentication Scheme Not Requiring Secrecy In The Computer, Operating Systems, Communications of the ACM, Aug., 1974, vol. 17, No. 8, Authors: Arthur Evans, Jr., et al.
Privacy And Authentication: An Introduction To Cryptography, Authors: Whitfield Diffie and Martin E. Hellman.
Password Security: A Case History, Operating Systems, Communications of the ACM, Nov., 1979, vol. 22, No. 11, Authors: Robert Morris, et al.
A High Security Log-In Procedure, Operating Systems, Communications of the ACM, Aug., 1974, vol. 17, No. 8, Authors: George B. Purdy.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication using random challenges does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication using random challenges, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication using random challenges will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2069670

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.