Method of authentication based on intersection of password sets

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

G06F 1100

Patent

active

061287423

ABSTRACT:
There is disclosed a method of authenticating the identity of a first party involved in communicating over a computer network system. The method comprises the steps of: providing the first party with a first password set; providing a second party with a second password set; transmitting an authentication message based on the first password set from the first party to the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if it is demonstrated, based on an analysis of the authentication message, that the first and second password sets contain at least one common password.

REFERENCES:
patent: 5060263 (1991-10-01), Bosen et al.
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5537544 (1996-07-01), Morisawa et al.
patent: 5604803 (1997-02-01), Aziz
patent: 5606663 (1997-02-01), Kadooka
patent: 5689566 (1997-11-01), Nguyen
patent: 5719941 (1998-02-01), Swift et al.
patent: 5721780 (1998-02-01), Ensor et al.
patent: 5734718 (1998-03-01), Prafullchandra
patent: 5751812 (1998-05-01), Anderson
patent: 5784464 (1998-07-01), Akiyama et al.
patent: 5799088 (1998-08-01), Raike
patent: 5832211 (1998-11-01), Blakley, III et al.
patent: 5881226 (1999-03-01), Veneklase
patent: 5892828 (1999-04-01), Perlman
patent: 5987232 (1999-11-01), Tabuki
http://www-tux/tuxdoc/doc63/docs/tins/chap 1.htm, Chapter 1: Preparing to Install BEA TUXEDO, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun. 1997, pp. 1-12 (registration for online support required; see http//www.beasys.com/support/).
http://www-tux/tuxdoc/doc63/docs/sect1/tlisten.htm, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun. 1997, pp. 1-4 (registration for online support required; see http://www.beasys.com/support/).
http://www-tux/tuxdoc/doc63/docs/sect1/wlisten.htm, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun., 1997, pp. 1-4 (registration for online support required; see http://www.beasys.com/support/).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of authentication based on intersection of password sets does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of authentication based on intersection of password sets, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of authentication based on intersection of password sets will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-205841

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.