Legitimacy verification of a node in a distributed network
First Claim
1. A method of authenticating a node in a distributed network,wherein the distributed network comprises a plurality of nodes connected to a shared medium of the distributed network,wherein each of the plurality of nodes is provisioned with an identity certificate comprising a public key, a private key associated with the public key and an identification sequence, wherein the identification sequence is unique to the system comprising the distributed network,said method comprising:
- a second node of the plurality of nodes, generating a node authenticity related information for authenticating at a first node of the plurality of nodes, wherein the node authenticity related information comprises a signature generated using the private key of the second node from a sequence, which comprises the identification sequence; and
the second node, transmitting the node authenticity related information together with the identity certificate provisioned at the second node to the first node, wherein the first node is enabled to perform an authentication verification using the signature and the public key included in the identity certificate comprised in the receive request and the identification sequence, with which the first node is provisioned.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system of authenticating a node in a distributed network is provided. The distributed network comprises a plurality of nodes connected to a shared medium of the distributed network. Each of the plurality of nodes is provisioned with an identity certificate comprising a public key, a private key associated with the public key and an identification sequence. The identification sequence is unique to the system comprising the distributed network. A second node of the plurality of nodes generates a node authenticity related information for authenticating at a first node of the plurality of nodes. The node authenticity related information comprises a signature generated using the private key of the second node from a sequence, which comprises the identification sequence. The second node transmits the node authenticity related information together with the identity certificate provisioned at the second node to the first node.
21 Citations
19 Claims
-
1. A method of authenticating a node in a distributed network,
wherein the distributed network comprises a plurality of nodes connected to a shared medium of the distributed network, wherein each of the plurality of nodes is provisioned with an identity certificate comprising a public key, a private key associated with the public key and an identification sequence, wherein the identification sequence is unique to the system comprising the distributed network, said method comprising: -
a second node of the plurality of nodes, generating a node authenticity related information for authenticating at a first node of the plurality of nodes, wherein the node authenticity related information comprises a signature generated using the private key of the second node from a sequence, which comprises the identification sequence; and the second node, transmitting the node authenticity related information together with the identity certificate provisioned at the second node to the first node, wherein the first node is enabled to perform an authentication verification using the signature and the public key included in the identity certificate comprised in the receive request and the identification sequence, with which the first node is provisioned. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 15)
-
-
10. A system comprising a plurality of node connected to a shared medium of the distributed network,
wherein each of the plurality of nodes is provisioned with an identity certificate comprising a public key, a private key associated with the public key and an identification sequence, wherein the identification sequence is unique to the system comprising the distributed network, wherein a second node of the plurality of nodes is configured to generate a node authenticity related information for authenticating at a first node of the plurality of nodes, wherein the second node authenticity related information comprises a signature generated using the private key of the second node from a sequence, which comprises the identification sequence; - and
transmit the node authenticity related information together with the identity certificate provisioned at the second node to the other node, wherein the first node is enabled to perform an authentication verification using the signature and the public key included in the identity certificate comprised in the receive request and the identification sequence, with which the first node is provisioned. - View Dependent Claims (11, 12, 13, 14, 16, 17, 18, 19)
- and
Specification