An authentication method
First Claim
1. An authentication method for authenticating communication between a first and a second party using a third party which is trusted by said first and second parties comprising the steps of:
- calculating by the trusted third party the value of a first authentication output using a parameter of the first party and a second authentication output using the first authentication output and sending the second authentication output to the second party;
calculating by the first party the first authentication output and sending the first authentication output to the second party; and
calculating by the second party the second authentication output based on the first authentication output received from the first party and comparing the calculated second authentication output with the second authentication output received from the trusted third party whereby if the two second authentication outputs are the same, the first party is authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method for authenticating communication between a first and a second party using a third party which is trusted by said first and second parties comprising the steps of calculating by the trusted third party the value of a first authentication output using a parameter of the first party and a second authentication output using the first authentication output and sending the second authentication output to the second party; calculating by the first party the first authentication output and sending the first authentication output to the second party; and calculating by the second party the second authentication output based on the first authentication output received from the first party and comparing the calculated second authentication output with the second authentication output received from the trusted third party whereby if the two second authentication outputs are the same, the first party is authenticated.
-
Citations
26 Claims
-
1. An authentication method for authenticating communication between a first and a second party using a third party which is trusted by said first and second parties comprising the steps of:
-
calculating by the trusted third party the value of a first authentication output using a parameter of the first party and a second authentication output using the first authentication output and sending the second authentication output to the second party;
calculating by the first party the first authentication output and sending the first authentication output to the second party; and
calculating by the second party the second authentication output based on the first authentication output received from the first party and comparing the calculated second authentication output with the second authentication output received from the trusted third party whereby if the two second authentication outputs are the same, the first party is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A first station for communication with a second station using a third party which is trusted by said first station and said second station, said first station comprising:
-
receiving means for receiving a first authentication output from said second station and a second authentication output from said trusted third party;
calculation means for calculating the second authentication output from the first authentication output received from the second station; and
comparing means for comparing the calculated second authentication output with the second authentication output received from the trusted third party, whereby if the two second authentication outputs are the same, the first party is authenticated. - View Dependent Claims (23, 24, 25, 26)
-
Specification