Authentication for computer networks
First Claim
Patent Images
1. A method for a user to authenticate to a first computer on a computer network comprises:
- a) a user authenticating himself to the first computer with a symmetric-type password unknown to the first computer and by means of a hybrid protocol; and
b) if the authentication is accepted the first computer then sends a digital certificate to the user, for subsequent use by the user to authenticate himself by means of the digital certificate to the first computer or other computers.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for a user to authenticate to a first computer on a computer network comprises:
a) a user authenticating himself to the first computer with a symmetric-type password unknown to the first computer and by means of a hybrid protocol; and
b) if the authentication is accepted the first computer then sends a digital certificate to the user, for subsequent use by the user to authenticate himself by means of the digital certificate to the first computer or other computers.
-
Citations
16 Claims
-
1. A method for a user to authenticate to a first computer on a computer network comprises:
-
a) a user authenticating himself to the first computer with a symmetric-type password unknown to the first computer and by means of a hybrid protocol; and
b) if the authentication is accepted the first computer then sends a digital certificate to the user, for subsequent use by the user to authenticate himself by means of the digital certificate to the first computer or other computers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for a user to authenticate to a first computer on a computer network comprises:
-
a) a user authenticating himself to the first computer with a symmetric-type password unknown to the first computer and by means of a hybrid protocol; and
b) if the authentication is accepted the first computer then sends a digital certificate to the user, for subsequent use by the user to authenticate himself by means of the digital certificate to the first computer or other computers, wherein the first computer authenticates the symmetric-type password using a verifier that is a hash or is derived from a hash of the symmetric-type password.
-
Specification