Method and system for data integrity protection
First Claim
1. A method of authenticating data, the method comprising the steps of receiving a message (114, 203) and a corresponding first data item (116, 213) generated according to a first predetermined rule (102, 206);
- generating a second data item (115, 210) according to a second predetermined rule (112, 206) on the basis of the received message;
calculating a first distance (117, 215) between the received first data item and the generated second data item;
comparing the calculated first distance with a predetermined distance value (212).
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating a message (111) received via a transmission channel (108) using a Message Authentication Code (MAC). The message comprises a message body (114) and a tag (116) and the method comprises the steps of generating a second tag (115) according to a MAC function (112) on the basis of the received message body and a secret key (113), calculating a distance (117) between the received tag and generated second tag, and comparing (118) the calculated distance with a predetermined threshold value
-
Citations
24 Claims
-
1. A method of authenticating data, the method comprising the steps of
receiving a message (114, 203) and a corresponding first data item (116, 213) generated according to a first predetermined rule (102, 206); -
generating a second data item (115, 210) according to a second predetermined rule (112, 206) on the basis of the received message;
calculating a first distance (117, 215) between the received first data item and the generated second data item;
comparing the calculated first distance with a predetermined distance value (212). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 22, 23, 24)
-
-
16. A method of transmitting a message from a transmitter (101, 501) to a receiver (110, 506) via a transmission channel (108, 505), the method comprising the steps of
at the transmitter generating a first data item (105, 209) according to a first predetermined rule (102, 206) on the basis of the message (104, 202); -
transmitting the message and the generated first data item from the transmitter to the receiver;
generating a second data item (115, 210) according to a second predetermined rule (112, 206) on the basis of the received message (114, 203);
calculating a first distance (215) between the received first data item (116, 213) and the generated second data item;
comparing the calculated first distance with a predetermined distance value (212). - View Dependent Claims (17, 18)
-
-
19. A communications system comprising
first processing means (503) adapted to calculate a first data item according to a first predetermined rule on the basis of a message; -
a transmitter (504) adapted to transmit the message and the generated first data item via a transmission channel (505);
a receiver (509) adapted to receive the transmitted message and the transmitted first data item;
second processing means (508) adapted to generate a second data item according to a second predetermined rule on the basis of the received message;
to calculate a first distance between the received first data item and the generated second data item; and
to compare the calculated first distance with a predetermined distance value.
-
-
20. An apparatus comprising
a receiver (509) adapted to receive a message and a corresponding first data item generated according to a first predetermined rule; -
first processing means (508) adapted to generate a second data item according to a second predetermined rule on the basis of the received message;
to calculate a first distance between the received first data item and the generated second data item; and
to compare the calculated first distance with a predetermined distance value. - View Dependent Claims (21)
-
Specification