Electronic message authentication
First Claim
Patent Images
1. A method, comprising:
- calculating a first part of a message authentication function by a first processor;
calculating a second part of the message authentication function by a second processor; and
combining the results of the first and second parts into the message authentication code by the first or second processors.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, and associated apparatus, comprises calculating a first part of a message authentication function by a first processor, calculating a second part of the message authentication function by a second processor, and combining the first and second parts into the message authentication function by the first or second processor. The message authentication function can be used to authenticate data transmitted between the first processor and a third processor.
16 Citations
18 Claims
-
1. A method, comprising:
-
calculating a first part of a message authentication function by a first processor;
calculating a second part of the message authentication function by a second processor; and
combining the results of the first and second parts into the message authentication code by the first or second processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented in a first computer, comprising:
-
creating a record;
computing a first part of a message authentication function using the contents of the record;
providing the result of the first part to a second computer; and
receiving the result of a second part of the message authentication function from the second computer, said second part computed using a data key that is not available to the first computer. - View Dependent Claims (10)
-
-
11. A system, comprising:
-
a first processor configured to compute a first part of a multi-part message authentication function;
a second processor in communication with the first processor, the second processor is configured to compute a second part of the message authentication function;
wherein the first part of the message authentication function takes the contents of a record and the second part takes a data key, and the first processor does not have the data key and the second processor does not have the record contents. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer, comprising:
-
a processor; and
memory containing code executable by said processor;
wherein said executable code causes said processor to compute a first part of a message authentication function including contents of a record, providing the result of said first part to a second computer, receiving the result of a second part of the message authentication function from the second computer, and encoding the record with the result of the second part; and
wherein the record contents are not revealed to the second computer and the second part is computed by the second computer using a data key that is not revealed to the first computer.
-
-
18. A method implemented in a first computer, comprising:
-
receiving a record from a third computer;
computing a first part of a message authentication function using the contents of the record;
providing the result of the first part and the message authentication code in the record to a second computer; and
the second computer computing a second part of the message authentication function based on the result of the first part, using a data key that is not available to the first computer, and validating the message authentication code with the result of the message authentication function.
-
Specification