SYSTEMS AND METHODS FOR FIRST AND SECOND PARTY AUTHENTICATION
First Claim
Patent Images
1. A method of authentication between a first party and a second party, the method comprising:
- generating a challenge to a first party system;
receiving a first response via the first party system, the first received response produced on a first party side of a network connection, the first received response based on the challenge and a most recent first party key stored on a memory of a first party security device communicatively coupled to the first party system;
receiving a second response via the first party system, the second received response produced on the first party side of the network connection, the second received response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from a second party side of the network connection;
generating a first response based on the challenge and a most recent first party key stored on the second party side of the network connection;
generating a second response based on the challenge and a second party key stored on the second party side of the network connection;
verifying the first received response against the first generated response;
verifying the second received response against the second generated response; and
generating a confirmation in response to a successful verification of both the first and the second received responses.
1 Assignment
0 Petitions
Accused Products
Abstract
First and second parties may be authenticated. After generating a challenge to the first party, two responses are received via the first party based on the challenge and two different keys. Two responses are also generated, and compared against the received responses. If the respective responses are verified, a confirmation is generated.
-
Citations
54 Claims
-
1. A method of authentication between a first party and a second party, the method comprising:
-
generating a challenge to a first party system; receiving a first response via the first party system, the first received response produced on a first party side of a network connection, the first received response based on the challenge and a most recent first party key stored on a memory of a first party security device communicatively coupled to the first party system; receiving a second response via the first party system, the second received response produced on the first party side of the network connection, the second received response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from a second party side of the network connection; generating a first response based on the challenge and a most recent first party key stored on the second party side of the network connection; generating a second response based on the challenge and a second party key stored on the second party side of the network connection; verifying the first received response against the first generated response; verifying the second received response against the second generated response; and generating a confirmation in response to a successful verification of both the first and the second received responses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of authentication between a first party and a second party, the method comprising:
-
receiving a challenge at a first party system from a second party side of a network connection; producing a first response to the challenge on a first party side of the network connection, the first response based on the challenge and a most recent first party key stored on a memory of a first party security device communicatively coupled to the first party system; producing a second response to the challenge on the first party side of the network connection, the second response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from the second party side of the network connection; receiving a confirmation code from the second party side of the network connection, the received confirmation code based on the first response and a most recent first party key stored on the second party side of the network connection as provided by a trusted third party; generating a first confirmation code based on the first response and the most recent first party key stored on the memory of the first party security device; and verifying the received confirmation code against the first generated confirmation code. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer-readable medium that stores instructions that cause a computer to perform authentication between a first party and a second party, by:
-
generating a challenge to a first party system; receiving a first response via the first party system, the first received response produced on a first party side of a network connection, the first received response based on the challenge and a most recent first party key stored on a memory of a first party security device communicatively coupled to the first party system; receiving a second response via the first party system, the second received response produced on the first party side of the network connection, the second received response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from a second party side of the network connection; generating a first response based on the challenge and a most recent first party key stored on the second party side of the network connection; generating a second response based on the challenge and a second party key stored on the second party side of the network connection; verifying the first received response against the first generated response; verifying the second received response against the second generated response; and generating a confirmation in response to a successful verification of both the first and the second received responses. - View Dependent Claims (38, 39, 40, 41, 42)
-
-
43. A computer-readable medium that stores instructions that cause a computer to perform authentication between a first party and a second party, by:
-
receiving a challenge at a first party system from a second party side of a network connection; producing a first response to the challenge on a first party side of the network connection, the first response based on the challenge and a most recent first party key stored on a memory of a first party security device; producing a second response to the challenge on the first party side of the network connection, the second response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from the second party side of the network connection; receiving a confirmation code from the second party side of the network connection, the received confirmation code based on the first response and a most recent first party key stored on the second party side of the network connection as provided by a trusted third party; generating a first confirmation code based on the first response and the most recent first party key stored on the memory of the first party security device; and verifying the received confirmation code against the first generated confirmation code. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A system that performs authentication between a first party and a second party, the system comprising:
-
at least one processor that executes instructions; and a computer-readable memory that stores instructions that cause the at least one processor to perform authentication, by; generating a challenge to a first party system; receiving a first response via the first party system, the first received response produced on a first party side of a network connection, the first received response based on the challenge and a most recent first party key stored on a memory of a first party security device communicatively coupled to the first party system; receiving a second response via the first party system, the second received response produced on the first party side of the network connection, the second received response based on the challenge and a second party key stored on the memory of the first party security device, the second party key provided to the first party security device from a second party side of the network connection; generating a first response based on the challenge and a most recent first party key stored on the second party side of the network connection; generating a second response based on the challenge and a second party key stored on the second party side of the network connection; verifying the first received response against the first generated response; verifying the second received response against the second generated response; and generating a confirmation in response to a successful verification of both the first and the second received responses. - View Dependent Claims (53, 54)
-
Specification