Simple Authentication of Messages
First Claim
Patent Images
1. A method comprising:
- receiving a first synchronization message comprising a first authentication token;
applying a hash function to the first authentication token at least one time to generate a first hash result;
determining whether the first hash result matches a trusted bit string; and
when the first hash result matches the first trusted bit string, then (i) defining a time point boundary between a first and second synchronization period, wherein the time point boundary corresponds at least in part to the time the first synchronization message was received, and (ii) replacing the corresponding trusted bit string with the first authentication token.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for using simple authenticated messages are disclosed for use with implementing (i) synchronization schemes, (ii) encoded control messaging schemes, and (iii) encrypted data communication schemes. Messages are authenticated by applying a secure hash function to one or more authentication tokens to produce hash results which are compared to stored trusted bit strings, wherein the stored trusted bit strings are replaced with the most-recently received authentication token whose corresponding hash result matched the stored bit string.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a first synchronization message comprising a first authentication token; applying a hash function to the first authentication token at least one time to generate a first hash result; determining whether the first hash result matches a trusted bit string; and when the first hash result matches the first trusted bit string, then (i) defining a time point boundary between a first and second synchronization period, wherein the time point boundary corresponds at least in part to the time the first synchronization message was received, and (ii) replacing the corresponding trusted bit string with the first authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving a message comprising a first authentication token; applying a hash function to the first authentication token at least one time to generate a first hash result; determining whether the first hash result matches a first trusted bit string; when the first hash result matches the first trusted bit string, then (i) setting a first bit to a first logic value, and (ii) replacing the first trusted bit string with the first authentication token; when the first hash result does not match the first trusted bit string, then determining whether the first hash result matches a second trusted bit string; and when the first hash result matches the second trusted bit string, then (i) setting the first bit to a second logic value, and (ii) replacing the second trusted bit string with the first authentication token. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification