Authentication Token for Identifying a Cloning Attack onto such Authentication Token
First Claim
Patent Images
1. An authentication token for a communication network comprising:
- a microprocessor;
a memory;
a stored secret key (Ki); and
a set of instructions for controlling the microprocessor into performing an authentication calculation on the basis of a received random value (RAND) and on the basis of the stored secret key, wherein that it the authentication token further comprises;
a memory location dedicated for storing a counter value; and
instructions for making the counter value evolve each time the authentication calculation is performed.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to an authentication token (10) for a communication network comprising a microprocessor (11), a memory (12), a stored secret key (Ki) and a set of instructions for controlling the microprocessor (11) into performing an authentication calculation on the basis of a received random (RAND) and on the basis of the stored secret key, characterized in that it includes a memory location dedicated for storing a counter value and it includes instructions for making the counter value evolve each time the authentication calculation is performed.
-
Citations
11 Claims
-
1. An authentication token for a communication network comprising:
-
a microprocessor; a memory; a stored secret key (Ki); and a set of instructions for controlling the microprocessor into performing an authentication calculation on the basis of a received random value (RAND) and on the basis of the stored secret key, wherein that it the authentication token further comprises; a memory location dedicated for storing a counter value; and instructions for making the counter value evolve each time the authentication calculation is performed. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A server assembly for a communication network comprising:
-
a processor assembly; a memory; a stored secret key (Ki) associated to a remote authentication token; and a set of instructions for controlling the processor assembly into generating a random value (RAND) and additionally performing an authentication calculation on the basis of the random value (RAND) and the stored secret key (Ki), wherein the server assembly includes; a memory location dedicated for storing a counter value; and instructions for making the counter value evolve each time the authentication calculation is performed. - View Dependent Claims (7, 8)
-
-
9. A server assembly for a communication network comprising:
-
a processor assembly; a memory; a stored secret key (Ki) associated to a remote authentication token; and a set of instructions for controlling the processor assembly of the server assembly into generating a random value, sending such random value to the remote authentication token and performing an authentication calculation on the basis of the random value (RAND) and the stored secret key (Ki), the set of instructions instructing the processor assembly to compare a result of the authentication calculation with a result of the same authentication calculation as received from the remote personal authentication token, wherein the server assembly includes; a memory location dedicated for storing a counter value and instructions for making the counter value evolve each time the comparison reveals that the comparison results match. - View Dependent Claims (10, 11)
-
Specification