Authentication Method, Client, Server And System
First Claim
1. An authentication method, wherein a server stores a second key, the method comprising:
- sending a challenge to a client by the server;
obtaining a first key by the client;
performing a transformation on the first key utilizing a local hash function to obtain a third key by the client;
encrypting the first key and the challenge utilizing the third key to obtain a ciphertext by the client; and
sending the ciphertext to the server by the client;
decrypting the ciphertext utilizing the second key stored locally by the server;
obtaining decrypted first key and decrypted challenge after decrypting the ciphertext, if the second key is the same as the third key by the server;
performing a transformation on the decrypted first key utilizing a local hash function to obtain a fourth key by the server;
passing an authentication of the client, if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the server and the second key stored by the server.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method, which includes: a server sends a challenge to a client; the client obtains a first key performs a transformation on the first key utilizing a local hash function to obtain a third key, encrypts the first key and the challenge utilizing the third key to obtain a ciphertext, and sends the ciphertext to the server; the server decrypts the ciphertext utilizing a second key stored locally, obtains a decrypted first key and a decrypted challenge if the second key is the same as the third key, performs a transformation on the decrypted first key utilizing a local hash function to obtain a fourth key, the client passes the authentication if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the server and the second key stored locally by the server.
-
Citations
15 Claims
-
1. An authentication method, wherein a server stores a second key, the method comprising:
-
sending a challenge to a client by the server; obtaining a first key by the client; performing a transformation on the first key utilizing a local hash function to obtain a third key by the client; encrypting the first key and the challenge utilizing the third key to obtain a ciphertext by the client; and sending the ciphertext to the server by the client; decrypting the ciphertext utilizing the second key stored locally by the server; obtaining decrypted first key and decrypted challenge after decrypting the ciphertext, if the second key is the same as the third key by the server; performing a transformation on the decrypted first key utilizing a local hash function to obtain a fourth key by the server; passing an authentication of the client, if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the server and the second key stored by the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A client which is configured for authentication, comprising:
-
a first module, configured to receive a challenge sent by a server, and send a ciphertext coming from a third module to the server; a second module, configured to store a hash function; a third module, configured to obtain a first key, perform a transformation on the first key utilizing the hash function coming from the second module to obtain a second key, and encrypt the first key and the challenge received by the first module utilizing the second key to obtain the ciphertext. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A server which is configured for authentication, comprising:
-
a first module, configured to send a challenge to a client, and receive a ciphertext sent by the client; a second module, configured o store a first key and a hash function; a third module, configured to decrypt the ciphertext received by the first module utilizing the first key stored by the second module, obtain a decrypted third key and a decrypted challenge if the first key is the same as a second key adopted to encrypt the ciphertext in the client, perform a transformation on the third key utilizing the hash function to obtain a fourth key, determine the client has passed the authentication if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the first module and the first key stored by the second module.
-
-
15. An authentication system, comprising a server and a client, wherein
the client is configured to obtain a first key, perform a transformation on the first key utilizing a locally stored hash function to obtain a second key after receiving a challenge sent by the server, encrypt the first key and the challenge utilizing the second key to obtain a ciphertext, and send the ciphertext to the server; the server is configured to store a third key, send the challenge to the client, decrypt the ciphertext utilizing the third key stored locally after receiving the ciphertext from the client, obtain a decrypted first key and a decrypted challenge if the third key is the same as the second key, perform a transformation on the decrypted first key utilizing a local hash function to obtain a fourth key, determine the client has passed an authentication if the decrypted challenge and the fourth key are respectively the same as the challenge sent by the server and the third key stored locally by the server.
Specification