Server Computer Issued Credential Authentication
First Claim
1. A method for authenticating a computer, the method comprising the following steps:
- issuing a credential from a first computer to a second computer;
transmitting said credential and a computer challenge from the second computer to the first computer when the second computer is to be authenticated;
transmitting a response to said computer challenge from said first computer to said second computer; and
verifying said response with said second computer in order to authenticate and verify said computers.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for authenticating computers is disclosed. The methods and system include issue a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.
60 Citations
20 Claims
-
1. A method for authenticating a computer, the method comprising the following steps:
-
issuing a credential from a first computer to a second computer; transmitting said credential and a computer challenge from the second computer to the first computer when the second computer is to be authenticated; transmitting a response to said computer challenge from said first computer to said second computer; and verifying said response with said second computer in order to authenticate and verify said computers. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for authenticating a computer, the system comprising:
-
a first computer; and a second computer in communication with the first computer; wherein the first computer and the second computer are configured to execute the following instructions; issue a credential from the first computer to the second computer; transmit the credential and a challenge from the second computer to the first computer when the second computer is to be authenticated; transmit a response to the challenge from the first computer to the second computer; and verify the response with the second computer in order to authenticate and verify the computers. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-readable medium containing a program with instructions that execute the following procedure:
-
issue a credential from a first computer to a second computer; generate a first challenge with the second computer; transmit the credential and the first challenge from the second computer to the first computer; determine with the first computer whether the credential is valid; compute a first response to the first challenge and generate a second challenge with the first computer; transmit the first response and the second challenge from the first computer to the second computer; determine with the second computer whether the first response is valid to verify the first computer; compute a second response to the second challenge with the second computer; transmit the second response from the second computer to the first computer; and determine with the first computer whether the second response is valid to verify and authenticate the computers. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification