SYSTEM AND METHODS FOR AUTHENTICATING A RECEIVER IN AN ON-DEMAND SENDER-RECEIVER TRANSACTION
First Claim
1. A method for authenticating a first device to a second device, the method comprising the steps of:
- determining, at the directory, a secret key and a first set of images by communicating with the first device;
receiving, at the directory, a transaction request from the second device to authenticate the first device;
generating, at the directory, a tag using said secret key and first information associated with said transaction request;
selecting a second set of images from said first set of images according to said tag;
sending said second set of images from the directory to the second device;
wherebyusing said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for authenticating a first device to a second device. This involves determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; and generating, at the directory, a tag using said secret key and first information associated with said transaction request. This also involves selecting a second set of images from said first set of images according to said tag, and sending said second set of images from the directory to the second device. Moreover, using said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device.
-
Citations
19 Claims
-
1. A method for authenticating a first device to a second device, the method comprising the steps of:
-
determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; generating, at the directory, a tag using said secret key and first information associated with said transaction request; selecting a second set of images from said first set of images according to said tag; sending said second set of images from the directory to the second device;
wherebyusing said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device. - View Dependent Claims (2, 3, 4)
-
-
5. A system for authenticating a first device to a second device using a directory, the system including:
a first processor associated with said directory and programmed to; determine a secret key and a first set of images by communicating with the first device; receive a transaction request from the second device to authenticate the first device; generate a first tag using said secret key and first information associated with said first transaction request; select a second set of images from said first set of images according to said first tag; and send said second set of images to the second device. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A computer-readable medium comprising program instructions, which, when executed by a processor, cause said processor to perform a method for authenticating a first device to a second device, the method comprising the steps of:
-
determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; generating, at the directory, a tag using said secret key and first information associated with said transaction request; selecting a second set of images from said first set of images according to said tag; sending said second set of images from the directory to the second device; using said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device. - View Dependent Claims (16, 17, 18)
-
-
19. A method for authenticating a first device to a second device using a directory, including the steps of:
-
determining, at the directory, a secret key and a first set of images by communicating with the first device; determining, at the first device, said secret key and said first set of images by communicating with the directory; sending a transaction request from the second device to the directory; receiving said transaction request at the directory from the second device to authenticate the first device; generating, at the directory, a first tag using said secret key and first information associated with said transaction request; selecting, at the directory, a second set of images from said first set of images according to said first tag; sending said second set of images from the directory to the second device; receiving, at the second device, said second set of images from said directory; receiving, at the first device, said first information associated with said first transaction request; generating, at the first device, a second tag using said secret key and said first information associated with said transaction request; selecting, at the first device, a third set of images from said first set of images according to said second tag; sending said third set of images from the first device to the second device; receiving, at the second device, said third set of images from said first device; and comparing said second and third sets of images.
-
Specification