System and Method for Performing Device Authentication Using Key Agreement
First Claim
Patent Images
1. A method of performing device authentication, the method comprising:
- a verification device participating in a key agreement protocol with an authentication device;
the verification device obtaining a first value from the authentication device, the first value having been generated by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and
the verification device using the first value to authenticate the authentication device by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided which employs a key agreement scheme, wherein the agreed-upon-shared key is used in a protocol message in the authentication rather than being employed as a session key.
64 Citations
31 Claims
-
1. A method of performing device authentication, the method comprising:
-
a verification device participating in a key agreement protocol with an authentication device; the verification device obtaining a first value from the authentication device, the first value having been generated by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and the verification device using the first value to authenticate the authentication device by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer readable medium comprising computer executable instructions for performing device authentication, the computer readable medium comprising instructions for:
-
a verification device participating in a key agreement protocol with an authentication device; the verification device obtaining a first value from the authentication device, the first value having been generated by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and the verification device using the first value to authenticate the device by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol.
-
-
15. A verification device comprising a processor and memory, the processor configured for performing device authentication, the memory storing computer executable instructions for:
-
participating in a key agreement protocol with an authentication device; obtaining a first value from the authentication device, the first value having been generated by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and using the first value to authenticate the device by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol.
-
-
16. A method of enabling device authentication, the method comprising:
-
an authentication device participating in a key agreement protocol with a verification device; the authentication device generating a first value by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and the authentication device providing the first value to the verification device, wherein the first value enables the verification device to perform device authentication by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer readable medium comprising computer executable instructions for performing device authentication, the computer readable medium comprising instructions for:
-
an authentication device participating in a key agreement protocol with a verification device; the authentication device generating a first value by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and the authentication device providing the first value to the verification device, wherein the first value enables the verification device to perform device authentication by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol.
-
-
31. An authentication device comprising a processor and memory, the processor configured for enabling device authentication, the memory storing computer executable instructions for:
-
participating in a key agreement protocol with a verification device; generating a first value by applying a deterministic function to a first result from a first operation performed in the key agreement protocol; and providing the first value to the verification device, wherein the first value enables the verification device to perform device authentication by performing a comparison of the first value with a second value, the second value generated by applying the deterministic function to a second result from a second operation performed in the key agreement protocol.
-
Specification