PROCESS AND DEVICE FOR AUTHENTICATION
First Claim
Patent Images
1. An authentication process, that comprises:
- a step of generating a random number,a step of generating a time-stamp,a step of generating a first secret key,a step of truncating the message authentication code utilizing said first secret key,a step of symmetrically encrypting the random number, time-stamp and truncation, utilizing a second secret key to produce an authentication code.
1 Assignment
0 Petitions
Accused Products
Abstract
The authentication process comprises:
- a step of generating a random number (105),
- a step of generating a time-stamp (115),
- a step of generating a first secret key (120),
- a step of truncating the message authentication code utilizing said first secret key (125),
- a step of symmetrically encrypting the random number, time-stamp and truncation (135), utilizing a second secret key (130) to produce an authentication code (145). Preferably, during the step of generating a random number, a quantum generator (100) is utilized. Preferably, during the truncation step, a cryptographic message authenticator is generated utilizing the first secret key. Preferably, during the step of symmetrically encrypting the random number, time-stamp and truncation, by utilizing the second secret key, in addition a hash (140) is produced.
34 Citations
7 Claims
-
1. An authentication process, that comprises:
-
a step of generating a random number, a step of generating a time-stamp, a step of generating a first secret key, a step of truncating the message authentication code utilizing said first secret key, a step of symmetrically encrypting the random number, time-stamp and truncation, utilizing a second secret key to produce an authentication code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An authentication device, that comprises:
-
a means of generating a random number, a means of generating a time-stamp, a means of generating a first secret key, a means of truncating the message authentication code utilizing said first secret key, a means of symmetrically encrypting the random number, time-stamp and truncation, utilizing a second secret key to produce an authentication code.
-
Specification