METHOD, SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM FOR AUTHENTICATING A COMPUTING DEVICE
First Claim
1. A method for authenticating a first computing device to one or more other computing devices, the method comprising:
- at a first computing device, generating a message using first secret data and second secret data, the first secret data for authenticating to a second computing device, the second secret data for authenticating to a third computing device; and
sending from the first computing device to the second computing device the message.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer-readable storage medium for authenticating a computing device are provided. According to embodiments of the invention, a first computing device generates a message using first secret data and second secret data, the first secret data for authenticating to a second computing device, the second secret data for authenticating to a third computing device. The first computing device sends the message to the second computing device. In some embodiments, challenge-response authentication is implemented. For example, the first computing device receives a challenge from the second computing device and generates the message based at least in part on the challenge. The second computing device compares local information with information received from the first computing device. The first computing device can thereby be authenticated to the second computing device. Furthermore, the first computing device can be authenticated to the third computing device by a similar process.
-
Citations
27 Claims
-
1. A method for authenticating a first computing device to one or more other computing devices, the method comprising:
-
at a first computing device, generating a message using first secret data and second secret data, the first secret data for authenticating to a second computing device, the second secret data for authenticating to a third computing device; and sending from the first computing device to the second computing device the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for authenticating a computing device, the method comprising:
-
receiving a message from a first computing device at a second computing device, the message comprising first information and second information; comparing at the second computing device local information with the first information, the comparing the local information with the first information for the purpose of authenticating the first computing device to the second computing device; based on the comparing the local information with the first information, determining at the second computing device that the local information does not match the first information; comparing at the second computing device the local information with the second information; and based on the comparing the local information with the second information, determining at the second computing device that the first computing device is authenticated to the second computing device in a case that the local information matches the second information. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for authenticating a computing device, the method comprising:
-
at a first computing device, generating a message using first secret data and second secret data, the first secret data for authenticating to a second computing device, the second secret data for authenticating to a third computing device; sending from the first computing device to the second computing device the message; receiving at the second computing device from the first computing device the message, the message comprising first information and second information, the first information comprising or corresponding to the first secret data, the second information comprising or corresponding to the second secret data; comparing at the second computing device local information with the second information; based on the comparing the local information with the second information, determining at the second computing device that the local information does not match the second information; comparing at the second computing device the local information with the first information; and based on the comparing the local information with the first information, determining at the second computing device that the first computing device is authenticated to the second computing device based on the local information matching the first information.
-
Specification