SYSTEM AND METHOD FOR AUTHENTICATING DATA
First Claim
Patent Images
1. A method for authentication comprising:
- processing a data block to determine a first secret element;
generating a second secret element based upon the first secret element;
generating a non-secret element based upon the second secret element; and
comparing the non-secret element to a comparator element associated with the first secret element to determine authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating data and timeliness are disclosed. A method for authentication can comprise processing a data block to determine a first secret element, generating a second secret element based upon the first secret element, generating a non-secret element based upon the second secret element, and comparing the non-secret element to a nonce associated with the first secret element to determine authentication.
-
Citations
29 Claims
-
1. A method for authentication comprising:
-
processing a data block to determine a first secret element; generating a second secret element based upon the first secret element; generating a non-secret element based upon the second secret element; and comparing the non-secret element to a comparator element associated with the first secret element to determine authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for authentication comprising:
-
processing a data block to determine a comparator element associated with a first identifier; processing the data block to determine a shared key associated with a second identifier; generating a first authentication key based upon the shared key; generating an authentication element using the first authentication key; and comparing the authentication element to the comparator element to determine authentication. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
a memory for storing an public key; a processor in communication with the memory, the processor configured to; process a data block using the public key to determine a first secret element, generate a second secret element based upon the first secret element, generate a non-secret element based upon the second secret element, and compare the non-secret element to a comparator element associated with the first secret element to determine authentication. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification