AUTHENTICATOR, AUTHENTICATEE AND AUTHENTICATION METHOD
First Claim
1. An authentication method of authenticating an authenticatee which stores first key information (NKey) which is hidden, by an authenticator which stores source information (HC) and second key information (HKey) which is hidden, the method comprising:
- generating, by the authenticatee, third key information (HKey′
), based on the source information (HC) and the first key information (NKey);
generating, by the authenticatee, a first session key (SKey), based on the third key information (HKey′
) and random number information; and
generating, by the authenticator, a second session key (SKey′
), based on the hidden second key information (HKey) and random number information.
4 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (SKey) by using the second key information (HKey) and the random number information. The authenticator is configured such that the second key information (HKey) is generated from the first key information (NKey) but the first key information (NKey) is not generated from the second key information (HKey).
15 Citations
1 Claim
-
1. An authentication method of authenticating an authenticatee which stores first key information (NKey) which is hidden, by an authenticator which stores source information (HC) and second key information (HKey) which is hidden, the method comprising:
-
generating, by the authenticatee, third key information (HKey′
), based on the source information (HC) and the first key information (NKey);generating, by the authenticatee, a first session key (SKey), based on the third key information (HKey′
) and random number information; andgenerating, by the authenticator, a second session key (SKey′
), based on the hidden second key information (HKey) and random number information.
-
Specification