Challenge-Response Authentication Using a Masked Response Value
First Claim
1. A method for a first device to authenticate a second device, the method performed by the first device and comprising:
- the first device sending to the second device a challenge value corresponding to an expected response value known by the first device, and a hiding value;
the first device receiving from the second device a masked response value;
the first device obtaining an expected masked response value from the expected response value and the hiding value;
the first device determining whether the expected masked response value matches the masked response value received from the second device.
7 Assignments
0 Petitions
Accused Products
Abstract
Challenge-response authentication protocols are disclosed herein, including systems and methods for a first device to authenticate a second device. In one embodiment, the following operations are performed by the first device: (a) sending to the second device: (i) a challenge value corresponding to an expected response value known by the first device, and (ii) a hiding value; (b) receiving from the second device a masked response value; (c) obtaining an expected masked response value from the expected response value and the hiding value; and (d) determining whether the expected masked response value matches the masked response value received from the second device. The operations from the perspective of the second device are also disclosed, which in some embodiments include computing the masked response value using the challenge value, the hiding value, and secret information known to the second device.
40 Citations
20 Claims
-
1. A method for a first device to authenticate a second device, the method performed by the first device and comprising:
-
the first device sending to the second device a challenge value corresponding to an expected response value known by the first device, and a hiding value; the first device receiving from the second device a masked response value; the first device obtaining an expected masked response value from the expected response value and the hiding value; the first device determining whether the expected masked response value matches the masked response value received from the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An device comprising:
-
a memory configured to store a challenge value and an expected response value corresponding to the challenge value; and an interface configured to send to another device the challenge value and a hiding value, and to receive a masked response value from the another device; the device configured to obtain an expected masked response value from the expected response value and the hiding value, and to determine whether the expected masked response value matches the masked response value received from the another device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A processor readable medium having stored thereon processor readable instructions that, when executed, cause a first device to authenticate a second device by performing operations comprising:
-
sending to the second device a challenge value corresponding to an expected response value known by the first device, and a hiding value; receiving from the second device a masked response value; obtaining an expected masked response value from the expected response value and the hiding value; determining whether the expected masked response value matches the masked response value received from the second device. - View Dependent Claims (18, 19, 20)
-
Specification