×

AUTHENTICATION METHOD, AUTHENTICATION DEVICE, AUTHENTICATION TARGET DEVICE AND IMAGE FORMING APPARATUS

  • US 20200136817A1
  • Filed: 10/23/2019
  • Published: 04/30/2020
  • Est. Priority Date: 10/30/2018
  • Status: Active Grant
First Claim
Patent Images

1. An authentication method performed bya first device configured to retain, among n×

  • m original keys identified by combinations of n first identifiers (n is an integer of 2 or greater) having different values and m second identifiers (m is an integer of 2 or greater) having different values, m original keys in which values of first identifiers are a same first value, anda second device configured to retain an authentication identifier and retain n authentication keys generated based on the authentication identifier and each of n original keys in which values of the second identifiers are a same second value among the n×

    m original keys,the method comprising;

    selecting, at the first device, an original key in which the first identifier has the first value and the second identifier has the second value based on the second value acquired from the second device, from the m original keys and generating, at the first device, an authentication key based on the selected original key and the authentication identifier acquired from the second device;

    selecting, at the second device, an authentication key generated from the original key in which the first identifier has the first value and the second identifier has the second value based on the first value acquired from the first device, from the n authentication keys;

    generating, at an authentication target device that is one of the first device and the second device, response data based on challenge data acquired from an authentication device that is the other of the first device and the second device and the authentication key generated or selected by the authentication target device, and notifying, by the authentication target device, the generated response data to the authentication device;

    generating, at the authentication device, verification data based on the challenge data and the authentication key generated or selected by the authentication device; and

    authenticating, at the authentication device, the authentication target device by comparing the verification data with the response data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×