×

Secure component authentication system

  • US 4,799,061 A
  • Filed: 11/18/1985
  • Issued: 01/17/1989
  • Est. Priority Date: 11/18/1985
  • Status: Expired due to Term
First Claim
Patent Images

1. A method whereby a first terminal may authenticate a second terminal wherein the terminals each possess an encryption key and the second terminal is authenticated if the encryption keys are equal, the steps of the method comprising:

  • generating a first number at the first terminal and creating a second number by encrypting the first number using the encryption key of the first terminal;

    transmitting the second number to the second terminal;

    generating a third number at the second terminal by decrypting the second number using the encryption key of the second terminal;

    generating a fourth number at the second terminal by encrypting the encryption key of the second terminal using the third number as the key;

    transmitting the fourth number to the first terminal; and

    verifying at said first terminal that said fourth number equals the encryption of said encryption key of said first terminal using said first number as key to thereby authenticate said second terminal.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×