Optionally moderated transaction systems
First Claim
1. In a cryptographic authentication method for use between a first party and a second party that share a common secret key, the improvement comprising the steps of:
- creating by said first party a first value;
applying a cryptographic transformation, based on said secret key, to said first value to produce a set of values by said first party and said first party storing the set of values;
creating a challenge value by a second party and supplying the challenge value to said first party after said cryptographic transformation has been applied by said first party;
selecting an allowed subset of said stored set of values by said first party,said subset being determined by said challenge;
transferring said selected subset of values by said first party to said second party;
re-computing said subset of values by said second party using said secret key and said first values and said cryptographic transformation;
comparing for equality by said second party of said subset of values received with said subset of values re-computed.
19 Assignments
0 Petitions
Accused Products
Abstract
A tamper-resistant part is disclosed that can conduct transactions with an external system through a moderating user-controlled computer or that can on other occasions be brought into direct connection with the external system. In the moderated configuration, the moderating computer is able to ensure that certain transactions with the external system are unlinkable to each other. In the unmoderated configuration the tamper-resistant part can also ensure the unlinkability of certain transactions. Also testing configurations are disclosed that allow improper functioning of the tamper-resistant part, such as that which could link transactions, to be detected by user-controlled equipment. Another testing configuration can detect improper functioning of an external system that could, for instance, obtain linking information from a tamper-resistant part.
153 Citations
8 Claims
-
1. In a cryptographic authentication method for use between a first party and a second party that share a common secret key, the improvement comprising the steps of:
-
creating by said first party a first value; applying a cryptographic transformation, based on said secret key, to said first value to produce a set of values by said first party and said first party storing the set of values; creating a challenge value by a second party and supplying the challenge value to said first party after said cryptographic transformation has been applied by said first party; selecting an allowed subset of said stored set of values by said first party, said subset being determined by said challenge; transferring said selected subset of values by said first party to said second party; re-computing said subset of values by said second party using said secret key and said first values and said cryptographic transformation; comparing for equality by said second party of said subset of values received with said subset of values re-computed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification