Authentication method and system using IC card
First Claim
1. A method of authenticating between a user and a network access entity using an IC card, comprising the steps of:
- executing an initial authentication using the IC card when the user first communicates with the network access entity;
commonly holding authentication information in both the user and the network access entity if the initial authentication achieves success; and
executing a re-authentication using said commonly held authentication information without using the IC card when the user communicates again with the same network access entity within a predetermined period of time after the last authentication,wherein said initial authentication is an authentication using a public key cryptographic technique, and wherein said re-authentication is an authentication using a secret key cryptographic technique.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating between a user or client and a network access entity such as a server or another client using an IC card. The method includes a step of executing an initial authentication using the IC card when the user first communicates with the network access entity, a step of commonly holding authentication information in both the user and the network access entity if the initial authentication achieves success, and a step of executing a re-authentication using the commonly held authentication information without using the IC card when the user communicates again with the same network access entity within a predetermined period of time after the last authentication.
-
Citations
10 Claims
-
1. A method of authenticating between a user and a network access entity using an IC card, comprising the steps of:
-
executing an initial authentication using the IC card when the user first communicates with the network access entity; commonly holding authentication information in both the user and the network access entity if the initial authentication achieves success; and executing a re-authentication using said commonly held authentication information without using the IC card when the user communicates again with the same network access entity within a predetermined period of time after the last authentication, wherein said initial authentication is an authentication using a public key cryptographic technique, and wherein said re-authentication is an authentication using a secret key cryptographic technique. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for authenticating between a user and a network access entity using an IC card, comprising:
-
means for executing an initial authentication using the IC card when the user first communicates with the network access entity; means for commonly holding authentication information in both the user and the network access entity if the initial authentication achieves success; and means for executing a re-authentication using said commonly held authentication information without using the IC card when the user communicates again with the same network access entity within a predetermined period of time after the last authentication, wherein said initial authentication is an authentication using a public key cryptographic technique, and wherein said re-authentication is an authentication using a secret key cryptographic technique. - View Dependent Claims (7, 8, 9, 10)
-
Specification