Client/server protocol for proving authenticity
First Claim
Patent Images
1. A method for authenticating a user with a verifier, comprising the steps of:
- (a) receiving by a user from a credential issuer a credential comprising the credential issuer'"'"'s digital signature;
(b) transmitting from the user to the verifier over an encrypted communications channel credential verification information; and
(c) authenticating the user based on the validity of the credential issuer'"'"'s digital signature and in response to the credential verification information.
7 Assignments
0 Petitions
Accused Products
Abstract
A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server'"'"'s public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client'"'"'s authenticity.
724 Citations
42 Claims
-
1. A method for authenticating a user with a verifier, comprising the steps of:
-
(a) receiving by a user from a credential issuer a credential comprising the credential issuer'"'"'s digital signature; (b) transmitting from the user to the verifier over an encrypted communications channel credential verification information; and (c) authenticating the user based on the validity of the credential issuer'"'"'s digital signature and in response to the credential verification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for authenticating a user, comprising:
-
a credential issuer issuing a credential comprising the credential issuer'"'"'s digital signature; a user element receiving the credential from the credential issuer and transmitting credential verification information over an encrypted communications channel; and a verifier authenticating the user in response to the validity of the credential issuer'"'"'s digital signature and in response to the credential verification information. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification