Method of authentication based on intersection of password sets
First Claim
1. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
- providing a first party with a first password set, the first password set being stored on a first storage device of the first party;
providing a second party with a second password set, the second password set being stored on a second storage device of the second party;
transmitting an authentication message based on the first password set from the first party to the second party; and
authenticating the identity of the first party by the second party for further communications over the computer network if it is demonstrated, based on an analysis of the authentication message, that the first and second password sets contain at least one common password.
2 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a method of authenticating the identity of a first party involved in communicating over a computer network system. The method comprises the steps of: providing the first party with a first password set; providing a second party with a second password set; transmitting an authentication message based on the first password set from the first party to the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if it is demonstrated, based on an analysis of the authentication message, that the first and second password sets contain at least one common password.
86 Citations
26 Claims
-
1. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
-
providing a first party with a first password set, the first password set being stored on a first storage device of the first party; providing a second party with a second password set, the second password set being stored on a second storage device of the second party; transmitting an authentication message based on the first password set from the first party to the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if it is demonstrated, based on an analysis of the authentication message, that the first and second password sets contain at least one common password. - View Dependent Claims (2, 3, 4, 21)
-
-
5. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
-
providing a first party with a first password set, the first password set being stored on a first storage device of the first party; providing a second party with a second password set, the second password set being stored on a second storage device of the second party; transmitting the first password set from the first party to the second party; comparing the first password set with the second password set by the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if the first and second password sets contain at least one common password. - View Dependent Claims (6, 7, 8, 22)
-
-
9. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
-
providing a first party with a first password set; providing a second party with a second password set; forming a first modified password set by operating on the first password set with a predetermined function by the first party; forming a second modified password set by operating on the second password set with the predetermined function by the second party; transmitting the first modified password set from the first party to the second party; comparing the first modified password set with the second modified password set by the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if the first and second modified password sets contain at least one common password. - View Dependent Claims (10, 11, 12, 23)
-
-
13. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
-
providing a first party with a first password set; providing a second party with a second password set; generating a first random challenge value by the second party; transmitting the first random challenge value to the first party; forming a first modified password set from the first password set by the first party using the first random challenge value; forming a second modified password set from the second password set by the second party using the first random challenge value; transmitting the first modified password set to the second party; comparing the first and second modified password sets by the second party; and authenticating the identity of the first party by the second party if the first and second modified password sets contain at least one common member. - View Dependent Claims (14, 15, 16, 17, 18, 24)
-
-
19. A method of authenticating the identity of a particular party involved in communicating over a computer network system, the method comprising the steps of:
-
providing a first party with a first password set; providing a second party with a second password set; transmitting a first authentication message, which is based on the first password set and a predetermined criteria, from the first party to a third party; transmitting a second authentication message which is based on the second password set and the predetermined criteria, from the second party to the third party; and authenticating the identity of the first party by the third party for further communications over the computer network if it is demonstrated, based on an analysis of the first and second authentication messages, that the first and second password sets contain at least one common password. - View Dependent Claims (25)
-
-
20. A networked computer system comprising:
-
a first terminal and a second terminal; the first terminal having stored therein a first password set and comprising; a first computing means for operating on the first password set with a predetermined function, a first comparing means for comparing the output of the first computing means with a transmitted set of values from the second terminal, and a first transmitting means for transmitting the output of the first computing means to the second terminal; and the second terminal having stored therein a second password set and comprising; a second computing means for operating on the second password set with the predetermined function, a second comparing means for comparing the output of the second computing means with a transmitted set of values from the first terminal, and a second transmitting means for transmitting the output of the second computing means to the first terminal.
-
-
26. A networked computer system, comprising:
-
a first terminal; and a second terminal, wherein the first terminal has stored therein a first password set, and comprising; a first computing arrangement operating on the first password set using a predetermined function and generating a first output, a first comparing arrangement comparing the first output to a transmitted set of values from the second terminal, and a first transmitting arrangement transmitting the first output to the second terminal, and wherein the second terminal has stored therein a second password set, and comprising; a second computing arrangement operating on the second password set using the predetermined function and generating a second output, a second comparing arrangement comparing the second output to a transmitted set of values from the first terminal, and a second transmitting arrangement transmitting the second output to the first terminal.
-
Specification