×

System and method for alternative encryption techniques

  • US 6,848,050 B1
  • Filed: 04/15/1999
  • Issued: 01/25/2005
  • Est. Priority Date: 04/16/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of verifying identification of a user and securely establishing an encryption key for a communication between a verifying entity having knowledge of a first secret and the user having knowledge of a second secret, comprising;

  • generating a first output which is a function of the first secret and a first random number;

    generating a second output which is a function of the second secret and a second random number;

    generating a first key which is a transform of the first output that is infeasible to invert without the first secret and the second secret;

    generating a second key which is a transform of the second output that is infeasible to invert without the first secret and the second secret;

    generating a first encrypted output which is a function of the first secret and the first key;

    generating a first verification value by decrypting the first encrypted output with the second key that indicates the equivalence of the first secret to the second secret;

    generating a second encrypted output which is a function of the second key and one of either the first decrypted number, if the first decrypted number is equal to both of the first and second secrets, and a random number; and

    generating a second verification value which is the second encrypted output decrypted using the first key that indicates an equivalence of the first secret to the second secret and the first key to the second key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×