Authenticating communications
First Claim
1. A method for authenticating a first terminal to a second terminal comprising:
- requesting a string from the second terminal;
obtaining the requested string from the second terminal;
merging the obtained string with a user-entered, encrypted password to create an identification code;
receiving an authentication if the identification code matches an identification code expected at the second terminal; and
sending information from an information server to the first terminal.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are described that authenticates a first terminal to a second terminal. In one embodiment, the invention includes, requesting a string from the second terminal, obtaining the requested string from the second terminal, merging the obtained string with a password to create an identification code, receiving an authentication if the identification code matches an identification code expected at the second terminal and sending information from an information server to the authenticated first terminal. In a further embodiment, the string is a pseudo random number sequence and an element of an ordered series. Merging the string can include merging the string with the password using an applet at the first terminal, the applet executing an encryption algorithm with a unique merging key.
45 Citations
24 Claims
-
1. A method for authenticating a first terminal to a second terminal comprising:
-
requesting a string from the second terminal;
obtaining the requested string from the second terminal;
merging the obtained string with a user-entered, encrypted password to create an identification code;
receiving an authentication if the identification code matches an identification code expected at the second terminal; and
sending information from an information server to the first terminal. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating a first terminal to a second terminal comprising:
-
requesting a string from the second terminal;
obtaining the requested string from the second terminal;
merging the obtained string with a user-entered, encrypted password to create an identification code, wherein merging the string comprises merging the string with the password using an applet at the first terminal, the applet executing an encryption algorithm with a unique merging key;
receiving an authentication if the identification code matches an identification code expected at the second terminal; and
sending information from an information server to the first terminal. - View Dependent Claims (7)
-
-
8. A method for authenticating a first terminal to a second terminal comprising:
-
requesting a string from the second terminal;
obtaining the requested string from the second terminal;
merging the obtained string with a password to create an identification code, wherein merging the string comprises performing a block addition of the string and the password, wherein performing a block addition further comprises performing a permutation to the string and to the password and adding the permutated string and the permutated password;
receiving an authentication if the identification code matches an identification code expected at the second terminal; and
sending information from an information server to the first terminal.
-
-
9. A method for authenticating a first terminal to a second terminal comprising:
-
requesting a string from the second terminal;
obtaining the requested string from the second terminal, wherein obtaining the requested string comprises receiving a web page containing a program for generating requests and the string;
merging the obtained string with a password to create an identification code;
receiving an authentication if the identification code matches an identification code expected at the second terminal; and
sending information from an information server to the first terminal. - View Dependent Claims (10)
-
-
11. A method for authenticating a first terminal to a second terminal comprising;
-
creating a string and storing it in association with an identification of a first terminal;
sending the string to the first terminal;
receiving an identification code from the first terminal composed by merging the sent string with a sender password;
comparing the identification code to an expected identification code; and
if the identification code matched an expected identification code, then authenticating the first terminal. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for authenticating a first terminal to a second terminal comprising:
-
creating a string and storing it in association with an identification of a first terminal;
sending the string to the first terminal;
receiving an identification code from the first terminal composed by merging the sent string with a sender password, wherein merging the string comprises merging the string with the password using an applet at the first terminal, the applet executing an encryption algorithm with a unique merging key;
comparing the identification code to an expected identification code; and
if the identification code matched an expected identification code, then authenticating the first terminal. - View Dependent Claims (18)
-
-
19. A method for authenticating a first terminal to a second terminal comprising:
-
creating a string and storing it in association with an identification of a first terminal;
sending the string to the first terminal, wherein sending the string comprises sending a web page containing a program for generating requests and the string;
receiving an identification code from the first terminal composed by merging the sent string with a sender password;
comparing the identification code to an expected identification code; and
if the identification code matched an expected identification code, then authenticating the first terminal. - View Dependent Claims (20)
-
-
21. An authentication terminal comprising:
-
a merge string library coupled to a processor to create a merge string and to store it in association with an identification of a second terminal;
an output device to send the merge string to the second terminal;
an input device to receive an identification code from the second terminal, the identification code being composed by merging the sent string with a second terminal password; and
an identification test library coupled to the processor to compare the identification code to an expected identification code and if the identification code matches an expected identification code, to authenticate the second terminal. - View Dependent Claims (22)
-
-
23. An authentication terminal comprising:
-
a merge string library coupled to a processor to create a merge string and to store it in association with an identification of a second terminal;
an output device to send the merge string to the second terminal;
an input device to receive an identification code from the second terminal, the identification code, being composed be merging the sent string with a second terminal password;
an identification test library coupled to the processor to compare the identification code to an expected identification code and if the identification code matches an expected identification code, to authenticate the second terminal; and
an encryption library coupled to the processor to generate the expected identification code by merging the string with the second terminal password using an encryption algorithm with a merging key unique to the second terminal.
-
-
24. An authentication terminal comprising:
-
a merge string library coupled to a processor to create a merge string and to store it in association with an identification of a second terminal;
an output device to send the merge string to the second terminal;
an input device to receive an identification code from the second terminal, the identification code being composed by merging the sent string with a second terminal password, wherein the terminal is a web server, wherein the input device and the output device communicate over the web and wherein the terminal transmits a web page to the second terminal containing a program for merging the second terminal password and the merge string; and
an identification test library coupled to the processor to compare the identification code to an expected identification code and if the identification code matches an expected identification code, to authenticate the second terminal.
-
Specification