×

Localized network authentication and security using tamper-resistant keys

  • US 7,325,134 B2
  • Filed: 10/07/2003
  • Issued: 01/29/2008
  • Est. Priority Date: 10/08/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A system for mutually authenticating a client operatively coupled to a communications network to a device operatively coupled to the communications network, the communications network comprising the client and the device, the device operatively coupled to a key database, the key database comprising client keys stored in association with unique client identifiers, the system comprising:

  • a client physical token adapted to be operatively coupled to the client, the client physical token comprising a client random number generator, a unique client identifier, and a client key;

    a device physical token adapted to be operatively coupled to the device, the device physical token comprising a device random number generator;

    client software adapted to be installed on the client to send a first challenge to the device, the first challenge comprising a first random number generated by the client random number generator and encrypted using the client key, the first challenge further comprising the unique client identifier; and

    device software adapted to be installed on the device to retrieve a stored client key associated with the client identification in the first challenge and decrypt the first random number in the first challenge using the retrieved client key, whereby decrypting the first random number authenticates the client computer to the device;

    wherein the device software, when installed in the device, sends a second challenge to the client, the second challenge comprising a second random number different from the first random number and generated by the device random number generator and encrypted using the client key;

    wherein the client software, when installed in the client, decrypts the second random number using the client key, whereby decrypting the second random number authenticates the access point to the client computer;

    wherein subsequent data sent between the device and the client is encrypted using a key derived from the first random number and the second random number.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×