Cryptographic authentication process
First Claim
1. A cryptographic authentication method, comprising:
- sending from a first entity to be authenticated to an authenticator second entity a message protected by a cryptographic algorithm and a secret, said authenticator second entity being in communication with a database containing at least one parameter having an assigned risk value and switching means for switching received protected messages to one of a first verification means and a second verification means based on a comparison of content of the received protected messages to the at least one parameter from the database;
performing an operation by said authenticator second entity, after receiving said message, said operation being selected from the group comprising;
completely verifying the authentication of the received protected message via the first verification means which includes said cryptographic algorithm and a verification key;
delaying complete verification of the authentication of said protected message;
partially verifying the authentication of the received protected message via said cryptographic algorithm and said verification key;
partially verifying the authentication of the received protected message via the second verification means which includes said cryptographic algorithm and said verification key and subsequently completing the verification; and
omitting verification of the authentication of said protected message;
wherein the operation performed by said authenticator second entity from said group of operations is selected as a function of a degree of certainty that the second entity wishes to obtain as to the authentication of the first entity based on the received messages of said switching means which is configured to switch the received protected messages to one of the first verification means and the second verification means based on the comparison of the content of the received protected messages to the at least one parameter from the database, and wherein the operation is concealed from the first entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic authentication method including a first step during which a first entity (A) to be authenticated sends an authenticator second entity (B) a message protected by a cryptographic algorithm and a secret key (Ks). During a second step, the second entity (B), after receiving said message, carries out operations selected from the group comprising completely verifying the authentication of the received protected message by means of said cryptographic algorithm and a verification key (Kv), delaying said complete verification, partly verifying said authentication, partly verifying said authentication and completing the verification subsequently, and omitting to verify said authentication. One of these operations is chosen as a function of the degree of certainty that the second entity (B) wishes to obtain as to the authentication of the first entity (A) and being concealed from the first entity (A).
51 Citations
9 Claims
-
1. A cryptographic authentication method, comprising:
-
sending from a first entity to be authenticated to an authenticator second entity a message protected by a cryptographic algorithm and a secret, said authenticator second entity being in communication with a database containing at least one parameter having an assigned risk value and switching means for switching received protected messages to one of a first verification means and a second verification means based on a comparison of content of the received protected messages to the at least one parameter from the database; performing an operation by said authenticator second entity, after receiving said message, said operation being selected from the group comprising; completely verifying the authentication of the received protected message via the first verification means which includes said cryptographic algorithm and a verification key; delaying complete verification of the authentication of said protected message; partially verifying the authentication of the received protected message via said cryptographic algorithm and said verification key; partially verifying the authentication of the received protected message via the second verification means which includes said cryptographic algorithm and said verification key and subsequently completing the verification; and omitting verification of the authentication of said protected message; wherein the operation performed by said authenticator second entity from said group of operations is selected as a function of a degree of certainty that the second entity wishes to obtain as to the authentication of the first entity based on the received messages of said switching means which is configured to switch the received protected messages to one of the first verification means and the second verification means based on the comparison of the content of the received protected messages to the at least one parameter from the database, and wherein the operation is concealed from the first entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A server, comprising:
-
first verification means configured to completely verify authentication of a received protected message based on a cryptographic algorithm and a verification key; second verification means configured to partially verify the authentication of the received protected message based on said cryptographic algorithm and said verification key; a database containing one or more parameters assigned a risk value; and switching means for switching received protected messages to one of the first verification means and the second verification means based on a comparison of content of the received protected messages to at least one parameter from the database.
-
Specification