×

Cryptographic authentication process

  • US 7,451,314 B2
  • Filed: 06/24/2002
  • Issued: 11/11/2008
  • Est. Priority Date: 06/27/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A cryptographic authentication method, comprising:

  • sending from a first entity to be authenticated to an authenticator second entity a message protected by a cryptographic algorithm and a secret, said authenticator second entity being in communication with a database containing at least one parameter having an assigned risk value and switching means for switching received protected messages to one of a first verification means and a second verification means based on a comparison of content of the received protected messages to the at least one parameter from the database;

    performing an operation by said authenticator second entity, after receiving said message, said operation being selected from the group comprising;

    completely verifying the authentication of the received protected message via the first verification means which includes said cryptographic algorithm and a verification key;

    delaying complete verification of the authentication of said protected message;

    partially verifying the authentication of the received protected message via said cryptographic algorithm and said verification key;

    partially verifying the authentication of the received protected message via the second verification means which includes said cryptographic algorithm and said verification key and subsequently completing the verification; and

    omitting verification of the authentication of said protected message;

    wherein the operation performed by said authenticator second entity from said group of operations is selected as a function of a degree of certainty that the second entity wishes to obtain as to the authentication of the first entity based on the received messages of said switching means which is configured to switch the received protected messages to one of the first verification means and the second verification means based on the comparison of the content of the received protected messages to the at least one parameter from the database, and wherein the operation is concealed from the first entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×