×

Efficient and secure authentication of computing systems

  • US 7,549,048 B2
  • Filed: 03/19/2004
  • Issued: 06/16/2009
  • Est. Priority Date: 03/19/2004
  • Status: Active Grant
First Claim
Patent Images

1. In a client computing system, a method for participating in authentication with a server computing system, the method comprising:

  • an act of the client computing system receiving a first server request that includes at least a first indication of the authentication mechanisms deployed at the server computing system and a server nonce;

    an act of the client computing system sending a first response to the server computing system and that includes a client public key, a client nonce and a selected set of the authentication mechanisms that were included in the first indication of the authentication mechanisms received from the server computing system and that are also deployed at the client computing system;

    an act of identifying a tunnel key that can be used to encrypt content transferred between the client computing system and the server computing system, the tunnel key comprising a hash of a concatenation of a session key together with the server nonce and the client nonce;

    an act of receiving a second server request that includes encrypted authentication content, the encrypted authentication content being encrypted with the tunnel key and including a server challenge, a mutually deployed authentication method and a trust anchor;

    an act of decrypting the encrypted authentication content with the tunnel key to reveal unencrypted authentication content, the unencrypted authentication content including the mutually deployed authentication mechanism the server challenge and the trust anchor; and

    an act of sending a second response to the second server request, the second response including encrypted response data that is responsive to the unencrypted authentication content, including at least one of a client challenge, a hashed message authentication code that corresponds to the server challenge, or a client authentication signature, the encrypted response data being used for authenticating the client computing system with the server computing system according to the mutually deployed authentication mechanism.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×