Method for securing a communication
First Claim
1. A method comprising:
- computing an authentication code using a first key and a second key within a responder,transmitting both said second key and said authentication code from said responder to an initiator using a first communication channel, after computing said authentication code,transmitting said first key from said responder to said initiator using a second communication channel,computing a verification code using said first key and said second key within said initiator,comparing said verification code with said authentication code within said initiator, andauthenticating said responder as a correct communication partner if said comparing checks out,wherein said second key is a secret key and said first communication channel is a secure channel.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing a communication between at least one initiator (I) and one responder (R) generates a first key (KEr) within the responder (R), generates a second key (K) within the responder (R), computes an authentication code (C) using the first key (KEr) and the second key within said responder (R), transmits the second key (K) and the authentication code (C) from the responder (R) to the initiator (I) using a first communication channel, transmits the first key (KEr) from the responder (R) to the initiator (I) using a second communication channel, computes a verification code (C′) using the first key (KEr) and the second key (K) within the initiator (I), and compares the verification code (C′) with the authentication code (C) within the initiator.
-
Citations
32 Claims
-
1. A method comprising:
-
computing an authentication code using a first key and a second key within a responder, transmitting both said second key and said authentication code from said responder to an initiator using a first communication channel, after computing said authentication code, transmitting said first key from said responder to said initiator using a second communication channel, computing a verification code using said first key and said second key within said initiator, comparing said verification code with said authentication code within said initiator, and authenticating said responder as a correct communication partner if said comparing checks out, wherein said second key is a secret key and said first communication channel is a secure channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
computing an authentication code using a raw public key and a second key within a responder, transmitting both said second key and said authentication code from said responder to an initiator using a first communication channel, after computing said authentication code, transmitting said raw public key from said responder to said initiator within an encrypted certification payload using a second communication channel, extracting said raw public key from said encrypted certification payload, computing a verification code using said raw public key and said second key within said initiator, comparing said verification code with said authentication code within said initiator, and authenticating said responder as a correct communication partner if said comparing checks out, wherein said second key is a secret key and said first communication channel is a secure channel. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system comprising an initiator and a responder,
wherein said responder comprises computing means configured to compute an authentication code from a first key and a second key, first transmission means configured to transmit both said second key and said authentication code from said responder to said initiator using a first communication channel, after computing said authentication code, and second transmission means configured to transmit said first key from said responder to said initiator using a second communication channel, and wherein said initiator comprises first transmission means configured to receive said second key and said authentication code from said responder via said first communication channel, second transmission means configured to receive said first key from said responder via said second communication channel, computing means configured to compute a verification code from said first key and said second key, and comparing means configured to compare said verification code with said authentication code wherein said second key is a secret key and said first communication channel is a secure channel.
-
31. A computer readable medium stored with instructions operable to cause a processor to secure a communication between an initiator and a responder of said communication by:
-
computing an authentication code using a first key and a second key within said responder, transmitting both said second key and said authentication code from said responder to said initiator using a first communication channel, after computing said authentication code, transmitting said first key from said responder to said initiator using a second communication channel, computing a verification code using said first key and said second key within said initiator, and comparing said verification code with said authentication code within said initiator, wherein said second key is a secret key and said first communication channel is a secure channel. - View Dependent Claims (32)
-
Specification