×

Device authentication

  • US 7,647,498 B2
  • Filed: 04/30/2004
  • Issued: 01/12/2010
  • Est. Priority Date: 04/30/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for the authentication of a first and a second device by a third device, the first and the second devices each possessing a shared secret key value h, each of the devices having available to it a public key P selected such that the operation of deriving the secret key value h from the product hP is a computationally difficult operation, the method comprising the steps of:

  • the first device communicating a product RD of a random value rD and P to the second device using the third device, the third device retaining a copy of the product RD;

    the second device communicating a product RB of a random value rB and P, and a challenge value eD to the first device using the third device, the third device retaining a copy of the product RB and the challenge value eD;

    the first device calculating a value yD defined by a first expression with a value equivalent to the product hP using the random value rD and the challenge value eD, and communicating the value yD and a challenge value eB to the second device using the third device, the third device retaining a copy of the value yD and a challenge value eB;

    the second device calculating a value yB defined by a second expression with a value equivalent to the product hP using the challenge value eB and the random value rB and communicating the value yB to the third device; and

    the third device authenticating the first device and the second device by comparing values of the first expression, the random value rD, the challenge value eD and the value yD, with values of the second expression, the random value rB, the challenge value eB and the value yB.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×