Server computer issued credential authentication
First Claim
1. A method for authenticating a computing device, the method comprising the following steps:
- issuing a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from a first computing device to a second computing device;
upon a loss of connection, transmitting said credential and a computer challenge from the second computing device to the first computing device;
transmitting a response to said computer challenge from said first computing device to said second computing device; and
verifying said response with said second computing device in order to authenticate and verify said computing devices and reestablish said connection,wherein;
the challenge is a random number generated by the second computing device, andthe first computing device computes the response to the challenge by performing a predetermined function on the random number.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating computers is disclosed. The method comprises issuing a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.
61 Citations
45 Claims
-
1. A method for authenticating a computing device, the method comprising the following steps:
-
issuing a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from a first computing device to a second computing device; upon a loss of connection, transmitting said credential and a computer challenge from the second computing device to the first computing device; transmitting a response to said computer challenge from said first computing device to said second computing device; and verifying said response with said second computing device in order to authenticate and verify said computing devices and reestablish said connection, wherein; the challenge is a random number generated by the second computing device, and the first computing device computes the response to the challenge by performing a predetermined function on the random number. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for authenticating a computer, the system comprising:
-
a first computer; and a second computer in communication with the first computer; wherein the first computer and the second computer are configured to execute the following instructions; issue a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from the first computer to the second computer; upon a loss of connection, transmit the credential and a challenge from the second computer to the first computer; transmit a response to the challenge from the first computer to the second computer; and verify the response with the second computer in order to authenticate and verify the computers and re-establish said connection, wherein; the second computer is configured to generate a challenge that is a random number, and the first computer is configured to generate a response to the challenge by performing a predetermined function on the random number. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for authenticating a computer, the method comprising the steps:
-
issuing a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from a first computer to a second computer; generating with the second computer a first challenge; transmitting the credential and the first challenge from the second computer to the first computer; determining with the first computer whether the credential is valid; computing a first response to the first challenge and generating a second challenge with the first computer; transmitting the first response and the second challenge from the first computer to the second computer; determining with the second computer whether the first response is valid; computing a second response to the second challenge with the second computer; transmitting the second response from the second computer to the first computer; and determining with the first computer whether the second response is valid to verify and authenticate the computers. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer-readable storage medium containing a program with instructions that execute the following procedure:
-
issue a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from a first computer to a second computer; generate a first challenge with the second computer; transmit the credential and the first challenge from the second computer to the first computer; determine with the first computer whether the credential is valid; compute a first response to the first challenge and generate a second challenge with the first computer; transmit the first response and the second challenge from the first computer to the second computer; determine with the second computer whether the first response is valid to verify the first computer; compute a second response to the second challenge with the second computer; transmit the second response from the second computer to the first computer; and determine with the first computer whether the second response is valid to verify and authenticate the computers. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for authenticating a computer, the system comprising:
-
a first computer; and a second computer in communication with the first computer; wherein the first computer and the second computer are configured to execute the following instructions; issue a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from the first computer to the second computer; generate a first challenge with the second computer; transmit the credential and the first challenge from the second computer to the first computer; determine with the first computer whether the credential is valid; compute a first response to the first challenge and generate a second challenge with the first computer; transmit the first response and the second challenge from the first computer to the second computer; determine with the second computer whether the first response is valid; compute a second response to the first challenge with the second computer; transmit the second response from the second computer to the first computer; and determine with the first computer whether the second response is valid to authenticate and verify the computers. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method of authentication performed between a first user with a first computer and a second user with a second computer, the method comprising the steps of:
-
issuing a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from the first user to the second user; generating a first challenge with the second user; transmitting the credential and the first challenge to the first user; determining with the first user whether the credential is valid; generating with the first user a first response to the first challenge and a second challenge; transmitting the first response and the second challenge to the second user; determining with the second user whether the first response is valid; generating with the second user a second response to the second challenge; transmitting the second response to the first user; and determining with the first user whether the second response is valid in order to authenticate and verify the first and second users.
-
-
44. A method for authenticating a computer, the method comprising the following steps:
-
issuing a credential based on session information, a hash seed, a maximum iterative value, credential information and an expiration time from a first computer to a second computer; in response to a connection between the first computer and the second computer being terminated, transmitting said credential and a computer challenge from the second computer to the first computer when the second computer is to be authenticated; transmitting a response to said computer challenge from said first computer to said second computer; and verifying at said second computer whether said response is valid, wherein said second computer re-establishes a connection with the first computer when the response is valid, wherein; the challenge comprises a random number generated by the second computer, the first computer generates the response to the challenge by calculating a predetermined function of the random number, and the second computer verifies whether the response is valid by calculating the predetermined function of the random number and comparing the result of the calculation to the response. - View Dependent Claims (45)
-
Specification