×

System and method of non-centralized zero knowledge authentication for a computer network

  • US 7,840,806 B2
  • Filed: 10/16/2003
  • Issued: 11/23/2010
  • Est. Priority Date: 10/16/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of protecting a host computer from unauthorized access by a client computer over a computer network, comprising the steps of:

  • installing a prover agent application on the client computer;

    installing a verifier agent application on the host computer;

    creating a trusted source application on the computer network to generate and publish encrypted values of a secret and product of first and second large prime numbers;

    reading the encrypted values for the secret and product, by the prover and verifier from the trusted source;

    decrypting the secret, by the prover and verifier;

    decrypting the product, by the prover and verifier;

    performing a plurality of verification dialog between the prover and verifier over the network, wherein the prover demonstrates knowledge of the secret and product without exposing the values of the secret and product, and wherein the client is denied access to a secure area of the host when the prover fails to demonstrate knowledge of the secret and product and granted access to the secure area when the client succeeds in demonstrating knowledge of the secret and product;

    installing a first agent to be authenticated on a third computer on the network, the first agent having values for s, n and t, s being the secret, n being the product, and t being a size of an answer set;

    installing a second agent on a fourth computer on the network, to authenticate the first agent, the second agent having values for s, n, and t;

    generating r as a random number generated by the first agent;

    calculating x by the first agent, r being raised to power of t modulus n;

    sending x from the first agent to the second agent, over the network;

    calculating b by the second agent, b being further defined as a member of set of integers from zero through t−

    1;

    sending b from the second agent to the first agent, over the network;

    calculating y by the first agent, y being a product of r*s raised to power of b;

    sending y from the first agent to the second agent, over the network; and

    determining authentication of the first agent, by determining equivalence of a first equation to a second equation, if y is not equal to zero, first equation is y^t mod n and second equation is (xv^b) mod n.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×