Authentication methods and apparatus utilizing hash chains
First Claim
Patent Images
1. A first processing device comprising:
- a memory;
a processor coupled to the memory; and
interface circuitry coupled to the processor;
the processor being operative to control the output of authentication information via the interface circuitry;
wherein the authentication information comprises a sequence of values corresponding to images of a hash chain;
wherein a given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices; and
wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)).
13 Assignments
0 Petitions
Accused Products
Abstract
A first processing device, which may be, for example, a wireless authentication token or an RFID tag, comprises a memory, a processor coupled to the memory, and interface circuitry coupled to the processor. The processor is operative to control the output of authentication information via the interface circuitry, where the authentication information comprises a sequence of values corresponding to images of a hash chain. A given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices.
-
Citations
21 Claims
-
1. A first processing device comprising:
-
a memory; a processor coupled to the memory; and interface circuitry coupled to the processor; the processor being operative to control the output of authentication information via the interface circuitry; wherein the authentication information comprises a sequence of values corresponding to images of a hash chain; wherein a given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices; and wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 21)
-
-
15. A method for use in a first processing device, the method comprising the step of:
-
outputting from the first processing device authentication information comprising a sequence of values corresponding to images of a hash chain; wherein a given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices; and wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)). - View Dependent Claims (16)
-
-
17. A processing device comprising:
-
a memory; a processor coupled to the memory; and interface circuitry coupled to the processor; the processor being operative to receive authentication information generated by another processing device, the authentication information comprising a sequence of values corresponding to images of a hash chain; wherein the processor is further operative to generate from a given one of the values of the sequence a modified value suitable for providing joint authentication of the processing devices; and wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)).
-
-
18. A method for use in a processing device, the method comprising the steps of:
-
receiving authentication information generated by another processing device, the authentication information comprising a sequence of values corresponding to images of a hash chain; and generating from a given one of the values of the sequence a modified value suitable for providing joint authentication of the processing devices; wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)). - View Dependent Claims (19)
-
-
20. An authentication system comprising:
-
at least first and second processing devices each comprising a processor and a memory; and an authentication element; wherein the first processing device is operative to output authentication information comprising a sequence of values corresponding to images of a hash chain; wherein a given one of the values of the sequence is utilized by the second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices by the authentication element; and wherein the sequence of values comprises a sequence of values of a hash chain ci, where ci(j) denotes a jth value in the chain such that ci(0) represents a head of the chain, and wherein for a specified one-way function ƒ
, ci(j)=ƒ
(ci(j+1)).
-
Specification