Method, system, and computer-readable storage medium for authenticating a computing device
First Claim
1. A method for authenticating a first computing device to one or more other computing devices, the method comprising:
- receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential;
sending, from the first computing device to the second computing device, a first message that includes the first credential and the second credential;
sending, from the first computing device to the third computing device, a second message that includes the first credential and the second credential;
receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and
receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer-readable storage medium for authenticating a computing device are provided. According to embodiments of the invention, a first computing device generates a message using first secret data and second secret data, the first secret data for authenticating to a second computing device, the second secret data for authenticating to a third computing device. The first computing device sends the message to the second computing device. In some embodiments, challenge-response authentication is implemented. For example, the first computing device receives a challenge from the second computing device and generates the message based at least in part on the challenge. The second computing device compares local information with information received from the first computing device. The first computing device can thereby be authenticated to the second computing device. Furthermore, the first computing device can be authenticated to the third computing device by a similar process.
74 Citations
28 Claims
-
1. A method for authenticating a first computing device to one or more other computing devices, the method comprising:
-
receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes the first credential and the second credential; sending, from the first computing device to the third computing device, a second message that includes the first credential and the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. A computer-readable storage medium storing computer-executable instructions for causing a computer to execute operations comprising:
-
receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes the first credential and the second credential; sending, from the first computing device to the third computing device, a second message that includes the first credential and the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device.
-
-
10. A method for authenticating a first computing device to one or more other computing devices, the method comprising:
-
receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes a first hash value and a second hash value, the first hash value generated based on the first credential, the second hash value generated based on the second credential; sending, from the first computing device to the third computing device, a second message that includes a third hash value and a fourth hash value, the third hash value generated based on the first credential, the fourth hash value generated based on the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 20, 21, 22)
-
-
19. A computer-readable storage medium storing computer-executable instructions for causing a computer to execute operations comprising:
-
receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes a first hash value and a second hash value, the first hash value generated based on the first credential, the second hash value generated based on the second credential; sending, from the first computing device to the third computing device, a second message that includes a third hash value and a fourth hash value, the third hash value generated based on the first credential, the fourth hash value generated based on the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device.
-
-
23. A computing device comprising:
-
one or more processors; and one or more computer-readable media coupled to the one or more processors, the one or more computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes the first credential and the second credential; sending, from the first computing device to the third computing device, a second message that includes the first credential and the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A computing device comprising:
-
one or more processors; and one or more computer-readable media coupled to the one or more processors, the one or more computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving, at a first computing device, a first credential and a second credential, the first credential for authenticating to a second computing device, the second credential for authenticating to a third computing device, the first credential different from the second credential; sending, from the first computing device to the second computing device, a first message that includes a first hash value and a second hash value, the first hash value generated based on the first credential, the second hash value generated based on the second credential; sending, from the first computing device to the third computing device, a second message that includes a third hash value and a fourth hash value, the third hash value generated based on the first credential, the fourth hash value generated based on the second credential; receiving, at the first computing device from the second computing device, a response to the first message, the response to the first message comprising information indicating whether the first computing device is authenticated to the second computing device; and receiving, at the first computing device from the third computing device, a response to the second message, the response to the second message comprising information indicating whether the first computing device is authenticated to the third computing device.
-
Specification