Server computer issued credential authentication
First Claim
1. A method for authenticating a computer, the method comprising the following steps:
- issuing a credential from a first computer to a second computer;
transmitting said credential and a computer challenge from the second computer to the first computer when the second computer is to be authenticated;
transmitting a response to said computer challenge from said first computer to said second computer; and
verifying said response with said second computer in order to authenticate and verify said computers.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating computers is disclosed. The method comprises issuing a credential from a first computer to a second computer. When the second computer authenticates to the first computer, the second computer transmits the credential and a first challenge to the first computer. The first computer determines whether the credential is valid, computes a first response to the first challenge, and generates a second challenge. The first computer transmits the first response and the second challenge to the second computer. The second computer determines whether the first response is valid and computes a second response to the second challenge. The second computer transmits the second response to the first computer in order to verify and authenticate the computers.
62 Citations
48 Claims
-
1. A method for authenticating a computer, the method comprising the following steps:
-
issuing a credential from a first computer to a second computer;
transmitting said credential and a computer challenge from the second computer to the first computer when the second computer is to be authenticated;
transmitting a response to said computer challenge from said first computer to said second computer; and
verifying said response with said second computer in order to authenticate and verify said computers. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for authenticating a computer, the system comprising:
-
a first computer; and
a second computer in communication with the first computer;
wherein the first computer and the second computer are configured to execute the following instructions;
issue a credential from the first computer to the second computer;
transmit the credential and a challenge from the second computer to the first computer when the second computer is to be authenticated;
transmit a response to the challenge from the first computer to the second computer; and
verify the response with the second computer in order to authenticate and verify the computers. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for authenticating a computer, the method comprising the steps:
-
issuing a credential from a first computer to a second computer;
generating with the second computer a first challenge;
transmitting the credential and the first challenge from the second computer to the first computer;
determining with the first computer whether the credential is valid;
computing a first response to the first challenge and generating a second challenge with the first computer;
transmitting the first response and the second challenge from the first computer to the second computer;
determining with the second computer whether the second response is valid;
computing a second response to the second challenge with the second computer;
transmitting the second response from the second computer to the first computer; and
determining with the first computer whether the second response is valid to verify and authenticate the computers. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable medium containing a program with instructions that execute the following procedure:
-
issue a credential from a first computer to a second computer;
generate a first challenge with the second computer;
transmit the credential and the first challenge from the second computer to the first computer;
determine with the first computer whether the credential is valid;
compute a first response to the first challenge and generate a second challenge with the first computer;
transmit the first response and the second challenge from the first computer to the second computer;
determine with the second computer whether the first response is valid to verify the first computer;
compute a second response to the second challenge with the second computer;
transmit the second response from the second computer to the first computer; and
determine with the first computer whether the second response is valid to verify and authenticate the computers. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system for authenticating a computer, the system comprising:
-
a first computer; and
a second computer in communication with the first computer;
wherein the first computer and the second computer are configured to execute the following instructions;
issue a credential from the first computer to the second computer;
generate a first challenge with the second computer;
transmit the credential and the first challenge from the second computer to the first computer;
determine with the first computer whether the credential is valid;
compute a first response to the first challenge and generate a second challenge with the first computer;
transmit the first response and the second challenge from the first computer to the second computer;
determine with the second computer whether the first response is valid;
compute a second response to the first challenge with the second computer;
transmit the second response from the second computer to the first computer; and
determine with the first computer whether the second response is valid to authenticate and verify the computers. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A system for authenticating a connection between computers, the system comprising:
-
first computing means; and
second computing means in communication with the first computing means;
wherein the first computing means is configured to issue a credential to the second computing means, and transmit and receive messages with the second computing means to verify the identity of the second computing means; and
the second computing means is configured to transmit the credential to the first computing means to authenticate therewith, and transmit and receive messages with the first computing means to verify the identity of the first computing means. - View Dependent Claims (46, 47)
-
-
48. A method of authentication performed between a first user and a second user with a computer, the method comprising the steps of:
-
issuing a credential from the first user to the second user;
generating a first challenge with the second user;
transmitting the credential and the first challenge to the first user;
determining with the first user whether the credential is valid;
generating with the first user a first response to the first challenge and a second challenge;
transmitting the first response and the second challenge to the second user;
determining with the second user whether the first response is valid;
generating with the second user a second response to the second challenge;
transmitting the second response to the first user; and
determining with the first user whether the second response is valid in order to authenticate and verify the first and second users.
-
Specification