NONCE GENERATION
First Claim
Patent Images
1. A method for an authentication protocol, the method performed by data processing apparatus and comprising:
- generating, by the data processing apparatus, a source value;
hashing, by the data processing apparatus, the source value to generate a nonce;
providing, by the data processing apparatus, the nonce with a query over a network;
receiving, in response to the query, reply data and an authentication code;
hashing a combination of the reply data and the nonce to generate a digest; and
determining the reply is authentic if the digest matches the authentication code.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating a nonce. In one aspect, a method includes generating, by a data processing apparatus, a source value, and hashing, by the data processing apparatus, the source value to generate the nonce.
107 Citations
14 Claims
-
1. A method for an authentication protocol, the method performed by data processing apparatus and comprising:
-
generating, by the data processing apparatus, a source value; hashing, by the data processing apparatus, the source value to generate a nonce; providing, by the data processing apparatus, the nonce with a query over a network; receiving, in response to the query, reply data and an authentication code; hashing a combination of the reply data and the nonce to generate a digest; and determining the reply is authentic if the digest matches the authentication code. - View Dependent Claims (2, 3, 4)
-
-
5. A method for an authentication protocol, the method performed by data processing apparatus and comprising:
-
generating, by the data processing apparatus, a plurality of source values; hashing, by the data processing apparatus, the source values to generate hash values; generating, by the data processing apparatus, a nonce from the hash values; providing, by the data processing apparatus, the nonce with a query over a network; receiving, in response to the query, reply data and an authentication code; hashing, by the data processing apparatus, a combination of the reply data and the nonce to generate a digest; and determining, by the data processing apparatus, the reply is authentic if the digest matches the authentication code. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A computer storage medium encoded with a computer program, the program comprising instructions that when executed by data processing apparatus cause the data processing apparatus to perform operations comprising:
-
generating a plurality of source values; hashing the source values to generate hash values; generating a nonce from the hash values; providing the nonce with a query over a network; receiving reply data and an authentication code; hashing a combination of the reply data and the nonce to generate a digest; and determining the reply is authentic if the digest matches the authentication code. - View Dependent Claims (11, 12, 13, 14)
-
Specification