System and method for restricting access to a terminal
First Claim
Patent Images
1. A method for authenticating data comprising the steps of:
- selecting at least two initial cryptographic keys from within a larger set of N cryptographic keys stored in a first device;
providing data to the first device;
generating authentication information required to authenticate the data utilizing the selected initial cryptographic keys;
sending the data and authentication information to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys;
authenticating the data in the second device utilizing the paired cryptographic keys; and
,selecting at least one other cryptographic key from the set of N cryptographic keys if one of the selected initial cryptographic keys has been compromised.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating data comprising the steps of: providing data to a first device having at least two initial cryptographic keys; generating authentication information required to authenticate the data utilizing the at least two initial cryptographic keys; sending the data and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; and authenticating the data in the second device utilizing the paired cryptographic keys.
10 Citations
30 Claims
-
1. A method for authenticating data comprising the steps of:
-
selecting at least two initial cryptographic keys from within a larger set of N cryptographic keys stored in a first device; providing data to the first device; generating authentication information required to authenticate the data utilizing the selected initial cryptographic keys; sending the data and authentication information to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; authenticating the data in the second device utilizing the paired cryptographic keys; and
,selecting at least one other cryptographic key from the set of N cryptographic keys if one of the selected initial cryptographic keys has been compromised.
-
-
2. A method for authenticating data comprising the steps of:
-
providing data to a first device having at least two initial cryptographic keys; generating authentication information required to authenticate the data utilizing the at least two initial cryptographic keys; sending the data and authentication information to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; and
,authenticating the data in the second device utilizing the paired cryptographic keys. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification