scispace - formally typeset
Patent

Method and device for mutual authentication

Reads0
Chats0
TLDR
In this paper, the authors propose a method of authenticating communication between a first and second party over an insecure, high bandwidth communications network, in which the first party (C) authenticates the second party (M) using a communications protocol comprising a first communications phase through a first communication channel over the insecure, HetNets, followed by a second communications phase of receiving information from the second node over a second communication channel, such as an empirical channel, and enabling a user to make a human comparison of the information received from the node with information generated by the first node
Abstract
A method of authenticating communication between a first and second party (or node) over an insecure, high bandwidth communications network, in which the first party (C) authenticates the second party (M) using a communications protocol comprising a first communications phase through a first communications channel over the insecure, high bandwidth communications network to establish a secure mode of communications between the first and second party, followed by a second communications phase of receiving information from the second party over a second communications channel, such as an empirical channel, and enabling a user to make a human comparison of the information received from the second party with information generated by the first party thereby enabling the user to authenticate the second party in the event of the information from both parties agrees.

read more

Citations
More filters
Patent

Streaming authentication and multi-level security for communications networks using quantum cryptography

TL;DR: In this article, the authors propose a low-latency message authenticator for quantum-secured communications, which is especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography.
Patent

Method and device for communication security

TL;DR: In this paper, the authors propose a method of authenticating communication between a first and second device over an insecure communications network, in which the first device authenticates the second device using a communications protocol including a first communications phase through a first communication channel over the insecure communication network, followed by a second communications phase of receiving information from the second devices over a second communication channel, such as an empirical channel, and enabling a comparison between the information received from a second device with information generated by the first devices thereby enabling authentication of the seconddevice in the event of the information from both devices
Patent

Method and apparatus for transmitting and receiving fec frame headers with variable header modulation

Hou-Shin Chen, +1 more
TL;DR: In this paper, a frame header of Forward Error Correction (FEC) is provided, suitable for using in the DVB-C2 Standard, which combines use of two different modulation types for the header information.
Patent

Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key

TL;DR: A master key may be used by each participant in a secure communication as mentioned in this paper, and each participant may select and encryption key from a distinct end of the master key, which eliminates a necessity for the end points in the secure communication to maintain a master key corresponding to every possible correspondent, the participants may communicate through an encryption server.
Patent

Payment authorization system

TL;DR: In this paper, a payment authorization device determines an authenticity of the merchant virtual storefront based on the retrieved identifying information and subsequently authorizes the virtual storefront transaction request, prior to authorization from a third-party approver.
References
More filters
Book ChapterDOI

UMAC: Fast and Secure Message Authentication

TL;DR: A message authentication algorithm, UMAC, which can authenticate messages roughly an order of magnitude faster than current practice (e.g., HMAC-SHA1), and about twice as fast as times previously reported for the universal hash-function family MMH.
Patent

Persistent dynamic payment service

TL;DR: In this paper, the authors propose an online authentication method for credit and debit card payments made from consumers to merchants in online transactions, which involves inserting a trusted third party online service into the payment authorization process.
Patent

Method and system for secure guaranteed transactions over a computer network

TL;DR: A trusted third-party authentication protocol that facilitates secure commercial transactions over computer networks between a merchant and a user was proposed in this article. But the method and system of the present invention generally involves three entities: a guarantor, which acts as a trusted arbitrator, a merchant, and a consumer or user.
Patent

Bilateral authentication and encryption system

TL;DR: In this article, a bilateral system for authenticating remote transceiving stations through use of station identifiers (IDs), and through the use of passwords which are used only one time, and thereafter exchanging messages through using an encryption key which is changed after each system connection.
Patent

Method of and system for authorizing purchases made over a computer network

TL;DR: In this paper, a method of and system for authorizing purchases made over a computer network is provided, where a consumer (12) electronically transmits an ATM card number over the network (24) to an on-line merchant (16) from which the consumer desires to make a purchase.