Systems And Methods For First And Second Party Authentication

  • Published: Jan 22, 2009
  • Earliest Priority: Jul 17 2007
  • Family: 3
  • Cited Works: 0
  • Cited by: 8
  • Cites: 14
  • Additional Info: Full text

First and second parties may be authenticated. After generating a challenge to the first party, two responses are received via the first party based on the challenge and two different keys. Two responses are also generated, and compared against the received responses. If the respective responses are verified, a confirmation is generated.

Download PDF
Document Preview
Document History
  • Publication: Jan 22, 2009
  • Application: Jul 17, 2007
    US US 77906007 A
  • Priority: Jul 17, 2007
    US US 77906007 A

Download Citation

Sign in to the Lens