TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS

Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second mod...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SOULAMI, TARIK, PERLMAN, BRIAN, ZAGORSKI, MARK, HSU, WEN-PIN, SCOTT, ZHANG, MARK
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SOULAMI, TARIK
PERLMAN, BRIAN
ZAGORSKI, MARK
HSU, WEN-PIN, SCOTT
ZHANG, MARK
description Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP2291787B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP2291787B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP2291787B13</originalsourceid><addsrcrecordid>eNrjZHALcXX28PMMDHUNVnDzD1Jw9QsODfL0c1dwDA3xcPUL8XR2DPH091Nw9HNR8PQLcXUP8gyJVPB3U3D29_UN9YNKB_MwsKYl5hSn8kJpbgYFN9cQZw_d1IL8-NTigsTk1LzUknjXACMjS0NzC3MnQ2MilAAAlUsseg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS</title><source>esp@cenet</source><creator>SOULAMI, TARIK ; PERLMAN, BRIAN ; ZAGORSKI, MARK ; HSU, WEN-PIN, SCOTT ; ZHANG, MARK</creator><creatorcontrib>SOULAMI, TARIK ; PERLMAN, BRIAN ; ZAGORSKI, MARK ; HSU, WEN-PIN, SCOTT ; ZHANG, MARK</creatorcontrib><description>Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TELEPHONIC COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2016</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160921&amp;DB=EPODOC&amp;CC=EP&amp;NR=2291787B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20160921&amp;DB=EPODOC&amp;CC=EP&amp;NR=2291787B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SOULAMI, TARIK</creatorcontrib><creatorcontrib>PERLMAN, BRIAN</creatorcontrib><creatorcontrib>ZAGORSKI, MARK</creatorcontrib><creatorcontrib>HSU, WEN-PIN, SCOTT</creatorcontrib><creatorcontrib>ZHANG, MARK</creatorcontrib><title>TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS</title><description>Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TELEPHONIC COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2016</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHALcXX28PMMDHUNVnDzD1Jw9QsODfL0c1dwDA3xcPUL8XR2DPH091Nw9HNR8PQLcXUP8gyJVPB3U3D29_UN9YNKB_MwsKYl5hSn8kJpbgYFN9cQZw_d1IL8-NTigsTk1LzUknjXACMjS0NzC3MnQ2MilAAAlUsseg</recordid><startdate>20160921</startdate><enddate>20160921</enddate><creator>SOULAMI, TARIK</creator><creator>PERLMAN, BRIAN</creator><creator>ZAGORSKI, MARK</creator><creator>HSU, WEN-PIN, SCOTT</creator><creator>ZHANG, MARK</creator><scope>EVB</scope></search><sort><creationdate>20160921</creationdate><title>TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS</title><author>SOULAMI, TARIK ; PERLMAN, BRIAN ; ZAGORSKI, MARK ; HSU, WEN-PIN, SCOTT ; ZHANG, MARK</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP2291787B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2016</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TELEPHONIC COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>SOULAMI, TARIK</creatorcontrib><creatorcontrib>PERLMAN, BRIAN</creatorcontrib><creatorcontrib>ZAGORSKI, MARK</creatorcontrib><creatorcontrib>HSU, WEN-PIN, SCOTT</creatorcontrib><creatorcontrib>ZHANG, MARK</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SOULAMI, TARIK</au><au>PERLMAN, BRIAN</au><au>ZAGORSKI, MARK</au><au>HSU, WEN-PIN, SCOTT</au><au>ZHANG, MARK</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS</title><date>2016-09-21</date><risdate>2016</risdate><abstract>Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP2291787B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TELEPHONIC COMMUNICATION
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title TECHNIQUES FOR ENSURING AUTHENTICATION AND INTEGRITY OF COMMUNICATIONS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T08%3A53%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SOULAMI,%20TARIK&rft.date=2016-09-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP2291787B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true