Authentication method and framework

A. McDiarmid (Inventor), J. Irvine (Inventor), ITI Scotland Ltd (Inventor), ITI Scotland Ltd (Patent applicant) (Inventor)

Research output: Patent

Abstract

Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.
Original languageEnglish
Patent numberWO/2009/044174
Publication statusPublished - 9 Apr 2009

    Fingerprint

Keywords

  • authentication requests
  • transmittion
  • devices
  • peer device
  • authentication credential

Cite this

McDiarmid, A., Irvine, J., ITI Scotland Ltd, & ITI Scotland Ltd (Patent applicant) (2009). Authentication method and framework. (Patent No. WO/2009/044174).