Authentication method and framework

A. McDiarmid (Inventor), J. Irvine (Inventor), ITI Scotland Ltd (Inventor), ITI Scotland Ltd (Patent applicant) (Inventor)

Research output: Patent

Abstract

Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.
LanguageEnglish
Patent numberWO/2009/044174
Publication statusPublished - 9 Apr 2009

Fingerprint

messages

Keywords

  • authentication requests
  • transmittion
  • devices
  • peer device
  • authentication credential

Cite this

McDiarmid, A., Irvine, J., ITI Scotland Ltd, & ITI Scotland Ltd (Patent applicant) (2009). Authentication method and framework. (Patent No. WO/2009/044174).
McDiarmid, A. (Inventor) ; Irvine, J. (Inventor) ; ITI Scotland Ltd (Inventor) ; ITI Scotland Ltd (Patent applicant) (Inventor). / Authentication method and framework. Patent No.: WO/2009/044174.
@misc{576083f8c27641adaa22517e85b6b44c,
title = "Authentication method and framework",
abstract = "Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.",
keywords = "authentication requests, transmittion, devices, peer device, authentication credential",
author = "A. McDiarmid and J. Irvine and {ITI Scotland Ltd} and {ITI Scotland Ltd (Patent applicant)}",
year = "2009",
month = "4",
day = "9",
language = "English",
type = "Patent",
note = "WO/2009/044174",

}

McDiarmid, A, Irvine, J, ITI Scotland Ltd & ITI Scotland Ltd (Patent applicant) 2009, Authentication method and framework, Patent No. WO/2009/044174.

Authentication method and framework. / McDiarmid, A. (Inventor); Irvine, J. (Inventor); ITI Scotland Ltd (Inventor); ITI Scotland Ltd (Patent applicant) (Inventor).

Patent No.: WO/2009/044174.

Research output: Patent

TY - PAT

T1 - Authentication method and framework

AU - McDiarmid, A.

AU - Irvine, J.

AU - ITI Scotland Ltd

AU - ITI Scotland Ltd (Patent applicant)

PY - 2009/4/9

Y1 - 2009/4/9

N2 - Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.

AB - Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.

KW - authentication requests

KW - transmittion

KW - devices

KW - peer device

KW - authentication credential

UR - http://www.wipo.int/pctdb/en/wo.jsp?WO=2009044174&IA=GB2008003383&DISPLAY=STATUS

M3 - Patent

M1 - WO/2009/044174

ER -

McDiarmid A, Irvine J, ITI Scotland Ltd, ITI Scotland Ltd (Patent applicant), inventors. Authentication method and framework. WO/2009/044174. 2009 Apr 9.