TY - PAT
T1 - Authentication method and framework
AU - McDiarmid, A.
AU - Irvine, J.
AU - ITI Scotland Ltd
AU - ITI Scotland Ltd (Patent applicant)
PY - 2009/4/9
Y1 - 2009/4/9
N2 - Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.
AB - Authentication in an ad-hoc network is established between a first device (for example a service-requesting device) and a second device (for example a service-providing device) using a third device (a peer device). An authentication request is transmitted from the first device to the second device. The second device transmits a query message to at least one third device (i.e. peer device). If the peer device has previously been authenticated with the first device, the peer device sends an authentication credential, for example an authentication key, to the first and second devices. Upon receiving the authentication credential, the first device sends the authentication credential to the second device. The second device then compares the authentication credential received from the first device with the authentication credential received from the third device, and authenticates the first device with the second device if the authentication credentials match. Preferably the authentication credential from the third (peer) device to the first device is encrypted.
KW - authentication requests
KW - transmittion
KW - devices
KW - peer device
KW - authentication credential
UR - http://www.wipo.int/pctdb/en/wo.jsp?WO=2009044174&IA=GB2008003383&DISPLAY=STATUS
M3 - Patent
M1 - WO/2009/044174
ER -