Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System, method and computer program product for authenticating a data agreement between network entities

A technology of computer programs and network entities, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve problems such as errors and difficult strings

Active Publication Date: 2008-09-24
NOKIA TECH OY
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such long strings are difficult to compare and, undesirably, have a higher chance of error

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, method and computer program product for authenticating a data agreement between network entities
  • System, method and computer program product for authenticating a data agreement between network entities
  • System, method and computer program product for authenticating a data agreement between network entities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Hereinafter, the present invention will be described more fully with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. However, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will convey knowledge to those skilled in the art. personnel to fully convey the scope of the invention. Like numbers refer to like elements throughout.

[0026] refer to figure 1 , which provides a description of one type of terminal and system that would benefit from the present invention. The systems, methods and computer program products of embodiments of the present invention will primarily be described in conjunction with mobile communication applications. It should be understood, however, that the systems, methods, and computer program products of embodiments of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for authenticating a data agreement between first and second network entities can include the first network entity committing to the agreed data value, and transmitting the committed data value and a first random value to the second network entity. The first network entity can receive a second random value, and can then open the committed data value such that the second network entity can check the committed data value. If successful, the second network entity can calculate a third check string, and the first network entity can similarly calculate a fourth check string, based upon the data value and the first and second random values. The first network entity can calculate the fourth check string without the second network entity committing to the data value. The method can then include comparing the check strings such that the agreed data can be considered authenticated based upon the comparison.

Description

technical field [0001] The present invention relates generally to systems and methods for authenticating data negotiation between network entities, and more particularly to a system for authenticating key agreement between network entities during connection establishment between the network entities and methods. Background technique [0002] In this specification, the concept of a short-range wireless data transfer connection mainly relates to a connection in which two or more devices or entities arranged relatively close to each other can communicate with each other wirelessly. In this communication, for example, wireless communication, infrared communication, inductive communication, etc. can be applied. For example, Bluetooth (Bluetooth) using a low-power wireless transmitter and wireless receiver has been developed for short-range wireless communication. TM )technology. Such devices can communicate with each other and thereby form an ad-hoc network. For example, peri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/40
CPCH04L2209/80H04L9/0844H04L63/08H04L63/0428H04L63/18H04L9/08H04L9/32
Inventor N·阿索坎K·纽伯格
Owner NOKIA TECH OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products