Authentication apparatus and method for universal appliance communication controller
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-009/00
출원번호
UP-0244643
(2002-09-16)
등록번호
US-7594114
(2009-10-20)
발명자
/ 주소
Hooker, John Kenneth
Larouche, Eric
출원인 / 주소
General Electric Company
대리인 / 주소
Rideout, Esq., George L.
인용정보
피인용 횟수 :
6인용 특허 :
20
초록▼
An authentication algorithm and apparatus for communication between a first device and a second device over a network carrier is provided. The algorithm includes encoding, in response to a message from the second device, a first authentication value upon receipt of the message; sending the encoded v
An authentication algorithm and apparatus for communication between a first device and a second device over a network carrier is provided. The algorithm includes encoding, in response to a message from the second device, a first authentication value upon receipt of the message; sending the encoded value to the second device; decoding, in response to a reply from the second device, a second authentication value upon receipt of the reply; and comparing the first and second authentication values to determine the authenticity of the reply.
대표청구항▼
What is claimed is: 1. An authentication method for communication between a first device and a second device over a network carrier, said authentication method comprising: determining whether a message from the second device is in a proper format for authentication; encoding, in response to the mes
What is claimed is: 1. An authentication method for communication between a first device and a second device over a network carrier, said authentication method comprising: determining whether a message from the second device is in a proper format for authentication; encoding, in response to the message from the second device, a first authentication value upon receipt of the message, the first authentication value encoded with a first encryption key; calculating a first cyclic redundancy check value of the message upon receipt of the message; sending the encoded first authentication value to the second device; decoding, in response to a reply from the second device, a second authentication value upon receipt of the reply if the reply is received within a predetermined time after sending the encoded first authentication value, the second authentication value decoded with a second encryption key; comparing the first and second authentication values to determine the authenticity of the reply; extracting a second cyclic redundancy check value from the reply; and comparing the second cyclic redundancy check value from the reply against the first cyclic redundancy check value of the message. 2. An authentication method in accordance with claim 1 further comprising randomly generating the first authentication value. 3. An authentication method for an appliance communication controller in communication with an external host controller, said authentication method comprising: determining whether a first message from the external host controller is in a proper format for authentication; encoding a first authentication counter value upon receipt of the first message from the external host controller, the first authentication counter value encoded with a first encryption key; calculating a first cyclic redundancy check value of the first message upon receipt of the first message; sending the encoded first authentication counter value to the external host controller; decoding a second authentication counter value upon receipt of a second message from the external host controller, the second authentication counter value decoded with a second encryption key; sending an authentication timeout message if the second message is not received within a predetermined time; comparing the first and second authentication counter values; ignoring the first message if the first and second authentication counter values do not match; extracting a second cyclic redundancy check value from the second message; comparing the cyclic redundancy check value from the second message against the first cyclic redundancy check value of the first message; and responding to the first message if the cyclic redundancy check value matches the stored cyclic redundancy check value. 4. An authentication method in accordance with claim 3 further comprising incrementing the first authentication counter value before encoding the first authentication counter value. 5. An authentication method in accordance with claim 3 further comprising sending an authentication failure message if the first and second authentication counter values do not match. 6. An authentication method in accordance with claim 5 further comprising: starting an authentication timer; and if the first and second authentication counter values do not match before the expiration of the authentication timer, sending an authentication failure message. 7. An authentication method for an appliance communication controller in communication with an external host controller through a network carrier, said authentication method comprising: determining whether a first message from the external host controller is in a proper format for authentication; maintaining an authentication counter value; calculating a first cyclic redundancy check value of the first message upon receipt of the first message from the external host controller; incrementing the authentication counter value in response to the first message from the external host controller; encoding the incremented authentication counter value with a first encryption key upon receipt of the first message from the external host controller; sending the encoded authentication counter value to the external host controller; decoding, with a second encryption key, a reply authentication counter value from the external host controller in response to the sent encoded authentication counter value if the reply authentication counter value is received within a predetermined time period; comparing the incremented and reply authentication counter values; ignoring the first message if the incremented and reply authentication counter values do not match; extracting a second cyclic redundancy check value from the reply authentication counter value; comparing the second cyclic redundancy check value from the reply authentication counter against the first cyclic redundancy check value of the first message; and responding to the first message if the second cyclic redundancy check value matches the first cyclic redundancy check value. 8. An authentication method in accordance with claim 7 further comprising sending an authentication time out message to the external host controller if the reply authentication counter value is not received within the predetermined time period. 9. A controller comprising: a processor; a memory; and a power line carrier transceiver operatively coupled to said processor, said processor programmed to determine whether a first message received by said power line carrier is in a proper format for authentication and execute a two-way authentication algorithm utilizing at least a first encryption key, a second encryption key, a first cyclic redundancy check value calculated from the first message, and a second cyclic redundancy check value extracted from a second message, to determine authenticity of messages received by said power line carrier transceiver, encode an authentication value and generate an authentication request, decode an authentication value from an authentication reply with said second encryption key, and generate an authentication timeout if the authentication reply is not received within a predetermined time. 10. A controller in accordance with claim 9 wherein said processor is programmed to: compare the encoded authentication value with the decoded authentication value; and respond to the authentication reply if the encoded authentication value matches the decoded authentication value. 11. An appliance communication controller comprising: a processor; a memory; and a transceiver operatively coupled to said processor, said processor configured to: determine whether an incoming message is in a proper format for authentication; generate an authentication request in response to the incoming message through said transceiver and calculate a first cyclic redundancy check value of the incoming message, the authentication request comprising a first encoded authentication value encoded with a first encryption key; receive an authentication reply within a predetermined time period after generating the authentication request; decode the authentication reply received in response to the authentication request, the authentication reply comprising a second encoded authentication value decoded by an external controller with a second encryption key; and based upon the decoded reply, respond to or ignore the incoming message, said processor configured to extract a second cyclic redundancy check value from the authentication reply. 12. An appliance communication controller comprising: a processor; a memory; and a power line carrier transceiver operatively coupled to said processor, said processor configured to: determine whether an incoming message is in a proper format for authentication; generate an authentication request in response to the incoming message through said power line carrier transceiver and calculate a first cyclic redundancy check value of the incoming message, said authentication request comprising a first encoded authentication counter value encoded with a first encryption key; decode an authentication reply with a second encryption key, when said authentication reply is received within a predetermined time period, said authentication reply comprising a second encoded authentication counter value; compare the first authentication counter value with the second authentication counter value; extract a second cyclic redundancy check value from said authentication replay; compare the second cyclic redundancy check value from said authentication reply against the first cyclic redundancy check value of the incoming message; and respond to the incoming message if said second cyclic redundancy check value from said authentication reply matches said first cyclic redundancy check value from the incoming message. 13. An appliance communication controller in accordance with claim 11 wherein said processor is configured to accept the authentication reply only within the predetermined time period after generating the authentication request.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (20)
Steven M. Blumenau ; Yoav Raz, Authentication of a host processor requesting service in a data processing network.
Evanyk Walter R. (Plano TX) Beber Michael H. (Allen TX) Donaldson Joel R. (Laredo TX) Larsen J.Orville (Plano TX) Adams David G. (Plano TX) Douglas Michael W. (Garland TX), Communications system for use in a hotel/motel.
Tatebayashi Makoto,JPX ; Matsuzaki Natsume,JPX ; Fukushima Yoshihisa,JPX ; Hirayama Koichi,JPX ; Ishihara Atsushi,JPX, Device authentication system which allows the authentication function to be changed.
Venkatraman Chandrasekar ; Morgan Jeffrey A., Embedding web access mechanism in an appliance for user interface functions including a web server and web browser.
Owens Leslie D. (Westford MA) Jueneman Robert R. (Acton MA) Worrest Ralph (Hudson MA) Davis Alvah B. (Atlanta GA), Method and apparatus for entity authentication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.