Two-user authentication

作者: Teemu Ilmari Savolainen , Markus Isomäki , Istvan Beszteri , Jyri Hämäläinen

DOI:

关键词:

摘要: The invention relates to two-user authentication. According an example aspect of the present invention, there is provided apparatus comprising at least one processing core, memory including computer program code, and code being configured to, with cause receive from a first device digital key, second encrypted data item, decrypt item using key obtain decrypted verify matches reference responsive matching grant access device.

参考文章(14)
Edward J. Gaudet, David M. T. Ting, Quorum-based secure authentication ,(2013)
Ying Qiu, Joonsang Baek, Han Chiang Tan, Jianying Zhou, Authentication and key establishment in wireless sensor networks ,(2009)
Babak Sadighi, Ludwig Seitz, Ling Cao, Access control system and method for operating said system ,(2007)
Yuji Nagai, Toshihiro Suzuki, Taku Kato, Tatsuyuki Matsushita, Noboru Shibata, Device and authentication method therefor ,(2013)
Jun-bum Shin, Yang-lim Choi, Method of sharing bus key and apparatus therefor ,(2007)
Mark S. O'Hare, Don Martin, Rick L. Orsini, Secure file sharing method and system ,(2012)
Sarah Glickfield, Isaac David Guedalia, Ravinder Paul Chandhok, Peer based authentication ,(2014)