Robshaw
Matt Robshaw, Paris FR
Patent application number | Description | Published |
---|---|---|
20090022310 | CRYPTOGRAPHIC DEVICE AND METHOD FOR GENERATING PSEUDO-RANDOM NUMBERS - A cryptographic device and a cryptographic method of generating pseudo-random numbers. Initial data is divided into a plurality of words on b bits defined in a finite body GF(2 | 01-22-2009 |
20090067620 | Cryptographic Hashing Device and Method - A device and a method of cryptographically hashing a message M, including the following steps: forming a sequence (M | 03-12-2009 |
Matt Robshaw, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20160034728 | RFID TAG AND READER CHARACTERISTIC DETERMINATION USING GROUP KEYS - An RFID tag possesses a group key issued by an authorized entity. When a reader requests some information from the tag, such as an identifier, the tag transmits a random number to the reader. The tag then determines one or more reader characteristics based on a response received from the reader. In one embodiment, the tag generates a verification value based on the random number and the group key and compares the verification value to the received response. If the comparison succeeds, the tag may treat the reader as possessing particular functionality, authorized to implement a particular feature, and/or authorized to receive information from the tag. If the comparison fails, the tag may treat the reader as lacking particular functionality, not authorized to implement a particular feature, and/or not authorized to receive information from the tag. The tag may request additional response(s) from the reader before determining the reader characteristic(s). | 02-04-2016 |
Matthew Robshaw, Paris FR
Patent application number | Description | Published |
---|---|---|
20100161988 | METHOD OF AUTHENTICATING AN ENTITY BY A VERIFICATION ENTITY - A method of authenticating an entity by a verification entity, said entities sharing a pair of secret keys X and Y. According to the invention said secret keys X and Y are n×m (n, m>1) binary matrices, said method comprising steps repeated r times (r≧1) of: | 06-24-2010 |
20100185851 | EFFICIENT AND SECURE CRYPTOGRAPHIC COUPON RELOADING - A system and a method for cryptographic coupon reloading are provided for, wherein a coupon comprises, on one hand, a pseudo-random number r | 07-22-2010 |
20100228986 | AUTHENTICATION SYSTEM AND METHOD USING ELECTRONIC TAGS - An authentication method of a prover device by a verifier device by means of cryptographic coupons is provided for, wherein a coupon comprises, on one hand, a pseudo-random number r | 09-09-2010 |
Matthew Robshaw, Herblay FR
Patent application number | Description | Published |
---|---|---|
20110249815 | METHOD OF IMPLEMENTING A BLOCK CIPHER ALGORITHM - A method is provided of implementing a block cipher algorithm by a device storing a fixed initialization datum, comprising, before execution of a first iteration of the algorithm in the course of a session, a step of determining a modified initialization datum by way of a determined function supplied as input with the fixed initialization datum and a state value specific to the session, the state value being stored in the device, said modified initialization datum being usable to implement the first iteration of the algorithm. | 10-13-2011 |
20120200386 | METHOD OF MUTUALLY AUTHENTICATING A READER AND A RADIO TAG - A method and apparatus are provided for mutually authenticating a reader and a radio tag. The method includes: a step of the tag sending data to the reader, the data enabling an index to be determined for identifying an authentication coupon of the reader, the index being selected by the tag; a step of the reader obtaining the coupon from the determined index and of the reader sending the coupon to the tag; a step of the tag obtaining an authentication value from the selected index and of the tag verifying that the coupon received from the reader corresponds to the authentication value that is obtained, if the verification is positive, then a step of finalizing the authentication of the tag by the reader; and if the verification is negative, interrupting the mutual authentication method. | 08-09-2012 |
20130043982 | METHOD OF IDENTIFYING AND AUTHENTICATING A RADIO TAG BY A READER - A method and apparatus are provided for identifying and authenticating a radio tag by a radio reader. The tag forms part of a set of tags in a radio range of the reader and has selected a time slot from a set of available time slots. The method includes: a step of the reader sending a query message during the selected time slot; and a step of the reader receiving a reply message from the tag that selected the time slot. The reply message includes a random value selected by the tag. The tag stores authentication coupons and the reply from the tag received by the reader during the time slot contains, as a random value selected by the tag, a value that is a function of one of the coupons. | 02-21-2013 |
Matthew Robshaw, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20140057601 | METHOD OF AUTHENTICATING A FIRST AND A SECOND ENTITY AT A THIRD ENTITY - A method is provided for authenticating a first entity and a second entity at a third entity. The first and third entities share a first secret key, and the second and third entities share a second secret key. The method includes steps of: dispatching by the third entity to the first entity of a challenge, calculation by the first entity, using the first secret key, of an authentication value; dispatching by the first entity to the second entity the authentication value, calculation by the second entity, using the second secret key, of an authentication response; dispatching by the second entity to the third entity of the authentication response; calculation by the third entity of an expected authentication response; and comparison of the authentication response received with the expected calculated authentication response. | 02-27-2014 |
20140368312 | Authentication method between a reader and a radio tag - A method for authenticating a reader to a radio tag includes the following steps, which are implemented by the tag: receiving a piece of information ciphered by a reversible operation, which is parameterized by an authentication coupon for the reader, and a data item allowing determination of an index for identifying the authentication coupon of the reader; calculating a current authentication coupon for the reader as a function of the index; deciphering the received piece of information ciphered by the reversible operation, which is parameterized by the calculated current authentication coupon; and checking the deciphered piece of information that is intended to verify that the calculated current coupon corresponds to the authentication coupon used by the reader in order to parameterize the reversible operation. | 12-18-2014 |