Abstract: First and second parties may be authenticated. After generating a challenge to the first party, two responses are received via the first party based on the challenge and two different keys. Two responses are also generated, and compared against the received responses. If the respective responses are verified, a confirmation is generated.
Type:
Application
Filed:
July 17, 2007
Publication date:
January 22, 2009
Applicant:
PROTECTIA CORPORATION
Inventors:
Igal Roytblat, Avraham Elarar, Moshe Ben-Shlomo