Authentication and Key Agreement Phase Sample Clauses

Authentication and Key Agreement Phase. When the user U wants to access the sensor node S, he or she initiates this phase by issuing a request via GWN. This phase enables GWN, U and S to effectively authenticate each other and then establish a session key between U and S. If a session key is negotiated successfully by U and S, then they can exchange private messages with each other via a public channel. A detailed description of the steps of this phase are as follows: 1. U selects a random number rU ∈ zq∗ , generates the current timestamp t1 and computes EU = rU P, M′ = M∗ ⊕ h (IDU dU), NU = rUQGWN = (N(x), N(y)), AIDU = MIDU ⊕ N(y), KU = (rU + dU)QGWN and hU = H1(KU M′ t1). Then, U sends the request message {EU, AIDU, hU, t1} via a public channel to GWN. 2. When GWN receives the authentication request message from U at the time t′ , it checks whether the condition |t′ − t1| ≤ ∆t holds. If yes, GWN then computes: N′ = dGWN EU = (N(x)′ , N(y)′ ). GWN then verifies U by computing the following: MID′ = AIDU ⊕ N(y)′ , MU = h(MID′ dGWN), K′ = dGWN(QU + EU), and h′ = H1 K′ MU t1 . GWN verifies if the equation ′ = hU holds or not. If the verification does not hold, GWN rejects the user’s authentication request; else, goes to 3. 3. GWN generates its current timestamp t2, selects a random number rGWN ∈ z∗q and calculates: EGWN = rGWNP, KGWN = (rGWN + dGWN )QS, MGWN = N(x)′ ⊕ h (RS KGWN EGWN ), hGWN = H1 (KGWN IDS t2). Then, the gateway node GWN sends the message {EU, EGWN, MGWN, hGWN, t2, t1} to S via a public channel. 4. Upon receiving the authentication message from GWN at time t′ , S first checks the validity of the timestamp on the condition |t′ − t2| ≤ ∆t. If t2 is invalid, S terminates the session. If it is valid, S then computes: K′ = dS (EGWN + QGWN ), N(x)′′ = MGWN ⊕ h RS K′ EGWN , and h′ = H1 K′ IDS t2 . Next, S verifies h′ . If h′ = hGWN, the sensor node S accepts XXX and goes to 5; otherwise, it rejects GWN. 5. S generates its current timestamp t3 and selects a random number rS ∈ z∗q , and computes ES = rS P, KS = rS (RS − h(IDS dS)P), hS = H1 (KS IDS t3), skS = rS(EU + N(x)′′ P) and AuthS = H1(skS t3). S sends the message {ES, t3, hS, AuthS} to GWN via a public channel. Then, S computes the session key SK = H2(skS ES EU t3 t1). 6. Upon receiving the replied message from S at time t′ , GWN checks the validity of t3 on the condition |t′ − t3| ≤ ∆t. If t3 is valid, GWN computes K′ = h (IDS dGWN) ES and ′ = H1 K′ IDS t3 . Then, GWN checks whether h′ = hS. If yes, GWN generates its current timest...
AutoNDA by SimpleDocs
Authentication and Key Agreement Phase. After completing this phase, the user Ui and the server S can achieve the goal of mutual authentication and session key agreement which can be used for secure subsequent communication without revealing user’s identity. The authentication and key exchange phase is depicted in FIGURE 4. Step 1. The user Ui inserts his smart card into a card reader and inputs IDi and pwi; Step 2. The smart card selects a random number r′i∈RZn∗ and computes R′i = r′i × G, Ai = ri′ × Rs × h(IDi ⊕ pwi ⊕ ri). Then sends ⟨Ri′, Ai, Mi⟩ to the server S.
Authentication and Key Agreement Phase. Step 1: GWN checks the validity of Ti and retrieves HIDi from TIDi. Then, GWN computes XSi = h(HIDi||K), ki = h(XSi ||Ti), X∗ = DIDi ⊕ ki, MU∗ i ,G = h((X∗ ⊕ HIDi)||XSi ||Ti), = then checks MU∗ ,G ? MU ,G. If it is correct, GWN computes XS = h(SIDj||K), MG,Sj = h(DIDi||SIDj||XSj ||TG), then sends {DIDi, MG,Sj , TG} to Sj, where TG is the timestamp. ? Step 2: Sj checks the validity of TG and computes MG∗ ,Sj = h(DIDi||SIDj||XS∗j ||TG), then checks MG∗ ,S MG,S . If it is successful, Sj computes kj = h(XS ||Tj), Zi = MG∗ ,S ⊕ kj, = KS = f (XXXx, kj), MSj ,G = h(Zi||XS∗j ||Tj), then sends {MSj ,G , Tj} to GWN, where Tj is the timestamp. Step 3: GWN checks the validity of Tj and computes kj = h(XSj ||Tj), Zi∗ = MG∗ ,Sj ⊕ kj, = MS∗ ,G = h(Zi||XS∗ ||Tj), then checks MS∗ ,G ? MS ,G. If it is correct, GWN computes MG,Ui = h(DIDi||MU∗ i ,G||kj||XXi ||TG′ ), yi = kj ⊕ h(ki), TIDinew = h(HIDi||Ti), then sends {yi, MG,Ui , TG′ }, where TG′ (TIDinew , TIDi). is the timestamp. Additionally, GWN updates (TIDi, TID◦ ) as Step 4: Ui checks the validity of TG′ and computes kj = yi ⊕ h(ki), = MG∗ ,U = h(DIDi||MU ,G||kj||XS ||TG′ ), then checks MG∗ ,U ? MG,U If it is correct, Ui computes KS = f (XXXx, kj) and updates TIDi as h(HIDi||Ti).
Authentication and Key Agreement Phase. In this phase, Ui and Sj authenticate each other and generate a common session key SK by the help of GWN. The trusted party GWN is interconnected with Ui and Sj, respectively, and helps to establish a session key between Ui and Sj; however, GWN is not able to derive the session key. Figure 3 illustrates the authentication and key agreement phase, which is performed as follows: Step 1: GWN ⇒ Sj : {DIDi, Xi, MG,Sj , TG} After receiving {XXXx, Xi, MUi ,G , Ti, TIDi}, GWN checks the validity of Ti and retrieves HIDi from TIDi. If no TIDi is found, GWN checks TIDi◦. If it still is not found, GWN rejects the login request; otherwise, GWN computes XSi = h(HIDi||K) and ki = h(XSi ||Ti). Then, = GWN verifies MU ,G ? h((DIDi ⊕ ki ⊕ HIDi)||XS ||Xi||Ti). If it is valid, GWN authenticates Ui and computes MG,Sj = h(DIDi||SIDj||XSj ||Xi||TG), then sends {XXXx, Xi, MG,Sj , TG} to Sj, where TG is the current timestamp. Step 2: Sj ⇒ GWN : {MSj ,G , Yj, Tj} After receiving {XXXx, Xi, MG,Sj , TG}, Sj checks the validity of TG and verifies MG,S ? h(DIDi||Xi||XS∗j ||TG) using its stored secret value XS∗j = h(SIDj||K). If it is valid, Sj authenticates GWN and computes kj = h(XS∗j ||Tj), Zi = MG,Sj ⊕ kj, where Tj is the current timestamp. Then, Sj generates a random number b ∈ Z∗p and computes Yj = bP and a session key SK = kji = h(DIDi||kj||bXi). Finally, Sj computes (MSj ,G = h(Zi||XS∗j ||Xi||Yj||Tj)) and sends {MSj ,G , Yj, Tj} to GWN. Step 3: GWN ⇒ Ui : {ei, MG,Ui , Yi, TG′ } ? After receiving {MSj ,G , Xx, Xx}, GWN checks the validity of Tj, computes kj = h(XSj ||Tj), Zi∗ = MG∗ ,S ⊕ kj and verifies MS ,G h(Zi∗ ||XS ||Xi||Yj||Tj). If it is valid, GWN = authenticates Sj and computes ei = kj ⊕ h(ki), (MG,Ui = h(DIDi||MUi ,G||kj||XSi ||Xi||Yj||TG′ )), TIDinew = h(HIDi||Ti), where TG′ is the current timestamp. Then, GWN sends {ei, MG,Ui , Yi, TG′ } to Ui and updates (TIDi, TIDi◦ ) as (TIDinew , TIDi) in its storage. ? Step 4: After receiving {ei, MG,Ui , Yi, TG′ }, Ui checks the validity of TG′ , computes k∗j = ei ⊕ h(k∗i ) and verifies MG,U h(DIDi||MU ,G||k∗j ||XS ||Xi||Yj||TG′ ). If it is valid, Ui computes the session key SK = kij = h(DIDi||kj||aYi). Finally, Ui updates TIDi as h(HIDi||Ti).
Authentication and Key Agreement Phase. This phase is established between 𝐷𝑖 and 𝐷𝑗 and shown in Fig. 1. Fig. 1. Authentication process in Xxxxxxxxx et al.’s protocol 𝑝 𝑖 Step 1. 𝐷𝑖 chooses a random number 𝑥 ∈ 𝑍∗ and calculates values of 𝜏 = 𝑥𝐺 and 𝛼 = 𝑥𝑄 where 𝑄 is the public 𝑖 𝑗 𝑗 key of 𝐷𝑗 . Then, it calculates pseudo-ID 𝐴𝐼𝐷𝑖 = 𝛼𝑖⨁𝐼𝐷𝑖 and calculates 𝑍𝑖 as 𝑍𝑖 = ℎ(𝛼�� ∥ 𝜏𝑖 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝑡1) where 𝑡1 is the current timestamp of the message. Finally, the message < 𝐴𝐼𝐷𝑖 , 𝜏𝑖 , 𝑍𝑖 , 𝑡1 > is sent to 𝐷𝑗 . Step 2. 𝐷𝑗 receives the message < 𝐴𝐼𝐷𝑖 , 𝜏𝑖 , 𝑍𝑖 , 𝑡1 > at time 𝑡′. If 𝑡′ − 𝑡1 < Δ𝑇, it verifies the freshness of the message. Then, it calculates 𝛼𝑖 = 𝑑𝑗 𝜏𝑖 and retrieves 𝐼𝐷𝑖 = 𝐴𝐼𝐷𝑖 ⨁𝛼𝑖. After that, it checks whether or not 𝑍𝑖 = ? ℎ(𝛼𝑖 ∥ 𝜏𝑖 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝑡1) and verifies 𝐷𝑖 . Otherwise, it immediately aborts the session. 𝐷𝑗 then, picks the random nonce 𝑦 ∈ 𝑍∗ and timestamp 𝑡 and calculates the values of 𝜏 = 𝑦𝐺, 𝐾 = 𝑦𝑄 + 𝑑 𝜏 , 𝐴𝐼𝐷 = 𝛼 ⨁𝐼𝐷 , 𝑝 2 𝑖 𝑗 𝑖 𝑗 𝑖 𝑗 and 𝑍𝑗 = ℎ(𝑘𝑗 ∥ 𝛼𝑖 ∥ 𝜏𝑖 ∥ 𝜏𝑗 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝑡2). Finally, it transmits the message < 𝐴𝐼𝐷𝑗 , 𝜏𝑗 , 𝑍𝑗 , 𝑡2 > to 𝐷𝑖 . Step 3. 𝐷𝑖 checks freshness of the received message and retrieves 𝐼𝐷𝑗 = 𝐴𝐼𝐷�� ⨁𝛼𝑖. Then, it calculates 𝐾𝑖 = 𝑥𝑄𝑗 + 𝑑𝑖 𝜏𝑗 and checks if 𝑍𝑗 =? ℎ(𝑘𝑖 ∥ 𝛼𝑖 ∥ 𝜏𝑖 ∥ 𝜏𝑗 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝑡2). If the condition holds, 𝐷𝑗 is verified. 𝐷𝑖 then calculates the session key 𝑆𝐾𝑖 as 𝑆𝐾𝑖 = ℎ(𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝜏𝑖 ∥ 𝜏𝑗 ∥ 𝐾𝑖) and generates message < 𝑅𝑖 > as 𝑅𝑖 = ℎ(𝑆𝐾𝑖 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝐾𝑖) to transmit to 𝐷𝑗 . Step 4. Upon the reception of the message, 𝐷𝑗 calculates session key as 𝑆𝐾𝑗 = ℎ(𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝜏𝑖 ∥ 𝜏𝑗 ∥ 𝐾𝑗 ) and checks whether or not 𝑅𝑖 =? ℎ(𝑆𝐾𝑗 ∥ 𝐼𝐷𝑖 ∥ 𝐼𝐷𝑗 ∥ 𝐾𝑗 ). If not, it immediately terminates the session; otherwise, 𝑆𝐾 = 𝑆𝐾𝑖 = 𝑆𝐾𝑗 is verified.
Authentication and Key Agreement Phase. If the above verification is successful, it indicates that the user Ui has successfully passed the login phase. Then, the vehicle Xx performs an encryption calculation and sends the encrypted request message M1 to the drone Dj. The drone Dj first checks the legitimacy of the timestamp Ti. If it is legal, the drone Dj encrypts the vehicle’s request message M1 into message M2 with its private information and forwards it to the control center (CC) for verification. The CC checks the legitimacy of the drone Dj and helps Dj verify the legitimacy of the vehicle Vi. If both the vehicle Vi and the drone Dj are legitimate, the CC helps the vehicle Vi and the drone Dj to generate the secrets for common verification. After that, the drone Dj and the vehicle Vi complete the authentication with the help of the CC and establish a session key for secure communication. Both the authentication and key agreement phases are briefed in Figure 6. The following steps are critical to completing this phase. 1) The vehicle Vi selects a random number αi, and generates an up-to-date timestamp Ti. To prevent temporary secret (αi) leak attack, the vehicle Vi computes ri = H2(αi si Ti), Ri = ri P , and Ri∗ = riPpub. To ensure security and save computing overhead, the vehicle Vi then computes an en- crypted ciphertext Ci = ER∗ (IDi, DIDj, PIDj, Ti) and a hash signature ρi = H4(DIDj PIDj IDi Ri Ri∗ si Ti), where Ri∗,x denotes the x-coordinate of the elliptic curve point Ri∗. At last, the vehicle Vi sends a request authentication s the legitimacy of the Vi by denying the request mes- sage M1. Otherwise, the CC confirms that the received credentials (IDi, DIDj, PIDj, Ti) are valid, and continues to decrypt [βj Tj] = DH2(sj||ρi||Ti)(Cj). Next, the CC authenticates the drone Dj by checking the hash signature δ =? H (C R ρ DID PID s β T ). If the authen- tication fails, the CC rejects the legitimacy of the Dj by denying the request message M2. Otherwise, the CC confirms that the drone Dj is valid, and generates a hash secret si,j = H6(si Ri∗ Ti Tcc) for the authentication of the Vi and the Dj. Then, the CC calculates an encrypted cipher- text Ci,j = EH2(sj||δj||βj )(XXXx si,j) and a hash signature ψi,j = H5(si,j Ri sj δj Ci,j DIDj Ti Tcc) for the Dj. Finally, the CC transmits the message M3 = Ci,j, ψi,j, Tcc to the Dj. 4) Upon receiving the message M3, the drone Dj first checks the freshness of the timestamp Tcc. If |Tc∗c − Tcc| < ∆T , the Dj acquires [DIDj||sj] = DH2(sj||δj||βj )(Ci,j), then...

Related to Authentication and Key Agreement Phase

  • Authentication of Notes If, at the time the successor by merger or consolidation to the Indenture Trustee succeeds to the trusts created by this Indenture, Notes have been authenticated but not delivered, the successor Indenture Trustee may adopt the certificate of authentication of a predecessor Indenture Trustee and deliver the Notes so authenticated. If at that time any Notes have not been authenticated, the successor Indenture Trustee may authenticate the Notes. In each of those cases, the certificates will have the same force and effect provided in the Notes or in this Indenture as the certificate of the predecessor Indenture Trustee.

  • Authentication Date The Notes of this Series shall be dated the date of their authentication.

  • Authentication of Trust Certificates On the Closing Date, the Owner Trustee shall cause the Trust Certificates to be executed on behalf of the Trust, authenticated and delivered to or upon the written order of the Depositor signed by the Depositor’s president, any vice president, secretary, treasurer or any assistant treasurer, without further company action by the Depositor. No Trust Certificate shall entitle a Certificateholder to any benefit under this Agreement or be valid for any purpose unless there shall appear on such Trust Certificate a certificate of authentication substantially in the form set forth in Exhibit A, executed by the Owner Trustee or the Certificate Registrar, as its authenticating agent, by manual signature; such authentication shall constitute conclusive evidence that such Trust Certificate shall have been duly authenticated and delivered hereunder. All Trust Certificates shall be dated the date of their authentication.

  • Authentication and Delivery The Indenture Trustee will, on Issuer Order, authenticate and deliver the Notes for original issue in the Classes, Note Interest Rates and initial Note Balances as stated below. Class A-1a Notes 2.33% $855,000,000 Class A-1b Notes One-Month LIBOR + 0.45% $145,000,000 Class B Notes 2.40% $69,000,000 Class C Notes 2.60% $53,300,000

  • Authentication and Delivery of Trust Certificates On the Closing Date, the Owner Trustee shall cause to be authenticated and delivered upon the order of the Depositor, in exchange for the Receivables and the other assets of the Issuer, simultaneously with the sale, assignment and transfer to the Issuer of the Receivables, and the constructive delivery to the Issuer of the Receivable Files and the other assets of the Issuer, Trust Certificates duly authenticated by the Owner Trustee, in authorized denominations equaling in the aggregate the Original Certificate Balance and evidencing the entire ownership of the Issuer. No Trust Certificate shall entitle its Certificateholder to any benefit under this Agreement, or be valid for any purpose, unless there shall appear on such Trust Certificate a certificate of authentication substantially in the form set forth in Exhibit A, executed by the Owner Trustee or the Trust’s Authenticating Agent, by manual signature; and such authentication shall constitute conclusive evidence that such Trust Certificate shall have been duly authenticated and delivered hereunder. All Trust Certificates shall be dated the date of their authentication. Upon issuance, authentication and delivery pursuant to the terms hereof, the Trust Certificates will be entitled to the benefits of this Agreement. Whenever, in any Basic Document, a reference is made to authentication by the Owner Trustee, such reference shall include authentication by the Owner Trustee and/or authentication by a party appointed to act as the Authenticating Agent of the Owner Trustee.

  • Execution, Authentication, Delivery and Dating of Rights Certificates (a) The Rights Certificates shall be executed on behalf of the Company by any of its Chairman of the Board, President, Chief Executive Officer and Chief Financial Officer. The signature of any of these officers on the Rights Certificates may be manual or facsimile. Rights Certificates bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices either before or after the countersignature and delivery of such Rights Certificates. (b) Promptly after the Company learns of the Separation Time, the Company will notify the Rights Agent of such Separation Time and will deliver Rights Certificates executed by the Company to the Rights Agent for countersignature, and the Rights Agent shall countersign (manually or by facsimile signature in a manner satisfactory to the Company) and send such Rights Certificates to the holders of the Rights pursuant to Subsection 2.2(c) hereof. No Rights Certificate shall be valid for any purpose until countersigned by the Rights Agent as aforesaid. (c) Each Rights Certificate shall be dated the date of countersignature thereof.

  • Authentication and Delivery of Debt Securities At any time and from time to time after the execution and delivery of this Indenture, the Partnership may deliver Debt Securities of any series executed by the Partnership to the Trustee for authentication, and the Trustee shall thereupon authenticate and deliver said Debt Securities to or upon a Partnership Order. In authenticating such Debt Securities, and accepting the additional responsibilities under this Indenture in relation to such Debt Securities, the Trustee shall be entitled to receive, and (subject to Section 7.01) shall be fully protected in relying upon: (a) a copy of any resolution or resolutions of the Board of Directors, certified by the Secretary or Assistant Secretary of the General Partner, authorizing the terms of issuance of any series of Debt Securities; (b) an executed supplemental Indenture, if any; (c) an Officers’ Certificate; and (d) an Opinion of Counsel prepared in accordance with Section 13.05 which shall also state: (i) that the form of such Debt Securities has been established by or pursuant to a resolution of the Board of Directors or by a supplemental Indenture as permitted by Section 2.01 in conformity with the provisions of this Indenture; (ii) that the terms of such Debt Securities have been established by or pursuant to a resolution of the Board of Directors or by a supplemental Indenture as permitted by Section 2.03 in conformity with the provisions of this Indenture; (iii) that such Debt Securities, when authenticated and delivered by the Trustee and issued by the Partnership in the manner and subject to any conditions specified in such Opinion of Counsel, will constitute valid and legally binding obligations of the Partnership, enforceable in accordance with their terms except as the enforceability thereof may be limited by bankruptcy, insolvency or similar laws affecting the enforcement of creditors’ rights generally and rights of acceleration and the availability of equitable remedies may be limited by equitable principles of general applicability; (iv) that the Partnership has the partnership power to issue such Debt Securities and has duly taken all necessary partnership action with respect to such issuance; (v) that the issuance of such Debt Securities will not contravene the organizational documents of the Partnership or result in any material violation of any of the terms or provisions of any law or regulation or of any material indenture, mortgage or other agreement known to such counsel by which the Partnership is bound; (vi) that authentication and delivery of such Debt Securities and the execution and delivery of any supplemental Indenture will not violate the terms of this Indenture; and (vii) such other matters as the Trustee may reasonably request. Such Opinion of Counsel need express no opinion as to whether a court in the United States would render a money judgment in a currency other than that of the United States. The Trustee shall have the right to decline to authenticate and deliver any Debt Securities under this Section 2.05 if the Trustee, being advised by counsel, determines that such action may not lawfully be taken or if the Trustee in good faith by its board of directors or trustees, executive committee or a trust committee of directors, trustees or officers (or any combination thereof) shall determine that such action would expose the Trustee to personal liability to existing Holders. The Trustee may appoint an authenticating agent reasonably acceptable to the Partnership to authenticate Debt Securities of any series. Unless limited by the terms of such appointment, an authenticating agent may authenticate Debt Securities whenever the Trustee may do so. Each reference in this Indenture to authentication by the Trustee includes authentication by such agent. An authenticating agent has the same rights as any Registrar, paying agent or agent for service of notices and demands. Unless otherwise provided in the form of Debt Security for any series, each Debt Security shall be dated the date of its authentication.

  • Execution, Authentication and Delivery and Dating The Securities shall be executed on behalf of the Company by any Responsible Officer. The signature of any of these officers on the Securities may be manual or facsimile. Securities bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices prior to the authentication and delivery of such Securities or did not hold such offices at the date of such Securities. At any time and from time to time after the execution and delivery of this Indenture, the Company may deliver Securities executed by the Company to the Trustee for authentication; and the Trustee shall, upon Company Order, authenticate and deliver such Securities as in this Indenture provided and not otherwise. Prior to any such authentication and delivery, the Trustee shall be provided with the Officers’ Certificate required to be furnished to the Trustee pursuant to Section 1.02, and the Board Resolution and any certificate relating to the issuance of the series of Securities required to be furnished pursuant to Section 2.02, an Opinion of Counsel substantially to the effect that: (1) all instruments furnished to the Trustee conform to the requirements of the Indenture and constitute sufficient authority hereunder for the Trustee to authenticate and deliver such Securities; (2) the form and terms of such Securities have been established in conformity with the provisions of this Indenture; (3) all laws and requirements with respect to the execution and delivery by the Company of such Securities have been complied with, the Company has the corporate power to issue such Securities and such Securities have been duly authorized and delivered by the Company and, assuming due authentication and delivery by the Trustee, constitute legal, valid and binding obligations of the Company enforceable in accordance with their terms (subject, as to enforcement of remedies, to applicable bankruptcy, reorganization, insolvency, moratorium or other laws and legal principles affecting creditors’ rights generally from time to time in effect and to general equitable principles, whether applied in an action at law or in equity) and entitled to the benefits of this Indenture, equally and ratably with all other Securities, if any, of such series Outstanding; (4) when applicable, the Indenture is qualified under the Trust Indenture Act; and (5) such other matters as the Trustee may reasonably request; and, if the authentication and delivery relates to a new series of Securities created by an indenture supplemental hereto, also stating that all laws and requirements with respect to the form and execution by the Company of the supplemental indenture with respect to that series of Securities have been complied with, the Company has corporate power to execute and deliver any such supplemental indenture and has taken all necessary corporate action for those purposes and any such supplemental indenture has been duly executed and delivered and constitutes the legal, valid and binding obligation of the Company enforceable in accordance with its terms (subject, as to enforcement of remedies, to applicable bankruptcy, reorganization, insolvency, moratorium or other laws and legal principles affecting creditors’ rights generally from time to time in effect and to general equitable principles, whether applied in an action at law or in equity). The Trustee shall not be required to authenticate such Securities if the issue thereof will adversely affect the Trustee’s own rights, duties or immunities under the Securities and this Indenture. Unless otherwise provided in the form of Security for any series, all Securities shall be dated the date of their authentication. No Security shall be entitled to any benefit under this Indenture or be valid or obligatory for any purpose unless there appears on such Security a certificate of authentication substantially in the form provided for herein executed by the Trustee by manual or facsimile signature, and such certificate upon any Security shall be conclusive evidence, and the only evidence, that such Security has been duly authenticated and delivered hereunder. Notwithstanding the foregoing, if any Security shall have been authenticated and delivered hereunder but never issued and sold by the Company, and the Company shall deliver such Security to the Trustee for cancellation as provided in Section 3.09, for all purposes of this Indenture such Security shall be deemed never to have been authenticated and delivered hereunder and shall never be entitled to the benefits of this Indenture.

  • Execution, Authentication and Delivery of Notes The Notes shall be signed in the name and on behalf of the Company by the manual or facsimile signature of any of its Chief Executive Officer, President, Chief Financial Officer, Treasurer, Secretary or any of its Executive or Senior Vice Presidents. At any time and from time to time after the execution and delivery of this Indenture, the Company may deliver Notes executed by the Company to the Trustee for authentication, together with a Company Order for the authentication and delivery of such Notes, and the Trustee in accordance with such Company Order shall authenticate and deliver such Notes, without any further action by the Company hereunder; provided that the Trustee shall be entitled to receive an Officer’s Certificate and an Opinion of Counsel of the Company with respect to the issuance, authentication and delivery of such Notes. Only such Notes as shall bear thereon a certificate of authentication substantially in the form set forth on the Form of Note attached as Exhibit A hereto, executed manually by an authorized signatory of the Trustee (or an authenticating agent appointed by the Trustee as provided by Section 17.10), shall be entitled to the benefits of this Indenture or be valid or obligatory for any purpose. Such certificate by the Trustee (or such an authenticating agent) upon any Note executed by the Company shall be conclusive evidence that the Note so authenticated has been duly authenticated and delivered hereunder and that the Holder is entitled to the benefits of this Indenture. In case any Officer of the Company who shall have signed any of the Notes shall cease to be such Officer before the Notes so signed shall have been authenticated and delivered by the Trustee, or disposed of by the Company, such Notes nevertheless may be authenticated and delivered or disposed of as though the Person who signed such Notes had not ceased to be such Officer of the Company; and any Note may be signed on behalf of the Company by such persons as, at the actual date of the execution of such Note, shall be the Officers of the Company, although at the date of the execution of this Indenture any such Person was not such an Officer.

  • Authentication and Delivery of Securities At any time and from time to time after the execution and delivery of this Indenture, the Issuer may deliver Securities of any series executed by the Issuer to the Trustee for authentication, and the Trustee shall thereupon authenticate and deliver such Securities to or upon the written order of the Issuer, signed by any two officers of the Issuer authorized by the Board to execute any such order, without any further action by the Issuer. In authenticating such Securities and accepting the additional responsibilities under this Indenture in relation to such Securities the Trustee shall be entitled to receive, and (subject to Section 5.01) shall be fully protected in relying upon: (a) a certified copy of any resolution or resolutions of the Board authorizing the action taken pursuant to the resolution or resolutions delivered under clause 2.04(b) below; (b) a copy of any resolution or resolutions of the Board relating to such series, in each case certified by the Secretary or an Assistant Secretary of the Issuer; (c) an executed supplemental indenture, if any; (d) an Officers' Certificate setting forth the form and terms of the Securities as required pursuant to Section 2.01 and 2.03, respectively and prepared in accordance with Section 10.05; (e) an Opinion of Counsel, prepared in accordance with Section 10.05, to the effect that (i) that the form or forms and terms of such Securities have been established by or pursuant to a resolution of the Board or by a supplemental indenture as permitted by Section 2.01 and 2.03 in conformity with the provisions of this Indenture; (ii) that such Securities, when authenticated and delivered by the Trustee and issued by the Issuer in the manner and subject to any conditions specified in such Opinion of Counsel, will constitute valid and binding obligations of the Issuer; (iii) that all laws and requirements in respect of the execution and delivery by the Issuer of the Securities have been complied with; and (iv) covering such other matters as the Trustee may reasonably request. The Trustee shall have the right to decline to authenticate and deliver any Securities under this Section if the Trustee, being advised by counsel, determines that such action may not lawfully be taken by the Issuer or if the Trustee in good faith by its board of directors or board of trustees, executive committee, or a trust committee of directors or trustees or Responsible Officers shall determine that such action would expose the Trustee to personal liability to existing Holders.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!