Login and Authentication Phase Sample Clauses

Login and Authentication Phase. 1. In login and authentication phase, a new random number a is generated. Then the user constructs the related public key as Ta(x), and a shared key XXXx=TaTKy (x), using Chebyshev chaotic map, and further calculates HU=H(IDU || IDSx || Ta(x) || PWU), C1=EkUSy (IDU || IDSx || IDSy || HU). The user sends message m1={Ta(x), IDU, IDSy, C1} to Sx, finally as shown in Fig. 1.
AutoNDA by SimpleDocs
Login and Authentication Phase. 1. In this phase, the user defines a long entropy random number a as its secret. Then Ui constructs a public key as Ta(x), using Chebyshev chaotic map. Then, it further computes HU =H(IDU || IDSx || Ta(x) ||TKy(x) || TaTKy (x) || PWU). Finally, the user sends message m1={ HU, Ta(x), IDSx , IDSy , PIDi} to Sx.
Login and Authentication Phase. To obtain the services of charging station CSj, Ui must authenticate CSj. Likewise; CSj also authenticates the user with the help of ESP. The steps in mutual authentication phase for Ui and CSj are illustrated below:
Login and Authentication Phase. Step 1: Ui inserts his/her smart card to a terminal and enters IDi and PWi. The terminal generates a timestamp TS4 and randomly chooses a key Ki and computes TCi=PTCi⊕H(r||PWi), PKSi=Ki⊕H(TCi||TS4), and Ci=H(IDi||Ki||TCi||TS4). Finally, Xx sends TIDi, Ci, XXXx, and TS4 to GWN. Step 2: Upon receiving the message, GWN checks whether the transmission delay is within the allowed time interval ΔT. TGWN* is the current time. If TGWN*- TS4 > ΔT, GWN terminates the current session and sends REJ message back to Xx; Otherwise, GWN continues to obtain IDi from the verification table according to XXXx and computes TCi=H(KGWN-U||IDi||TEi) and Ci*=H(IDi||Ki||TCi||TS4). If Ci*≠Ci, GWN rejects it and sends REJ message to Xx. Otherwise, GWN authenticates Ui successfully and computes Ki=PKSi⊕H(TCi||TS4). Then GWN computes the accessed sensor node Sj’s temporal credential TCj=H(KGWN-S||SIDj), CGWN=H(TIDi||TCj||TS5) and PKSGWN=Ki⊕H(TCj||TS5), where TS5 is the timestamp. Finally, GWN sends TS5, XXXx, CGWN, and PKSGWN to Sj.
Login and Authentication Phase. Step 1: Ui inserts his/her smart card to a terminal and enters IDi and PWi. The terminal generates a timestamp TS4 and randomly chooses a key Ki and computes TCi=PTCiH(r||PWi), PKSi=KiH(TCi||TS4), and Ci=H(IDi||Ki||TCi||TS4). Finally, Xx sends TIDi, Ci, XXXx, and TS4 to GWN.
Login and Authentication Phase. The MUi and CMDi participate in this stage to establish a mutual authentication session key at the end of the authentication session so that these entities can safely forward their data. The main steps at this stage can be described as follows:

Related to Login and Authentication Phase

  • Execution and Authentication At least one Officer must sign the Notes for the Company by manual or facsimile signature. If an Officer whose signature is on a Note no longer holds that office at the time a Note is authenticated, the Note will nevertheless be valid. A Note will not be valid until authenticated by the manual signature of the Trustee. The signature will be conclusive evidence that the Note has been authenticated under this Indenture. The Trustee will, upon receipt of a written order of the Company signed by an Officer (an “Authentication Order”), authenticate Notes for original issue that may be validly issued under this Indenture, including any Additional Notes. The aggregate principal amount of Notes outstanding at any time may not exceed the aggregate principal amount of Notes authorized for issuance by the Company pursuant to one or more Authentication Orders, except as provided in Section 2.07 hereof. The Trustee may appoint an authenticating agent acceptable to the Company to authenticate Notes. An authenticating agent may authenticate Notes whenever the Trustee may do so. Each reference in this Indenture to authentication by the Trustee includes authentication by such agent. An authenticating agent has the same rights as an Agent to deal with Holders or an Affiliate of the Company.

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

  • Authorization, Authentication, and Access In order to ensure that access to the Data is limited to authorized staff, the Contractor must:

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.

Time is Money Join Law Insider Premium to draft better contracts faster.