| http://www.w3.org/ns/prov#value | - Continuing with FIGS. 2 and 3, the mobile device 104 and the home device 104 separately calculate an authentication code AUTH as a cryptographically strong authentication code where AUTH is a function of the shared secret SSone and the challenge C. For example, AUTH=HMAC-SHA1 (C, SSone) (Steps 4A, 4B, FIG. 3).
|