×

Techniques for implementing a data storage device as a security device for managing access to resources

  • US 10,154,037 B2
  • Filed: 03/22/2017
  • Issued: 12/11/2018
  • Est. Priority Date: 03/22/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • determining that a user is not authenticated to access a resource requested at a device associated with the user, wherein access to the resource is controlled by an access management system;

    identifying, at the device, a storage device that is connected to the device, wherein the storage device is identified to verify registration of the storage device as a security device for authentication of the user;

    determining that device information about the storage device is stored at a first location on the storage device, wherein the device information includes an identifier of the storage device;

    generating, using a hashing process, an access key for verifying registration of the storage device, wherein the access key is generated based at least in part on the device information;

    generating key data based on a first decryption, using the access key, of security data stored at a second location on the storage device, wherein the key data includes a private key and a public key;

    transmitting a message to request the access management system to verify registration of the storage device as the security device, wherein the message is encrypted using the private key, and wherein the message includes user information about the user and the device information;

    receiving, from an access management system, a response to the request to verify registration of the storage device, wherein the response includes access data to enable access to the resource requested at the device, wherein the access data is generated based on verifying that the storage device is registered with the access management system for the user, and wherein the access data is encrypted using a public key associated with registration of the storage device for the user at the access management system;

    generating decrypted access data based on a second decryption of the access data using the private key; and

    enabling the device to access the resource using the decrypted access data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×