×

User authentication over networks

  • US 10,263,962 B2
  • Filed: 05/10/2017
  • Issued: 04/16/2019
  • Est. Priority Date: 07/28/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating user authentication data, associated with a user ID, at an authentication system comprising an authentication server connected to a network and a secure cryptoprocessor operatively coupled to the authentication server, the method comprising:

  • providing, in data storage operatively coupled to the authentication server, a first token for said user ID, the first token being produced by the secure cryptoprocessor by encoding the user authentication data associated with the user ID via an encoding process dependent on a secret key of the secure cryptoprocessor, said first token for said user ID produced at the authentication server by;

    receiving a registration request for the user ID from the remote computer via the network, the registration request comprising a ciphertext encrypting the user authentication data associated with the user ID under a public key of a first public-private key pair, the private key of which is secret to the secure cryptoprocessor, and supplying the ciphertext to the secure cryptoprocessor;

    at the secure cryptoprocessor, decrypting the ciphertext using said private key to obtain the user authentication data associated with the user ID, encoding the user authentication data via a deterministic function using said secret key to produce said first token, and supplying the first token to the authentication server; and

    wherein said decryption and encoding is performed as a single atomic operation in the cryptoprocessor;

    at the authentication server, storing the first token for the user ID in said data storage;

    at the authentication server, receiving an authentication request for the user ID from a remote computer via the network, the authentication request comprising a ciphertext encrypting user authentication data under said public key of said first public-private key pair, and supplying the ciphertext to the secure cryptoprocessor;

    at the secure cryptoprocessor, decrypting the ciphertext using said private key to obtain plaintext user authentication data; and

    encoding said obtained plaintext user authentication data via said deterministic function using said secret key to produce a second token, and supplying the second token to the authentication server, wherein said decryption and encoding is performed as a single atomic operation in the cryptoprocessor;

    at the authentication server, retrieving said first token for the user ID from said data storage;

    at the authentication server, comparing the first and second tokens to check for equality of said plaintext user authentication data and the user authentication data encoded in the first token via a cryptographic processing operation in which the authentication data is not exposed outside the secure cryptoprocessor; and

    at the authentication server, in response to said equality, sending an authentication confirmation message to the remote computer via the network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×