×

Challenge-response access control using context-based proof

  • US 10,297,094 B2
  • Filed: 12/29/2017
  • Issued: 05/21/2019
  • Est. Priority Date: 04/06/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for authorizing access to an asset, in which an access-controlling entity controls access to the asset and a requesting entity wishes access to the asset, said method comprising:

  • transmitting to the requesting entity a challenge data set;

    receiving from the requesting entity a response purportedly corresponding to a representation of the challenge data set in a non-repudiatable form, obtained from an event validation system;

    querying the event validation system to determine whether the response does correspond to a correct representation of the challenge data set in the non-repudiatable form; and

    authorizing the requesting entity for access only if the response is the same as the correct representation;

    in which the event validation system is a keyless, hash tree-based signing infrastructure, further comprising;

    inputting the representation of the challenge data set as an input record to the keyless, hash tree-based signing infrastructure and computing a data signature including recomputation parameters to a logically uppermost value in the hash tree, said recomputation parameters encoding information from other data sets than the representation of the challenge data set,whereby determining whether the response does correspond to the correct representation comprises using the recomputation parameters and the purported representation of the challenge data set to recompute upward through the hash-tree based infrastructure, such that the response does correspond to the correct representation if the same uppermost value is attained as when it was computed with the challenge data set submitted by the requesting entity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×