×

System and method for facilitating multi-connection-based authentication

  • US 10,362,022 B2
  • Filed: 04/13/2017
  • Issued: 07/23/2019
  • Est. Priority Date: 04/13/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method of facilitating multi-connection-based authentication, the method being implemented by a computer system that comprises one or more processors executing computer program instructions that, when executed, perform the method, the method comprising:

  • causing, by the computer system, first and second connections to be established between the computer system and a remote client device;

    obtaining, by the computer system, a first challenge response from the remote client device via the first connection and a second challenge response from the remote client device via the second connection, the first and second challenge responses each being generated based on a same private key stored in a secure local storage at the remote client device;

    obtaining, by the computer system, a public key corresponding to the private key from the remote client device via the first connection;

    performing, by the computer system, public-key-based verification of the first challenge response by using the public key to verify at least a portion of the first challenge response;

    obtaining, by the computer system, a confirmation of identification information associated with an entity, to which the private key corresponds, based on information obtained from the remote client device via the first connection;

    registering, by the computer system, the public key in a database in association with the entity based on (i) the obtained confirmation via the first connection and (ii) the public-key-based verification of the first challenge response obtained via the first connection;

    obtaining, by the computer system, an identifier associated with the entity from the remote client device via the second connection;

    determining, by the computer system, a match between the associated identifier and at least one identifier registered in association with the entity in a database;

    performing, by the computer system, based on the matching, public-key-based verification of the second challenge response by using the public key to verify at least a portion of the second challenge response; and

    authenticating, by the computer system, information obtained from the remote client device via the second connection based on the public-key-based verification of the second challenge response obtained via the second connection.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×