×

Secure remote user authentication leveraging public key cryptography and key splitting

  • US 10,411,907 B2
  • Filed: 01/25/2017
  • Issued: 09/10/2019
  • Est. Priority Date: 01/25/2017
  • Status: Active Grant
First Claim
Patent Images

1. An electronic user authentication method comprising the steps of:

  • receiving a login request at an information system, wherein the login request is received over a network from a registered remote user device;

    based on the login request, identifying a public key associated with a user;

    generating a random challenge;

    encrypting the challenge using the public key to form an encrypted challenge;

    providing the encrypted challenge to the remote user device;

    accessing a fragment of a private key, wherein the private key is associated with the identified public key as an asymmetric cryptographic key pair;

    partially decrypting the encrypted challenge using the fragment of the private key to form a first result;

    providing the first result to the remote user device;

    receiving a reply message from the remote user device, the reply message including a token authenticator value that demonstrates that the challenge was successfully decrypted; and

    responsive to a determination that the challenge was successfully decrypted, permitting the requested login to the information system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×