Workstation log-in
First Claim
1. A method performed by a computer system, the method comprising:
- providing, to a mobile device paired with the computer system, a nonce and an identifier for the computer system;
receiving, by the computer system from the mobile device, an encrypted message that was encrypted using a pairing key for the pairing of the computer system and the mobile device, wherein the encrypted message comprises an encrypted form of the nonce, a password encrypted with a password key for the computer system, and an initialization vector that was used to encrypt the password with the password key;
decrypting, by the computer system, the encrypted message using the pairing key for the pairing of the computer system and the mobile device;
verifying, by the computer system, that a nonce decrypted from the encrypted message matches the nonce provided to the mobile device;
in response to successfully decrypting the encrypted message using the pairing key and verifying that the nonce decrypted from the encrypted message matches the nonce provided to the mobile device, decrypting, by the computer system, the encrypted password using (i) the password key and (ii) the initialization vector decrypted from the encrypted message; and
providing, by the computer system, the decrypted password to log-in a user corresponding to the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method including actions of pairing with a mobile device and receiving a user name, a password encrypted with a connector password key, and a public key of the mobile device. Additional actions include providing the password encrypted with the connector password key, receiving the password in a decrypted form, obtaining a pairing key, encrypting the pairing key using the public key, encrypting the password with a local password key, providing the pairing key encrypted using the public key and the password encrypted with the local password key, disconnecting from the mobile device, after disconnecting form the mobile device, reconnecting with mobile device, providing a workstation identification, receiving the user name and the password encrypted with the local password key, decrypting the password encrypted with the local password key, and logging in the user using the user name and the password decrypted with the local password key.
97 Citations
20 Claims
-
1. A method performed by a computer system, the method comprising:
-
providing, to a mobile device paired with the computer system, a nonce and an identifier for the computer system; receiving, by the computer system from the mobile device, an encrypted message that was encrypted using a pairing key for the pairing of the computer system and the mobile device, wherein the encrypted message comprises an encrypted form of the nonce, a password encrypted with a password key for the computer system, and an initialization vector that was used to encrypt the password with the password key; decrypting, by the computer system, the encrypted message using the pairing key for the pairing of the computer system and the mobile device; verifying, by the computer system, that a nonce decrypted from the encrypted message matches the nonce provided to the mobile device; in response to successfully decrypting the encrypted message using the pairing key and verifying that the nonce decrypted from the encrypted message matches the nonce provided to the mobile device, decrypting, by the computer system, the encrypted password using (i) the password key and (ii) the initialization vector decrypted from the encrypted message; and providing, by the computer system, the decrypted password to log-in a user corresponding to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a computer system comprising one or more computers; and one or more computer-readable media storing instructions that, when executed by the one or more computers, cause the one or more computers to perform operations comprising; providing, to a mobile device paired with the computer system, a nonce and an identifier for the computer system; receiving, by the computer system from the mobile device, an encrypted message that was encrypted using a pairing key for the pairing of the computer system and the mobile device, wherein the encrypted message comprises an encrypted form of the nonce, a password encrypted with a password key for the computer system, and an initialization vector that was used to encrypt the password with the password key; decrypting, by the computer system, the encrypted message using the pairing key for the pairing of the computer system and the mobile device; verifying, by the computer system, that a nonce decrypted from the encrypted message matches the nonce provided to the mobile device; in response to successfully decrypting the encrypted message using the pairing key and verifying that the nonce decrypted from the encrypted message matches the nonce provided to the mobile device, decrypting, by the computer system, the encrypted password using (i) the password key and (ii) the initialization vector decrypted from the encrypted message; and providing, by the computer system, the decrypted password to log-in a user corresponding to the mobile device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. One or more non-transitory computer-readable media storing instructions that, when executed by one or more computers of a computer system, cause the one or more computers to perform operations comprising:
-
providing, to a mobile device paired with the computer system, a nonce and an identifier for the computer system; receiving, by the computer system from the mobile device, an encrypted message that was encrypted using a pairing key for the pairing of the computer system and the mobile device, wherein the encrypted message comprises an encrypted form of the nonce, a password encrypted with a password key for the computer system, and an initialization vector that was used to encrypt the password with the password key; decrypting, by the computer system, the encrypted message using the pairing key for the pairing of the computer system and the mobile device; verifying, by the computer system, that a nonce decrypted from the encrypted message matches the nonce provided to the mobile device; in response to successfully decrypting the encrypted message using the pairing key and verifying that the nonce decrypted from the encrypted message matches the nonce provided to the mobile device, decrypting, by the computer system, the encrypted password using (i) the password key and (ii) the initialization vector decrypted from the encrypted message; and providing, by the computer system, the decrypted password to log-in a user corresponding to the mobile device.
-
Specification