User authentication by linking randomly-generated authentication secret with personalized secret
First Claim
Patent Images
1. A method for digital authentication, comprising:
- using a user device operated by an authorized user to produce and register a secret in a computer system; and
using a first user input and a second user input from a user requesting to access the computer system to initiate a challenge from the computer system and a response from the requesting user to compare the registered secret with a user-side hash value computed from the first and second user inputs to authorize the requested access when there is a match and to reject the requested access when there is not a match.
1 Assignment
0 Petitions
Accused Products
Abstract
This patent application discloses techniques, devices and systems for user authentication based on linking between a randomly generated authentication secret and a personalized secret.
-
Citations
47 Claims
-
1. A method for digital authentication, comprising:
-
using a user device operated by an authorized user to produce and register a secret in a computer system; and
using a first user input and a second user input from a user requesting to access the computer system to initiate a challenge from the computer system and a response from the requesting user to compare the registered secret with a user-side hash value computed from the first and second user inputs to authorize the requested access when there is a match and to reject the requested access when there is not a match. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A user authentication method utilizing challenge and response comprising:
when a user requests an access to a computer system, using a first user input and a second user input from the user and a registered secret at the system to perform a challenge-and-response process to authorize or reject the access request. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
24. A method of user authentication, comprising:
-
using an authentication secret to associate a user identifier of a user with a system identifier of a computer system;
using a user password from the user and the authentication secret as input to produce a user-side secret;
grouping the user-side secret, user identifier, and system identifier as an authenticator; and
using the user password and the authenticator to reproduce the authentication secret by a user station to reestablish the association as a basis for authenticating the user to the computer system. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method of user authentication, comprising:
-
using a secret to link a user with a computer system;
in a login process, using a user-side verifier to verify whether the secret is used in processing an access request on the user side. - View Dependent Claims (38, 39, 40, 41, 42)
-
-
43. An article comprising a machine-readable medium that store machine-executable instructions for user authentication, the instructions causing a machine to:
-
send an access request to a computer system;
receive a challenge message from the computer system;
use a first user input, a second user input, and the challenge message as input to a transformation to produce a response message;
send the response message and a user identifier to the computer system; and
receive an access decision from the computer system, wherein the access decision, either a permission or a denial, is determined by the computer system according to a registered secret associated with the user identifier. - View Dependent Claims (44, 45, 46, 47)
-
Specification