Technique for providing multiple levels of security
First Claim
Patent Images
1. A method for user authentication, comprising;
- receiving, from a first user and by an authentication server, a first authentication request transformed with a private portion of a first type split private key associated with a first asymmetric key pair having a public key and the first type split private key;
authenticating the first user for a first level of network access based upon the received first request being transformed with a private portion of the first type split private key;
receiving, from a second user and by the authentication server, a second authentication request transformed with a private portion of a second type split private key associated with a second asymmetric key pair having a public key and the second type split private key; and
authenticating the second user for a second level of network access based upon the received second request being transformed with a private portion of the second type split private key.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the first request being transformed with the first type of split private key. A second authentication request that is transformed with a private portion of a second type private key is also received. A second user is authenticated for a second level of network access based upon the second request being transformed with the second type of split private key.
42 Citations
18 Claims
-
1. A method for user authentication, comprising;
-
receiving, from a first user and by an authentication server, a first authentication request transformed with a private portion of a first type split private key associated with a first asymmetric key pair having a public key and the first type split private key;
authenticating the first user for a first level of network access based upon the received first request being transformed with a private portion of the first type split private key;
receiving, from a second user and by the authentication server, a second authentication request transformed with a private portion of a second type split private key associated with a second asymmetric key pair having a public key and the second type split private key; and
authenticating the second user for a second level of network access based upon the received second request being transformed with a private portion of the second type split private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for user authentication, comprising:
-
a communications interface configured to receive i) a first authentication request from a first user transformed with a private portion of a first type split private key associated with a first asymmetric key pair having a public key and the first type split private key, and ii) a second authentication request from a second user transformed with a private portion of a second type split private key associated with a second asymmetric key pair having a public key and the second type split private key; and
a processor configured to i) authenticate the first user for a first level of network access based upon the received first request being transformed with a private portion of the first type split private key, and ii) authenticate the second user for a second level of network access based upon the received second request being transformed with a private portion of the second type split private key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification