Token authentication system
First Claim
1. A method of controlling user access with a token having fixed manufacturer controlled information, the method comprising:
- determining the manufacturer controlled information from the token;
generating a cryptographic key using the manufacturer controlled information of the token; and
authenticating the token using the generated cryptographic key.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method and program product for enabling token authentication by generating a secret key using manufacturer controlled information (57) present on a token (34). A computer (30) typically reads the manufacturer controlled information and applies an cryptographic algorithm (41) to determine the secret key (47). The secret key (47) may comprise or be used to generate a one-time password (42) for use in authenticating the token (34). Typical manufacturer controlled information (57) present on the token (34) includes static, non-writeable/erasable information, such as a serial number (56) or manufacturer ID (54). Where desired, the token authentication is accomplished in the absence of memory or processors on the token that are dedicated to the authentication process, itself. This absence reduces token hardware requirements and associated expenses. The dynamic generation of the cryptographic key (47) also reduces risks conventionally associated with duplicating static keys stored within token memory. Where desired, token includes a password (55) and/or a user name (53) in addition to the manufacturer controlled information (57) for realizing multiple factor authentication. As such, the password (55) and user name (53) stored on the token (34) may automatically be transmitted to the access device (14).
87 Citations
33 Claims
-
1. A method of controlling user access with a token having fixed manufacturer controlled information, the method comprising:
-
determining the manufacturer controlled information from the token;
generating a cryptographic key using the manufacturer controlled information of the token; and
authenticating the token using the generated cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of controlling user access with random data stored within a memory of a token, the method comprising:
-
determining the random data from the token;
generating a cryptographic key using the random data of the token; and
authenticating the token using the generated cryptographic key.
-
-
22. An apparatus, comprising:
-
a token having fixed manufacturer controlled information; and
an access control device comprising a program resident in a memory, the program configured to determine the manufacturer controlled information from the token;
to generate a cryptographic key using the manufacturer controlled information of the token; and
to authenticate the token using the generated cryptographic key. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An access control device, comprising:
-
a token comprising a memory having random data; and
a program resident in the memory, the program configured to determine the random data from the token;
to generate a cryptographic key using the random data of the token; and
to authenticate the token using the generated cryptographic key.
-
-
33. A program product, comprising:
-
program code configured to determine fixed manufacturer controlled information from a token;
to generate a cryptographic key using the manufacturer controlled information of the token; and
to authenticate the token using the generated cryptographic key; and
a signal bearing medium bearing the program code.
-
Specification