TOKEN BASED TWO FACTOR AUTHENTICATION AND VIRTUAL PRIVATE NETWORKING SYSTEM FOR NETWORK MANAGEMENT AND SECURITY AND ONLINE THIRD PARTY MULTIPLE NETWORK MANAGEMENT METHOD
First Claim
1. Secure electronic device networks comprising:
- A plurality of independent networks;
Each independent network having a plurality of end user devices attachable to the network forming nodes thereof, each end user device having input plugs for coupling accessories thereto;
A network managing system which includes authenticating the end user devices attached to the network;
A plurality of authenticating keys, with each key attachable to an input plug of an end user device, each key containing a validation certificate therein and constructed to establish a virtual private network tunnel between at least a portion of the network managing system and the key, whereby the presence of a current validation certificate on a key coupled to the end users device may be validated prior to granting access to the network.
1 Assignment
0 Petitions
Accused Products
Abstract
A two-factor network authentication system uses “something you know” in the form of a password/Pin and “something you have” in the form of a key token. The password is encrypted in a secure area of the USB device and is protected from brute force attacks. The key token includes authentication credentials. Users cannot authenticate without the key token. Four distinct authentication elements that the must be present. The first element is a global unique identifier that is unique to each key. The second is a private credential generated from the online service provider that is stored in a secure area of the USB device. The third element is a connection profile that is generated from the online service provider. The fourth element is a credential that is securely stored with the online service provider. The first two elements create a unique user identity. The second two elements create mutual authentication.
66 Citations
20 Claims
-
1. Secure electronic device networks comprising:
-
A plurality of independent networks;
Each independent network having a plurality of end user devices attachable to the network forming nodes thereof, each end user device having input plugs for coupling accessories thereto;
A network managing system which includes authenticating the end user devices attached to the network;
A plurality of authenticating keys, with each key attachable to an input plug of an end user device, each key containing a validation certificate therein and constructed to establish a virtual private network tunnel between at least a portion of the network managing system and the key, whereby the presence of a current validation certificate on a key coupled to the end users device may be validated prior to granting access to the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
- 11. An authenticating key for access of an end users electronic device to a plurality of independent networks each having a network management system, the authenticating key comprising a key attachment mechanism which is attachable to an input plug of an end user device, each key configured to create a communication link between the network management system of each selected independent network and the key, wherein the communication between the network management system for the selected network and the key is not preconfigured on the end user device, each key further containing a validation certificate therein unique to the selected network, wherein the network can verify the presence of a current validation certificate on the key for that network coupled to the end users device through the communication link prior to granting access to the selected network.
-
18. A token based authentication system for network management and security of online networks comprising:
-
authenticating key tokens for access of end user devices to at least one online end user device network, the authenticating key comprising a key attachment mechanism which is attachable to an input plug of an end user device, each key further containing at least one validation certificate therein associated with an specific end user device network, wherein the validation certificate includes a global identifier specific to the user and a private credential private credential specific to the associated end user device network; and
a network management system associated with the at least one online end user device network, wherein the network management system can verify the presence of a current validation certificate on the key coupled to the end users device prior to granting access to the associated online end user device network. - View Dependent Claims (19, 20)
-
Specification