METHODS AND SYSTEMS FOR VERIFYING A LOCATION FACTOR ASSOCIATED WITH A TOKEN
First Claim
1. A method for facilitating verification of a location factor associated with a token, the token receiving an encrypted challenge from a server, the encrypted challenge encrypted by a key commonly shared by the server and the token, the token decrypting the encrypted challenge by the commonly shared key, the method comprising:
- manipulating the challenge by a predetermined elliptic curve cryptography (ECC) procedure to obtain a manipulated challenge; and
returning the manipulated challenge to the server as a reply to the challenge for verification at the server.
1 Assignment
0 Petitions
Accused Products
Abstract
A server, method and/or computer-readable medium verifies a location factor associated with a token. The server generates a challenge and encrypts the challenge by a key commonly shared by the server and the token, and transmits the encrypted challenge to the token. The token decrypts the encrypted challenge by the commonly shared key and manipulates the challenge by an elliptic curve cryptography (ECC) procedure so that the server can verify that the signed manipulated challenge was generated at the token based upon the ECC public key.
148 Citations
24 Claims
-
1. A method for facilitating verification of a location factor associated with a token, the token receiving an encrypted challenge from a server, the encrypted challenge encrypted by a key commonly shared by the server and the token, the token decrypting the encrypted challenge by the commonly shared key, the method comprising:
-
manipulating the challenge by a predetermined elliptic curve cryptography (ECC) procedure to obtain a manipulated challenge; and returning the manipulated challenge to the server as a reply to the challenge for verification at the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of verifying a location factor associated with a token by a server, the server generating a challenge and encrypting the challenge by a key commonly shared by the server and the token, the server transmitting the encrypted challenge to the token, the token decrypting the encrypted challenge by the commonly shared key, the method further comprising:
-
receiving a signed manipulated challenge and an elliptic curve cryptography (ECC) public key from the token, the manipulated challenge manipulated by a predetermined ECC procedure; and verifying that the manipulated challenge was generated at the token based upon the ECC public key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A server for verifying a location factor associated with a token, the server generating a challenge and encrypting the challenge by a key commonly shared by the server and the token, the server transmitting the encrypted challenge to the token, the token decrypting the encrypted challenge by the commonly shared key, the server comprising:
a processor configured to; receive a signed manipulated challenge and an elliptic curve cryptography (ECC) public key from the token, the manipulated challenge manipulated by a predetermined ECC procedure; and verify that the signed manipulated challenge was generated at the token based upon the ECC public key. - View Dependent Claims (16, 17, 18, 19)
-
20. A token for facilitating verification of a location factor associated with the token by a server, the token receiving an encrypted challenge from the server, the encrypted challenge encrypted by a key commonly shared by the server and the token, the token decrypting the encrypted challenge by the commonly shared key, the token comprising:
a processor configured to; manipulate the challenge by a predetermined elliptic curve cryptography (ECC) procedure to obtain a manipulated challenge; and return the manipulated challenge to the server as a reply to the challenge for verification at the server. - View Dependent Claims (21, 22, 23, 24)
Specification