SYSTEM AND METHOD FOR DIGITAL USER AUTHENTICATION
First Claim
1. A method of digital user authentication comprising:
- receiving a request at a server from a private key module associated with a first user device;
directing a request for a user challenge from the server to a second user device;
wherein successful completion of the user challenge is required to access a first portion of a private key; and
in response to a successful user challenge, creating at least a second portion of a digital signature associated with a second portion of the private key at the server to authenticate the user to a third party.
3 Assignments
0 Petitions
Accused Products
Abstract
A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the private key from the server to a second user device; and in response to a successful user challenge creating a first portion of a digital signature and a second portion of a digital signature at the server. The method of the preferred embodiment can further include combining the first portion of the digital signature and the second portion of the digital signature; and delivering the digital signature to the first user device. The method of the preferred embodiment can function to secure the digital signature process by splitting or dividing the user'"'"'s private key into two or more portions, each of which require independent authorization from the user in order to create the digital signature.
80 Citations
26 Claims
-
1. A method of digital user authentication comprising:
-
receiving a request at a server from a private key module associated with a first user device; directing a request for a user challenge from the server to a second user device;
wherein successful completion of the user challenge is required to access a first portion of a private key; andin response to a successful user challenge, creating at least a second portion of a digital signature associated with a second portion of the private key at the server to authenticate the user to a third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of digital user authentication comprising:
-
delivering a public key from a first user device to a third party; requesting a second portion of a digital signature derived from a second portion of the private key by the first user device; receiving at the first user device at least a second portion of a digital signature derived from the second portion of the private key in response to a successful user challenge completed on a second user device; and delivering a digital signature from the first user device to the third party. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of digital user authentication comprising:
-
receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of a digital signature derived form a first portion of a private key from the server to a second user device; in response to a successful user challenge, creating at least a second portion of a digital signature at the server; combining the first portion of the digital signature and the second portion of the digital signature at the server; and delivering the digital signature from the server to the first user device. - View Dependent Claims (23, 24, 25, 26)
-
Specification