STRONG AUTHENTICATION TOKEN WITH VISUAL OUTPUT OF PKI SIGNATURES
First Claim
1. A portable handheld authentication device comprising at least one data processing component and a display, the authentication device adapted to:
- generate an input value;
submit the input value to an asymmetric cryptographic operation, said asymmetric cryptographic operation generating a result based on an asymmetric cryptographic algorithm parameterized by a first private key of a public-private key pair;
obtain the result of said asymmetric cryptographic operation;
generate an authentication message substantially comprising said result of said asymmetric cryptographic operation;
encode said authentication message into one or more images; and
display said one or more images on said display.
2 Assignments
0 Petitions
Accused Products
Abstract
A handheld authentication device comprising a data processor and a display is adapted to: generate an input value; submit the input value to an asymmetric cryptographic operation; obtain the result of said asymmetric cryptographic operation; generate an authentication message substantially comprising the result of the asymmetric cryptographic operation; encode the authentication message into one or more images; and display these images on the display. A method for securing computer-based applications remotely accessed by a user comprises capturing images displayed on the display of an authentication device of the user whereby these images have been encoded with an authentication message generated by the authentication device and whereby the authentication message comprises the result of an asymmetric cryptographic operation on an input value; decoding the images to retrieve the authentication message; retrieving the result of the asymmetric cryptographic operation from the authentication message; verifying the authentication message.
122 Citations
40 Claims
-
1. A portable handheld authentication device comprising at least one data processing component and a display, the authentication device adapted to:
-
generate an input value; submit the input value to an asymmetric cryptographic operation, said asymmetric cryptographic operation generating a result based on an asymmetric cryptographic algorithm parameterized by a first private key of a public-private key pair; obtain the result of said asymmetric cryptographic operation; generate an authentication message substantially comprising said result of said asymmetric cryptographic operation; encode said authentication message into one or more images; and display said one or more images on said display. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for securing computer-based applications being remotely accessed by at least one user comprising the steps of:
-
capturing one or more images displayed on the display of an authentication device of said at least one user whereby said one or more images have been encoded with an authentication message generated by said authentication device and whereby said authentication message comprises the result of an asymmetric cryptographic operation on an input value based on an asymmetric cryptographic algorithm parameterized by a first private key of a public-private key pair; decoding said one or more images to retrieve said authentication message; retrieving said result of said asymmetric cryptographic operation from said authentication message; verifying said authentication message; wherein verifying said authentication message comprises verifying said retrieved result of said asymmetric cryptographic operation using an asymmetric cryptographic algorithm parameterized with a public key corresponding to said first private key. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification