IDENTITY AUTHENTICATION USING CREDENTIALS
First Claim
Patent Images
1. A method, comprising:
- receiving, from a computing device, a user name and a password, the user name comprising a credential for the computing device and the password being encrypted, wherein the credential comprises a public key for the computing device;
extracting the credential from the user name;
decrypting the password based on the public key; and
authenticating the computing device based on the decrypted password.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
70 Citations
20 Claims
-
1. A method, comprising:
-
receiving, from a computing device, a user name and a password, the user name comprising a credential for the computing device and the password being encrypted, wherein the credential comprises a public key for the computing device; extracting the credential from the user name; decrypting the password based on the public key; and authenticating the computing device based on the decrypted password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, from a computing device, a user name, a password, and a timestamp, the user name comprising a credential for the computing device and the password being encrypted, wherein the credential comprises a public key for the computing device; extracting the credential from the user name; decrypting the password based on the public key; verifying the received time stamp. authenticating the computing device based on the decrypted password. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving, from a computing device, a user name and a password, the user name comprising a digital certificate for the computing device and the password being encrypted; extracting the digital certificate from the user name; decrypting the password based on the digital certificate; converting the received user name to a first format, wherein the first format corresponds with a format for the decrypted password; comparing the converted user name to the decrypted password; and authenticating the computing device if the converted user name matches the decrypted password. - View Dependent Claims (17, 18, 19, 20)
-
Specification