METHOD AND SYSTEM FOR ESTABLISHING TRUSTED COMMUNICATION USING A SECURITY DEVICE
First Claim
1. A method for providing a secure access from a security device at a local network location to a remote network application, the method comprising:
- at the security device, having a global unique identifier (UID), a processor, and a memory;
obtaining, from a remote network location, a private security software, and causing the private security software to obtain a user selectable personal identification number (PIN), and the UID of the security device, the UID uniquely identifying the security device;
forwarding the PIN, the UID and the private security software to the remote network location for generating a user-personalized credential code using the PIN, the UID and the private security software, comprising encrypting the user-personalized credential code;
at the security device, obtaining the user-personalized credential code from the remote network location, and verifying an authenticity of the user selectable PIN and the UID, without communicating over a network, comprising decrypting the user-personalized credential code;
retrieving access credentials to the remote network application upon verifying the authenticity of the user selectable PIN and the UID; and
authorizing access to the remote network application using the retrieved access credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for authenticating a security device for establishing trusted email communication. The security device is authenticated by installing private security software on the security device. In order to authorize an email transaction, a transaction authorization is performed using the security device by display a QR (Quick Response) code from an authorization server on a user terminal and scanning the QR code into the security device. After scanning the QR code, an OTA (One-Time-Authorization) code is sent from the security device to the authorization server for verifying the transaction. Embodiments of the present invention provide trusted email communication. A corresponding system for authenticating a security device and preforming trusted email communication is also provided.
-
Citations
20 Claims
-
1. A method for providing a secure access from a security device at a local network location to a remote network application, the method comprising:
-
at the security device, having a global unique identifier (UID), a processor, and a memory; obtaining, from a remote network location, a private security software, and causing the private security software to obtain a user selectable personal identification number (PIN), and the UID of the security device, the UID uniquely identifying the security device; forwarding the PIN, the UID and the private security software to the remote network location for generating a user-personalized credential code using the PIN, the UID and the private security software, comprising encrypting the user-personalized credential code; at the security device, obtaining the user-personalized credential code from the remote network location, and verifying an authenticity of the user selectable PIN and the UID, without communicating over a network, comprising decrypting the user-personalized credential code; retrieving access credentials to the remote network application upon verifying the authenticity of the user selectable PIN and the UID; and authorizing access to the remote network application using the retrieved access credentials. - View Dependent Claims (2, 3, 4)
-
-
5. The method of 3 further comprising:
-
authorizing access of a user to a client application using the security device; adding an identity token to a message; sending the message from the client application to the sending server; verifying the message at the sending server using the token within the message; sending the message from the sending server to a receiving server; and verifying the message at the receiving server using the token within the message. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A system for providing a secure access from a security device at a local network location to a remote network application, the system comprising:
-
a remote server computer at the remote network location; and a security device at the local network location, the security device having a global unique identifier (UID), a processor, and a memory having computer readable instructions stored thereon, causing the processor to; obtain, from a remote network location, a private security software, and causing the private security software to obtain a user selectable personal identification number (PIN), and the UID of the security device, the UID uniquely identifying the security device; forward the PIN, the UID and the private security software to the remote network location for generating a user-personalized credential code using the PIN, the UID and the private security software, comprising encrypting the user-personalized credential code; obtains, at the security device, the user-personalized credential code from the remote network location, and verifying an authenticity of the user selectable PIN and the UID, without communicating over a network, comprising decrypting the user-personalized credential code; retrieve access credentials to the remote network application upon verifying the authenticity of the user selectable PIN and the UID; and authorize access to the remote network application using the retrieved access credentials. - View Dependent Claims (12, 13, 14)
-
-
15. The system of 13 wherein the computer readable instructions further cause the processor to:
-
authorize access of a user to a client application using the security device; add an identity token to a message; send the message from the client application to the sending server; verify the message at the sending server using the token within the message; send the message from the sending server to a receiving server; and verify the message at the receiving server using the token within the message. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification