SECURE AUTHENTICATION IN TLS SESSIONS
First Claim
1. A computer implemented method for secure authentication within a communication protocol session, comprising:
- retrieving, by a client computer of the TLS session, a challenge string associated with the TLS session;
generating, by the client computer, a first digest based on the challenge string and authentication information of a user of the client computer;
sending, by the client computer, the first digest to a server of the TLS session, wherein the retrieving, generating and sending, by the client computer, are carried out after the TLS session has been established between the client computer and the server.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention may include a method, computer program product and system for secure authentication within a communication protocol session. The embodiment may include retrieving, by a client computer of the TLS session, a challenge string associated with the TLS session. The embodiment may include generating, by the client computer, a first digest based on the challenge string and authentication information of a user of the client computer. The embodiment may include sending, by the client computer, the first digest to a server of the TLS session. The retrieving, generating and sending, by the client computer, are carried out after the TLS session has been established between the client computer and the server.
13 Citations
20 Claims
-
1. A computer implemented method for secure authentication within a communication protocol session, comprising:
-
retrieving, by a client computer of the TLS session, a challenge string associated with the TLS session; generating, by the client computer, a first digest based on the challenge string and authentication information of a user of the client computer; sending, by the client computer, the first digest to a server of the TLS session, wherein the retrieving, generating and sending, by the client computer, are carried out after the TLS session has been established between the client computer and the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for secure authentication within a Transport Layer Security (TLS) session, the computer program product comprising:
one or more computer-readable tangible storage devices and program instructions stored on at least one of the one or more computer-readable tangible storage devices, the program instructions comprising; program instructions to retrieve authentication information of a user from a client of the TLS session; program instructions to generate a first digest based on the retrieved authentication information and a challenge string associated with the TLS session; program instructions to compare the first digest with a second digest received from the client of the TLS session, wherein the second digest is generated by the client of the TLS session based on the authentication information and the challenge string; program instructions to authenticate the user in response to a result of the comparison, wherein the retrieving, generating, comparing and authenticating are carried out after the TLS session has been established between the client of the TLS session and a server of the TLS session. - View Dependent Claims (10, 11, 12, 13, 14)
-
15. A computer system for secure authentication within a Transport Layer Security (TLS) session, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to retrieve authentication information of a user from a client of the TLS session; program instructions to generate a first digest based on the retrieved authentication information and a challenge string associated with the TLS session; program instructions to compare the first digest with a second digest received from the client of the TLS session, wherein the second digest is generated by the client of the TLS session based on the authentication information and the challenge string; program instructions to authenticate the user in response to a result of the comparison, wherein the retrieving, generating, comparing and authenticating are carried out after the TLS session has been established between the client of the TLS session and a server of the TLS session. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification