AUTHENTICATION USING ASYMMETRIC CRYPTOGRAPHY KEY PAIRS
First Claim
Patent Images
1. An authentication server system comprising:
- a processor; and
a memory resource storing machine readable instructions executable by the processor to;
receive an input from a device indicating a request to log into the system;
verify the input from the device using an asymmetric cryptography key pair;
deny access to the device in response to the input failing to correspond to the asymmetric cryptography key pair; and
inactivate an account of the device based on a number of attempt failures exceeding a failure threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
An example authentication server system comprising: a processor; and a memory resource storing machine readable instructions executable by the processor to: receive an input from a device indicating a request to log into the system; verify the input from the device using an asymmetric cryptography key pair; deny access to the device in response to the input failing to correspond to the asymmetric cryptography key pair; and inactivate an account of the device based on a number of attempt failures exceeding a failure threshold.
-
Citations
20 Claims
-
1. An authentication server system comprising:
-
a processor; and a memory resource storing machine readable instructions executable by the processor to; receive an input from a device indicating a request to log into the system; verify the input from the device using an asymmetric cryptography key pair; deny access to the device in response to the input failing to correspond to the asymmetric cryptography key pair; and inactivate an account of the device based on a number of attempt failures exceeding a failure threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving an input from a device indicating a request to log into a system; verifying the input from the device using only an asymmetric cryptography key; denying access to the device in response to; an account in locked status; and the locked status below a threshold period of time; logging a failed event of the asymmetric cryptography key pair in a system log; monitoring the failed event and stamping the failed event with a failed timestamp; and inactivating the account based on a number of failed event exceeding a failure threshold. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory machine-readable medium storing instructions executable by a processor to:
-
receive an input from a device indicating a request to log into a system; verify the input from the device using only an asymmetric cryptography key pair and without using passphrase verification; deny access to the device in response to; an account in locked status; and the locked status below a threshold period of time; log a failed event of the asymmetric cryptography key pair in a system log; monitor the failed event and stamping the failed event with a failed timestamp; and inactivate the account based on a number of failed event exceeding a failure threshold, wherein the account is inactivated for a threshold period of time. - View Dependent Claims (19, 20)
-
Specification