×

ABDS method utilizing security information in authenticating entity access

  • US 6,950,940 B2
  • Filed: 01/31/2003
  • Issued: 09/27/2005
  • Est. Priority Date: 08/04/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of providing a requesting entity with access to a controlled resource, the requesting entity communicating electronically over a communications medium with an access authentication component for the controlled resource, wherein the requesting entity possesses a secure device that maintains therein a private key of a public-private key pair and wherein the secure device is adapted to generate digital signatures using the private key, comprising the steps of:

  • (a) providing the requesting entity with a security account maintained in a database of the access authentication component, information in the security account being retrievable by the access authentication component based on a unique identifier of the requesting entity, the information identifying the requesting entity'"'"'s authority to access the controlled resource;

    (b) associating in the database the public key of the public-private key pair with the security account such that the public key is retrievable by the access authentication component based on the unique identifier;

    (c) associating a security profile of the secure device with the security account such that the security profile is retrievable by the access component based on the unique identifier, the security profile identifying security features of the secure device, the security features indicative of the relative security strength of the secure device as compared to the other devices capable of generating digital signatures;

    (d) wherein the access authentication component performs the steps of;

    (i) receiving the unique identifier of the requesting entity;

    (ii) receiving a message and a digital signature of the message;

    (iii) based on the unique identifier, obtaining the public key of the requesting entity and the security profile of the secure device;

    (iv) using the public key obtained from the database, decrypting the digital signature to verify that the digital signature was generated using the private key of the secure device;

    and, (e) if the digital signature verifies, granting the requesting entity with access to the controlled resource as a function of the information pertaining to the requesting entity'"'"'s authority to access the controlled resource and as a function of the relative security strength of the secure device.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×