×

ABDS system utilizing security information in authenticating entity access

  • US 7,010,691 B2
  • Filed: 01/31/2003
  • Issued: 03/07/2006
  • Est. Priority Date: 08/04/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A system for authenticating a requesting entity for access to a controlled resource, comprising:

  • (a) a device of the requesting entity, the device maintaining securely therein a private key of a public-private key pair and adapted to generate digital signatures of a message using the private key, the message comprising a unique identifier and a request by the requesting entity for access to the controlled resource;

    (b) an access authentication component having authority to allow or deny the request for access to the controlled resource, the access authentication component separate from the device but in electronic communication over a communications medium with the device for receipt of the digitally-signed message; and

    (c) at least one database containing information linked together, the information including;

    (i) the public key of the public-private key pair, but not the private key, (ii) predetermined authorization rights of the requesting entity to access the controlled resource, and (iii) a security profile of the device, wherein the security profile includes security features and manufacturing history of the device and wherein a security strength of the device relative to other devices is determinable from the security profile;

    wherein the unique identifier is associated with the public key in the at least one database prior to receipt of the digitally-signed message and wherein the information is accessible by the access authentication component from the at least one database based on the unique identifier, and wherein, in response to receipt of the digitally-signed message, the access authentication component verifies that the message was digitally-signed using the private key maintained within the device by decrypting the digital signature using the public key obtained from the database, and if the digitally-signed message verifies, the access authentication component authenticates the requesting entity for access to the controlled resource as a function of (i) the security strength of the device and (ii) the predetermined authorization rights of the requesting entity.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×