×

ABDS method and verification status for authenticating entity access

  • US 7,143,284 B2
  • Filed: 01/31/2003
  • Issued: 11/28/2006
  • Est. Priority Date: 08/04/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of authenticating a requesting entity for access to a controlled resource, the requesting entity communicating electronically over a communications medium with an access authentication component for the controlled resource, comprising the steps of:

  • (a) providing the requesting entity with a security account maintained in a database of the access authentication component, the security account having a record of information being retrievable by the access authentication component based on a unique identifier of the requesting entity;

    (b) associating a public key of a public-private key pair of the requesting entity with the record such that the public key of the requesting entity is retrievable from the record based on the unique identifier and wherein the private key of the public-private key pair is maintained only within a secure device of the requesting entity, and wherein the access authentication component does not reside in and is not part of the secure device of the requesting entity;

    (c) wherein the secure device performs the steps of;

    (i) receiving suspect verification data;

    (ii) comparing the suspect verification data with verification data of the requesting entity previously stored in the secure device;

    (iii) generating a verification status indicator based on said comparison; and

    (iv) generating a digitally-signed message using the private key of the secure device, the digitally-signed message including a message and a digital signature of the message, the message including a request by the requesting entity for access to the controlled resource and the verification status indicator generated by the secure device;

    (d) wherein the access authentication component performs the steps of;

    (i) receiving the unique identifier of the requesting entity;

    (ii) receiving the digitally-signed message generated by the secure device;

    (iii) obtaining the request and the verification status indicator from the message;

    (iv) based on the unique identifier, obtaining the public key of the requesting entity from the record; and

    (iv) using the public key obtained from the record, decrypting the digital signature to verify that the digital signature was generated using the private key of the secure device and that the verification status indicator was not altered after the digital signature was generated;

    and, (e) providing the requesting entity with access to the controlled resource in response to the request if the digital signature was generated using the private key of the secure device and as a function of the verification status indicator obtained from the digitally-signed message.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×