ABDS method and verification status for authenticating entity access
First Claim
1. A method of authenticating a requesting entity for access to a controlled resource, the requesting entity communicating electronically over a communications medium with an access authentication component for the controlled resource, comprising the steps of:
- (a) providing the requesting entity with a security account maintained in a database of the access authentication component, the security account having a record of information being retrievable by the access authentication component based on a unique identifier of the requesting entity;
(b) associating a public key of a public-private key pair of the requesting entity with the record such that the public key of the requesting entity is retrievable from the record based on the unique identifier and wherein the private key of the public-private key pair is maintained only within a secure device of the requesting entity, and wherein the access authentication component does not reside in and is not part of the secure device of the requesting entity;
(c) wherein the secure device performs the steps of;
(i) receiving suspect verification data;
(ii) comparing the suspect verification data with verification data of the requesting entity previously stored in the secure device;
(iii) generating a verification status indicator based on said comparison; and
(iv) generating a digitally-signed message using the private key of the secure device, the digitally-signed message including a message and a digital signature of the message, the message including a request by the requesting entity for access to the controlled resource and the verification status indicator generated by the secure device;
(d) wherein the access authentication component performs the steps of;
(i) receiving the unique identifier of the requesting entity;
(ii) receiving the digitally-signed message generated by the secure device;
(iii) obtaining the request and the verification status indicator from the message;
(iv) based on the unique identifier, obtaining the public key of the requesting entity from the record; and
(iv) using the public key obtained from the record, decrypting the digital signature to verify that the digital signature was generated using the private key of the secure device and that the verification status indicator was not altered after the digital signature was generated;
and, (e) providing the requesting entity with access to the controlled resource in response to the request if the digital signature was generated using the private key of the secure device and as a function of the verification status indicator obtained from the digitally-signed message.
9 Assignments
0 Petitions
Accused Products
Abstract
Authenticating an entity for access to a controlled resource by an access authentication component for the controlled resource includes the steps of: the requesting entity initially opening a security account with the access authentication component, with the access authentication component establishing and maintaining a record including information pertaining to the account and being retrievable based on a unique identifier for the requesting entity, and associating a public key of a public-private key pair with the record; the requesting entity originating an electronic message and generating a digital signature using a private key of the key pair, and sending the digitally signed electronic message to the access authentication component with the unique identifier; authenticating the electronic message using the public key associated with the record identified by the unique identifier; and upon successful authentication, authenticating access to the controlled resource. A digitally signed verification status is included with the electronic message.
156 Citations
17 Claims
-
1. A method of authenticating a requesting entity for access to a controlled resource, the requesting entity communicating electronically over a communications medium with an access authentication component for the controlled resource, comprising the steps of:
-
(a) providing the requesting entity with a security account maintained in a database of the access authentication component, the security account having a record of information being retrievable by the access authentication component based on a unique identifier of the requesting entity; (b) associating a public key of a public-private key pair of the requesting entity with the record such that the public key of the requesting entity is retrievable from the record based on the unique identifier and wherein the private key of the public-private key pair is maintained only within a secure device of the requesting entity, and wherein the access authentication component does not reside in and is not part of the secure device of the requesting entity; (c) wherein the secure device performs the steps of; (i) receiving suspect verification data; (ii) comparing the suspect verification data with verification data of the requesting entity previously stored in the secure device; (iii) generating a verification status indicator based on said comparison; and (iv) generating a digitally-signed message using the private key of the secure device, the digitally-signed message including a message and a digital signature of the message, the message including a request by the requesting entity for access to the controlled resource and the verification status indicator generated by the secure device; (d) wherein the access authentication component performs the steps of; (i) receiving the unique identifier of the requesting entity; (ii) receiving the digitally-signed message generated by the secure device; (iii) obtaining the request and the verification status indicator from the message; (iv) based on the unique identifier, obtaining the public key of the requesting entity from the record; and (iv) using the public key obtained from the record, decrypting the digital signature to verify that the digital signature was generated using the private key of the secure device and that the verification status indicator was not altered after the digital signature was generated; and, (e) providing the requesting entity with access to the controlled resource in response to the request if the digital signature was generated using the private key of the secure device and as a function of the verification status indicator obtained from the digitally-signed message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. In a system for authenticating a requesting entity for access to a controlled resource in which access to the controlled resource is controlled by an access authentication component for the controlled resource, a method comprising the steps of:
-
(a) providing the requesting entity with a security account maintained in a database of the access authentication component, the security account having a record of information being retrievable by the access authentication component based on a unique identifier of the requesting entity; (b) associating a public key of a public-private key pair of the requesting entity with the record such that the public key of the requesting entity is retrievable from the record based on the unique identifier and wherein the private key of the public-private key pair is maintained within a secure device of the requesting entity, and wherein the access authentication component does not reside in and is not part of the secure device of the requesting entity; (c) wherein the secure device performs the steps of; (i) receiving suspect verification data; (ii) comparing the suspect verification data with verification data of the requesting entity previously stored in the secure device; (iii) generating a verification status indicator based on said comparison; and (iv) generating a digitally-signed message using the private key of the secure device, the digitally-signed message including a message and a digital signature of the message, the message including a request by the requesting entity for access to the controlled resource and the verification status indicator generated by the secure device; (d) transmitting over a communications medium an electronic communication from the requesting entity to the access authentication component, the electronic communication including the unique identifier of the requesting entity and the digitally-signed message; (e) wherein the access authentication component performs the steps of; (i) receiving the electronic communication; (ii) obtaining the digital signature, the unique identifier of the requesting entity, the request, and the verification status indicator from the electronic communication; (iii) based on the unique identifier, obtaining the public key of the requesting entity from the record; and (iv) using the public key obtained from the record, decrypting the digital signature to verify that the digital signature was generated using the private key of the secure device and that the verification status indicator was not altered after the digital signature was generated; and, (f) providing the requesting entity with access to the controlled resource in response to the request if the digital signature was generated using the private key of the secure device and as a function of the verification status indicator obtained from the digitally-signed message.
-
-
17. A method of providing access to an entity requesting access to a controlled resource, the requesting entity communicating electronically over a communications medium with an access authentication component for the controlled resource, comprising the steps of:
-
(a) providing the requesting entity with a security account maintained in a database accessible by the access authentication component, the security account having information that is retrievable based on a unique identifier, the information pertaining to the requesting entity'"'"'s right to access the controlled resource; (b) associating a public key of a public-private key pair with the security account such that the public key is retrievable based on the unique identifier of the requesting entity; and (c) thereafter, (i) receiving the unique identifier; (ii) receiving a message and a digital signature of the message, the message comprising a request by the requesting entity for access to the controlled resource and a verification status indicator, the verification status indicator and digital signature generated by a secure device, the verification status indicator representative of a comparison of suspect verification data input into the secure device with verification data of the requesting entity previously stored in the secure device, wherein the secure device does not reside in and is not part of the access authentication component; (iii) obtaining the public key associated with the unique identifier received; (iv) decrypting the digital signature using the public key obtained to verify that the digital signature was generated using the private key of the secure device and that the verification status indicator was not altered after the digital signature was generated; and (v) granting the requesting entity with access to the controlled resource in response to the request if the digital signature was generated using the private key of the secure device and as a function of the verification status indicator obtained from the digitally-signed message and as a function of the information pertaining to the requesting entity'"'"'s right to access the controlled resource.
-
Specification