×

Computer network security system employing portable storage device

  • US 7,228,438 B2
  • Filed: 10/23/2001
  • Issued: 06/05/2007
  • Est. Priority Date: 04/30/2001
  • Status: Active Grant
First Claim
Patent Images

1. A security system for controlling access to a trusted computer network by a client computer, comprising:

  • a bastion host that controls access to said trusted computer network;

    a first data store associated with said bastion host and configured to store a set of key-password pairs;

    a portable storage device;

    a second data store associated with said portable storage device and configured to store passwords represented in said key-password pairs;

    a user operable initialization mechanism that interfaces with said first and second data stores, said initialization mechanism generating and storing said key-password pairs in said first data store and generating and storing said passwords in said second data store;

    an authentication mechanism having a first component associated with said bastion host and having a second component associated with said client computer;

    said first component being configured to communicate a password-specific key associated with one of said key-password pairs to said second component;

    said second component being configured to access said second data store and retrieve at least one password represented in said key-password pair;

    said second component being further configured to communicate said at least one password to said first component based on input from the user and based on said password-specific key communicated from said first component;

    wherein said second component is further configured to prompt a user to provide an identification value, retrieve a symmetric key from a protected area within said portable storage device that is only accessible upon authentication of said portable storage device, produce an encrypted identification value by encrypting said second identification value with said symmetric key, and retrieve the password by decrypting a corresponding encrypted value in said second datastore using a combination of the encrypted identification value and the password-specific key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×