System and method for controlling access to multiple public networks and for controlling access to multiple private networks
First Claim
1. A method for controlling access to a network, the method comprising the following steps:
- (a) coupling a user device to a network;
(b) transmitting a first response including a particular secret of at least two secrets stored in the user device to the network;
(c) generating a second response including the particular secret upon receipt of the first response by the network;
(d) comparing the first response and second response; and
(e) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for controlling access to multiple public networks and for controlling access to multiple private networks is provided. Authentication is used with unique public shared secrets and unique private shared secrets to control access to the networks. The invention includes a user device for communicating with at least a public network and/or a private network. The device may be capable of accessing multiple networks through one or more private networks with multiple access control servers. The user device must provide a correct response to each access control server, before access to the network may be granted. The device generates a one-time password, or response, to gain access to a controlled network server. The response generated by the device is matched to a response generated by an access control server that may have generated a challenge that prompted the response. If the two responses match, the device is authenticated and a user of the device is granted access to the network server.
-
Citations
23 Claims
-
1. A method for controlling access to a network, the method comprising the following steps:
-
(a) coupling a user device to a network; (b) transmitting a first response including a particular secret of at least two secrets stored in the user device to the network; (c) generating a second response including the particular secret upon receipt of the first response by the network; (d) comparing the first response and second response; and (e) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for controlling access to a network, the method comprising the following steps:
-
(a) coupling a user device storing at least two secrets to a network; (b) transmitting a request to the network; (c) transmitting a challenge including an instruction to use a particular secret of the secrets to the user device; (d) generating a first response including the particular secret; (e) transmitting the first response to the network; (f) generating a second response including the particular secret upon receipt of the first response by the network; (g) comparing the first response and second response; and (h) authenticating the user device if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (9, 10, 11, 12, 13, 14, 18)
-
-
15. A method for controlling access to a public network, the method comprising the following steps:
-
(a) coupling a user device to a public network, the network including a server and the user device stores at least two public shared secrets; (b) transmitting an access request from the user device to the server; (c) transmitting a challenge from the server to the user device; (d) processing the challenge to ascertain one of the public shared secrets as a selected public shared secret stored on the user device; (e) generating a first response using at least the selected public shared secret; (f) transmitting the first response to the server; (g) generating a second response upon receipt of the first response by the server; (h) comparing the first response and second response; and (i) authenticating the user device to grant access to the public network if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (16, 17)
-
-
19. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including a server and the user device stores at least two private shared secrets; (b) transmitting an access request from the user device to the server; (c) transmitting a challenge from the server to the user device; (d) processing the challenge to ascertain at least a selected private shared secret stored on the user device; (e) generating a first response using at least the selected private shared secret as one of the private shared secrets; (g) transmitting the first response to the server; (h) generating a second response upon receipt of the first response by the server; (i) comparing the first response and second response; and (j) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match.
-
-
20. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including an access control server, and the user device stores at least two private shared secrets and at least two public shared secrets; (b) transmitting an access request from the user device to the server, the access request comprising a first response that includes a selected public shared secret as one of the public shared secrets and a selected private shared secret as one of the private shared secrets, both stored on the user device; (c) invoking the server to generate a second response upon receipt of the first response, the server generating the second response by means of the following steps, (i) processing the challenge transmitted to the user device to retrieve the selected public shared secret and the selected private shared secret, and (ii) processing the selected public shared secret and selected private shared secret to generate the second response; (h) comparing the first response and second response; and (i) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match. - View Dependent Claims (21, 22)
-
-
23. A method for controlling access to a private network, the method comprising the following steps:
-
(a) coupling a user device to a private network, the network including an access control server, and the user device stores at least two private shared secrets and at least two public shared secrets; (b) transmitting an access request from the user device to the server; (c) transmitting a challenge from the server to the user device; (d) processing the challenge to retrieve a selected public shared secret and a selected private shared secret stored on the user device; (e) processing the selected public shared secret and selected private shared secret to generate a first response; (f) transmitting the first response to the server; (g) invoking the server to generate a second response upon receipt of the first response by the server, the server generating the second response by means of the following steps, (i) processing the challenge transmitted to the user device to retrieve the selected public shared secret and the selected private shared secret, and (ii) processing the selected public shared secret and selected private shared secret to generate the second response; (h) comparing the first response and second response; and (i) authenticating the user device to grant access to the private network if the first response and second response match, and not authenticating the user device if the first response and second do not match.
-
Specification