×

Cryptographic binding of authentication schemes

  • US 7,793,340 B2
  • Filed: 11/21/2007
  • Issued: 09/07/2010
  • Est. Priority Date: 11/21/2007
  • Status: Active Grant
First Claim
Patent Images

1. In a computing system environment having pluralities of computing devices, a method of cryptographically binding authentication schemes to verify that a secure authentication sequence was executed at a first computing device to gain access to a sensitive application or resource on a second computing device, comprising:

  • executing at the first computing device two login sequences for the authentication schemes with a strong authentication framework;

    upon completion of a first sequence of the two login sequences at the first computing device, generating an authentication token;

    by the first sequence of the two login sequences, encrypting at the first computing device the authentication token using a private key corresponding to the first sequence;

    upon completion of a second sequence of the two login sequences at the first computing device, encrypting the encrypted authentication token with a private key corresponding to the second sequence; and

    upon a user attempting to access the sensitive application or resource on the second computing device, verifying the secure authentication sequence at the first computing device by twice decrypting the encrypted said encrypted authentication token to recover the authentication token.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×