Method and system for asymmetric key security
First Claim
Patent Images
1. A method of creating asymmetric security keys for authenticating previous interaction with each of a plurality of servers, comprising:
- receiving a first identity key associated with a first server of the plurality of servers;
generating a first master key corresponding to the first server;
creating one or more seeds by utilizing an encryption function of the first identity key and the first master key;
utilizing the one or more seeds to create an asymmetric public and an asymmetric private key pair corresponding to the first server; and
requesting the first server to store the asymmetric public key;
storing the asymmetric private key at a client; and
authenticating previous interaction with the first server, comprising;
when proof of knowledge of the asymmetric public key is required by the first server, presenting proof of knowledge of the asymmetric public key to the first server and accessing the first server without sending the asymmetric private key; and
when proof of possession of the asymmetric private key is required in addition to the proof of knowledge of the asymmetric public key by the first server, presenting proof of possession of the asymmetric private key to the first server and accessing the first server.
4 Assignments
0 Petitions
Accused Products
Abstract
Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master key, and storing the pair-wise public or symmetric key at the client and the website.
-
Citations
18 Claims
-
1. A method of creating asymmetric security keys for authenticating previous interaction with each of a plurality of servers, comprising:
-
receiving a first identity key associated with a first server of the plurality of servers; generating a first master key corresponding to the first server; creating one or more seeds by utilizing an encryption function of the first identity key and the first master key; utilizing the one or more seeds to create an asymmetric public and an asymmetric private key pair corresponding to the first server; and requesting the first server to store the asymmetric public key; storing the asymmetric private key at a client; and authenticating previous interaction with the first server, comprising; when proof of knowledge of the asymmetric public key is required by the first server, presenting proof of knowledge of the asymmetric public key to the first server and accessing the first server without sending the asymmetric private key; and when proof of possession of the asymmetric private key is required in addition to the proof of knowledge of the asymmetric public key by the first server, presenting proof of possession of the asymmetric private key to the first server and accessing the first server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for authenticating previous interaction with one or more servers utilizing an asymmetric key pair comprising:
-
a processor; a communication channel connected with the processor; and a memory coupled with and readable by the processor, the memory containing a series of instruction that, when executed by the processor, cause the processor to; receive a first identity key associated with a first server; generate a first master key; create a seed by utilizing an encryption function of the first identity key and the first master key; utilize the seed to create an asymmetric private and asymmetric public key pair; and request the first server to store the asymmetric public key; store the asymmetric private key at a client; authenticate previous interaction with the first server, comprising; request proof of knowledge of the asymmetric public key from the first server; and upon receipt of the proof of knowledge of the asymmetric public key, access the first server. - View Dependent Claims (13, 14, 15)
-
-
16. A computer storage medium encoding a computer program of instructions for executing a computer implemented method for authenticating previous interaction with one or more servers, the method comprising:
-
receiving a first identity key associated with a first server; generating a first master key; creating one or more seeds by utilizing an encryption function of the first identity key, the first master key, and one or more constants; utilizing the one or more seeds to create an asymmetric private and asymmetric public key pair; requesting the first server to store the asymmetric public key; storing the asymmetric private key at a client; authenticating previous interaction with the first server, comprising; presenting proof of knowledge of the asymmetric public key to the first server; receiving a request from the first server for proof of possession of the asymmetric private key; presenting proof of possession of the asymmetric private key to the first server; and receiving an indication from the first server that the client is authenticated and that access is permitted. - View Dependent Claims (17, 18)
-
Specification