×

System and method for generating a single use password based on a challenge/response protocol

  • US 8,042,155 B1
  • Filed: 09/29/2006
  • Issued: 10/18/2011
  • Est. Priority Date: 09/29/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure authentication, comprising:

  • issuing, by a management console, a challenge request to a security appliance in response to an entity inserting a smart card and entering a username and a password into the management console to verify the identity of the entity;

    in response to receiving the request issued by the management console, identifying, by the security appliance, a public key and a salt value stored on the security appliance wherein the public key and the salt value are associated with the entity and the smart card inserted by the entity into the management console;

    generating, on the security appliance, a bit pattern, the bit pattern associated with the username of the entity and stored in the security appliance;

    sending a challenge to the management console, the challenge including a secure hash of the bit pattern, an identification value associated with the security appliance, a version of the bit pattern and identification value encrypted with the public key, and the salt value;

    is in response to receiving the challenge, decrypting, by the smart card, the version of the bit pattern and identification value using a private key contained within the smart card;

    using, on the management console, the decrypted bit pattern to compute the secure hash received from the security appliance;

    comparing, on the management console, the decrypted security appliance identification value and computed secure hash of the bit pattern with the security appliance identification value and secure hash of the bit pattern received from the security appliance in the challenge to determine if they match;

    in response to a match of the comparison, returning, by the management console, a response to the security appliance, the response including a keyed hash message authentication code (HMAC), wherein the associated bit pattern is used as a key to encrypt the HMAC;

    utilizing the bit pattern stored on the security appliance and associated with the entity'"'"'s username to compute the keyed HMAC received from the management console;

    matching the computed keyed HMAC with the received keyed HMAC at the security appliance; and

    in response to matching the computed keyed HMAC with the received keyed HMAC at the security appliance, authenticating the entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×