Methods and systems for verifying a location factor associated with a token
First Claim
Patent Images
1. A method for verifying a token, the method comprising:
- receiving, from a server, a challenge encrypted with a key commonly shared by the server and the token;
decrypting the challenge with the commonly shared key;
performing an exclusive or (“
XOR”
) operation on the decrypted challenge and a public key to obtain a manipulated challenge, wherein the public key is stored on or generated by the token;
signing the manipulated challenge with a private key associated with the public key; and
returning the signed manipulated challenge to the server as a reply to the challenge for verification at the server.
1 Assignment
0 Petitions
Accused Products
Abstract
A server, method and/or computer-readable medium verifies a location factor associated with a token. The server generates a challenge and encrypts the challenge by a key commonly shared by the server and the token, and transmits the encrypted challenge to the token. The token decrypts the encrypted challenge by the commonly shared key and manipulates the challenge by an elliptic curve cryptography (ECC) procedure so that the server can verify that the signed manipulated challenge was generated at the token based upon the ECC public key.
209 Citations
18 Claims
-
1. A method for verifying a token, the method comprising:
-
receiving, from a server, a challenge encrypted with a key commonly shared by the server and the token; decrypting the challenge with the commonly shared key; performing an exclusive or (“
XOR”
) operation on the decrypted challenge and a public key to obtain a manipulated challenge, wherein the public key is stored on or generated by the token;signing the manipulated challenge with a private key associated with the public key; and returning the signed manipulated challenge to the server as a reply to the challenge for verification at the server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of verifying a token by a server, the method comprising:
-
generating, at the server, a challenge encrypted with a key commonly shared by the server and the token; sending the encrypted challenge to the token; receiving a signed manipulated challenge and a public key from the token, the signed manipulated challenge having been manipulated by the token decrypting the challenge, performing an exclusive or (“
XOR”
) operation on the decrypted challenge and the public key to obtain a manipulated challenge, and signing the manipulated challenge with a private key associated with the public key; andverifying that the signed manipulated challenge was generated at the token based upon the public key. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A server for verifying a token, the server comprising:
a processor configured to; generate a challenge encrypted with a key commonly shared by the server and the token; send the encrypted challenge to the token; receive a signed manipulated challenge and a public key from the token, the signed manipulated challenge having been manipulated by the token decrypting the challenge, performing an exclusive or (“
XOR”
) operation on the decrypted challenge and the public key to obtain a manipulated challenge, and signing the manipulated challenge with a private key associated with the public key; andverify that the signed manipulated challenge was generated at the token based upon the public key. - View Dependent Claims (12, 13, 14)
-
15. A security token comprising:
a processor configured to; receive, from a server, a challenge encrypted with a key commonly shared by the server and the token; decrypt the challenge with the commonly shared key; performing an exclusive or (“
XOR”
) operation on the decrypted challenge and a public key to obtain a manipulated challenge, wherein the public key is stored on or generated by the token;sign the manipulated challenge with a private key associated with the public key; and return the signed manipulated challenge to the server as a reply to the challenge for verification at the server. - View Dependent Claims (16, 17, 18)
Specification