×

Automatic centralized authentication challenge response generation

  • US 8,086,853 B2
  • Filed: 03/18/2005
  • Issued: 12/27/2011
  • Est. Priority Date: 03/18/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving at a first device a challenge from a second device via a computer network when the first device attempts to log in to access the second device;

    transmitting from the first device to an authentication server a first request to generate a response to the received challenge, the authentication server being configured to verify an identity of the first device with respect to the authentication server and determine whether the first device is permitted to access the second device, the authentication server being on a separate computing device from both the first device and the second device, the first request including a name of the first device, a message authenticator for the first device, a name of the second device, and the received challenge from the second device;

    receiving at the first device from the authentication server a first reply to the first request, the first reply containing the response to the received challenge, the response comprising a first result of a computation on the challenge performed by the authentication server using a secret associated with the second device, wherein the secret is not transmitted between the first device and the authentication server during an authentication attempt, the secret being recognizable by the authentication server and not shared with potential peer devices including the first device; and

    based on the first reply from the authentication server, terminating the authentication attempt at the first device or forwarding from the first device to the second device at least a portion of the first reply containing the response to the received challenge;

    when the first device forwards the response to the second device, the second device is configured to;

    transmit to the authentication server a second request to validate the first device, the second request comprising at least the response, the challenge, the name of the first device, and the name of the second device;

    receive from the authentication server a second result of a computation on the response performed by the authentication server using the challenge and the secret associated with the second device; and

    based on the second result from the authentication server, terminate the authentication attempt at the second device or exchange data with the first device to continue the login process to enable the first device to authenticate the second device;

    based on a successful validation of the first device;

    transmitting a second challenge from the first device to the second device for authentication of the second device by the first device, the second challenge transmitted to the second device to enable the second device to use the authentication server to generate a second response to the second challenge, the authentication server configured to generate the second response by using a first device secret that is associated with the first device and is not shared with the second device;

    receiving the second response to the second challenge from the second device;

    sending a third request including the second response to the authentication server to verify the second response, the authentication server configured to authenticate the second device against an expected response by using the first device secret associated with the first device;

    receiving at the first device a message from the authentication server indicating whether the second device has been authenticated.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×