×

Method and system for secure authentication of a user by a host system

  • US 8,146,141 B1
  • Filed: 12/16/2004
  • Issued: 03/27/2012
  • Est. Priority Date: 12/16/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for allowing a user to securely log on to a host system via an electronic interface, comprising:

  • receiving, using a web server computer having a processor and memory, a request from the user at a user'"'"'s computing device having a processor and memory and with a browser to access a website via the web server computer;

    sending, using the web server computer, an encryption applet, a replay prevention ID, and a public key of a public/private key pair, the private key for which is known by a tamper-proof physical hardware security module of an application server computer having a processor and memory, to the browser of the user'"'"'s computing device;

    receiving, using the user'"'"'s computing device, entry of the user'"'"'s credentials into the encryption applet;

    encrypting, using the user'"'"'s computing device, the user'"'"'s credentials with a symmetric key and encrypting, using the user'"'"'s computing device, the symmetric key and replay prevention ID with the public key of the public/private key pair by the encryption applet;

    sending, using the user'"'"'s computing device, the symmetric key-encrypted user'"'"'s credentials and public key-encrypted symmetric key and replay prevention ID via the web server computer to the application server computer from the browser of the user'"'"'s computing device by the encryption applet without decrypting the symmetric key-encrypted user'"'"'s credentials and public key-encrypted symmetric key and replay prevention ID at the web server computer and passing, using the user'"'"'s computing device via the web server computer, the symmetric key-encrypted user'"'"'s credentials and public key-encrypted symmetric key and replay prevention ID into the tamper-proof physical hardware security module of the application server computer;

    decrypting, using the application server computer, internally within the tamper-proof physical hardware security module of the application server computer the public key-encrypted symmetric key and replay prevention ID with the private key of the public/private key pair known by the tamper-proof physical hardware security module of the application server computer and decrypting, using the application server computer, internally within the tamper-proof physical hardware security module of the application server computer the symmetric key-encrypted user'"'"'s credentials with the decrypted symmetric key;

    re-encrypting, using the application server computer, internally within the tamper-proof physical hardware security module of the application server computer the decrypted user'"'"'s credentials with a new symmetric key known to an authentication server computer having a processor and memory and passing, using the application server computer, the re-encrypted user'"'"'s credentials and decrypted replay prevention ID out of the tamper-proof physical hardware security module of the application server computer;

    comparing, using the application server computer, the decrypted replay prevention ID with a clear-text version of the replay prevention ID retained by the application server computer, and if the decrypted replay prevention ID and the retained version are identical, sending, using the application server computer, the re-encrypted user'"'"'s credentials to the authentication server computer for verification; and

    decrypting, using the authentication server computer, the re-encrypted user'"'"'s credentials with the new symmetric key known to the authentication server computer, checking, using the authentication server computer, the decrypted user'"'"'s credentials for veracity, and if verified, allowing, using the authentication server computer, the user'"'"'s logon.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×