×

Roaming utilizing an asymmetric key pair

  • US 8,213,608 B2
  • Filed: 09/08/2008
  • Issued: 07/03/2012
  • Est. Priority Date: 02/14/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a user seeking access to information via a network from a user network location (UNL), using a asymmetric crypto-key having a private key (Dx) and a public key (Ex), with Dx split into multiple key portions including a user key portion (Dxx) and a trusted server key portion (Dxs), and with Dxx being computable based on a first factor (F1) and a second factor (F2), the method comprising:

  • persistently storing Dxs, F2, and a symmetric crypto-key (S) at a trusted server; and

    authenticating the user by (i) receiving, at the UNL, initial authentication information as a user input, (ii) transmitting, from the UNL, the received initial authentication information, (iii) initially authenticating the user, at the trusted server, based on the transmitted initial authentication information, (iv) encrypting, at the trusted server after the initial authentication, the stored F2 with the stored S, (v) transmitting, from the trusted server, encrypted F2, (vi) receiving, at the UNL, a user input corresponding to the first factor, (vii) computing S, at the UNL, based on the input initial authentication information, (viii) decrypting the transmitted encrypted F2, at the UNL, with the computed S, (ix) computing Dxx, at the UNL, based on the user input corresponding to F1 and the decrypted F2, (x) encrypting a message, at the UNL, with the computed Dxx, (xi) transmitting the encrypted message from the UNL, and (xii) decrypting, at the trusted server, the transmitted encrypted message with the stored Dxs.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×