System and method for providing an user's security when setting-up a connection over insecure networks
First Claim
1. A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of:
- transmitting an identity token or identity claim from a user station to a service provider station, wherein the user station and service provider station are coupled to the insecure network, and wherein the service provider station comprises at least one computer system including at least one processor;
triggering, with the at least one processor, the creation of a secret URL by the service provider station upon reception of the identity token or identity claim;
transmitting, from the at least one computer system, the secret URL over a telephone line as secure side channel to the user station;
obtaining the secret URL within the user station; and
setting-up a new communication path in the insecure network that links the user and the service provider station based on said secret URL, wherein the step of triggering the creation of a secret URL comprises the steps of;
creating a crypto-container by the service provider station, wherein the crypto-container includes the secret URL encrypted with a key known to the user, wherein the secure side channel is used to transmit the crypto-container; and
decrypting the crypto-container within the user station to obtain the secret URL.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.
8 Citations
12 Claims
-
1. A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of:
-
transmitting an identity token or identity claim from a user station to a service provider station, wherein the user station and service provider station are coupled to the insecure network, and wherein the service provider station comprises at least one computer system including at least one processor; triggering, with the at least one processor, the creation of a secret URL by the service provider station upon reception of the identity token or identity claim; transmitting, from the at least one computer system, the secret URL over a telephone line as secure side channel to the user station; obtaining the secret URL within the user station; and setting-up a new communication path in the insecure network that links the user and the service provider station based on said secret URL, wherein the step of triggering the creation of a secret URL comprises the steps of; creating a crypto-container by the service provider station, wherein the crypto-container includes the secret URL encrypted with a key known to the user, wherein the secure side channel is used to transmit the crypto-container; and decrypting the crypto-container within the user station to obtain the secret URL. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for setting up a secure communication between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of:
-
transmitting an identity token or identity claim from a user station to a service provider station, wherein the user station and service provider station are coupled to the insecure network, and wherein the service provider station comprises at least one computer system including at least one processor; triggering, with the at least one processor, the creation of a secret codebook by the service provider station upon reception of the identity token or identity claim; transmitting, from the at least one computer system, the secret codebook over a telephone line as a secure side channel to the user station; obtaining the secret codebook within the user station; and transmitting a choice from the codebook to the service provider station, wherein the step of triggering the creation of a secret codebook comprises the steps of; creating a crypto-container by the service provider station, wherein the crypto-container includes the secret codebook encrypted with a key known to the user, wherein the secure side channel is used to transmit the crypto-container; and decrypting the crypto-container within the user station to obtain the secret codebook. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for setting up a secure communication line between a user computer and a service provider computer using non-secure communication channels within an insecure network, comprising:
-
a user computer coupled to the insecure network through a first data terminal equipment; a service provider computer coupled to the insecure network through a second data terminal equipment; a communication path in the insecure network linking the user computer and the service provider computer; a first communication unit for communicating a request from the user computer to the service provider computer; a URL creation module for creating a URL within the service provider computer; a second communication unit for communicating the URL from the service provider computer to the user computer over a telephone line as a secure side channel; a URL accessing unit for accessing the URL by the user; and a set-up module for setting-up a new communication path in the insecure network linking the user computer and the service provider computer based on the secret URL.
-
-
12. A system for setting up a secure communication between a user computer and a service provider computer using non-secure communication channels within an insecure network, comprising:
-
a user computer coupled to the insecure network through a first data terminal equipment; a service provider computer coupled to the insecure network through a second data terminal equipment; a communication path in the insecure network linking the user computer and the service provider computer; a first communication unit for communicating a request from the user computer to the service provider computer; a codebook creation module for creating a codebook within the service provider computer; a second communication unit for communicating the codebook from the service provider computer to the user over a telephone line as a secure side channel; a codebook accessing unit for accessing the codebook by the user; and a codebook choice display menu module for enabling and transmitting the choice of one of the codebook options to communicate the choice in the insecure network linking the user computer and the service provider computer based on the secret knowledge.
-
Specification