×

One-time password authentication employing local testing of candidate passwords from one-time password server

  • US 8,412,928 B1
  • Filed: 03/31/2010
  • Issued: 04/02/2013
  • Est. Priority Date: 03/31/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method by which a one-time password (OTP) server provides a one-time password service to an authentication server coupled to the OTP server by a communications channel, the method comprising the steps, performed by a processor of the OTP server, of:

  • maintaining, in a memory of the OTP server, a set of associations between a plurality of users and corresponding user-specific secret data used in a one-time-password (OTP) process to generate OTPs for use in authenticating the users;

    receiving an authentication request from the authentication server via the communications channel, the authentication request identifying one of the users, the authentication server having separately received a first hashed OTP value resulting from application of a hash function to a user-generated OTP for authenticating the identified user;

    in response to receiving the authentication request, executing the OTP process using the secret data for the identified user to generate a set of candidate OTPs, any one of the candidate OTPs being expected to match the user-generated OTP for a valid authentication of the identified user;

    generating and returning a response to the authentication server via the communications channel, the response including second hashed OTP values each generated by applying the hash function to a respective candidate OTP;

    subsequent to returning the response to the authentication server, receiving an informational message from the authentication server (a) indicating whether any of the second hashed OTP values has matched the first hashed OTP value, and (b) identifying which one, if any, of the second hashed OTP values has matched the first hashed OTP value; and

    conditionally taking further user-specific action based on the indication in the informational message whether any of the second hashed OTP values has matched the first hashed OTP value,wherein the further user-specific action includes (a) maintaining a count of recent occurrences of OTP requests for the user for which the informational message from the authentication server indicates that none of the second hashed OTP values has matched a hashed OTP value for the user, and (b) taking a count-based action based on whether the count of recent occurrences is greater than a predetermined threshold.

View all claims
  • 18 Assignments
Timeline View
Assignment View
    ×
    ×