×

Authentication system and method for operating the same

  • US 8,447,984 B1
  • Filed: 06/25/2004
  • Issued: 05/21/2013
  • Est. Priority Date: 06/25/2004
  • Status: Active Grant
First Claim
Patent Images

1. An authentication system, comprising:

  • an authentication card having a unique identifier, the authentication card being configured to include a private portion of an authentication keypair and an anonymous authentication certificate;

    a card reader capable of interfacing with the authentication card, the card reader being configured to access information stored on the authentication card;

    a client computing system connected to communicate with the card reader; and

    a server computing system connected to communicate with the client computing system, the server computing system including a memory having a user record stored therein, the user record including the unique identifier of the authentication card, a user name assigned to the authentication card, and the anonymous authentication certificate of the authentication card having a public portion of the authentication keypair, wherein the anonymous authentication certificate is stored on the authentication card during provisioning of the authentication card and is placed in the user record in association with the unique identifier of the authentication card during a user enrollment process that links the user name to the anonymous authentication certificate,wherein the presence of the anonymous authentication certificate in the user record enables the server computing system to authenticate the authentication card without communication with an external certificate authority,wherein the server is configured to transmit a challenge string to the authentication card, the authentication card being configured to encrypt the challenge string using the private portion of the authentication keypair and transmit the encrypted challenge string to the server as a response, the server being configured to decrypt the response using the public portion of the authentication keypair, the server being further configured to determine if the decrypted response matches the challenge string transmitted to the authentication card.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×