Method and system for secure authentication of a user by a host system
First Claim
1. A method for allowing a user to securely log on to a host system via an electronic interface, comprising:
- receiving, at a processor of an application server computer, a user'"'"'s personal identification number (PIN) encrypted with a symmetric key and the symmetric key and a replay prevention ID encrypted with a public key of a public/private key pair of the application server computer from a browser application on a user'"'"'s computing device via a processor of a web server computer, said symmetric key-encrypted user'"'"'s PIN and public key-encrypted symmetric key and replay prevention ID being encrypted and digitally signed within a single sign-on token;
decrypting, using the processor of the application server computer, the single sign-on token and passing, using the processor of the application server computer, the symmetric key-encrypted user'"'"'s PIN and the public key-encrypted symmetric key and replay prevention ID into a tamper-proof physical hardware security module of the application server computer;
decrypting, using a microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the public key-encrypted symmetric key and replay prevention ID with the private key of the public/private key pair, and decrypting, using the microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the symmetric key-encrypted user'"'"'s PIN with the decrypted symmetric key;
re-encrypting, using the microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the decrypted user'"'"'s PIN with a new symmetric key, and passing, using the microprocessor of the tamper-proof physical hardware security module, the re-encrypted user'"'"'s PIN and decrypted replay prevention ID out of the tamper-proof physical hardware security module;
sending, using the processor of the application server computer, the re-encrypted user'"'"'s PIN to a processor of an authentication server computer for verification; and
decrypting, using the processor of the authentication server computer, the re-encrypted user'"'"'s PIN with the new symmetric key, and verifying, using the processor of the authentication server computer, the decrypted user'"'"'s PIN.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction with the system in which a user'"'"'s credential is DES encrypted, and the DES key is PKI encrypted with the public key of an application server by an encryption applet before being transmitted to the application server. Within the HSM of the application server, the HSM decrypts and re-encrypts the credential under a new DES key known to the authentication server, the re-encrypted credential is forwarded to the authentication server, decrypted with the new DES key known to the authentication server, and verified by the authentication server.
71 Citations
15 Claims
-
1. A method for allowing a user to securely log on to a host system via an electronic interface, comprising:
-
receiving, at a processor of an application server computer, a user'"'"'s personal identification number (PIN) encrypted with a symmetric key and the symmetric key and a replay prevention ID encrypted with a public key of a public/private key pair of the application server computer from a browser application on a user'"'"'s computing device via a processor of a web server computer, said symmetric key-encrypted user'"'"'s PIN and public key-encrypted symmetric key and replay prevention ID being encrypted and digitally signed within a single sign-on token; decrypting, using the processor of the application server computer, the single sign-on token and passing, using the processor of the application server computer, the symmetric key-encrypted user'"'"'s PIN and the public key-encrypted symmetric key and replay prevention ID into a tamper-proof physical hardware security module of the application server computer; decrypting, using a microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the public key-encrypted symmetric key and replay prevention ID with the private key of the public/private key pair, and decrypting, using the microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the symmetric key-encrypted user'"'"'s PIN with the decrypted symmetric key; re-encrypting, using the microprocessor of the tamper-proof physical hardware security module, internally within the tamper-proof physical hardware security module, the decrypted user'"'"'s PIN with a new symmetric key, and passing, using the microprocessor of the tamper-proof physical hardware security module, the re-encrypted user'"'"'s PIN and decrypted replay prevention ID out of the tamper-proof physical hardware security module; sending, using the processor of the application server computer, the re-encrypted user'"'"'s PIN to a processor of an authentication server computer for verification; and decrypting, using the processor of the authentication server computer, the re-encrypted user'"'"'s PIN with the new symmetric key, and verifying, using the processor of the authentication server computer, the decrypted user'"'"'s PIN. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for allowing a user to securely log on to a host system via an electronic interface, comprising:
-
an application server computer having a processor coupled to memory, said application server computer processor being programmed for; receiving a user'"'"'s personal identification number (PIN) encrypted with a symmetric key and the symmetric key and a replay prevention ID encrypted with a public key of a public/private key pair of the application server computer from a browser application on a user'"'"'s computing device via a processor of a web server computer, said symmetric key-encrypted user'"'"'s PIN and public key-encrypted symmetric key and replay prevention ID being encrypted and digitally signed within a single sign-on token, decrypting the single sign-on token and passing the symmetric key-encrypted user'"'"'s PIN and the public key-encrypted symmetric key and replay prevention ID into a tamper-proof physical hardware security module of the application server computer; the tamper-proof physical hardware security module having a microprocessor coupled to memory, said tamper-proof physical hardware security module microprocessor being programmed for; decrypting, internally within the tamper-proof physical hardware security module, the public key-encrypted symmetric key and replay prevention ID with the private key of the public/private key pair, decrypting, internally within the tamper-proof physical hardware security module, the symmetric key-encrypted user'"'"'s PIN with the decrypted symmetric key, re-encrypting, internally within the tamper-proof physical hardware security module, the decrypted user'"'"'s PIN with a new symmetric key, and passing the re-encrypted user'"'"'s PIN and decrypted replay prevention ID out of the tamper-proof physical hardware security module; the application server computer processor being further programmed for sending the re-encrypted user'"'"'s credentials to an authentication server computer for verification; and the authentication server computer having a processor coupled to memory, said authentication server computer processor being programmed for decrypting the re-encrypted user'"'"'s credentials with the new symmetric key and for verifying the decrypted user'"'"'s credentials.
-
Specification