System and method for accessing private networks
First Claim
1. A method of operating a mobile device, the method comprising:
- receiving at the mobile device, a challenge from an authentication server on behalf of a computing device attempting to access a private network, the challenge having been generated in response to a request by the computing device to access the private network;
obtaining a private value entered by a user, wherein the private value is not accessible by the computing device;
the mobile device using the private value, the challenge, and a private key stored on the mobile device to generate a response to the challenge; and
the mobile device sending the response to the authentication server to enable the computing device to access the private network.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for using a mobile device to authenticate access to a private network. The mobile device may operate to receive a challenge from an authentication server, the challenge having being generated according to a request to access a private network; obtain a private value; use the private value, the challenge, and a private key to generate a response to the challenge; and send the response to the authentication server. An authentication server may operate to generate a challenge; send the challenge to a mobile device; receive a response from the mobile device, the response having been generated by the mobile device using a private value, the challenge, and a private key; verify the response; and confirm verification of the response with a VPN gateway to permit a computing device to access a private network.
-
Citations
22 Claims
-
1. A method of operating a mobile device, the method comprising:
-
receiving at the mobile device, a challenge from an authentication server on behalf of a computing device attempting to access a private network, the challenge having been generated in response to a request by the computing device to access the private network; obtaining a private value entered by a user, wherein the private value is not accessible by the computing device; the mobile device using the private value, the challenge, and a private key stored on the mobile device to generate a response to the challenge; and the mobile device sending the response to the authentication server to enable the computing device to access the private network. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable storage medium comprising computer executable instructions for operating a mobile device, the computer executable instructions comprising instructions for:
-
receiving at the mobile device, a challenge from an authentication server on behalf of a computing device attempting to access a private network, the challenge having been generated in response to a request by the computing device to access the private network; obtaining a private value entered by a user, wherein the private value is not accessible by the computing device; the mobile device using the private value, the challenge, and a private key stored on the mobile device to generate a response to the challenge; and the mobile device sending the response to the authentication server to enable the computing device to access the private network. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A mobile device comprising a processor, and memory, the memory comprising computer executable instructions for causing the processor to:
-
receive at the mobile device, a challenge from an authentication server on behalf of a computing device attempting to access a private network, the challenge having been generated in response to a request by the computing device to access the private network; obtain a private value entered by a user, wherein the private value is not accessible by the computing device; use the private value, the challenge, and a private key stored on the mobile device to generate a response to the challenge; and send the response to the authentication server to enable the computing device to access the private network.
-
-
12. A method of operating an authentication server, the method comprising:
-
generating a challenge in response to a request from a computing device to access a private network; sending the challenge to a mobile device on behalf of the computing device attempting to access the private network; receiving a response from the mobile device, the response having been generated by the mobile device using a private value entered by a user, the challenge, and a private key stored on the mobile device, wherein the private value is not accessible by the computing device; verifying the response; and confirming verification of the response with a virtual private network gateway to permit the computing device to access the private network. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium comprising computer executable instructions for operating an authentication server, the computer executable instructions comprising instructions for:
-
generating a challenge in response to a request from a computing device to access a private network; sending the challenge to a mobile device on behalf of the computing device attempting to access the private network; receiving a response from the mobile device, the response having been generated by the mobile device using a private value entered by a user, the challenge, and a private key stored on the mobile device, wherein the private value is not accessible by the computing device; verifying the response; and confirming verification of the response with a virtual private network gateway to permit the computing device to access the private network. - View Dependent Claims (18, 19, 20, 21)
-
-
22. An authentication server comprising a processor and memory, the memory comprising computer executable instructions for causing the processor to:
-
generate a challenge in response to a request from a computing device to access a private network; send the challenge to a mobile device on behalf of the computing device attempting to access the private network; receive a response from the mobile device, the response having been generated by the mobile device using a private value entered by a user, the challenge, and a private key stored on the mobile device, wherein the private value is not accessible by the computing device; verify the response; and confirm verification of the response with a virtual private network gateway to permit the computing device to access the private network.
-
Specification