System and method for digital user authentication
First Claim
1. A method of digital user authentication comprising:
- receiving a request at a server from a private key module associated with a first user device;
directing a request for a user challenge from the server to a second user device, wherein the second user device is a smartphone or a tablet, wherein successful completion of the user challenge is required to access a first portion of a private key; and
in response to a successful user challenge completed on the second user device, creating at least a second portion of a digital signature associated with a second portion of the private key at the server to authenticate the user to a third party.
3 Assignments
0 Petitions
Accused Products
Abstract
A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the private key from the server to a second user device; and in response to a successful user challenge creating a first portion of a digital signature and a second portion of a digital signature at the server. The method of the preferred embodiment can further include combining the first portion of the digital signature and the second portion of the digital signature; and delivering the digital signature to the first user device. The method of the preferred embodiment can function to secure the digital signature process by splitting or dividing the user'"'"'s private key into two or more portions, each of which require independent authorization from the user in order to create the digital signature.
127 Citations
28 Claims
-
1. A method of digital user authentication comprising:
-
receiving a request at a server from a private key module associated with a first user device; directing a request for a user challenge from the server to a second user device, wherein the second user device is a smartphone or a tablet, wherein successful completion of the user challenge is required to access a first portion of a private key; and in response to a successful user challenge completed on the second user device, creating at least a second portion of a digital signature associated with a second portion of the private key at the server to authenticate the user to a third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of digital user authentication comprising:
-
delivering a public key from a first user device to a third party; generating a first portion of a digital signature, the first portion derived from a first portion of a private key, on the first user device; requesting a second portion of a digital signature, the second portion derived from a second portion of the private key by the first user device; receiving at the first user device at least a second portion of a digital signature derived from the second portion of the private key in response to a successful user challenge completed on a second user device, wherein the second user device is a smartphone or a tablet; and delivering a digital signature from the first user device to the third party. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of digital user authentication comprising:
-
receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of a digital signature derived from a first portion of a private key from the server to a second user device;
wherein the second user device is a smartphone or tablet;in response to a successful user challenge completed on the second device, creating at least a second portion of a digital signature derived from a second portion of the private key at the server; combining the first portion of the digital signature and the second portion of the digital signature at the server; and delivering the digital signature from the server to the first user device. - View Dependent Claims (24, 25, 26, 27, 28)
-
Specification