×

Supporting the use of a secret key

  • US 9,530,013 B2
  • Filed: 03/25/2015
  • Issued: 12/27/2016
  • Est. Priority Date: 08/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by an apparatus of a first installation, which stores key identifications with allocation to a respective user, wherein a second installation stores secret keys which each can be found by means of a respective key identification, the method comprising:

  • authenticating a user who logs onto the first installation via a user device,creating a temporary identifier as a basis for retrieving a secret key held ready for the user in the second installation and allocating the temporary identifier to the user,transmitting the temporary identifier to the user device,receiving a request for a key identification from the second installation, wherein the request contains the temporary identifier which was transmitted to the second installation from the user device,determining the user allocated to the received temporary identifier and determining the key identification stored for the determined user, andtransmitting the key identification to the second installation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×