Supporting the use of a secret key
First Claim
1. A method performed by an apparatus of a first installation, which stores key identifications with allocation to a respective user, wherein a second installation stores secret keys which each can be found by means of a respective key identification, the method comprising:
- authenticating a user who logs onto the first installation via a user device,creating a temporary identifier as a basis for retrieving a secret key held ready for the user in the second installation and allocating the temporary identifier to the user,transmitting the temporary identifier to the user device,receiving a request for a key identification from the second installation, wherein the request contains the temporary identifier which was transmitted to the second installation from the user device,determining the user allocated to the received temporary identifier and determining the key identification stored for the determined user, andtransmitting the key identification to the second installation.
1 Assignment
0 Petitions
Accused Products
Abstract
A first installation stores key identifications with allocation to a respective user and a second installation stores secret keys which each can be found by means of a key identification. The first installation authenticates a user who logs onto the first installation via a user device, creates a temporary identifier, allocates the identifier to the user and transmits the identifier to the user device. The second installation receives a request for a secret key from the user device together with the identifier and requests a key identification from the first installation, wherein the received identifier is transmitted. The first installation determines a user allocated to the received identifier, identifies a key identification stored for the determined user and transmits the key identification to the second installation. This second installation determines a secret key based on the received key identification and transmits the secret key to the user device.
-
Citations
20 Claims
-
1. A method performed by an apparatus of a first installation, which stores key identifications with allocation to a respective user, wherein a second installation stores secret keys which each can be found by means of a respective key identification, the method comprising:
-
authenticating a user who logs onto the first installation via a user device, creating a temporary identifier as a basis for retrieving a secret key held ready for the user in the second installation and allocating the temporary identifier to the user, transmitting the temporary identifier to the user device, receiving a request for a key identification from the second installation, wherein the request contains the temporary identifier which was transmitted to the second installation from the user device, determining the user allocated to the received temporary identifier and determining the key identification stored for the determined user, and transmitting the key identification to the second installation. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus of a first installation, which stores key identifications with allocation to a respective user, wherein a second installation stores secret keys which each can be found by means of a respective key identification, the apparatus comprising at least one processor and at least one memory storing a program, wherein the at least one memory and the program are configured to, with the at least one processor, cause the apparatus to perform the following:
-
authenticate a user who logs onto the first installation via a user device, create a temporary identifier as a basis for retrieving a secret key held ready for the user in the second installation and allocating the temporary identifier to the user, transmit the temporary identifier to the user device, receive a request for a key identification from the second installation, wherein the request contains the temporary identifier which was transmitted to the second installation from the user device, determine the user allocated to the received temporary identifier and determining the key identification stored for the determined user, and transmit the key identification to the second installation. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium which stores a program comprising program instructions, wherein the program instructions when executed by a processor cause an apparatus of a first installation, which stores key identifications with allocation to a respective user, to perform the following, wherein a second installation stores secret keys which each can be found by means of a respective key identification:
-
authenticate a user who logs onto the first installation via a user device, create a temporary identifier as a basis for retrieving a secret key held ready for the user in the second installation and allocating the temporary identifier to the user, transmit the temporary identifier to the user device, receive a request for a key identification from the second installation, wherein the request contains the temporary identifier which was transmitted to the second installation from the user device, determine the user allocated to the received temporary identifier and determining the key identification stored for the determined user, and transmit the key identification to the second installation.
-
-
11. A method performed by an apparatus of a second installation which stores secret keys which each can be found by means of a respective key identification, wherein a first installation stores key identifications with allocation to a respective user, the method comprising:
-
receiving a request for a secret key from a user device together with a temporary identifier, requesting a key identification from the first installation, wherein the received temporary identifier is transmitted, receiving the key identification from the first installation for the user allocated to the temporary identifier in the first installation, determining the secret key based on the received key identification and transmitting the secret key to the user device. - View Dependent Claims (12, 13, 14)
-
-
15. An apparatus of a second installation which stores secret keys which each can be found by means of a respective key identification, wherein a first installation stores key identifications with allocation to a respective user, the apparatus comprising at least one processor and at least one memory storing a program, wherein the at least one memory and the program are configured to, with the at least one processor, cause an apparatus to perform the following:
-
receive a request for a secret key from a user device together with a temporary identifier, request a key identification from the first installation, wherein the received temporary identifier is transmitted, receive the key identification from the first installation for the user allocated to the temporary identifier in the first installation, determine the secret key based on the received key identification, and transmit the secret key to the user device. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium which stores a program comprising program instructions, wherein the program instructions when executed by a processor cause an apparatus of a second installation which stores secret keys which each can be found by means of a respective key identification to perform the following, wherein a first installation stores key identifications with allocation to a respective user:
-
receive a request for a secret key from a user device together with a temporary identifier, request a key identification from the first installation, wherein the received temporary identifier is transmitted, receive the key identification from the first installation for the user allocated to the temporary identifier in the first installation, determine the secret key based on the received key identification, and transmit the secret key to the user device.
-
Specification