×

Method for producing a soft token, computer program product and service computer system

  • US 9,647,840 B2
  • Filed: 10/17/2013
  • Issued: 05/09/2017
  • Est. Priority Date: 10/26/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for generating a soft token, the method comprising:

  • providing a secure element, wherein, in a protected storage area of the secure element, a secret key of a first asymmetric cryptographic key pair is stored and wherein the secure element is associated with a user, setting up a first cryptographically secured connection between an electronic device of the user and a service computer system;

    transmitting a request for the generation of the soft token from the electronic device to the service computer system via the first connection;

    generating, by the service computer system, a one-time password on the basis of a reception of the request by the service computer system, where the one-time password is generated without knowledge of the secret key of the first asymmetric cryptographic key pair;

    registering the one-time password as an identifier of the first connection by the service computer system;

    transmitting the one-time password from the service computer system to the electronic, device via the first connection;

    issuing the one-time password via a user interface of the electronic device;

    setting up a second cryptographically stored connection between a user computer system and the service computer system;

    entering the one-time password into the user computer system;

    transmitting the entered one-time password from the user computer system to the service computer system via the second connection;

    verifying, by means of the service computer system, whether the registered one-time password is in agreement with the one-time password received via the second connection, and if successfully verified, reading at least one attribute stored in an ID token; and

    generating the soft token by signing the at least one attribute and a public key of the first cryptographic key pair, transmitting the soft token via the first connection to the electronic device and/or transmitting the soft token via the second connection to the user computer system, wherein a local connection is set up between the user computer system and the secure element, wherein the local connection is a bidirectional ad hoc connection.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×