×

Protecting passwords and biometrics against back-end security breaches

  • US 9,887,989 B2
  • Filed: 04/22/2016
  • Issued: 02/06/2018
  • Est. Priority Date: 06/23/2012
  • Status: Active Grant
First Claim
Patent Images

1. A multifactor authentication method for authenticating a user of an application while mitigating back-end security breaches, the application comprising an application front-end running on a computing device and an application back-end running on a server, the server being part of a back-end subsystem, the back-end subsystem comprising a back-end storage medium, the method comprising:

  • during a registration phase, the application front-end sending to the application back-end one or more registration-phase bearer tokens;

    during the registration phase, the application back-end computing a registration-phase tag derived from a registration-phase joint hash of a public key and the one or more registration-phase bearer tokens, the public key being a component of a key pair pertaining to an asymmetric cryptosystem, the public key being treated by the application as a secret shared between the application front-end and the application back-end, wherein the public key is never communicated by the application front-end or the application back-end to any third party;

    during the registration phase, the application back-end storing the registration-phase tag in the back-end storage medium;

    during the registration phase, the application back-end deleting the public key and the one or more registration-phase bearer tokens from the back-end subsystem after computing the registration-phase tag;

    during an authentication phase, the application front-end sending to the application back-end the public key and one or more authentication-phase bearer tokens;

    during the authentication phase, the application front-end proving to the application back-end knowledge of a private key associated with the public key, the private key being a component of the key pair;

    during the authentication phase, the application back-end computing an authentication-phase tag derived from an authentication-phase joint hash of the public key and the one or more authentication-phase bearer tokens;

    during the authentication phase, the application back-end deleting the public key and the one or more authentication-phase bearer tokens from the back-end subsystem after computing the authentication-phase tag; and

    during the authentication phase, the application back-end verifying that the authentication-phase tag is equal to the registration-phase tag.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×