×

Automatic key management using enterprise user identity management

  • US 10,454,676 B2
  • Filed: 06/22/2015
  • Issued: 10/22/2019
  • Est. Priority Date: 02/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprised of at least one data processor connected with at least one memory that stores software instructions, where execution of the software instructions by the at least one data processor causes the system to:

  • form a key pair for a user, the key pair comprising a public key and a private key,wherein the private key is unique to the user,wherein the private key is encrypted to create an encrypted private key using a passphrase comprised of an enterprise password of the user verified by an enterprise directory and comprised of an identification; and

    wherein the identification uniquely identifies in the enterprise a user device by which the user accesses the enterprise;

    store the private key in the user device;

    store the public key in at least one enterprise server for use by the enterprise server;

    receiving from a device used by the user an encrypted private key in conjunction with an entered password and an entered user identification;

    verify, by a server access function and by using the enterprise directory, that the entered user identification matches an authorized user identification and the entered password matches the enterprise password;

    determine by the server access function an identification of the device used by the user to enter the user identification and password;

    decrypt by the server access function the encrypted private key received from the device using the identification of the device and the entered password;

    compare by the server access function the identification of the device, which is obtained in conjunction with the decrypting of the private key received from the device, with the identification that uniquely identifies the user device in the enterprise; and

    grant by the server access function the user access to the at least one enterprise server via the device, in response to the identification of the device matching the identification that uniquely identifies in the enterprise the user device, the user identification being verified by using the enterprise directory, and the entered password being verified by using the enterprise directory to match the enterprise password.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×