User authentication system
First Claim
Patent Images
1. A communication method comprising:
- authenticating at least one user to a plurality of access devices; and
building at least one network comprising the access devices.
5 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
130 Citations
58 Claims
-
1. A communication method comprising:
-
authenticating at least one user to a plurality of access devices; and
building at least one network comprising the access devices. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10, 11, 12, 13)
-
-
14. A communication method comprising:
-
authenticating a plurality of users to a plurality of access devices; and
building a plurality of networks comprising the access devices. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of authenticating a user to a device comprising:
-
defining a security boundary associated with an access device; and
providing at least one credential directly into the security boundary to authenticate a user to the access device. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of accessing a service comprising:
-
receiving a credential associated with a user;
authenticating the credential;
providing the authenticated credential to a service provider;
receiving at least one key from the service provider in response to the authenticated credential; and
using the at least one key to access a service. - View Dependent Claims (36, 37, 38, 39)
-
-
40. A communication system comprising:
-
a plurality of access devices coupled to receive authentication information, each access device comprising at least one cryptographic processor for signing the authentication information;
an access server coupled to receive the signed authentication information, the access server comprising at least one cryptographic processor for generating at least one key for the access devices, the access server configured to provide the at least one key to the access devices in accordance with the signed authentication information. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. An access device comprising:
-
at least one cryptographic processor within a security boundary; and
at least one input device configured to provide authentication signals directly into the security boundary. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification