×

Automatic Key Management Using Enterprise User Identity Management

  • US 20160241558A1
  • Filed: 02/13/2015
  • Published: 08/18/2016
  • Est. Priority Date: 02/13/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by at least one data processor, comprising:

  • forming a key pair for a user, the key pair comprising a public key and a private key that is unique to the user and that is encrypted using a passphrase comprised of an enterprise password of the user and an identification that uniquely identifies in the enterprise a user device by which the user accesses the enterprise, where the encrypted private key is comprised of the passphrase;

    storing the encrypted private key in the user device and storing the public key in at least one enterprise server that is accessed by the user via the user device and a server access function;

    subsequently, when the user accesses the enterprise server, providing the encrypted private key, that was stored in the user device, from the user device to the server access function in conjunction with the password and the identification that uniquely identifies in the enterprise the user device by which the user accesses the enterprise;

    decrypting at the server access function the encrypted private key using the provided password and the identification that uniquely identifies in the enterprise the user device to obtain from the decrypted private key the password and the identification that uniquely identifies in the enterprise the user device;

    comparing the provided password and the identification that uniquely identifies in the enterprise the user device with the password and the identification that uniquely identifies in the enterprise the user device that are obtained from the decrypted private key; and

    granting the user access to the enterprise server via the user device and the server access function only if the provided password and the identification that uniquely identifies in the enterprise the user device matches with the password and the identification that uniquely identifies in the enterprise the user device that are obtained from the decrypted private key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×