×

Cryptographic device that binds an additional authentication factor to multiple identities

  • US 8,819,437 B2
  • Filed: 09/30/2010
  • Issued: 08/26/2014
  • Est. Priority Date: 09/30/2010
  • Status: Active Grant
First Claim
Patent Images

1. In a computing environment, a method of binding a security artifact to a user'"'"'s account at a service provider, the method comprising a computing system performing the following:

  • accessing a first pseudonym for a security artifact, wherein the security artifact comprises at least one of a cryptographic hardware device or a software module that provides an additional authentication factor that is reusable across accounts from multiple service providers to authenticate to the different service providers either directly or by unlocking security tokens that have already been issued by the service providers, and wherein the security artifact is configured to perform cryptographic operations to prove its presence during authentication, and wherein the first pseudonym is an identifier of the security artifact to a first service provider and wherein the first pseudonym uniquely identifies the particular security artifact to the first service provider over other different security artifacts when the user has other security artifacts to authenticate to the same service provider to access a user account at the first service for the user;

    providing the first pseudonym for the security artifact to the first service provider, wherein the first pseudonym for the security artifact is bound with a user account at the first service provider for the user associated with the security artifact;

    accessing a second pseudonym, different than the first pseudonym, for the same security artifact, wherein the second pseudonym is an identifier of the security artifact to a second service provider, different than the first service provider, and wherein the second pseudonym uniquely identifies the particular security artifact to the second service provider over other different security artifacts when the user has other security artifacts to authenticate to the same service provider to access a user account at the second service for the user;

    providing the second pseudonym for the security artifact to the second service provider, wherein the second pseudonym for the security artifact is bound with a user account at the second service provider for the user associated with the security artifact; and

    wherein using the first pseudonym for the first service provider and the second pseudonym for the second service provider prevents activity using the security artifact from being correlated across the first service provider and the second service provider by using the first and second pseudonyms with the first and second service providers respectively when using the security artifact with the first and second service providers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×