×

Method for distributed trust authentication

  • US 9,641,341 B2
  • Filed: 03/21/2016
  • Issued: 05/02/2017
  • Est. Priority Date: 03/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network, the method comprising:

  • distributing a first private key share of a first private key to a primary authentication system, a second private key share of the first private key to a secondary authentication system, and a public key to a first service provider, wherein the public key corresponds to a private key used to generate the first and second private key shares;

    wherein the secondary authentication system and the first service provider do not have access to the first private key share;

    wherein the primary authentication system and the first service provider do not have access to the second private key share, wherein the primary authentication system is an identity provider for the first service provider, and wherein the secondary authentication system is an independent authentication service;

    performing, at the primary authentication system, in response to a first attempt of a first user operating a computing device to access the first service provider, primary authentication of the first user using a first authentication factor;

    generating, at the primary authentication system, a first authentication response to the primary authentication;

    generating, at the primary authentication system, a first partial digital signature for the first authentication response using the first private key share;

    performing, at the secondary authentication system, in response to the first attempt of the first user to access the first service provider, secondary authentication of the first user using a second authentication factor;

    generating, at the secondary authentication system, a second authentication response to the secondary authentication;

    generating, at the secondary authentication system, a second partial digital signature for the second authentication response using the second private key share;

    combining the first and the second partial digital signatures, resulting in a first composite digital signature;

    transmitting, over the network, the first composite digital signature to the first service provider with the first and the second authentication responses;

    validating, at the first service provider, the first composite digital signature using the public key; and

    providing the first user with access, via the network, to the first service provider in response to successful validation of the first composite digital signature.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×