Generierung und Verwaltung geheimer Chiffrierschlüssel auf Kennwortgrundlage

    公开(公告)号:DE112015002927T5

    公开(公告)日:2017-03-16

    申请号:DE112015002927

    申请日:2015-08-25

    Applicant: IBM

    Abstract: Bereitgestellt werden Verfahren und Vorrichtungen zum Generieren eines geheimen Chiffrierschlüssels eines Benutzercomputers 3, der sich über ein Netzwerk 4 mit einem Server 2 verbinden lässt. Auf dem Benutzercomputer 3 wird ein geheimer Benutzerwert bereitgestellt. Auf dem Server 2 wird ein geheimer Serverwert mit einem Prüfwert bereitgestellt, der den geheimen Benutzerwert und ein Benutzerkennwort codiert. Als Reaktion auf eine Eingabe eines Eingabekennworts auf dem Benutzercomputer 3 codiert der Benutzercomputer den geheimen Benutzerwert und das Eingabekennwort, um einen ersten Wert zu erzeugen, der dem Prüfwert entspricht, und überträgt den ersten Wert über das Netzwerk 4 an den Server 2. Als Reaktion darauf vergleicht der Server 2 den ersten Wert und den Prüfwert, um zu prüfen, ob das Eingabekennwort gleich dem Benutzerkennwort ist. Wenn dies der Fall ist, codiert der Server 2 den ersten Wert und den geheimen Serverwert, um einen zweiten Wert zu erzeugen, und überträgt den zweiten Wert über das Netzwerk 4 an den Benutzercomputer 3. Als Reaktion darauf generiert der Benutzercomputer den geheimen Chiffrierschlüssel, indem er den zweiten Wert, das Eingabekennwort und den geheimen Benutzerwert codiert.

    Distributed single sign-on
    12.
    发明专利

    公开(公告)号:GB2530726A

    公开(公告)日:2016-04-06

    申请号:GB201416888

    申请日:2014-09-25

    Applicant: IBM

    Abstract: A user computer (2, fig. 1) connects via a network (3, fig. 1) to verifier servers (4, fig. 1) and authentication servers (5, fig. 1). Respective cryptographic shares of password data, dependent on a predetermined user password, are provided at the authentication servers. A plurality of password data shares is needed to determine if the password matches a password attempt. Respective cryptographic shares of secret data, enabling determination of a username for a verifier server, are provided at the authentication servers. A plurality of secret data shares is needed to reconstruct the secret data. The user computer communicates 32, via the network, with a minimum threshold number of the authentication servers and the password data shares of those servers are used to determine if 33 the user password matches an input password attempt 31. If so, the user computer receives 35 secret data shares from respective authentication servers. On receipt of said shares, the user computer reconstructs 36 and uses the secret data to generate 37, in communication with a plurality of the authentication servers, a cryptographic token for authenticating 38, 39 secretly from the authentication servers the user computer to a selected verifier server under the username that server.

    Backup and invalidation of authentication credentials

    公开(公告)号:GB2527603A

    公开(公告)日:2015-12-30

    申请号:GB201411510

    申请日:2014-06-27

    Applicant: IBM

    Abstract: Re-issuance of an attribute-based user credential, wherein the user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair, comprising: receiving by the issuer from the user a set of values derived from the backup values comprising a second value of the at least one authentication pair, validating by the issuer that the second value is a valid authentication answer with respect to the first value and whether the set of values was derived from a valid first credential, and providing by the issuer a second credential to the user based on the first set of values.

    Reissue of crypographic credentials

    公开(公告)号:GB2521802B

    公开(公告)日:2015-10-14

    申请号:GB201508225

    申请日:2013-10-10

    Applicant: IBM

    Abstract: Effecting reissue in a data processing system of a cryptographic credential certifying a set of attributes, the credential being initially bound to a first secret key stored in a first processing device. A backup token is produced using the first device and comprises a commitment to said set of attributes and proof data permitting verification that the set of attributes in said commitment corresponds to the set of attributes certified by said credential. At a second processing device, a second secret key is stored and blinded to produce a blinded key. A credential template token produced from the backup token and the blinded key is sent to a credential issuer where said verification is performed using the proof data and the credential template token is used to provide a reissued credential, certifying said set of attributes, to the second device, the reissued credential being bound to the second secret key.

    Reissue of crypographic credentials

    公开(公告)号:GB2521802A

    公开(公告)日:2015-07-01

    申请号:GB201508225

    申请日:2013-10-10

    Applicant: IBM

    Abstract: Methods and apparatus are provided for effecting reissue in a data processing system of a cryptographic credential certifying a set of attributes, the credential being initially bound to a first secret key stored in a first tamper-resistant processing device (10). A backup token is produced using the first tamper-resistant processing device (10). The backup token comprises a commitment to said set of attributes and first proof data permitting verification that the set of attributes in said commitment corresponds to the set of attributes certified by said credential. The backup token is stored in backup memory (14). If the first tamper-resistant device should be lost or stolen, then at a second tamper- resistant processing device (10) storing a second secret key, the second secret key is blinded to produce a blinded key. A credential template token is produced from the backup token and the blinded key. The credential template token is sent to a credential issuer (2) of the data processing system (1) via user apparatus (6) of the system. At the credential issuer (2), said verification is performed using the first proof data and the credential template token is used to provide a reissued credential, certifying said set of attributes, to the second tamper-resistant device via said user apparatus (6), the reissued credential being bound to the second secret key.

Patent Agency Ranking