Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for anonymous authentication using multiple devices

Active Publication Date: 2016-06-23
UNIV OF SOUTH FLORIDA
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention proposes a system and method for verifying the identity of a group of users by requiring them to use multiple devices for authentication. This approach increases security and anonymity as it prevents unauthorized access through a single device and prevents the authentication system from learning which user has gained access.

Problems solved by technology

However, such a method of authentication can be prone to error and can require the user to recall hard-to-remember passwords.
However, such a method of authentication can be vulnerable to discovery of the user property.
However, such a method of authentication can be attacked by stealing the token.
Additionally, the traditional methods of authentication do not provide anonymity for a user requesting authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for anonymous authentication using multiple devices
  • Systems and methods for anonymous authentication using multiple devices
  • Systems and methods for anonymous authentication using multiple devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]The present disclosure describes systems and methods for authenticating “users” (which can be human users, devices, processes, clients, etc.). Authentication decisions can be based on the existence of cryptographic signatures from some set of devices (sometimes referred to as “tokens”) associated with the user, During registration, the authenticator (e.g., an “authentication server”) can associate devices with users and / or each other. This description therefore uses the term “registered” to mean “associated”; the devices “registered” with a user are “associated” with that user and / or with each other. Each device can have one or more associated cryptographic keys (which, in some embodiments, can be shared with the authenticator and / or other devices). Although the authenticator can associate a plurality of devices with each user, the associated devices need not store any data indicating or identifying the existence of other devices associated with the same user. Instead, the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user devices of an associated set of user devices, wherein each of the user devices is registered to at least one user requesting access to the resource registered to at least two users. The authenticator generates and transmits an authentication challenge in response to the request to a subset of the user devices. A user device subsequently generates and transmits a response to the authentication challenge to the authenticator. The authenticator determines whether the responses received from the one or more user devices constitutes a valid response and grants any one or more of the user devices of the associated set of user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to currently pending U.S. patent application Ser. No. 14 / 693,490, entitled “Systems and Method for Authentication Using Multiple Devices”, having a filing date of Apr. 22, 2015, which claims priority to U.S. Provisional Patent Application No. 62 / 095,137, entitled “Systems and Method for Authentication Using Multiple Devices”, having a filing date of Dec. 22, 2014, both of which are hereby incorporated by reference.BACKGROUND[0002]A traditional method of authentication can involve prompting a user for a username and password. However, such a method of authentication can be prone to error and can require the user to recall hard-to-remember passwords.[0003]Another traditional method of authentication can involve receiving a unique property of the user, such as a fingerprint, to identify a user. However, such a method of authentication can be vulnerable to discovery of the user property. For example, an attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0853H04L9/3271H04L63/0823H04L63/08H04L63/0407
Inventor LIGATTI, JARRED ADAMGOLDGOF, DMITRYCETIN, CAGRISUBILS, JEAN-BAPTISTE
Owner UNIV OF SOUTH FLORIDA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products