METHOD FOR SECURING AN AUTOMATED SYSTEM
    1.
    发明申请

    公开(公告)号:US20190356487A1

    公开(公告)日:2019-11-21

    申请号:US15983233

    申请日:2018-05-18

    IPC分类号: H04L9/16 H04L9/08

    摘要: A method for securing a system including a configuration subsystem and a production subsystem. The configuration subsystem is separate from the production subsystem that comprises a plurality of components, a gatekeeper and an entity secured with a first secret value. A generator hosted in the configuration subsystem selects a secret sharing scheme and generates, from an input parameter different from the first secret value, a set of secret shares using the secret sharing scheme. The generator uniquely assigns and securely sends a secret share extracted from the set to each of the components. The gatekeeper gets a subset of the secret shares from the components and constructs a second secret value from the subset using the secret sharing scheme. The gatekeeper computes the first secret value by applying a preset function to the second secret value, and then the gatekeeper unlocks access to the entity using the first secret value.

    Method for securing an automated system

    公开(公告)号:US10805079B2

    公开(公告)日:2020-10-13

    申请号:US15983233

    申请日:2018-05-18

    IPC分类号: H04L9/16 H04L9/08 G06F21/60

    摘要: A method for securing a system including a configuration subsystem and a production subsystem. The configuration subsystem is separate from the production subsystem that comprises a plurality of components, a gatekeeper and an entity secured with a first secret value. A generator hosted in the configuration subsystem selects a secret sharing scheme and generates, from an input parameter different from the first secret value, a set of secret shares using the secret sharing scheme. The generator uniquely assigns and securely sends a secret share extracted from the set to each of the components. The gatekeeper gets a subset of the secret shares from the components and constructs a second secret value from the subset using the secret sharing scheme. The gatekeeper computes the first secret value by applying a preset function to the second secret value, and then the gatekeeper unlocks access to the entity using the first secret value.

    Use of personal device for convenient and secure authentication

    公开(公告)号:US10686787B2

    公开(公告)日:2020-06-16

    申请号:US15380204

    申请日:2016-12-15

    申请人: Gemalto Inc.

    摘要: The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal device, said authenticator being stored by the access device after registration of the personal device comprising a double encryption using an access device's secret key and a personal device's public key to be retrieved at each request of authentication received from the personal device, encrypted using a session key and sent with the session key encrypted using the personal device's public key to the personal device for partial decryption using the decrypted session key and the personal device's private key, re-encryption using the session key and sending back to the access device for total decryption of the authenticator, using the session key and the access device's secret key, and use of the thus decrypted authenticator to authenticate at the access device.

    Use of Personal Device for Convenient and Secure Authentication

    公开(公告)号:US20180176223A1

    公开(公告)日:2018-06-21

    申请号:US15380204

    申请日:2016-12-15

    申请人: Gemalto Inc.

    IPC分类号: H04L29/06

    摘要: The present invention relates to a method to authenticate a user using an authenticator at an access device using another registered device named personal device, said authenticator being stored by the access device after registration of the personal device comprising a double encryption using an access device's secret key and a personal device's public key to be retrieved at each request of authentication received from the personal device, encrypted using a session key and sent with the session key encrypted using the personal device's public key to the personal device for partial decryption using the decrypted session key and the personal device's private key, re-encryption using the session key and sending back to the access device for total decryption of the authenticator, using the session key and the access device's secret key, and use of the thus decrypted authenticator to authenticate at the access device.