| CPC H04L 9/3273 (2013.01) [H04L 9/0844 (2013.01); H04L 9/0869 (2013.01); H04L 9/14 (2013.01); H04L 9/3242 (2013.01); H04L 9/3265 (2013.01); H04L 9/3268 (2013.01); H04L 63/0428 (2013.01); H04L 63/0442 (2013.01); H04L 63/061 (2013.01); H04L 63/0869 (2013.01); H04L 9/50 (2022.05); H04L 2209/04 (2013.01); H04L 2209/08 (2013.01); H04L 2209/56 (2013.01)] | 19 Claims |

|
1. A computer-implemented method comprising:
encrypting, by an authentication server, an authentication challenge to obtain an encrypted authentication challenge;
sending, by the authentication server, the encrypted authentication challenge to a user device;
receiving, by the authentication server, an encrypted authentication response from the user device;
generating, by the authentication server, a shared secret using an authentication server private key and a user device authentication public key;
decrypting, by the authentication server, the encrypted authentication response using the shared secret to obtain an authentication response including a signed authentication challenge, wherein the user device generated the signed authentication challenge by signing the authentication challenge using a user device authentication private key corresponding to the user device authentication public key; and
authenticating, by the authentication server, the user device based on verifying the signed authentication challenge included in the authentication response using the user device authentication public key.
|