US20020062452A1 - Countering credentials copying - Google Patents

Countering credentials copying Download PDF

Info

Publication number
US20020062452A1
US20020062452A1 US09/921,265 US92126501A US2002062452A1 US 20020062452 A1 US20020062452 A1 US 20020062452A1 US 92126501 A US92126501 A US 92126501A US 2002062452 A1 US2002062452 A1 US 2002062452A1
Authority
US
United States
Prior art keywords
secret
client device
shared
server device
unpredictable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/921,265
Inventor
Warwick Ford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gen Digital Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/921,265 priority Critical patent/US20020062452A1/en
Priority to AU2001285083A priority patent/AU2001285083A1/en
Priority to PCT/US2001/025927 priority patent/WO2002017555A2/en
Assigned to VERISIGN, INC. reassignment VERISIGN, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FORD, WARWICK
Publication of US20020062452A1 publication Critical patent/US20020062452A1/en
Priority to US11/340,948 priority patent/US8478998B2/en
Assigned to SYMANTEC CORPORATION reassignment SYMANTEC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VERISIGN, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • This invention pertains to the field of authenticated communications between and among digital devices such as computers, and, specifically, pertains to techniques for thwarting the copying of credentials by nefarious persons or otherwise.
  • Diffie-Hellman key exchange as described in U.S. Pat. No. 4,200,770, is a mechanism to permit two entities to have a shared secret; the secret could be an encryption key.
  • shared unpredictable secret 50 is not an encryption key.
  • the present invention comprises systems, methods, and computer readable media for authenticating a client device ( 1 ) to a server device ( 5 ).
  • a preferred method comprises the steps of generating a shared unpredictable secret ( 50 ), storing the shared unpredictable secret ( 50 ) in the client device ( 1 ) and in the server device ( 5 ), and requiring the client device ( 1 ) to prove that it contains the correct shared unpredictable secret ( 50 ) as a precondition to the server device ( 5 ) validating the client device ( 1 ).
  • the shared unpredictable secret ( 50 ) is replaced by a new shared unpredictable secret ( 54 ) each time the server device ( 5 ) validates the client device ( 1 ).
  • FIG. 1 is a block system-level diagram of a preferred embodiment of the present invention.
  • FIG. 2 is a flow diagram of a preferred embodiment of the registration/reset phase of the present invention.
  • FIG. 3 is a flow diagram of a preferred embodiment of the log-in phase of the present invention.
  • FIG. 4 is a flow diagram illustrating an alternative embodiment of the method illustrated in FIG. 3.
  • FIG. 5 is an illustration of shared unpredictable secret 50 and its progeny.
  • client can be any digital device, e.g., a personal computer, mobile phone, smartcard, Internet appliance, or any other network accessible device.
  • client 1 There may be one client 1 or, as illustrated in FIG. 1, a finite number n of clients 1 .
  • Each client 1 wishes to communicate with an infrastructural component that is referred to in the present patent application as a server (or “server device”) 5 .
  • Server 5 may provide any type of service to client 1 .
  • server 5 might be an Internet service provider or a telephone network access point.
  • the communications link between client 1 and server 5 may be any link, such as a wireless link, a wired link, or a link over a network 4 , which may be an open network such as the Internet.
  • the process that commences with client 1 requesting validation with server 5 and including server 5 checking proof data that client 1 has generated from the shared unpredictable secret 50 is referred to herein as a “log-in”.
  • a log-in results in client 1 being either validated or not validated by server 5 .
  • One concern in such an environment pertains to credentials sharing.
  • a person who has access to a client device 1 voluntarily shares his personal credentials, such as a password or private cryptographic key, with other user devices 2 . All of these user devices 2 employ the user account of the original user.
  • Two problems that arise from this scenario are: 1) It is difficult for server 5 to hold particular users 2 accountable for their actions when using the services provided by server 5 , since some or all users 2 are indistinguishable from each other; and 2) Users may fraudulently avoid paying subscription fees that are designed for payment on a per-user basis.
  • malware 3 Another concern is outright credentials theft.
  • a nefarious person having access to a client-like device referred to as “attacker 3 ” in FIG. 1
  • penetrates a legitimate client device 1 copies stored credentials data from client device 1 into attacker device 3 , perhaps supplements this thievery with a determination of other information such as the user's password, personal identification number, or social security number from other sources, and then masquerades as the legitimate user from the attacker device 3 .
  • client device 1 being attacked is a hardware device and not a software module, this scenario is sometimes referred to as “device cloning”.
  • Client devices 1 that are typically cloned include mobile telephones and smartcards.
  • the present invention also applies to the copying of a portable credentials storage medium such as a magnetic stripe card or ticket if that medium is writable as well as readable by the terminal device in which it is used.
  • client device 1 is taken to mean the combination of the portable credentials storage medium and the terminal device in which it is currently inserted.
  • the present invention uses a method of stateful authenticators to provide a low cost, low overhead means of detecting when one user account is being employed for more than one client device 1 over a period of time.
  • the stateful authenticator used herein is a shared unpredictable secret 50 .
  • the present invention has utility in countering credentials sharing behavior by effectively restricting use of a user account to one or a limited number of client devices 1 .
  • the invention also counters credentials theft by means of detecting the use of one user account from more than one client device 1 after stored credentials have been copied between client devices 1 , regardless of how easy or difficult it was to copy the credentials from the original device 1 .
  • the method will first be described with respect to a special case in which there is but one legitimate client device 1 .
  • FIG. 2 illustrates the registration/reset phase.
  • client 1 typically presents a user's authentication data to server 5 .
  • the ensuing dialog between client 1 and server 5 is geared to determining whether the user associated with client 1 is legitimately associated with a claimed user account.
  • the authentication data presented by client 1 may include private personal data, a response to a pre-established challenge question posed by server 5 , a biometric input such as a fingerprint or an eyeball scan, etc.
  • the registration/reset phase may involve the user making a payment, in which case authentication data may or may not need to be presented by client 1 to server 5 .
  • the payment can be made by client 1 securely crediting server 5 's account, and can be made online or offline.
  • the registration/reset phase is typically undertaken less frequently than the log-in phase.
  • server 5 decides whether the authentication data presented by client 1 are acceptable. If not, client 1 is not allowed to register (step 26 ). If acceptable, client 1 is allowed to register (step 23 ). In this eventuality, the shared unpredictable secret 50 is generated (step 24 ).
  • the shared unpredictable secret (SUS) 50 comprises an unpredictable component 51 and an optional fixed component 52 .
  • Unpredictable component 51 may be generated by a random number generator or a pseudo-random number generator.
  • unpredictable component 51 is generated at server 5 and communicated to client 1 , but it may also be generated at client 1 , or at a combination of server 5 and client 1 .
  • unpredictable component 51 may be pre-installed in client device 1 during manufacture or during a device 1 personalization process.
  • fixed component 52 typically comprises identification information.
  • fixed component 52 may be a serial number of the client device 1 . This could be useful when there are two or more client devices 1 associated with the same user account number.
  • fixed component 52 could be the user account number when there is more than one user account number associated with the same client device 1 . This situation may occur, for example, when a user has one account number for business use and another account number for personal use; or when two users share the same cellular telephone 1 ; or when the client device 1 is a terminal into which users insert their credentials storage media.
  • server 5 transmits SUS 50 to client 1 .
  • the transmission is preferably encrypted, for reasons of security. Any type of encryption, including symmetric or asymmetric encryption, may be used.
  • an SUS 50 having an unpredictable component 51 is generated by the aforementioned Diffie-Hellman key exchange technique, or pre-installed in device 1 as described previously.
  • the same SUS 50 is stored in both server 5 and client 1 (step 25 ).
  • SUS's 50 may be stored in a secure fashion, such as using tamper-resistant hardware protection, e.g., epoxied integrated circuits, or by means of dynamically changing the location of SUS's 50 (and new SUS's 54 ) in storage.
  • FIG. 3 illustrates the basic method of the log-in phase.
  • the log-in at least for legitimate users, is not meant to be attempted until after the registration/reset phase has successfully concluded.
  • Steps 30 , 31 , and 32 are optional.
  • client 1 presents credentials to server 5 .
  • the credentials may include a password, personal identification number (PIN), a transformed (e.g. hashed) password, biometric signature, portable credentials medium identifier, or cryptographic authentication proof generated from a private cryptographic key.
  • PIN personal identification number
  • transformed e.g. hashed
  • biometric signature e.g. hashed
  • portable credentials medium identifier e.g. hashed
  • cryptographic authentication proof generated from a private cryptographic key.
  • step 31 server 5 checks the credentials. If the check fails, typically the client is not validated (step 32 ).
  • step 32 If step 32 is entered, one or more things may happen. For example, client 1 may be totally rejected and not allowed to be validated ever again. Less onerously, client 1 could be given reduced privileges, such as the ability to read a Web page stored on server 5 but not to conduct any financial transactions thereon; or client 1 could be made to re-enter the registration/reset phase.
  • step 33 client 1 presents proof data to server 5 .
  • the proof data allows server 5 to verify that client 1 holds a correct secret 50 , 54 .
  • the secret is SUS 50 .
  • the secret could be new SUS 54 , in the case where the log-in is a subsequent log-in following the re-set of server 5 as described in conjunction with step 43 , below.
  • the proof data are computed upon SUS 50 . It is desirable that SUS 50 itself be not directly communicated over an open network 4 lest it be intercepted by a nefarious person.
  • client 1 computes proof data without revealing SUS 50 itself is for client 1 to compute a one-way function of SUS 50 .
  • the one-way function is typically a cryptographic hash function.
  • server 5 checks the proof data by applying its (server 5 's) proof data generation algorithm to its (server 5 's) stored version of SUS 50 . If the proof data generated by server 5 matches the proof data presented by client 1 , client 1 has passed the test, and the method proceeds to step 37 . Otherwise, client 1 has failed the test and is not validated at step 32 . Step 32 operates as previously described.
  • client 1 and server 5 have to be using consistent if not identical proof data generation algorithms. It is immaterial whether or not an eavesdropper knows what this algorithm is (or what these algorithms are).
  • step 37 update data 53 and a new shared unpredictable secret 54 are generated, typically by sever 5 .
  • item 54 is referred to as a “secret” rather than a “shared unpredictable secret”, because the contents of the storage area that server 5 uses for SUS's are not replaced with new SUS 54 until step 40 is executed, below. Thus, the secret is not yet “shared”.
  • update data 53 is such that client 1 and server 5 are able to generate new SUS 54 from the most recent version of SUS 50 , by means of applying update data 53 thereto.
  • the a step of applying update data 53 to SUS 50 comprises computing a one-way function of the combination of SUS 50 and update data 53 .
  • update data 53 could be a new random or pseudo-random number that client 1 and server 5 XOR with old SUS 50 in order to generate new SUS 54 .
  • server 5 could send an encrypted new SUS 54 to client 1 , but the advantage of sending update data 53 is that update data 53 do not have to be encrypted, thus making for a simpler and less cumbersome protocol.
  • server 5 sends to client 1 an old SUS 50 that hasn't been acknowledged yet.
  • client 1 updates its (client 1 's) storage area that is allocated to SUS's with new secret 54 .
  • Client 1 's storage area may be on a portable credentials storage medium.
  • Steps 41 , 42 , and 43 are optional. Without these steps, the method illustrated in FIG. 3 works well when the communications channel 4 is clean and uncorrupted, but a potential problem arises in the case of a noisy or corrupted channel 4 : update data 53 could be lost in transit between client 5 and server 1 , or client 1 could fail to correctly store new secret 54 .
  • steps 41 , 42 , and 43 resolves the problem of noisy or corrupted channels 4 or a malfunctioning client device 1 , through the use of acknowledgement (ACK) data.
  • client 1 sends the ACK to server 5 after client 1 has successfully received update data 53 and stored the new secret 54 .
  • the ACK may optionally contain proof data allowing server 5 to verify that client 1 has successfully computed the new SUS 54 .
  • the proof data should not be the same proof data as used in step 33 ; otherwise, a replay attack would be possible.
  • server 5 is set (e.g., programmed) to accept proof data emanating from any SUS's since the previous validation, plus new SUS 54 .
  • server 5 is adapted to accept from client 1 any proof data that are generated from a secret that is newer than the secret for which the most recent acknowledgement data have been received by server 5 .
  • client 1 at step 33 will be presenting proof data emanating from new SUS 54
  • server 5 at step 34 will be programmed to accept said data.
  • update data 53 were not received by client 1
  • client 1 at step 33 will be presenting proof data emanating from an old SUS 50
  • server 5 at step 34 will be programmed to accept said data.
  • Step 42 illustrates the reality that server 5 may or may not receive the ACK, either because the update data 53 were lost in transit, the ACK was lost in transit, or the client device 1 failed.
  • server 5 receives the ACK within a preselected “time-out” period, then client 1 is validated at step 44 and step 40 is entered into.
  • server 5 updates its (server 5 's) storage area that is allocated to SUS's with new secret 54 .
  • new secret 54 becomes a new shared unpredictable secret, because it is now shared by client 1 and server 5 .
  • server 5 deletes SUS 50 and any older SUS's from its list of acceptable SUS's.
  • both client 1 and server 5 will have stored therewithin new SUS 54 ; and the proof data (of client 1 in step 33 and server 5 in step 34 ) will be based upon new SUS 54 .
  • server 5 does not receive at step 42 the ACK from client 1 during the time-out period, client 1 is not validated at step 32 , which executes as described previously.
  • the protocols described herein have the following desirable properties: 1) Any SUS ( 50 ) value produces no more than one validation; and 2) If the protocol fails at any stage, both client 1 and server 5 are left in a state that a new invocation of the protocol will operate correctly.
  • server 5 maintains an audit trail of log-in attempts, noting in particular those log-in attempts in which the step 34 checks have failed.
  • Each audit record should contain the then-current values of old SUS 50 and new SUS 54 .
  • server 5 maintains an audit trail of log-in attempts, the service provider or systems administrator can use the audit trail in resolving such disputes.
  • any user possessing or knowing correct credentials and attempting a log-in from a client device 1 that holds the correct SUS 50 will succeed in being validated, even in the event a log-in sequence is not successfully completed, owing, for example, to a communication or system failure.
  • the present invention automatically protects against message replay, i.e., the situation where an eavesdropper records a session and plays it back. This is because a new SUS 54 is generated at each successful validation.
  • FIG. 4 An alternative embodiment is illustrated in FIG. 4.
  • the method of claim 4 is identical to the method of FIG. 3 wherein acknowledgement data are used, except that steps 33 and 34 are consolidated into steps 41 and 42 .
  • the presentation of proof data by client 1 and the checking of the proof data by server 5 are not performed prior to server 5 generating update data 53 and new secret 54 in step 37 .
  • Step 50 of FIG. 4 replaces step 41 of FIG. 3.
  • client 1 sends both the proof data and the acknowledgement data to server 5 .
  • the proof data are computed on the new secret 54 .
  • the proof data could serve a double role as proof data and acknowledgement data. In this case, there is no need for acknowledgement data separate and apart from the proof data.
  • Step 51 of FIG. 4 replaces step 42 of FIG. 3.
  • server 5 checks both the proof data and the acknowledgement data, or, in the case where the proof data serve the double role as proof data and acknowledgement data, the proof data.
  • server 5 holds current SUS's 50 and new SUS's 54 for each client device 1 , and considers each client device 1 to be legitimate; and each client device 1 has its own unique SUS 50 and new SUS 54 .
  • the number n of clients 1 may be restricted in accordance with local policy.
  • SUS's 50 , 54 are respectively unique from one device 1 to the next.
  • the registration/reset process has to be undertaken by each client device 1 to establish each SUS 50 .
  • the invention is the same as described above in conjunction with the single client 1 embodiment.

Abstract

Systems, methods and computer readable media for enabling a server device (5) to validate one or more client devices (1). A shared unpredictable secret (50) is generated. The shared unpredictable secret (50) is stored in the client device (1) and in the server device (5). The client device (1) proves possession of a correct shared unpredictable secret (50) to the server device (5). The shared unpredictable secret (50) is replaced by a new shared unpredictable secret (54) each time the client device (1) is validated by the server device (5).

Description

    RELATED APPLICATION
  • This patent application is related to and claims priority from U.S. provisional patent application Ser. No. 60/226,429 filed on Aug. 18, 2000, entitled “Countering Credentials Theft”, having the same inventor and assignee as the present patent application.[0001]
  • TECNICAL FIELD
  • This invention pertains to the field of authenticated communications between and among digital devices such as computers, and, specifically, pertains to techniques for thwarting the copying of credentials by nefarious persons or otherwise. [0002]
  • BACKGROUND
  • Diffie-Hellman key exchange, as described in U.S. Pat. No. 4,200,770, is a mechanism to permit two entities to have a shared secret; the secret could be an encryption key. In the present invention, shared [0003] unpredictable secret 50 is not an encryption key.
  • DISCLOSURE OF INVENTION
  • The present invention comprises systems, methods, and computer readable media for authenticating a client device ([0004] 1) to a server device (5). A preferred method comprises the steps of generating a shared unpredictable secret (50), storing the shared unpredictable secret (50) in the client device (1) and in the server device (5), and requiring the client device (1) to prove that it contains the correct shared unpredictable secret (50) as a precondition to the server device (5) validating the client device (1). The shared unpredictable secret (50) is replaced by a new shared unpredictable secret (54) each time the server device (5) validates the client device (1).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other more detailed and specific objects and features of the present invention are more fully disclosed in the following specification, reference being had to the accompanying drawings, in which: [0005]
  • FIG. 1 is a block system-level diagram of a preferred embodiment of the present invention. [0006]
  • FIG. 2 is a flow diagram of a preferred embodiment of the registration/reset phase of the present invention. [0007]
  • FIG. 3 is a flow diagram of a preferred embodiment of the log-in phase of the present invention. [0008]
  • FIG. 4 is a flow diagram illustrating an alternative embodiment of the method illustrated in FIG. 3. [0009]
  • FIG. 5 is an illustration of shared [0010] unpredictable secret 50 and its progeny.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • As used in the present patent application, client (sometimes referred to as “client device”) [0011] 1 can be any digital device, e.g., a personal computer, mobile phone, smartcard, Internet appliance, or any other network accessible device. There may be one client 1 or, as illustrated in FIG. 1, a finite number n of clients 1. Each client 1 wishes to communicate with an infrastructural component that is referred to in the present patent application as a server (or “server device”) 5. Server 5 may provide any type of service to client 1. For example, server 5 might be an Internet service provider or a telephone network access point. The communications link between client 1 and server 5 may be any link, such as a wireless link, a wired link, or a link over a network 4, which may be an open network such as the Internet. The process that commences with client 1 requesting validation with server 5 and including server 5 checking proof data that client 1 has generated from the shared unpredictable secret 50 is referred to herein as a “log-in”. A log-in results in client 1 being either validated or not validated by server 5.
  • One concern in such an environment pertains to credentials sharing. In this scenario, a person who has access to a [0012] client device 1 voluntarily shares his personal credentials, such as a password or private cryptographic key, with other user devices 2. All of these user devices 2 employ the user account of the original user. Two problems that arise from this scenario are: 1) It is difficult for server 5 to hold particular users 2 accountable for their actions when using the services provided by server 5, since some or all users 2 are indistinguishable from each other; and 2) Users may fraudulently avoid paying subscription fees that are designed for payment on a per-user basis.
  • Another concern is outright credentials theft. In this scenario, a nefarious person having access to a client-like device, referred to as “attacker [0013] 3” in FIG. 1, penetrates a legitimate client device 1, copies stored credentials data from client device 1 into attacker device 3, perhaps supplements this thievery with a determination of other information such as the user's password, personal identification number, or social security number from other sources, and then masquerades as the legitimate user from the attacker device 3. When the client device 1 being attacked is a hardware device and not a software module, this scenario is sometimes referred to as “device cloning”. Client devices 1 that are typically cloned include mobile telephones and smartcards.
  • The present invention also applies to the copying of a portable credentials storage medium such as a magnetic stripe card or ticket if that medium is writable as well as readable by the terminal device in which it is used. In this case, the [0014] term client device 1 is taken to mean the combination of the portable credentials storage medium and the terminal device in which it is currently inserted.
  • The present invention uses a method of stateful authenticators to provide a low cost, low overhead means of detecting when one user account is being employed for more than one [0015] client device 1 over a period of time. Specifically, the stateful authenticator used herein is a shared unpredictable secret 50. The present invention has utility in countering credentials sharing behavior by effectively restricting use of a user account to one or a limited number of client devices 1. The invention also counters credentials theft by means of detecting the use of one user account from more than one client device 1 after stored credentials have been copied between client devices 1, regardless of how easy or difficult it was to copy the credentials from the original device 1.
  • All of the method steps illustrated herein describe modules that can be implemented in hardware, software, and/or firmware. Some of these modules reside on the [0016] client device 1 and some on the server device 5, as will be readily understood by examining the figures in conjunction with the following description.
  • The method will first be described with respect to a special case in which there is but one [0017] legitimate client device 1. There are two phases of the method of the present invention: a registration/reset phase and a log-in phase.
  • FIG. 2 illustrates the registration/reset phase. In [0018] step 21, client 1 typically presents a user's authentication data to server 5. The ensuing dialog between client 1 and server 5 is geared to determining whether the user associated with client 1 is legitimately associated with a claimed user account. The authentication data presented by client 1 may include private personal data, a response to a pre-established challenge question posed by server 5, a biometric input such as a fingerprint or an eyeball scan, etc. Alternatively, the registration/reset phase may involve the user making a payment, in which case authentication data may or may not need to be presented by client 1 to server 5. The payment can be made by client 1 securely crediting server 5's account, and can be made online or offline. The registration/reset phase is typically undertaken less frequently than the log-in phase.
  • At [0019] step 22, server 5 decides whether the authentication data presented by client 1 are acceptable. If not, client 1 is not allowed to register (step 26). If acceptable, client 1 is allowed to register (step 23). In this eventuality, the shared unpredictable secret 50 is generated (step 24).
  • As illustrated in FIG. 5, the shared unpredictable secret (SUS) [0020] 50 comprises an unpredictable component 51 and an optional fixed component 52. Unpredictable component 51 may be generated by a random number generator or a pseudo-random number generator. Typically, unpredictable component 51 is generated at server 5 and communicated to client 1, but it may also be generated at client 1, or at a combination of server 5 and client 1. As an alternative to communicating unpredictable component 51 to client 1, unpredictable component 51 may be pre-installed in client device 1 during manufacture or during a device 1 personalization process.
  • When used, [0021] fixed component 52 typically comprises identification information. For example, fixed component 52 may be a serial number of the client device 1. This could be useful when there are two or more client devices 1 associated with the same user account number. Conversely, fixed component 52 could be the user account number when there is more than one user account number associated with the same client device 1. This situation may occur, for example, when a user has one account number for business use and another account number for personal use; or when two users share the same cellular telephone 1; or when the client device 1 is a terminal into which users insert their credentials storage media.
  • Typically, after [0022] server 5 has generated SUS 50, server 5 transmits SUS 50 to client 1. The transmission is preferably encrypted, for reasons of security. Any type of encryption, including symmetric or asymmetric encryption, may be used. Alternatively, an SUS 50 having an unpredictable component 51 is generated by the aforementioned Diffie-Hellman key exchange technique, or pre-installed in device 1 as described previously. The same SUS 50 is stored in both server 5 and client 1 (step 25). SUS's 50 may be stored in a secure fashion, such as using tamper-resistant hardware protection, e.g., epoxied integrated circuits, or by means of dynamically changing the location of SUS's 50 (and new SUS's 54) in storage.
  • FIG. 3 illustrates the basic method of the log-in phase. The log-in, at least for legitimate users, is not meant to be attempted until after the registration/reset phase has successfully concluded. [0023] Steps 30, 31, and 32 are optional. At step 30, client 1 presents credentials to server 5. The credentials may include a password, personal identification number (PIN), a transformed (e.g. hashed) password, biometric signature, portable credentials medium identifier, or cryptographic authentication proof generated from a private cryptographic key. Since log-ins normally occur more frequently than registration/resets, the character and content of the credentials and procedure are such that the server's check of the credentials is typically simpler and faster than the server's check of the user's authentication data in previously-described step 21. In step 31, server 5 checks the credentials. If the check fails, typically the client is not validated (step 32).
  • If [0024] step 32 is entered, one or more things may happen. For example, client 1 may be totally rejected and not allowed to be validated ever again. Less onerously, client 1 could be given reduced privileges, such as the ability to read a Web page stored on server 5 but not to conduct any financial transactions thereon; or client 1 could be made to re-enter the registration/reset phase.
  • If the check passes, the method moves to step [0025] 33, where client 1 presents proof data to server 5. The proof data allows server 5 to verify that client 1 holds a correct secret 50, 54. (Normally, the secret is SUS 50. However, the secret could be new SUS 54, in the case where the log-in is a subsequent log-in following the re-set of server 5 as described in conjunction with step 43, below. For purposes of simplifying this discussion, it will be assumed that the proof data are computed upon SUS 50.) It is desirable that SUS 50 itself be not directly communicated over an open network 4 lest it be intercepted by a nefarious person. One method by which client 1 computes proof data without revealing SUS 50 itself is for client 1 to compute a one-way function of SUS 50. The one-way function is typically a cryptographic hash function. Then, at step 34, server 5 checks the proof data by applying its (server 5's) proof data generation algorithm to its (server 5's) stored version of SUS 50. If the proof data generated by server 5 matches the proof data presented by client 1, client 1 has passed the test, and the method proceeds to step 37. Otherwise, client 1 has failed the test and is not validated at step 32. Step 32 operates as previously described.
  • In order for this method to work, [0026] client 1 and server 5 have to be using consistent if not identical proof data generation algorithms. It is immaterial whether or not an eavesdropper knows what this algorithm is (or what these algorithms are).
  • At [0027] step 37, update data 53 and a new shared unpredictable secret 54 are generated, typically by sever 5. On FIG. 3 (boxes 37 and 39), item 54 is referred to as a “secret” rather than a “shared unpredictable secret”, because the contents of the storage area that server 5 uses for SUS's are not replaced with new SUS 54 until step 40 is executed, below. Thus, the secret is not yet “shared”.
  • Then, at [0028] step 38, server 5 sends update data 53 to client 1. Update data 53 is such that client 1 and server 5 are able to generate new SUS 54 from the most recent version of SUS 50, by means of applying update data 53 thereto. Typically, the a step of applying update data 53 to SUS 50 comprises computing a one-way function of the combination of SUS 50 and update data 53. For example, update data 53 could be a new random or pseudo-random number that client 1 and server 5 XOR with old SUS 50 in order to generate new SUS 54. Alternative to the use of update data 53, server 5 could send an encrypted new SUS 54 to client 1, but the advantage of sending update data 53 is that update data 53 do not have to be encrypted, thus making for a simpler and less cumbersome protocol. In an alternative embodiment, in situations where the optional acknowledgement data are used (see below), server 5 sends to client 1 an old SUS 50 that hasn't been acknowledged yet.
  • At [0029] step 39, client 1 updates its (client 1's) storage area that is allocated to SUS's with new secret 54. Client 1's storage area may be on a portable credentials storage medium.
  • [0030] Steps 41, 42, and 43 are optional. Without these steps, the method illustrated in FIG. 3 works well when the communications channel 4 is clean and uncorrupted, but a potential problem arises in the case of a noisy or corrupted channel 4: update data 53 could be lost in transit between client 5 and server 1, or client 1 could fail to correctly store new secret 54.
  • The inclusion of [0031] steps 41, 42, and 43 resolves the problem of noisy or corrupted channels 4 or a malfunctioning client device 1, through the use of acknowledgement (ACK) data. In step 41, client 1 sends the ACK to server 5 after client 1 has successfully received update data 53 and stored the new secret 54. The ACK may optionally contain proof data allowing server 5 to verify that client 1 has successfully computed the new SUS 54. The proof data should not be the same proof data as used in step 33; otherwise, a replay attack would be possible.
  • At [0032] step 43, server 5 is set (e.g., programmed) to accept proof data emanating from any SUS's since the previous validation, plus new SUS 54. Another way of saying this is that server 5 is adapted to accept from client 1 any proof data that are generated from a secret that is newer than the secret for which the most recent acknowledgement data have been received by server 5. Thus, if the situation is that client 1 has received the update data 53, but for some reason the ACK has been lost in transit, during the next log-in, client 1 at step 33 will be presenting proof data emanating from new SUS 54, and server 5 at step 34 will be programmed to accept said data. If, on the other hand, update data 53 were not received by client 1, then, during the next log-in, client 1 at step 33 will be presenting proof data emanating from an old SUS 50, and server 5 at step 34 will be programmed to accept said data.
  • Step [0033] 42 illustrates the reality that server 5 may or may not receive the ACK, either because the update data 53 were lost in transit, the ACK was lost in transit, or the client device 1 failed. If server 5 receives the ACK within a preselected “time-out” period, then client 1 is validated at step 44 and step 40 is entered into. At step 40, server 5 updates its (server 5's) storage area that is allocated to SUS's with new secret 54. Thus, new secret 54 becomes a new shared unpredictable secret, because it is now shared by client 1 and server 5. As a substep to step 40, server 5 deletes SUS 50 and any older SUS's from its list of acceptable SUS's. Thus, in future log-in attempts, both client 1 and server 5 will have stored therewithin new SUS 54; and the proof data (of client 1 in step 33 and server 5 in step 34) will be based upon new SUS 54.
  • If, on the other hand, [0034] server 5 does not receive at step 42 the ACK from client 1 during the time-out period, client 1 is not validated at step 32, which executes as described previously.
  • The protocols described herein have the following desirable properties: 1) Any SUS ([0035] 50) value produces no more than one validation; and 2) If the protocol fails at any stage, both client 1 and server 5 are left in a state that a new invocation of the protocol will operate correctly.
  • Optionally, for example in conjunction with step [0036] 34, server 5 maintains an audit trail of log-in attempts, noting in particular those log-in attempts in which the step 34 checks have failed. Each audit record should contain the then-current values of old SUS 50 and new SUS 54. In the event a legitimate user disputes accountability for actions attributed to use of his account, if server 5 maintains an audit trail of log-in attempts, the service provider or systems administrator can use the audit trail in resolving such disputes.
  • By using the techniques described herein, any user possessing or knowing correct credentials and attempting a log-in from a [0037] client device 1 that holds the correct SUS 50 will succeed in being validated, even in the event a log-in sequence is not successfully completed, owing, for example, to a communication or system failure.
  • The present invention automatically protects against message replay, i.e., the situation where an eavesdropper records a session and plays it back. This is because a [0038] new SUS 54 is generated at each successful validation.
  • If the legitimate user of the credentials voluntarily shares his credentials with one or more other users who will be operating from what in essence becomes an [0039] illegitimate client device 2, only one client (legitimate client 1 or illegitimate client 2) can successfully log in subsequently without server 5 invoking special action, such as causing the requesting client 1,2 to re-execute the registration/reset phase. This represents a disincentive for the legitimate user to share his credentials, since his own usage of his account will be negatively impacted.
  • If the legitimate user's credentials are copied in a credentials theft, then one of the following scenarios will subsequently occur: [0040]
  • 1) The [0041] legitimate client 1 logs in again before the attacker 3 attempts to masquerade as a legitimate user. In this case, the attacker 3 log-in will be alerted to the server 5 and consequently be subject to special action, such as rejection outright or granting of reduced privileges.
  • 2) The attacker [0042] 3 logs in before legitimate client 1 logs-in again. In this case, attacker 3 can successfully masquerade as a legitimate user up to the time of the legitimate user's next log-in. On the legitimate user's next log-in, server 5 will be alerted and special action taken. This special action might include out-of-band communication with the legitimate user, investigation of the situation, and consequent shut-out of attacker 3 from further validations.
  • An alternative embodiment is illustrated in FIG. 4. The method of [0043] claim 4 is identical to the method of FIG. 3 wherein acknowledgement data are used, except that steps 33 and 34 are consolidated into steps 41 and 42. Thus, in the FIG. 4 embodiment, unlike the FIG. 3 embodiment, the presentation of proof data by client 1 and the checking of the proof data by server 5 are not performed prior to server 5 generating update data 53 and new secret 54 in step 37.
  • [0044] Step 50 of FIG. 4 replaces step 41 of FIG. 3. In step 50, client 1 sends both the proof data and the acknowledgement data to server 5. The proof data are computed on the new secret 54. The proof data could serve a double role as proof data and acknowledgement data. In this case, there is no need for acknowledgement data separate and apart from the proof data.
  • [0045] Step 51 of FIG. 4 replaces step 42 of FIG. 3. In step 51, server 5 checks both the proof data and the acknowledgement data, or, in the case where the proof data serve the double role as proof data and acknowledgement data, the proof data.
  • As stated previously, there may be legitimate use of a number n of [0046] different client devices 1 by a single legitimate user. In this case, server 5 holds current SUS's 50 and new SUS's 54 for each client device 1, and considers each client device 1 to be legitimate; and each client device 1 has its own unique SUS 50 and new SUS 54. The number n of clients 1 may be restricted in accordance with local policy. In this scenario, SUS's 50, 54 are respectively unique from one device 1 to the next. The registration/reset process has to be undertaken by each client device 1 to establish each SUS 50. In all other respects, the invention is the same as described above in conjunction with the single client 1 embodiment.
  • The above description is included to illustrate the operation of the preferred embodiments and is not meant to limit the scope of the invention. The scope of the invention is to be limited only by the following claims. From the above discussion, many variations will be apparent to one skilled in the art that would yet be encompassed by the spirit and scope of the present invention.[0047]

Claims (19)

What is claimed is:
1. A method for validating a client device by a server device, said method comprising the steps of:
generating a shared unpredictable secret;
storing the shared unpredictable secret in the client device and in the server device;
requiring the client device to prove that it holds a correct secret as a precondition to the server device validating the client device; and
replacing the shared unpredictable secret by a new shared unpredictable secret when the server device validates the client device.
2. The method of claim 1 wherein an initial shared unpredictable secret is determined in the client device and in the server device during a registration step that occurs prior to a log-in step.
3. The method of claim 2 wherein the registration step entails more checking of bona fides of the client device than does a log-in step.
4. The method of claim 2 wherein, during the registration step, the client device is required to make a payment to the user device.
5. The method of claim 1 wherein the shared unpredictable secret is generated by a generator from the group comprising a random number generator and a pseudo-random number generator.
6. The method of claim 1 wherein the shared unpredictable secret comprises an unpredictable component and a fixed component.
7. The method of claim 1 wherein a plurality of client devices desire to be validated by the server device; and
each client device has a unique unpredictable secret that it shares with the server device.
8. The method of claim 1 wherein, following a validation of the client device, the server device discards the original shared unpredictable secret and stores within the server device a new shared unpredictable secret that can be generated by applying update data to the original shared unpredictable secret.
9. The method of claim 1 wherein:
the server device sends update data to the client device;
the client device applies the update data to the shared unpredictable secret to generate a new secret; and
the client device replaces the shared unpredictable secret with the new secret.
10. The method of claim 9 wherein:
the server device generates the update data using a generator from the group comprising a random number generator and a pseudo-random number generator; and
the step of applying the update data to the shared unpredictable secret comprises computing a one-way function of the combination of the shared unpredictable secret and the update data.
11. The method of claim 9 wherein the client device sends acknowledgement data to the server device to confirm that the client device has replaced the shared unpredictable secret with the new secret.
12. The method of claim 11 wherein, in response to the server device receiving the acknowledgement data from the client device, the server device:
validates the client device; and
discards the shared unpredictable secret and stores within the server device the new secret, which now becomes a new shared unpredictable secret.
13. The method of claim 11 wherein:
the client device sends to the server device proof data demonstrating that the client device holds a correct secret; and
the server device is adapted to accept from the client device any proof data that are generated from a secret that is newer than the secret for which the most recent acknowledgment data have been received by the server device.
14. The method of claim 11 wherein:
the client device sends to the server device both the acknowledgment data and proof data derived from the new secret.
15. The method of claim 14 wherein:
the proof data are computed on the new secret; and
the proof data serve also as acknowledgment data.
16. The method of claim 1 wherein:
the client device presents proof data to the server device, wherein the proof data are derived from a shared unpredictable secret using a proof data generation algorithm, and the proof data do not divulge the shared unpredictable secret;
the server device checks the proof data by using a proof data generation algorithm consistent with the proof data generation algorithm used by the client device; and
when the server device determines that the proof data presented by the client device were not generated from the same shared unpredictable secret that is stored in both the client device and in the server device, the server device does not validate the client device.
17. The method of claim 16 wherein each proof data generation algorithm is a one-way function.
18. A system for enabling a server device to validate a client device, said system comprising:
at least one client device;
a server device;
a shared unpredictable secret;
means for storing the shared unpredictable secret in the client device;
means for storing the shared unpredictable secret in the server device;
coupled to the client device and to the server device, means for determining whether the client device holds a correct secret;
coupled to the determining means, means for allowing the server device to validate the client device when the client device proves that it holds a correct secret; and
coupled to the client device and to the server device, means for replacing the original shared unpredictable secret with a new shared unpredictable secret when the server device validates the client device.
19. A computer readable medium containing computer program instructions for enabling a server device to validate a client device, said computer program instructions causing the execution of the following steps:
generating a shared unpredictable secret;
storing the shared unpredictable secret in the client device and in the server device;
requiring the client device to prove that it holds a correct secret as a precondition to allowing the client device to be validated by the server device; and
replacing the shared unpredictable secret by a new shared unpredictable secret when the client device is validated by the server device.
US09/921,265 2000-08-18 2001-08-01 Countering credentials copying Abandoned US20020062452A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US09/921,265 US20020062452A1 (en) 2000-08-18 2001-08-01 Countering credentials copying
AU2001285083A AU2001285083A1 (en) 2000-08-18 2001-08-16 Countering credentials copying
PCT/US2001/025927 WO2002017555A2 (en) 2000-08-18 2001-08-16 Countering credentials copying
US11/340,948 US8478998B2 (en) 2000-08-18 2006-01-27 Authenticated communication using a shared unpredictable secret

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US22642900P 2000-08-18 2000-08-18
US09/921,265 US20020062452A1 (en) 2000-08-18 2001-08-01 Countering credentials copying

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/340,948 Continuation US8478998B2 (en) 2000-08-18 2006-01-27 Authenticated communication using a shared unpredictable secret

Publications (1)

Publication Number Publication Date
US20020062452A1 true US20020062452A1 (en) 2002-05-23

Family

ID=26920528

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/921,265 Abandoned US20020062452A1 (en) 2000-08-18 2001-08-01 Countering credentials copying
US11/340,948 Expired - Fee Related US8478998B2 (en) 2000-08-18 2006-01-27 Authenticated communication using a shared unpredictable secret

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/340,948 Expired - Fee Related US8478998B2 (en) 2000-08-18 2006-01-27 Authenticated communication using a shared unpredictable secret

Country Status (3)

Country Link
US (2) US20020062452A1 (en)
AU (1) AU2001285083A1 (en)
WO (1) WO2002017555A2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US20040205176A1 (en) * 2003-03-21 2004-10-14 Ting David M.T. System and method for automated login
WO2005055018A1 (en) * 2003-12-08 2005-06-16 Kobil Systems Gmbh Method and device for securing digital data
US20080114983A1 (en) * 2006-11-15 2008-05-15 Research In Motion Limited Client credential based secure session authentication method and apparatus
US7398549B2 (en) 2001-05-18 2008-07-08 Imprivata, Inc. Biometric authentication with security against eavesdropping
US7950021B2 (en) 2006-03-29 2011-05-24 Imprivata, Inc. Methods and systems for providing responses to software commands
US8453222B1 (en) * 2010-08-20 2013-05-28 Symantec Corporation Possession of synchronized data as authentication factor in online services
US8806192B2 (en) * 2011-05-04 2014-08-12 Microsoft Corporation Protected authorization for untrusted clients
US20150281225A1 (en) * 2014-03-27 2015-10-01 Microsoft Corporation Techniques to operate a service with machine generated authentication tokens
US9483762B1 (en) * 2015-01-23 2016-11-01 Island Intellectual Property, Llc Invariant biohash security system and method
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software
US10326795B2 (en) 2014-03-20 2019-06-18 Microsoft Technology Licensing, Llc Techniques to provide network security through just-in-time provisioned accounts
US10783233B2 (en) * 2015-07-10 2020-09-22 Fujitsu Limited Apparatus authentication system, management device, and apparatus authentication method

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6795905B1 (en) 2000-03-31 2004-09-21 Intel Corporation Controlling accesses to isolated memory using a memory controller for isolated execution
US6986052B1 (en) 2000-06-30 2006-01-10 Intel Corporation Method and apparatus for secure execution using a secure memory partition
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7124273B2 (en) 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US7418500B1 (en) * 2002-03-25 2008-08-26 Network Appliance, Inc. Mechanism for controlled sharing of files in a clustered application environment
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7058807B2 (en) * 2002-04-15 2006-06-06 Intel Corporation Validation of inclusion of a platform within a data center
US7318141B2 (en) 2002-12-17 2008-01-08 Intel Corporation Methods and systems to control virtual machines
US7320073B2 (en) 2003-04-07 2008-01-15 Aol Llc Secure method for roaming keys and certificates
US7739521B2 (en) 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US7802085B2 (en) * 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US8924728B2 (en) 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
FR2937204B1 (en) * 2008-10-15 2013-08-23 In Webo Technologies AUTHENTICATION SYSTEM
US8397281B2 (en) * 2009-12-30 2013-03-12 Symantec Corporation Service assisted secret provisioning
US8606234B2 (en) * 2009-12-31 2013-12-10 Symantec Corporation Methods and apparatus for provisioning devices with secrets
EP2845403A4 (en) * 2012-04-26 2016-03-02 Nokia Technologies Oy Method and apparatus for controlling wireless network access parameter sharing
AU2012101558B4 (en) * 2012-08-29 2013-05-30 Device Authority Ltd Adaptive device authentication
US9578511B2 (en) 2014-06-30 2017-02-21 Libre Wireless Technologies, Inc. Systems and techniques for wireless device configuration
EP4348924A1 (en) * 2021-05-25 2024-04-10 Visa International Service Association Multi-party computation for many computers

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US5146498A (en) * 1991-01-10 1992-09-08 Motorola, Inc. Remote key manipulations for over-the-air re-keying
US5613214A (en) * 1993-10-18 1997-03-18 Nec Corporation Mobile communication terminal authenticating system
US5661807A (en) * 1993-07-30 1997-08-26 International Business Machines Corporation Authentication system using one-time passwords
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US5940007A (en) * 1996-02-24 1999-08-17 Mercedes-Benz Ag Remote control system for motor vehicle related devices
US5953420A (en) * 1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users
US5991405A (en) * 1998-01-27 1999-11-23 Dsc Telecom, L.P. Method for dynamically updating cellular phone unique encryption keys
US5995624A (en) * 1997-03-10 1999-11-30 The Pacid Group Bilateral authentication and information encryption token system and method
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US6148404A (en) * 1997-05-28 2000-11-14 Nihon Unisys, Ltd. Authentication system using authentication information valid one-time
US6240184B1 (en) * 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US20010048745A1 (en) * 2000-05-23 2001-12-06 Sheymov Victor I. Systems and methods for communication protection
US6757825B1 (en) * 1999-07-13 2004-06-29 Lucent Technologies Inc. Secure mutual network authentication protocol
US6938157B2 (en) * 2000-08-18 2005-08-30 Jonathan C. Kaplan Distributed information system and protocol for affixing electronic signatures and authenticating documents

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5323464A (en) * 1992-10-16 1994-06-21 International Business Machines Corporation Commercial data masking
FR2753858B1 (en) * 1996-09-25 1999-03-26 METHOD AND SYSTEM FOR SECURING TELEPHONE CALL MANAGEMENT CENTERS
FR2753857B1 (en) * 1996-09-25 1998-12-11 METHOD AND SYSTEM FOR SECURING THE DELIVERY OF SERVICES BROADCASTED ON AN INTERNET-TYPE COMPUTER NETWORK
US6182220B1 (en) * 1998-03-30 2001-01-30 International Business Machines Corporation System and method for building and exchanging encrypted passwords between a client and server
US6802000B1 (en) * 1999-10-28 2004-10-05 Xerox Corporation System for authenticating access to online content referenced in hardcopy documents

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US5146498A (en) * 1991-01-10 1992-09-08 Motorola, Inc. Remote key manipulations for over-the-air re-keying
US5661807A (en) * 1993-07-30 1997-08-26 International Business Machines Corporation Authentication system using one-time passwords
US5613214A (en) * 1993-10-18 1997-03-18 Nec Corporation Mobile communication terminal authenticating system
US5940007A (en) * 1996-02-24 1999-08-17 Mercedes-Benz Ag Remote control system for motor vehicle related devices
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5953420A (en) * 1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users
US5995624A (en) * 1997-03-10 1999-11-30 The Pacid Group Bilateral authentication and information encryption token system and method
US6148404A (en) * 1997-05-28 2000-11-14 Nihon Unisys, Ltd. Authentication system using authentication information valid one-time
US6240184B1 (en) * 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US5991405A (en) * 1998-01-27 1999-11-23 Dsc Telecom, L.P. Method for dynamically updating cellular phone unique encryption keys
US6757825B1 (en) * 1999-07-13 2004-06-29 Lucent Technologies Inc. Secure mutual network authentication protocol
US20010048745A1 (en) * 2000-05-23 2001-12-06 Sheymov Victor I. Systems and methods for communication protection
US6938157B2 (en) * 2000-08-18 2005-08-30 Jonathan C. Kaplan Distributed information system and protocol for affixing electronic signatures and authenticating documents

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7398549B2 (en) 2001-05-18 2008-07-08 Imprivata, Inc. Biometric authentication with security against eavesdropping
US10505930B2 (en) 2003-03-21 2019-12-10 Imprivata, Inc. System and method for data and request filtering
US20040205176A1 (en) * 2003-03-21 2004-10-14 Ting David M.T. System and method for automated login
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US7660880B2 (en) 2003-03-21 2010-02-09 Imprivata, Inc. System and method for automated login
WO2005055018A1 (en) * 2003-12-08 2005-06-16 Kobil Systems Gmbh Method and device for securing digital data
US7950021B2 (en) 2006-03-29 2011-05-24 Imprivata, Inc. Methods and systems for providing responses to software commands
US20080114983A1 (en) * 2006-11-15 2008-05-15 Research In Motion Limited Client credential based secure session authentication method and apparatus
US8418235B2 (en) * 2006-11-15 2013-04-09 Research In Motion Limited Client credential based secure session authentication method and apparatus
US8453222B1 (en) * 2010-08-20 2013-05-28 Symantec Corporation Possession of synchronized data as authentication factor in online services
US9946855B2 (en) 2010-11-19 2018-04-17 Nagravision S.A. Method to detect cloned software
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software
US8806192B2 (en) * 2011-05-04 2014-08-12 Microsoft Corporation Protected authorization for untrusted clients
US10326795B2 (en) 2014-03-20 2019-06-18 Microsoft Technology Licensing, Llc Techniques to provide network security through just-in-time provisioned accounts
US20150281225A1 (en) * 2014-03-27 2015-10-01 Microsoft Corporation Techniques to operate a service with machine generated authentication tokens
US9569773B1 (en) 2015-01-23 2017-02-14 Island Intellectual Property, Llc Invariant biohash security system and method
US9904914B1 (en) 2015-01-23 2018-02-27 Island Intellectual Property, Llc Notification system and method
US9965750B1 (en) 2015-01-23 2018-05-08 Island Intellectual Property, Llc Notification system and method
US10134035B1 (en) * 2015-01-23 2018-11-20 Island Intellectual Property, Llc Invariant biohash security system and method
US9805344B1 (en) 2015-01-23 2017-10-31 Island Intellectual Property, Llc Notification system and method
US9483762B1 (en) * 2015-01-23 2016-11-01 Island Intellectual Property, Llc Invariant biohash security system and method
US10623182B1 (en) 2015-01-23 2020-04-14 Island Intellectual Property, Llc Invariant biohash security system and method
US10832317B1 (en) 2015-01-23 2020-11-10 Island Intellectual Property, Llc Systems, methods, and program products for performing deposit sweep transactions
US10783233B2 (en) * 2015-07-10 2020-09-22 Fujitsu Limited Apparatus authentication system, management device, and apparatus authentication method

Also Published As

Publication number Publication date
WO2002017555A3 (en) 2003-01-03
US8478998B2 (en) 2013-07-02
US20070192829A1 (en) 2007-08-16
WO2002017555A2 (en) 2002-02-28
AU2001285083A1 (en) 2002-03-04

Similar Documents

Publication Publication Date Title
US8478998B2 (en) Authenticated communication using a shared unpredictable secret
CN111429254B (en) Business data processing method and device and readable storage medium
JP2828218B2 (en) Method and system for changing an authorized password or key in a distributed communication network
US8627424B1 (en) Device bound OTP generation
US8214890B2 (en) Login authentication using a trusted device
CN109361668A (en) A kind of data trusted transmission method
US9118665B2 (en) Authentication system and method
WO2020258837A1 (en) Unlocking method, device for realizing unlocking, and computer readable medium
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
US10263782B2 (en) Soft-token authentication system
CN108418691A (en) Dynamic network identity identifying method based on SGX
JP6906521B2 (en) Biometric Protocol Standard Systems and Methods
JP2004508619A (en) Trusted device
JP2008538146A (en) Architecture for privacy protection of biometric templates
CN110659467A (en) Remote user identity authentication method, device, system, terminal and server
WO2006117806B1 (en) Bilaterally generated encryption key system
CN107347073B (en) A kind of resource information processing method
US20210049611A1 (en) Decentralized biometric authentication platform
CN110493177A (en) Based on unsymmetrical key pond to and sequence number quantum communications service station AKA cryptographic key negotiation method and system
US11736481B2 (en) Friction-less identity proofing during employee self-service registration
JP4657706B2 (en) Authority management system, authentication server, authority management method, and authority management program
CN115473655A (en) Terminal authentication method, device and storage medium for access network
Chase et al. Acsesor: A new framework for auditable custodial secret storage and recovery
CN111651740B (en) Trusted platform sharing system for distributed intelligent embedded system
US10979226B1 (en) Soft-token authentication system with token blocking after entering the wrong PIN

Legal Events

Date Code Title Description
AS Assignment

Owner name: VERISIGN, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FORD, WARWICK;REEL/FRAME:012438/0190

Effective date: 20011008

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: SYMANTEC CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERISIGN, INC.;REEL/FRAME:025499/0882

Effective date: 20100809