Method and system for secure access

Electrical computers and digital processing systems: support – System access control based on user identification by... – Solely password entry

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S182000, C713S187000, C713S189000, C726S002000

Reexamination Certificate

active

07325141

ABSTRACT:
If a user loses his password or pass phrase required for a computer or communication system, he must have some way of obtaining a new one. Typically, new passwords are provided to users manually, by another human, an approach that is expensive and insecure. The invention provides an automated solution which allows recovery of secure access. The invention does this by complementary encryption of the user's pass phrase and responses to personal questions, the reference responses being encrypted with the pass phrase and the pass phrase being encrypted with the reference responses. When a user loses his pass phrase, he can provide answers to the personal questions and the system will recover both the reference responses and the pass phrase, so the account can be re-initialized by entering a new pass phrase. The invention also allows “approximate matching”, so biometric data can be used for identification.

REFERENCES:
patent: 647895 (1900-04-01), Fischer
patent: 5719941 (1998-02-01), Swift et al.
patent: 5991882 (1999-11-01), O'Connell
patent: 0647895 (1994-05-01), None
“Commercial Key Recovery” Walker et al.,Communications of the ACM, Mar. 1996, vol. 39, No. 3, pp. 41-47.
“Verifiable Partial Key Escrow” Bellare et al.,ACM, 1997, pp. 78-91.
“A Taxonomy for Key Escrow Encryption Systems”, Denning et al,Communications of the ACM, Mar. 1996, vol. 39, No. 3, pp. 34-40.
“The “Omega” Key Management Service”, Reiter et al.,CCS, 1996, pp. 38-47.
“Robust Sharing of Secrets When the Dealer is Honest of Cheating”, Rabin,Journal of the Association for Computing Machinery, vol. 41, No. 6, Nov. 1994, pp. 1089-1109.
“Password Recovery Windows Toolkit”, Held,International Journal of Network Management,1998, pp. 368-370.
“Protecting Secret Keys with Personal Entropy”, Ellison et al., Oct. 28, 1999, pp. 1-13.
“Cryptographic Solution to a Multilevel Security Problem”, Akl et al.,Cryptography and Multilevel Security, pp. 237-249.
“Secret Sharing Homomorphisms: Keeping Shares of a Secret (Extended Abstract)” Benaloh, pp. 251-260.
“Generalized Secret Sharing and Monotone Functions” Benaloh et al., pp. 27-35.
“Safeguarding Cryptographic Keys”, Blakley, National Computer Conference, 1979, pp. 313-317.
“The Detection of Cheaters in Threshold Schemes”, Brickell et al., pp. 564-577.
“Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults”, Chor et al., 1985, pp. 383-395.
“Secret Sharing Scheme Realizing General Access Structure”, Ito et al.,Globecom, 1987, pp. 3.6.1-3.6.4.
“A Generalized Secret Sharing Scheme with Cheater Detection”, Lin et al., pp. 149-158.
“How to Share a Secret”, Shamir,Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 612-613.
“How to Share a Secret with Cheaters”, Tompa et al.,Journal of Cryptology, 1988, pp. 133-138.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for secure access does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for secure access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for secure access will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2815052

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.