User authentication for portable electronic devices using...

Electrical computers and digital processing systems: support – System access control based on user identification by... – Pin/password generator device

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000

Reexamination Certificate

active

06460138

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to the security of portable electronic devices, and more particularly to a method and system for the authentication of a user of a portable electronic device using asymmetrical cryptography.
BACKGROUND OF THE INVENTION
Security for most electronic devices dealing with sensitive data utilizes one or another form of a password (PIN or access code) to prevent unauthorized access. In order to use a device the user is requested to enter a password or pin. If correct, the user is allowed to use the device, if not, well he/she is usually just prompted to try again.
Password protection, however, has not proven to be a very effective means of user authentication due to two fundamental problems with passwords. If they are relatively short and easy to memorize, they may be easily compromised either through guessing (by unauthorized users) or broken using a simple password cracking program. Stronger protection is achieved through longer, meaningless or randomly generated passwords, but they are easy to forget (by authorized users). And in many portable electronic devices, the situation is even worse in the cases where passwords are stored in storage that requires batteries to keep it stable. An unauthorized user can simply remove the batteries and wait for the password to disappear.
An improved approach to providing security for electronic devices is to create long, invincible passwords using public-key cryptography, and to then store those passwords (digital keys) on smart cards. A Smart card is a plastic credit card that carries an imbedded chip instead of a magnetic stripe.
Public-key cryptography enables two communicating parties to disguise information they send to each other through encryption and decryption. Using the digital keys stored on the smart card, the sender encrypts, or scrambles, information before storing it on a smart card. The encrypted information on the smart card is unintelligible to an intruder. When the smart card is inserted into a smart card reader attached to the device to be accessed, the smart card reader decrypts, or unscrambles, the information. Access to the device is allowed once the information is verified.
Many of today'smart cards use asymmetric cryptographic algorithms. With this method, a public key is used in combination with a private key that is only used by the owner of the smart card. Typically, the private key is stored on the smart card, while the public key is stored within the protected electronic device. A message sent using these two keys can only be decoded using the complementary keys. Thus, anonymous and secure data transmission is attained using the public key and the data can only be read by the owner of the private key.
Before a user can own a smart card, the user must first obtain a certificate from a certificate authority. A certificate issued by the certificate authority binds a particular public key to the name of the person or entity the certificate identifies (such as the name of an employee). Certificates help prevent the use of fake public keys for impersonation. Only the public key certified by the certificate will work with the corresponding private key possessed by the person or entity identified by the certificate.
These public and private keys are used to authenticate the person by creating a digital signature for that person, which is then stored on the smart card along with the person's PIN. When the user inserts his/her smart card into a smart card reader to gain access to a particular device, the user is prompted for the PIN. If the PIN matches the PIN read from the card, the user's digital signature is then used to authenticate that the user is who he/she claims to be.
FIG. 1
is diagram illustrating a standard smart card protocol for creating and verifying a digital signature. A digital signature is created by running message text through a hashing algorithm. This yields a message digest. The message digest along with the message is then encrypted using the private key of the individual who is sending the message, turning it into a digital signature. The digital signature can only be decrypted by the public key of the same individual. The recipient of the message decrypts the digital signature to obtain the original message, and uses the original message to recalculate the message digest. The value of this newly calculated message digest is compared to the value of the message digest found from the digital signature. A match indicates that the message has not been tampered with. Since the public key of the sender was used to verify the signature, the text must have been signed with the private key owned by the sender.
This use of digital signatures is the emerging standard for user authentication and security in network environments. In theory, a person can use the same digital certificate to gain access to any number of services, rather than having to remember and manage a number of different passwords. Smart cards are not subject to tampering or forgery (provided the key is long enough). An unauthorized user would have to know the user's PIN and also have the user's digital certificate to gain access.
Unfortunately, there is problem with using smart cards to provide security for portable electronic devices because smart card readers are too bulky to be built in to such devices. For example, certain types of portable electronic devices, such as digital cameras and personal digital assistants, utilize removable memories that are even smaller than PCMCIA cards. One example of this type of memory is a compact flash card. One solution is to carry an external smart card reader around as a peripheral device and plug it into such a device when the user wishes to use the device. This, however, would be inconvenient and burdensome to the user. And simply storing a pin and a digital certificate on a removable memory compatible with the portable electronic device is not an acceptable alternative because of the risk of having the memory lost or stolen. This would allow a third party to gain access to the user's PIN and to impersonate the owner in any transaction where asymmetrical cryptography are used for authentication.
Accordingly, what is needed is a system and method for authenticating the user of a portable electronic device without the need of a smart card and reader. The present invention addresses such a need.
SUMMARY OF THE INVENTION
The present invention provides a method and system for authenticating a user of a portable electronic device having a removable memory using asymmetric cryptography, the asymmetric cryptography requiring the use of a user's private key and public key. The method and system include storing the user's private key and public key on the portable electronic device. Thereafter, information including the user's personal identification number (PIN) is encrypted using the user's private key and public key, respectively, to create encrypted authentication information. The encrypted authentication information is then stored on a standard removable memory, such as a flash card. Until the removable memory containing the correct authentication information is inserted into the device and the authentication information verified, the portable electronic device remains locked and inaccessible to all would be users.
When the removable memory is subsequently inserted into the portable electronic device, the portable electronic device automatically decrypts the authentication information using the private and public keys, respectively, and prompts the user for a PIN code. If the decrypted authentication information and the entered PIN are verified, the user is authenticated without the use of a smart card or card reader and the device is unlocked allowing the user to gain access.
According to the system and method disclosed herein, the present invention provides enhanced security for portable electronic devices while maintaining the devices's portability.


REFERENCES:
patent: 5282247 (1994-01-01),

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

User authentication for portable electronic devices using... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with User authentication for portable electronic devices using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and User authentication for portable electronic devices using... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2998678

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.