Protected storage of core data secrets

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S165000, C713S182000, C713S183000, C713S185000, C713S186000, C713S193000

Reexamination Certificate

active

06272631

ABSTRACT:

TECHNICAL FIELD
This invention relates to systems and methods that provide central services for securely storing core data secrets such as passwords, cryptographic keys, and sensitive personal or financial codes.
BACKGROUND OF THE INVENTION
Increasingly, financial and other sensitive transactions are being performed by personal computers. This has increased the need for secure storage of data. Modem cryptography techniques are often used to protect such data from unauthorized access.
New security methods, however, have brought about a need to store and protect “core” data secrets, such as private cryptographic keys, credit card numbers, and other small pieces of secret data. Presently, this responsibility is left to individual application programs or to personal computer users themselves. Although programs are available that allow users to encrypt and store data, such programs cannot typically be used by other application programs. Currently, each application program has to devise a safe and secure method to store such data.
As an example of the problems associated with the current state of the art, consider the issues involved in exploiting smart card technologies. A smart card is particularly well suited as a receptacle for core data secrets such as those described above. In addition, smart cards can be used to authenticate users by requiring each user to insert his or her personal smart card into a receptacle associated with the user's personal computer. Tamper-proof smart cards have been designed for just these purposes.
Problems arise without agreed-upon standards for using such devices. Although a developer could provide capabilities for working with a limited number of smart cards, it would be difficult or impossible to anticipate all the different variations that might eventually arise. This fact makes it impractical to implement smart card technology in various different applications.
Although some storage media such as magnetic hard disks do not present the challenges of smart cards, many software developers simply do not have the background and knowledge required to safely implement modern cryptographic techniques. Even if they did, it would be inefficient for each developer to undertake the complex task of developing a method of storing core secrets. Furthermore, resulting solutions would be incompatible. It would be much more preferable to adopt a common scheme for storing such data, and to avoid having to implement a new solution for every different application program.
SUMMARY OF THE INVENTION
The invention described below provides central protected storage services that can be called by application programs to store core secrets. An embodiment of the invention is implemented as a server process and associated interfaces that can be invoked by application programs to store and retrieve small data items.
The general method and architecture includes a storage server and a plurality of installable storage providers and authentication providers. Each storage provider is adapted to securely store data using a specific type of media, such as magnetic media or smart cards. Details of the storage medium are hidden from the calling application programs. Authentication providers are used to authenticate users by different methods, such as by requesting passwords, by reading smart cards, by retinal scans, or by other ways that might be devised in the future. Again, authentication details are generally hidden from the calling application programs.
Application programs interact with the storage server through well-defined interfaces. A data item can be stored with a simple call to the storage server, and can be retrieved later with a similar call. All encryption, decryption, item integrity checks, and user authentication are performed by the storage server and its associated providers. Because of this, application programs can take advantage of advanced security features without adding complexity to the application programs themselves.
When storing a data item using the protected storage services, an application program can specify rules that determine when to allow access to the data item. Access is generally limited to the computer user that created the data item. Access can similarly be limited to specified application programs or to certain classes of application programs. The storage server authenticates requesting application programs before returning data to them.
A default authentication provider authenticates users based on their computer or network logon. Other authentication providers can also be installed.
A default storage provider allows storage of data items on magnetic media such as a hard disk or a floppy disk. Data items are encrypted before they are stored. The encryption uses a key that is derived from the authentication of the user. Specifically, the key is derived from the user's password, supplied during computer or network logon. In addition, an application program or the user can specify that certain items require an additional password to be entered whenever access to the data is requested.
The default storage provider implements a multi-level key encryption scheme to minimize the amount of encryption that has to be re-done when the user changes a password. Each data item is encrypted using an item key that is generated randomly by the system. The item key is in turn encrypted with a master key that is itself encrypted (as described below) with a key derived from the user-supplied password (such as the user's logon password).


REFERENCES:
patent: 4933969 (1990-06-01), Marshall et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5509074 (1996-04-01), Choudhury et al.
patent: 5530758 (1996-06-01), Marino, Jr. et al.
patent: 5555304 (1996-09-01), Hasebe et al.
patent: 5870477 (1999-02-01), Sasaki et al.
patent: 0 442 839 A3 (1991-01-01), None
patent: 0 456 386 A2 (1991-04-01), None
patent: 0 717 339 A2 (1995-11-01), None
patent: 0 820 017 A2 (1997-03-01), None
Korth, Henry K. and Silberschatz, Abraham, “Database System Concepts, Second Edition”, McGraw-Hill, Inc., pp 3-5 and 15, Jan. 1991.*
“Signing Code with Microsoft's Authenticode Technology,” date unknown.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protected storage of core data secrets does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protected storage of core data secrets, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protected storage of core data secrets will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2452768

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.