A portion of the disclosure of this patent document contains material to which the claim of copyright protection is made. The copyright owner has no objection to the facsimile reproduction by any person of the patent document or the patent disclosure, as it appears in the U.S. Patent and Trademark Office file or records, but reserves all other rights whatsoever.
Many computer applications and systems require a user to enter a password in order to access the application or system. Typically the user must have an account for the system or application. In addition to the password, the account typically has a user identifier associated with the account. For example, electronic mail systems and financial systems typically require a user to enter a user identifier and password in order for the user to access their email account.
While protecting account access with passwords is useful in restricting access to accounts to authorized persons, problems remain with password protected systems. A first problem is that users often forget their password. In order for an account to be secure, the user must choose or be assigned a password that is hard for an unauthorized user to guess. Unfortunately, a password that is hard to guess may also be a password that is hard for a user to remember.
A second problem is that a user's account may be hijacked, that is, an unauthorized user may obtain the authorized user's password (either by guessing or by otherwise learning the password), log in to the user's account, and change the password. The result is that the authorized user may no longer access their account because the new password is only known by the hijacker.
In addition to the problems created for a user when their account password is forgotten or hijacked, the owner or operator of the protected system incurs increased support costs, because the user must typically interact with support staff in order to regain access to their account. For example, support staff typically attempts to authenticate that the person seeking access to an account is the legitimate account holder, and not an imposter attempting to gain unauthorized access to an account. A common method of authentication is to ask the person seeking access questions such as “what is your city of birth”, or “what is your mother's maiden name.” However, answers to these types of questions may be relatively easy to obtain, even easier than attempting to guess the password in the first place. Thus, authentication methods typically in use in previous systems may impose significant support staff cost for relatively little security benefit.
In view of the above problems and issues, there is a need in the art for the present invention.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration, specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical, and electrical changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, herein by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
In the Figures, the same reference number is used throughout to refer to an identical component which appears in multiple Figures. Signals and connections may be referred to by the same reference number or label, and the actual meaning will be clear from its use in the context of the description.
The functions or algorithms described herein are implemented in hardware, and/or software in embodiments. The software comprises computer executable instructions stored on computer readable media such as memory or other types of storage devices. The term “computer readable media” is also used to represent software-transmitted carrier waves. Further, such functions correspond to modules, which are software, hardware, firmware, or any combination thereof. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. A digital signal processor, ASIC, microprocessor, or any other type of processor operating on a system, such as a personal computer, server, a router, or any other device capable of processing data including network interconnection devices executes the software.
Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example process flow is applicable to software, firmware, and hardware implementations.
Protected system 108 may be any type of system in which some aspect of access to the system is restricted to authorized individuals. Examples of such systems include email (electronic mail) systems, financial systems, fee based service systems, subscription based systems or any other system in which access may be restricted or limited.
Client application 102 may be any type of application configured to operate with a protected system 108 on a computer system such as server 106. For example, in the case of an email system, client application 102 may be an email client configured to provide a user a means to send email messages to other users and view email messages sent to the user's account. Client application 102 may be a browser client such as a world wide web browser configured to view web pages provided by a web services based system.
Database 112 maintains account information 120 about the users of protected system 108. This information may include user ID (user identification) 122, password 124 (typically encrypted) and account recovery key 126.
Word list 130 is a set of words. The words may be randomly selected from a source such as a dictionary. In some embodiments, the words in word list 130 are processed to remove words that sound alike (homophones). Further, in some embodiments slang terms or potentially offensive terms are not included in word list 130. In the embodiments represented by
In general, the system above operates as follows. A user ID and password are typically established when an account is initially created for a user on protected system 108. In addition, an account recovery key generator 110 generates an account recovery key for the user. In some embodiments, the account recovery key comprises a sequence of multiple words. Theses words may be obtained from one or more word lists 130. The account recovery key may be stored in an encrypted manner in database account info 120 or it may be stored as clear text. Account recovery key generator 110 may be a component of the protected system 108, or it may be separate service that may be used by multiple protected systems. Further details on the generation of account recovery keys will be provided below with reference to
After the account has been created and the various account information portions established or generated, the user may utilize the account. Should the user forget details about their account, such as the password, or should the account be hijacked by a malicious user who changes the password thereby preventing the authorized user from gaining access to their account, the account recovery key may be used to restore the authorized user's access to the account. Further details on recovering access using an account recovery key are provided below with reference to
It should be noted that the components depicted as operating on server 106 may in fact be distributed across multiple servers and need not be collocated on a single server.
The method begins by creating an account on a protected system (block 302). The account creation may be user initiated, or it may be initiated by a protected system. Further, the account creation may involve user identification and password creation, or it may involve password creation.
Next, the system generates an account recovery key (block 304). In some embodiments, generation of an account recovery key starts with the generation of a random number by a random number generator (also sometimes referred to as a pseudorandom number generator). The random number is then mapped into multiple subkeys, one component for each word that is to be used for the account recovery key.
In alternative embodiments, the random number may be segmented into more or fewer subkeys. For example, subkey 406 is a larger subkey than subkeys 404. In these embodiments, fewer subkeys may be segmented from the random number, however the larger subkey may be used as an index into a longer list of words. Conversely, a smaller subkey may be used as an index into a correspondingly smaller list of words.
In some embodiments, a single word list may be used, and each subkey is used as an index into the word list. In alternative embodiments, multiple word lists may be used, with each subkey used as an index into a differing word list from the other subkeys.
Further, in some embodiments, multiple random numbers may be generated, one for each subkey. In these embodiments, segmenting a single random number is not used, rather the account recovery key comprises each of the randomly generated subkeys. Each of these subkeys may then be used as an index into a word list or multiple word lists as described above.
Returning to
In some embodiments, the account recovery key may be encrypted (block 308). Various mechanisms for encryption are known in the art and within the scope of the inventive subject matter. In some embodiments, a one-way encryption mechanism may be used. Encryption may be utilized when the user account data may not be secure. For example, if the account recovery key is used on a portable computing system such as a laptop, PDA or cell phone, the account recovery key may be determined by a malicious user if not encrypted. In these environments, it is desirable to encrypt the account recovery key prior to storage.
Next, the account recovery key is stored in a persistent data storage (block 310). In some embodiments, the persistent data storage may be a database used to store account details for a protected system. In alternative embodiments, the persistent data storage may be a persistent memory on a computer system such as a battery backed memory, a flash memory, a hard drive or other persistent memory.
It should be noted that in some embodiments, once the account recovery key is generated and stored, it remains unchanged for the life of the account associated with the account recovery key. This is desirable, because if an interface is provided to change the account recovery key, a malicious user could use the interface to change the account recovery key thereby preventing the legitimate user from recovering access to the account.
The system then receives the account recovery key (block 506). In some embodiments, an account identifier may be provided in addition to the words comprising the account recovery key. In alternative embodiments, the account identifier may be provided on a separate screen or interface.
In some embodiments, the account recovery key provided by the user is encrypted (block 508). In these embodiments, the encryption used corresponds to an original encryption mechanism that was used when the account recovery key was initially generated as discussed above.
The account recovery key supplied at block 506 is then compared to determine if it matches the stored account recovery key (block 510). In some embodiments, of the supplied account recovery key and the stored account recovery key do not match, the system returns to block 504 to prompt the user to re-enter an account recovery key. The system may impose limits on the number of times a user is allowed to attempt to enter an account recovery key for an account.
If the supplied account recovery key and the stored account recovery key match, the system then restores access to the account associated with the account recovery key (block 510). In other words, the system allows the user to access their account as if the proper password had been provided. The system may then provide an interface, or the user may select an interface, allowing the user to change the password away from the previous password that was forgotten or illegitimately changed.
The illustrations of embodiments described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. The accompanying drawings that form a part hereof show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced.
Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. The elements, materials, geometries, dimensions, and sequence of operations can all be varied to suit particular packaging requirements.
Embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
The Abstract is provided to comply with 37 C.F.R. § 1.72(b) to allow the reader to quickly ascertain the nature and gist of the technical disclosure. The Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
In the foregoing Detailed Description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments have more features than are expressly recited in each claim. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
It will be readily understood to those skilled in the art that various other changes in the details, material, and arrangements of the parts and method stages which have been described and illustrated in order to explain the nature of embodiments herein may be made without departing from the principles and scope of embodiments as expressed in the subjoined claims.