The invention relates to distributing token records.
Computer networks, and in particular Wide Area Networks (WANs) such as the internet, provide opportunities for the misuse and abuse of communications. For example, two users (e.g., a human user and an enterprise server) communicating via the WAN may have their communications intercepted and/or altered. Also, it is possible for one user to misrepresent his, her, or its identity to another user.
Thus, there is a need for both privacy and authentication between users of the network communicating with one another. In other words, users should be able to rely on the fact that their transmissions will not be intercepted or altered, and that transmissions from someone purporting to be a particular user do in fact originate from that user.
In many secure communication applications, a seed is required in order to perform certain cryptographic operations such as encryption, decryption, authentication, etc. The seed may comprise, by way of example, a symmetric key or other secret shared by two or more entities.
One such application is in authentication tokens, such as the RSA SecurID authentication token available from RSA, The Security Division of EMC, of Bedford, Mass., U.S.A. The RSA SecurID authentication token is used to provide two-factor authentication. Authorized users are issued individually-registered tokens that generate single-use token codes, which change based on a time code algorithm. For example, a different token code may be generated every 60 seconds. In a given two-factor authentication session, the user is required to enter a personal identification number (PIN) plus the current token code from his or her authentication token. This information is supplied to an authentication entity. The authentication entity may be a server or other processing device equipped with RSA Authentication Manager software available from RSA Security Inc. The PIN and current token code may be transmitted to the authentication entity and if the PIN and current token code are determined to be valid, the user is granted access appropriate to his or her authorization level. Thus, the token codes are like temporary passwords that cannot be guessed by an attacker, with other than a negligible probability.
Referring to
It will be appreciated that the user 110 may have access to a communications terminal 140 such as a personal computer, a personal digital assistant (PDA) or a similar device. During the authentication process the user may read a passcode from the user authentication device 120 and enter the code manually to the communications terminal 140. Alternatively, the user authentication device 120 may communicate with the communications terminal 140 to deliver the passcode thereto. The communications terminal 140 may communicate information to the server 105 via a communications channel 170. The communications channel 170 can be any method and/or interface that enables communication of information to the server 105 that may be required to authenticate the identity of the user 110. The communications terminal 140 can communicate information generated by the user 110, the device 120, or both, to the server 105 over the communications channel 170.
In order to authenticate the user, the server 105 performs algorithmic calculations for each user authentication attempt that is substantially identical to the algorithmic calculation performed by the user authentication device 120. The server 105 compares the authentication information received over communications channel 170 and the authentication information generated by the server 105 to determine whether there is a match. If there is a match, then the server 105 can authenticate the identity of the user 110.
Referring to
It will be appreciated that when the token as described above is created the unique seed for the token is placed into a token record. The token record may then be loaded into the authentication entity, for example, the server to allow the token to be used in an authentication event.
Accordingly, a mechanism or technique is required for delivering (e.g., securely delivering) the token records from a token manufacturer to an end customer or user to avoid the token record being revealed to an attacker. If the information in the token record is revealed to an attacker, there is a risk that the attacker may be able to use the information to the attacker's advantage.
In the past, storage media such as CD-ROMs have been used to distribute token records with token shipments.
Other techniques have also been used in the past to deliver token records to end customers.
A method and system for use in distributing token records is disclosed. At least one token record comprises a unique seed associated with a one-time password (OTP) token. An encryption key and a corresponding decryption key are generated for assisting selective encryption and decryption of a token record associated with a OTP token. The encryption key and the decryption key being unique to an end user of the token record. The token record is encrypted with the assistance of the encryption key. One of the decryption key and the encrypted token record is provided to the end user of the token record. The other of the decryption key and the encrypted token record is provided to the end user in response to secure receipt of the one of the decryption key and the encrypted token record by the end user. The encrypted token record can be decrypted with the assistance of the decryption key.
Features and advantages of the present invention will become more apparent from the following detailed description of exemplary embodiments thereof taken in conjunction with the accompanying drawings in which:
The invention can be implemented in numerous ways, including as a process, an apparatus, a system, a computer program embodied on a computer readable storage medium, and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, the implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
Referring to
The technique comprises generating 410 an encryption key and a corresponding decryption key for assisting selective encryption and decryption of a token record associated with a OTP token. It will be appreciated that the encryption key and the decryption key may be unique to an end user of the token record. For example, the keys may be generated in response to receiving an order for OTP tokens from the end user. It will be appreciated that the keys may be asymmetric keys such as a public-private key pair for assisting in the encryption and decryption of the token record. The public key can assist in the encryption of the token record. The private key can assist in the decryption of the encrypted token record. The technique comprises encrypting 420 the token record with the assistance of the encryption key. For example, the token record may be encrypted with the public key. The technique comprises providing 430 one of the decryption key and the encrypted token record to the end user of the token record. In this embodiment, the decryption key is provided to the end user. For example, the decryption key may be provided on a hardware device. In one embodiment, the hardware device may comprise an on-device key generation mechanism for generating a public-private key pair. The device may enable the public key to be removed from the device such that the private key only is maintained thereon. In a further embodiment, the private key may be a non-exportable key such that the private key is exclusively associated with the device. The advantage of removing the public key and maintaining the private key on the device is that the public key may be kept exclusively by the manufacturer and the private key exclusively by the end user. It will be appreciated that additionally security features may be provided in connection with the device. For example, the device may be configured such that a PIN is required to be set before the decryption key located on the device can be used. Thereafter, the PIN may be required to be entered before the device with the decryption key can be used. The technique comprises providing 440 the other of the decryption key and the encrypted token record to the end user in response to secure receipt of the one of the decryption key and the encrypted token record by the end user. The encrypted token record can be decrypted with the assistance of the decryption key. For example, if the decryption key has been provided to the end user, the manufacturer may not provide the encrypted token record to the end user until confirmation of secure receipt of the decryption key is received from the end user. The encrypted token record may be provided on a storage medium such as a CD ROM or over a network such as the internet. It will be appreciated that access to the token record will be prohibited to the end user until both the encrypted token record and the decryption key are in the end users possession.
In an exemplary implementation, the end user may be provided with the CD ROM containing the encrypted token record and the device containing the decryption key. For example, the device may comprise the private key for assisting decryption of the encrypted token record. It will be appreciated from the above that the end user will be provided with the CD ROM and the device separately. Indeed, it will be appreciated that one of the CD ROM and the device will only be provided to the end user in response to confirmation of safe receipt of the other. It will also be appreciated that a decryption software utility, for example, a client application, may be provided to the end user such that when running on a computer the client application can co-operate with the CD ROM and the device for decrypting the token record. For example, the device may be plugged into the USB port of the computer for facilitating decryption of the encrypted token record.
Referring to
Referring to
Referring to
An advantage of the above techniques is that the techniques facilitate secure delivery of token records. The token records are encrypted to protect the sensitive information and only an end user is capable of decrypting the token records intended for that particular user. Accordingly, the token records may be shipped to an end user using insecure shipping transport. The use of such transport will have no impact on the security of the information contained in the token records as the encrypted token records can only be decrypted when the end user is in possession of both the encrypted token record and the decryption key.
While the above techniques describe generating an encryption key and a decryption key, it will be appreciated that the keys may not be generated until the identity of the end user is validated. For example, this may require the end user registering with the manufacturer before an order is processed.
While the above techniques describe generating an encryption key and a decryption key, it will be appreciated by those skilled in the art that the encryption key and the decryption key may be generated at either the token manufacturer end or at the end user end. In one embodiment, the token manufacturer may generate the encryption key and the corresponding decryption key for assisting selective encryption and decryption of a token record associated with a OTP token. In another alternative embodiment, the end user may generate the encryption key and the corresponding decryption key. For example, the end user may generate and provide the decryption key to itself as well as providing the encryption key to the token manufacturer. It will be apparent that by receiving the encryption key, the token manufacturer will be aware that the corresponding decryption key has been provided to and securely received by the end user. The token manufacturer may subsequently encrypt the token record with the assistance of the encryption key and provide the encrypted token record to the end user. However, it will be apparent to those skilled in the art that regardless of where the keys are generated the encryption key will be provided to and maintained exclusively by the manufacturer and the decryption key will be provided to and maintained exclusively by the end user.
While the above techniques describe providing the end user with a hardware device comprising the decryption key, it will be appreciated that end user may be provided with a file comprising the decryption key for assisting in the decryption of the encrypted token record.
While the techniques describe encrypting the token record and subsequently providing one of the encrypted token record and decryption key to the end user, it will be appreciated in certain instances the decryption key may be provided to the end user before encrypting the token record with the assistance of the encryption key.
While the invention has been disclosed in connection with preferred embodiments shown and described in detail, modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention should be limited only by the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6205549 | Pravetz | Mar 2001 | B1 |
6226618 | Downs et al. | May 2001 | B1 |
7203314 | Kahn et al. | Apr 2007 | B1 |
7599495 | Kurihara et al. | Oct 2009 | B2 |
7891007 | Waxman et al. | Feb 2011 | B2 |
20030023862 | Yamasaki et al. | Jan 2003 | A1 |
20030061481 | Levine et al. | Mar 2003 | A1 |
20040098348 | Kawasaki et al. | May 2004 | A1 |
20040196370 | Yaegashi | Oct 2004 | A1 |
20040255134 | Miyamoto | Dec 2004 | A1 |
20050154890 | Vembu | Jul 2005 | A1 |
20060126846 | Araki et al. | Jun 2006 | A1 |
20070033642 | Ganesan et al. | Feb 2007 | A1 |
20070130462 | Law et al. | Jun 2007 | A1 |
20070155306 | Koli et al. | Jul 2007 | A1 |
20070220271 | Law | Sep 2007 | A1 |
20080059806 | Kishida et al. | Mar 2008 | A1 |
20080168543 | von Krogh | Jul 2008 | A1 |
20080168544 | von Krogh | Jul 2008 | A1 |
20080235511 | O'Brien et al. | Sep 2008 | A1 |
20080287176 | Bennett, III | Nov 2008 | A1 |
20090290711 | Bloom et al. | Nov 2009 | A1 |
20090316903 | Jeung | Dec 2009 | A1 |
20100195824 | Lin | Aug 2010 | A1 |
20100205448 | Tarhan et al. | Aug 2010 | A1 |
20110069836 | Rae et al. | Mar 2011 | A1 |
20110082799 | Parduhn et al. | Apr 2011 | A1 |
20110142234 | Rogers | Jun 2011 | A1 |
20110213969 | Nakhjiri et al. | Sep 2011 | A1 |
20120233684 | Denis et al. | Sep 2012 | A1 |
20120246461 | Buckley et al. | Sep 2012 | A1 |
20130091362 | Poeluev | Apr 2013 | A1 |
20130121492 | Vacon | May 2013 | A1 |
20140041009 | Kousaka | Feb 2014 | A1 |
Entry |
---|
Rubin, Aviel D. “Independent One-Time Passwords”. Jun., 1995.Usenix. pp. 1-11. |