The present invention relates generally to information processing systems and more particularly to a methodology and implementation for enabling a locking and unlocking of a digital pen.
Digital pens currently have the capability to associate a single user to a specific pen. However, in a shared environment, a pen currently lacks the functionality to distinguish between multiple users. To digitally sign handwritten documents, in contrast, it is necessary to associate an associated user to their digital certificate. Furthermore, in current art, the problem of potential pen theft has not yet been unaddressed. As digital pens are complex devices, they are generally expensive and attractive targets for theft.
Thus, there is a need for an improved methodology and system for enabling password protection to digital pens to prevent unauthorized personnel from using digital pens.
A locking digital pen includes memory means for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents, and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system.
A better understanding of the present invention can be obtained when the following detailed description of a preferred embodiment is considered in conjunction with the following drawings, in which:
It is noted that circuits and devices which are shown in block form in the drawings are generally known to those skilled in the art, and are not specified to any greater extent than that considered necessary as illustrated, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.
In
The locking methodology disclosed herein may be implemented with a digital pen that senses pressure, acceleration and other sensed changes in the pen tip as it is used for writing, or with a digital pen that operates in conjunction with a special pad or tablet as discussed in the example below. In the exemplary embodiment discussed below, a digital pen typically remains in a limited operational mode or locked state in which the pen is selectively operational to process input user passwords or authorization codes only. If an authorized password is entered, the pen assumes an enhanced operational mode in which the user of the pen is enabled to perform various enhanced functions, including but not limited to digitally signing electronic documents.
The invention presented in this disclosure provides a system, method and apparatus for locking and unlocking a digital pen for multiple users. Once a user has unlocked a pen the user can do one of several things. Firstly, the public key associated with that user can be used for digitally signing or encrypting a document. Several users can be supported or multiple IDs for the same user can be supported. Secondly, a private key associated with a user can be used to encrypt documents. Thirdly, the pen itself can be disabled so that its function is useless without a password. This becomes a valuable anti-theft deterrent for expensive digital pens. Such a pen known to be unusable would have little or no resale value and present too high a risk for acquiring illicitly.
The user can lock a digital pen through the same methods as unlocking. The apparatus used is the digital pen itself and the means for locking and unlocking can occur in one of two methods. In one method, a password alone can lock or unlock the pen. This sequence of characters, symbols, and numbers would have to be unique so that it does not interfere with normal operation of the pen. In one embodiment, the lock and unlock passwords are unique. For example, if the password were commonly found in the language, problems would arise. For example, if a user chose the word “house” as the lock password, it is conceivable that he/she could inadvertently lock the pen when writing a sentence using the lock password. If however, the password were a combination of letters and numbers that would never be used in normal written communication, like “corv3tt3”, then this method becomes practical and requires no additional steps. In another embodiment, the same password is used to lock and unlock the pen, where the writing of the password merely signifies a binary state change for the pen.
In accordance with the present disclosure, there is provided a means for using password technology with digital pens. The mechanism that enables passwords to work within a digital pen includes adding a user interface (comprised of buttons and displays) and also a program product to the digital pen. This program product contains the logic to associate password management capabilities described above with specific unique functions of a digital pen.
A second method for locking/unlocking would involve incorporating a mechanical switch or button on the digital pen itself that signifies the user's desire to unlock the pen. When activated, this mechanism puts the pen into a lock or unlock verification state. In any embodiment related to UNLOCKing the digital pen, the user hand-writes a password somewhere on the page with metadata that identifies the password to use to unlock the digital pen. For example, the user writes: “UNLOCK 12345” on the paper. 12345 happens to be the password. This commands the pen to unlock itself without needing any buttons to push to put the pen into a mode of input to unlock the pen. In this method, several methodologies can be incorporated into verification processing. Techniques commonly used in forensics to identify the actual properties of the handwritten password can be analyzed, in addition to the representative characters. Since the signature can be evaluated at the time of creation, elements of handwriting which are normally not available for analysis are now possible, including changes in speed, pressure, and timing which may now be sensed and measured.
In a second UNLOCK embodiment, an input method and an LCD display are used to select a password, letter by letter and digit by digit to unlock the pen when the password is complete. By pressing a “SUBMIT” or “ENTER” button on the digital pen, the user completes the password.
In a third UNLOCK methodology, the a set of tumblers or thumbwheels (not shown) on the digital pen is used to input the password and when all the letters and digits of the password match up the pen is unlocked. Once the password is used to unlock the pen the user can change the tumblers to any random position.
When the digital pen is LOCKed, the pen can end up in two states. One is to lock the pen and completely disable all functionality, and the other state is to lock the pen but continue to allow the pen to function as it normally does except that the pen does not associate a digital signature with the user anymore so that no documents can be digitally signed. The state to disable the pen can either be configured to occur automatically on lock, or with a special lock code entered into the pen.
In another LOCK embodiment, the user handwrites the word LOCK with metadata that tells the pen this is a legitimate lock command. In another example, the word “LOCK” can be written within squared brackets “[ . . . ]” and the containment within the squared brackets would indicate a command that the pen should be locked rather than the input of text.
In another LOCK embodiment, the user simply presses a button on the digital pen that locks the pen. In another example, the user is enabled to enter a special sequence on a set of tumblers that locks the pen. In yet another LOCKing implementation, the user enters a special LOCK sequence through a selector on the LCD panel letter by letter or digit by digit that is selectively operable to lock the pen.
An exemplary UNLOCK sequence is illustrated in
In an exemplary LOCK sequence 601 as shown in
The method and apparatus of the present invention has been described in connection with a preferred embodiment as disclosed herein. The disclosed methodology may be implemented in a wide range of sequences to accomplish the desired results as herein illustrated. Although an embodiment of the present invention has been shown and described in detail herein, along with certain variants thereof, many other varied embodiments that incorporate the teachings of the invention may be easily constructed by those skilled in the art, and even included or integrated into a processor or CPU or other larger system integrated circuit or chip. The disclosed methodology may also be implemented partially in program code stored on a CD, disk or diskette (portable or fixed), or other memory device, from which it may be loaded into memory and executed to achieve the beneficial results as described herein. Accordingly, the present invention is not intended to be limited to the specific form set forth herein. On the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the invention.
Number | Date | Country | |
---|---|---|---|
Parent | 11197618 | Aug 2005 | US |
Child | 12157256 | US |