This patent application is a U.S. National Phase of International Patent Application No. PCT/EP2016/079437, filed 1 Dec. 2016, which claims priority to German Patent Application No. 10 2015 225 792.4, filed 17 Dec. 2015, the disclosures of which are incorporated herein by reference in their entireties.
Illustrative embodiments relate to a method and a system for protected communication between a mobile unit coupled to a smartphone and a server, and a computer program product.
Disclosed embodiments will be explained below using the appended drawings, in which:
Increasingly, the situation arises in which a mobile device such as a smartphone acts as a base or connection point for further mobile devices, for example, a smartwatch. Although operating concepts and security functions are also transferred from the smartphone to the smartwatch, the question arises as to whether, with regard to the differences in the interfaces and in the computing power, all the demands on security and operator friendliness on the smartwatch can be ensured.
US 2009/0271621 A1 discloses a method with facilitated login function for smartphones, in which firstly registration data and a PIN are transmitted to a server and the latter checks the registration data. If the check is successful, encrypted data comprising the registration data and the PIN is transmitted to the smartphone, which then, upon renewed login, transmits only the PIN and the encrypted data.
US 2014/168071 A1 discloses a method for rerouting personal data from a computer to another device in the vicinity of a user, the presence of the user being determined by presence detection on the basis of biometric features.
US 2014/181954 A1 discloses a method for transmitting a digital identity from a server to a mobile device such as a smartphone and/or a smartwatch. For example, the smartphone provides the smartwatch with the complete digital identity, so that the smartwatch can function like the smartphone.
Disclosed embodiments are based on safely configuring and simplifying the communication between a mobile unit coupled to a smartphone and a server.
This is achieved by a method, a system and a computer program product.
The disclosed method for protected communication between a mobile unit coupled to a smartphone and a server, wherein it is possible to access a service of the server via the smartphone by registration data, comprising:
In the disclosed embodiments, simple operation with maximum security is permitted by the simplified entry of a secret number such as a PIN instead of a password on the mobile unit. Anywhere where a mobile unit, such as a smartwatch, for example, is used to use a secure account in which a password has to be entered, the method presented here in conjunction with a smartphone or a similar mobile device can simplify the usage. The security is completely preserved, since the storage of the registration data, the secret number and the secret is carried out exclusively in a secure memory in the smartphone. No storage of this data in the program, for example, an App, on the smartphone or on the mobile unit is carried out. The secret is used to identify the mobile unit uniquely so that, in conjunction with the secret number, secure registration on the smartphone or its secure memory can be carried out. The secure memory can, for example, be a password-protected keystore. The secure system overall, but at least the entry relating to the respective secret number, is secured by this secret number.
Provision can be made for the secure memory in the smartphone to be separated from a data and/or program storage location. This increases the security, since a secure memory permits and offers higher security measures than a program or software such as an App.
Provision can also be made for the registration data to comprise a username and a password, wherein the part of the registration data is the password. This type of registration data is widespread, so that extensive compatibility with existing systems is provided. Provision can be made for only the password from the registration data to be stored in the memory. The username is usually known, so that, by this measure, storage space in the secure memory can be saved. The username can then be stored in another memory or in the program.
The mobile unit can be a smartwatch or a wearable computer. Such units, such as, for example, including data spectacles or data contact lenses, are increasing in importance and permit multiply simplified user entries. However, the user interfaces of such mobile units are normally poorly suited for the entry of passwords, so that the solution proposed here, to replace a password by a simpler secret number such as a four-digit PIN, for example, is appropriate.
Provision can be made for the secret number to be entered on the smartphone for the first time. During the first-time entry, it may be more convenient and also more secure to enter the secret number directly into the smartphone, where it is stored. Alternatively, an entry and subsequent transmission by the mobile unit is possible.
The secret can comprise a network identifier. Since the mobile unit comprises at least one interface to a network for communication, the unique identifier such as a BLUETOOTH® ID or an MAC address (Media Access Control Address) can be used. This network identifier is already present and is the hardware address of each individual network adapter, to identify the latter uniquely in a network. Thus, unique identification of the mobile unit can be achieved with little outlay.
Provision can be made that, following the transmission of at least part of the registration data, a service between the server and the mobile unit is started. The method operations described can go beyond the communication for the access to or for the preparation of a service, and can comprise the start and also the operation of a service such as, for example, an online service. Services of this type are already available, for example, in transportation vehicles, such as door opening, transportation vehicle parking, etc., or in domestic appliances or smart home installations such as, for example, washing machines or refrigerators.
The disclosed system for protected communication between a mobile unit coupled to a smartphone and a server, access to a service of the server being possible via the smartphone by a user identifier, characterized in that the mobile unit comprises a secret, in that the smartphone and/or the mobile unit is configured for the first-time entry of a secret number in association with the user identifier, in that the smartphone has a secure memory configured to store the user identifier, the secret number and the secret, in that the mobile unit is configured for the transmission of the secret number, re-entered on the mobile unit, and of the secret from the mobile unit to the secure memory, in that the smartphone is configured to read at least part of the user identifier from the secure memory if the transmitted secret number and the transmitted secret match the stored secret number and the stored secret, and to transmit at least part of the user identifier from the smartphone to the server. The same benefits and modifications as previously described apply.
The mobile unit can be a smartwatch or a wearable computer. Such units, such as, for example, including data spectacles or data contact lenses, are increasing in importance and permit multiply simplified user entries. However, the user interfaces of such mobile units are normally poorly suited for the entry of passwords, so that the solution proposed here, to replace a password by a simpler secret number such as a four-digit PIN, for example, is appropriate.
Provision can be made for the mobile unit and the smartphone to communicate via a radio network. Such a connection is widely available and has adequate security standards, so that there is very good compatibility.
The connection between the mobile unit and the smartphone and/or between the smartphone and the server can be protected by cryptographic methods, such as by the use of symmetrical or asymmetrical keys. In this way, the security can be increased further.
The disclosed computer program product comprises program code to carry out the previously described method when the program product is executed on a device or a system for protected communication. The same benefits and modifications as previously described apply.
Further embodiments can be gathered from the remaining named features.
The various embodiments named in this application, if not otherwise explained in the individual case, can be combined with one another.
A mobile unit, here a smartwatch 18, is coupled to the smartphone 14 and, via the smartphone 14, also coupled to the server 12. The mobile unit can also be a wearable computer or a wearable device, which means a portable device such as, for example, smart spectacles, or a computer unit arranged in an item of clothing.
The smartwatch 18 and the smartphone 14 communicate with each other via a communications link 20. The communications link 20 is typically short-range radio, such as, for example, BLUETOOTH®, near-field communication or the like. The transmission range lies in the range of centimeters to a few meters here. The communications link 20 can be protected with a cryptographic method.
To be able to use the service offered by the server 12, there is a program 22 on the smartphone 14. The program 22 can be an App, for example, which has been downloaded from the server 12 or another source and installed on the smartphone 14. The software or the program 22 can be an independent unit or consist of multiple elements, which can also be implemented in hardware.
In addition, the smartphone 14 contains a secure memory 24 which, for example, is secured with a password or key and in which registration data 26 for registration or access to a service of the server 12 is located. The registration data 26 comprises a username and an associated password.
Furthermore, a secret number 28 is stored in the secure memory 24. The secret number 28 such as a PIN (personal identification number), for example, having four digits, has been entered into the smartphone 14 or the smartwatch 18 in association with the registration data 26. The secret number 28 is used for the simplified entry of an access identifier on the smartwatch 18, which often has a rudimentary user interface. As will be described later in connection with
Furthermore, a secret 30 is stored in the secure memory 24. The secret 30 is a unique identifier of the smartwatch 18. This can be, for example, a network identifier such as a BLUETOOTH® ID or an MAC (Media Access Control) or else a pseudo-random number.
By using
Firstly, to a certain extent as preparation, the secret number 28 is entered into the smartphone 14 in association with the registration data 26 and, together with the registration data 26 and the secret 30, is stored in the secure memory 24. The secret number 28 can be entered into the smartphone 14 or into the smartwatch 18 and then transmitted to the smartphone 14 for the above-described storage.
If, then, a user wishes to use a service of the server 12, such as, for example, the opening of his transportation vehicle, with his smartwatch 18, he first enters the secret number 28 on the smartwatch 18. The secret number 28 is then transmitted to the smartwatch 14 together with the secret 30.
In the smartwatch 14, access to the secure memory 24 is made with the secret number 28 and the secret 30. If the check on the data is successful, which means the access authorization to the secure memory 26 by using the secret number 28 and the secret 30, the registration data 26 for the user of the smartphone 14 and therefore also the smartwatch 18 is read from the secure memory and transmitted to the server 12.
On the server 12, the registration data 26, which means username and password, is checked and, if the check is positive, the requested service 32 is started with a message or data transmission from the server 12 to the smartwatch 18. If provided in this service 32, the smartwatch 18 sends messages or data 34 back to the server. The communication between the server 12 and the smartwatch 18 can proceed via the smartphone 14. For instance, the server 12 and the smartphone 14 can communicate via a mobile radio protocol, and the smartphone 14 can then communicate with the smartwatch 18 via a BLUETOOTH® low energy link. Alternatively, the communication between the server 12 and the smartwatch 18 can be carried out directly, which means without incorporating the smartphone 14 in the execution of the service 32. In this case, it may be necessary for the smartphone 14 to transmit address information from the smartwatch 18 to the server 12.
Thus, by a simple entry of a secret number 28, such as a PIN, on the smartwatch 18, authentication can be carried out on the server 12. In addition, the method is very secure, since the secret number 28 remains only on the smartphone 14 when it has been entered there. All important data, such as the registration data 26, the secret number 28 and the secret 30, is stored only in the secure memory 24 of the smartphone 14 and not on the smartwatch 18 or in the program 22.
Number | Date | Country | Kind |
---|---|---|---|
10 2015 225 792 | Dec 2015 | DE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2016/079437 | 12/1/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2017/102355 | 6/22/2017 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
8656179 | Billings | Feb 2014 | B2 |
9009805 | Kirkby | Apr 2015 | B1 |
10063374 | Bamasag | Aug 2018 | B2 |
20030041244 | Buttyan | Feb 2003 | A1 |
20050039010 | Grove | Feb 2005 | A1 |
20050125669 | Stewart | Jun 2005 | A1 |
20090271621 | Mendelovich | Oct 2009 | A1 |
20100228990 | Billings | Sep 2010 | A1 |
20120311322 | Koyun | Dec 2012 | A1 |
20130152179 | Lee | Jun 2013 | A1 |
20130263234 | Givoni | Oct 2013 | A1 |
20140040136 | Gatlin | Feb 2014 | A1 |
20140108486 | Borzycki et al. | Apr 2014 | A1 |
20140168071 | Ahmed et al. | Jun 2014 | A1 |
20140181954 | Robertson | Jun 2014 | A1 |
20140230019 | Civelli et al. | Aug 2014 | A1 |
20140245396 | Oberheide | Aug 2014 | A1 |
20140331060 | Hayton | Nov 2014 | A1 |
20140334271 | Park et al. | Nov 2014 | A1 |
20150089590 | Krishnan | Mar 2015 | A1 |
20150147065 | Civelli et al. | May 2015 | A1 |
20150161371 | Hoshi | Jun 2015 | A1 |
20150178757 | Moshal | Jun 2015 | A1 |
20150186636 | Tharappel | Jul 2015 | A1 |
20150199684 | Maus | Jul 2015 | A1 |
20150222517 | McLaughlin | Aug 2015 | A1 |
20150295901 | Woodward | Oct 2015 | A1 |
20150332038 | Ramsden | Nov 2015 | A1 |
20150373149 | Lyons | Dec 2015 | A1 |
20160005032 | Yau | Jan 2016 | A1 |
20160065544 | Chen | Mar 2016 | A1 |
20160085954 | Tunnell | Mar 2016 | A1 |
20160142211 | Metke | May 2016 | A1 |
20160246454 | Vonshak | Aug 2016 | A1 |
20160353266 | Winkler | Dec 2016 | A1 |
20170039599 | Tunnell | Feb 2017 | A1 |
20170048212 | Everhart | Feb 2017 | A1 |
20170126610 | Sachidanandam | May 2017 | A1 |
20180176223 | Hutchinson | Jun 2018 | A1 |
20180203601 | Birchfield | Jul 2018 | A1 |
Number | Date | Country |
---|---|---|
102013012339 | Jan 2015 | DE |
2433457 | Mar 2012 | EP |
2014143916 | Sep 2014 | WO |
2015126095 | Aug 2015 | WO |
Entry |
---|
Search Report for German Patent Application No. 10 2015 225 792.4; dated Nov. 3, 2016. |
Search Report for International Patent Application No. PCT/EP2016/079437; dated Mar. 7, 2017. |
Number | Date | Country | |
---|---|---|---|
20180376334 A1 | Dec 2018 | US |