Field of the Invention
The present invention generally relates to systems and methods for access control, and the like, more particularly to systems and methods for proximity-based access control based on a physical token, and the like.
Discussion of the Background
In recent years, systems and methods for access control, and the like, have been developed. However, such systems lack robustness and features sets across multiple platforms with respect to proximity-based access control, and the like.
Therefore, there is a need for methods and systems for access control, and the like. Accordingly, the above and other needs are addressed by the illustrative embodiments of the present invention, which provide a novel method and system for proximity-based access control based on a physical token, and the like.
Accordingly, in an illustrative aspect, there is provided a system, method and computer program product for proximity-based access control, including a physical token device having a programmable computing device, a memory storage device, and a wireless radio device having a limited range; and a user device that couples to the physical token device over one of: a wireless interface to the wireless radio device integrated into the physical token, and a physical interface to the physical token with electrical connectivity between the physical token and the user device. The programmable computing device is configured to only allow the user device to access the memory storage device over the wireless or physical interface when the physical token device is either within the limited range of the wireless radio device, or physically attached such that electrical connection is possible, respectively.
The physical token device is one of a Fob device, a keyfob device, a wristband device, a ring device, and a credit card device.
The user device is one of an Android device, an iPhone device, a tablet device, a smartphone device, a workstation, a PC, a laptop, or generally any device or adapter which provides a frame or sleeve for physical including mechanical or electro-permanent magnetic capture of the physical token device.
The wireless radio device is one of a Bluetooth radio device, a Wi-Fi radio device, and a Near Field Communication (NFC) radio device, and the wireless interface is one of a Bluetooth wireless interface, a Wi-Fi wireless interface, and an NFC wireless interface.
The physical token device includes a token interface application configured to interface the physical token device over a cloud-based network with a Security Framework Provider (SFP).
The physical token device includes a USB port, or other physical connection providing electrical connectivity, for charging the physical token device from the user device, and providing a secure connection to the Security Framework Provider (SFP) over the cloud-based network via the user device coupled to the physical token device via the USB port, as well as a secure connection for sensitive operations, including keying, and provisioning operations.
Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, simply by illustrating a number of illustrative embodiments and implementations, including the best mode contemplated for carrying out the present invention. The present invention also is capable of other and different embodiments, and its several details can be modified in various respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive.
The embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which like reference numerals refer to similar elements, and in which:
The present invention includes recognition that the Concept of operations (CONOP) presented here is built around the concept of a physical token that enables a proximity-based access control model for sensitive user data stored on user devices (e.g., tablets, smartphones, workstations), or in a cloud folder, and the like. The present disclosure describes the concept of operation for a secure privacy system and method based on, for example, processing capability and storage capabilities, and the like, embedded in a device with a form factor analogous to a key fob, and the like. Such device is called a Proximity Access Control (PAC) Token, and, for example, includes a wireless, such as Bluetooth, and the like, radio with limited range so that eavesdropping is difficult and easy to detect. The Proximity Access Control Token can provide a micro USB port, which can be used for (1) charging as well as (2) a confidential connection for sensitive operations, such as keying, and the like. For such option, the Proximity Access Control Token can be configured as a host USB, and the like. The Proximity Access Control Token can also provide other ports allowing direct electrical connection between the Proximity Access Control Token and a user device, or direct electrical connection between the Proximity Access Control Token and an interface device, such as a sleeve or similar adapter, which interface device connects to the user device. A provided commercial off the shelf Host Platform, such as an Android or iPhone platform, and the like, that supports a Bluetooth interface can be pre-loaded with PAC Token Interface Applications. PAC Token Interface Applications are built to interface with the Proximity Access Control Token, as well as a cloud-based network, and the like, provided by a Security Framework Provider (SFP).
The following nomenclature, for example, is adopted in the present disclosure: A privacy device is a “Proximity Access Control Token” or “PAC Token”. A “User Device” is a commercial off-the-shelf (COTS) platform(s) of a user, and which houses PAC Token Interface Applications, and associates with a Proximity Access Control Token; A “Backup User Device” is a COTS platform(s) of a user and which stores User Data; A “Cloud User Device” is a network platform(s) of a user and which stores User Data; A “Security Framework Provider Embedded App” is a security application running on the Proximity Access Control Token that provides security services (e.g., confidentiality and integrity); “PAC Token Interface Apps” are applications that run on the User Device and interface with the Proximity Access Control Token for non-volatile storage. The key used by one Proximity Access Control Token to store Black Data such that another Proximity Access Control Token can decrypt the Black Data is referred to as the “Transfer Key”; Data encrypted with a Transfer Key is referred to as “Black Transfer Data”; An encrypted Transfer Key is referred to as a “Black Transfer Key”; A password that enables decryption of a Black Transfer Key is referred to as a “Transfer Password”; A split value that enables decryption of a Black Transfer Key is referred to as a “Transfer Split”.
Referring now to the drawings, wherein like reference numerals designate identical or corresponding parts throughout the several views, and more particularly to
Primary security services can include Secure Data Storage and Secure Transfer. The device 114 in tandem with an associated User Device 118 enable the user 102 to securely store application data on the device 114 (e.g., configured as Secure Data Storage), as well as transfer data securely off of the device 114 for later access by that device 114 or any other device 114 whose user has the Transfer Password (e.g., configured as Secure Transfer).
An Access Control Model Overview includes a password established for the device 114 as part of the process of keying. The password is used, cryptographically, to unlock the device 114 keyset. Access control models are proposed for unlocking the device 114 security services, for example, as follows.
In a Proximity Only Model, once the password has been entered successfully then as long as the device 114 has power it can provide security services to the User Device 118 that it has associated with based only on the device 114 being in proximity to the associated User Device 118. Because security critical key variables in the device 114 (e.g., the Private Key and Keys associated with secure storage) are restricted to volatile (RAM) storage only, if power is lost, the password can be re-entered, but once it has been entered, the proximity model enables security services as soon as proximity occurs.
In a Proximity Plus Password (Proximity+PW), a more conservative access control model, the device 114 provides security services to the User Device 118 it has associated with only if the device 114 is in proximity to the User Device 118 and the password is correctly entered.
PAC Token Unlock Configuration allows the device 114 to support configurations for unlock that range from requiring access to the SFP Network to unlock to unlocking regardless of SFP Network access.
The following describes various Concept of Operation (ConOp) Scenarios. For example,
Installing of applications (e.g., referred to as Interface Apps) includes the applications, for example, being customized for each User Device 118 environment (e.g., 0/S), and the like. For example, Bluetooth Pairing between the device 114 and the User Device 118 can employ the described secure association that then rides on top of the basic Bluetooth connection. The securing of the interface between an application (e.g., referred to as an Interface App) and the device 114 includes establishing a link between the User Device 118 and the device 114 that is secured, for example, via certificates, and the like. Standard wireless security (e.g., Bluetooth, WiFi security), and the like, can be employed but advantageously need not be relied upon.
Red Data Exchange between an application (e.g., referred to as an Interface App) and the device 114 can be enabled, as well as providing an Interface Protocol configured to exchange data between multiple applications (e.g., referred to as Interface Apps) on the User Device 118 and a single device 114. An application (e.g., referred to as an Interface App) can also import Red Data from other applications.
In addition, Black Data can be copied to a Backup User Device 118, wherein the device 114 copies its ciphertext to the backup user device 118. For example, no special keying apart from that integrated into the device 114 for the purposes of its own Data At Rest (DAR). Black Data also can be moved to the Backup User Device 118, for example, for freeing up storage space on the device 114, while allowing the backed up data to be later read back in and be used. In this case, the device 114 can store XTS index information along with the Black Data. Black Data also can be transferred to the Backup User Device 118 in a similar manner.
For example,
Patching (e.g., Software Updating) of the device 114 can employ software update authentication leveraging software signatures, and the like.
A Support for Multiple personas feature can be configured, for example, so that different persona data can be stored encrypted with unique keys tied to passwords, or with multiple passwords employed but only a single keyset for Data At Rest encryption/decryption being in effect, and the like.
The Decommissioning of the device 114 can be realized whereby revoking a PAC Token deletes its Keystore, permanently removing access to Secure Storage. Deactivation, which eliminates PIN based decryption of Secure Storage contents, but allows for later reactivation over the air can be provided via the management account provided by the Security Framework Provider.
The following table summarizes various Vulnerability, Threat, and Countermeasure scenarios.
Advantageously, the Device 114 can be configured in any suitable form, for example, including the device 114 having general forms, such as Fob, Wristband, Ring, Credit card, any suitable object making sense to be carried with a person, and the like. The device 114 can be configured, for example, as an adapter that has a computer chip, and the like, therein. Such a chip can include security keys, security algorithms, secure storage, and the like, and wherein the adapter includes wireless or other type of low range connections and connectivity, and the like. Unlocking such a device can be accomplished via password entry on a host keyboard, or via direct interaction with the device, such as via built in biometric measuring capability such as fingerprint reading, and the like.
Accordingly, Bluetooth, WiFi, SD interface devices, and the like can be employed for or with the device 114. For example, a PAC device can be employed in MicroSD from factor. This device seats into any device that has an SD, MicroSD, and the like slot. In addition, there, are numerous adapters that have MicroSD slots, and which can be employed with the device 114.
Thus, the present invention is not directed to wireless storage, but rather how to enable secure storage that becomes the secure storage of various user devices (e.g., for Phones, Tablets, PC's, Cars, Refrigerators, Thermostats) of one person. In this way, the device 114 can be employed like a digital keyring of a person across that person's Internet of Things (loT). Accordingly, the device 114, for example, configured as a MicroSD card with security keys, security algorithm, secure storage, and the like, can be integrated into various adapters, and the like. Secure storage is understood to apply to both data and software objects. So, for example, the information stored securely on device 114 could be both a banking application as well as data it operates on (e.g., account numbers, balances, etc.); neither the application nor its associated data are accessible until device 114 is unlocked.
The above described devices and subsystems of the illustrative embodiments can include, for example, any suitable servers, workstations, PCs, laptop computers, PDAs, Internet appliances, handheld devices, cellular telephones, wireless devices, computer architectures including x86, ARM, MPIS with operating system (OS) platforms including Windows, Linux, iOS, Android, other electronic devices, and the like, capable of performing the processes of the illustrative embodiments. The devices and subsystems of the illustrative embodiments can communicate with each other using any suitable protocol and can be implemented using one or more programmed computer systems or devices. One or more interface mechanisms can be used with the illustrative embodiments, including, for example, Internet access, telecommunications in any suitable form (e.g., voice, modem, and the like), wireless communications media, and the like. For example, employed communications networks or links can include one or more wireless communications networks, cellular communications networks, cable communications networks, satellite communications networks, G3 communications networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, WiMAX Networks, “cloud” computer networks, virtual machine and hosting networks, a combination thereof, and the like.
It is to be understood that the devices and subsystems of the illustrative embodiments are for illustrative purposes, as many variations of the specific hardware and/or software used to implement the illustrative embodiments are possible, as will be appreciated by those skilled in the relevant art(s). For example, the functionality of one or more of the devices and subsystems of the illustrative embodiments can be implemented via one or more programmed computer systems or devices.
To implement such variations as well as other variations, a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the illustrative embodiments. On the other hand, two or more programmed computer systems or devices can be substituted for any one of the devices and subsystems of the illustrative embodiments. Accordingly, principles and advantages of distributed processing, such as redundancy, replication, and the like, also can be implemented, as desired, to increase the robustness and performance the devices and subsystems of the illustrative embodiments.
The devices and subsystems of the illustrative embodiments can store information relating to various processes described herein. This information can be stored in one or more memories, such as a hard disk, optical disk, magneto-optical disk, RAM, and the like, of the devices and subsystems of the illustrative embodiments. One or more databases of the devices and subsystems of the illustrative embodiments can store the information used to implement the illustrative embodiments of the present invention. The databases can be organized using data structures (e.g., records, tables, arrays, fields, graphs, trees, lists, and the like) included in one or more memories or storage devices listed herein. The processes described with respect to the illustrative embodiments can include appropriate data structures for storing data collected and/or generated by the processes of the devices and subsystems of the illustrative embodiments in one or more databases thereof. All or a portion of the devices and subsystems of the illustrative embodiments can be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, micro-controllers, application processors, domain specific processors, application specific signal processors, and the like, programmed according to the teachings of the illustrative embodiments of the present invention, as will be appreciated by those skilled in the computer and software arts. Appropriate software can be readily prepared by programmers of ordinary skill based on the teachings of the illustrative embodiments, as will be appreciated by those skilled in the software art. In addition, the devices and subsystems of the illustrative embodiments can be implemented by the preparation of application-specific integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be appreciated by those skilled in the electrical art(s). Thus, the illustrative embodiments are not limited to any specific combination of hardware circuitry and/or software.
Stored on any one or on a combination of computer readable media, the illustrative embodiments of the present invention can include software for controlling the devices and subsystems of the illustrative embodiments, for driving the devices and subsystems of the illustrative embodiments, for enabling the devices and subsystems of the illustrative embodiments to interact with a human user, and the like. Such software can include, but is not limited to, device drivers, firmware, operating systems, development tools, applications software, and the like. Such computer readable media further can include the computer program product of an embodiment of the present invention for performing all or a portion (e.g., if processing is distributed) of the processing performed in implementing the illustrative embodiments. Computer code devices of the illustrative embodiments of the present invention can include any suitable interpretable or executable code mechanism, including but not limited to scripts, interpretable programs, dynamic link libraries (DLLs), Java classes and applets, complete executable programs, Common Object Request Broker Architecture (CORBA) objects, SW frameworks including .NET/CLR, JVM, scripting frameworks including PHP, Python, Perl, Shell, and the like. Moreover, parts of the processing of the illustrative embodiments of the present invention can be distributed for better performance, reliability, cost, and the like.
As stated above, the devices and subsystems of the illustrative embodiments can include computer readable medium or memories for holding instructions programmed according to the teachings of the present invention and for holding data structures, tables, records, and/or other data described herein. Computer readable medium can include any suitable medium that participates in providing instructions to a processor for execution. Such a medium can take many forms, including but not limited to, non-volatile media, volatile media, transmission media, and the like. Non-volatile media can include, for example, optical or magnetic disks, magneto-optical disks, flash memories, and the like. Volatile media can include dynamic memories, and the like. Transmission media can include coaxial cables, copper wire, fiber optics, and the like. Transmission media also can take the form of acoustic, optical, electromagnetic waves, and the like, such as those generated during radio frequency (RF) communications, infrared (IR) data communications, transmission media including WiFi/802.11, BT, 3G, LTE, and the like. Common forms of computer-readable media can include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other suitable magnetic medium, a CD-ROM, CDRW, DVD, solid-state drive (SSD) storage devices, any other suitable optical medium, punch cards, paper tape, optical mark sheets, any other suitable physical medium with patterns of holes or other optically recognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, a DRAM, a DDR, a NAND/NOR flash device, any other suitable memory chip or cartridge, a carrier wave, or any other suitable medium from which a computer can read.
While the present invention has been described in connection with a number of illustrative embodiments and implementations, the present invention is not so limited, but rather covers various modifications and equivalent arrangements, which fall within the purview of the appended claims.
The present invention claims priority to U.S. Provisional Patent Application Ser. No. 62/196,271 of Zarkesh et al., entitled “METHOD AND SYSTEM FOR PROXIMITY-BASED ACCESS CONTROL,” filed on Jul. 23, 2015, the entire disclosure of which is hereby incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
62196271 | Jul 2015 | US |