Methods and systems for assigning roles on a token

Information

  • Patent Grant
  • 8639940
  • Patent Number
    8,639,940
  • Date Filed
    Wednesday, February 28, 2007
    17 years ago
  • Date Issued
    Tuesday, January 28, 2014
    10 years ago
Abstract
An embodiment relates generally to a method of assigning roles to a token. The method includes determining a first role for a first participant on a token and providing exclusive access to a first section of the token for the first participant base on the first role. The method also includes determining a second role for a second participant on the token and providing exclusive access to a second section of the token for the second participant based on the second role.
Description
FIELD

This invention relates generally to managing tokens, more particularly, to methods and systems for assigning roles on the token.


DESCRIPTION OF THE RELATED ART

Smart cards are generally well known. Smart cards can be used to provide authentication for transactions such as logging into a secure computer. However, smart cards are not merely a piece of plastic with a strip of magnetic material. Smart cards also store and process information. Smart cards are storage devices with the core mechanics to facilitate communication with a reader or coupler. They have file system configurations and the ability to be partitioned into public and private spaces that can be made available or locked. They also have segregated areas for protected information, such as certificates, e-purses, and entire operating systems. In addition to traditional data storage states, such as read-only and read/write, some vendors are working with sub-states best described as “add only” and “update only.”


The physical characteristics of smart cards are governed by international standards. For example, the size of a card is covered by ISO-7810. ISO-7816 and subsequent standards cover manufacturing parameters, physical and electrical characteristics, location of the contact points, communication protocols, data storage, and more. Data layout and format, however, can vary from vendor to vendor.


The use of smart cards is a mechanism to increase security especially for large business and governmental entities. These entities often contain valuable information such as financial data, personnel records, strategies, etc., that may be critical for the respective entity. Moreover, smart cards can provide a method to control access to data within the enterprise systems of the respective entity. Accordingly, the reasons to use smart card (“tokens”) are plentiful.


However, in some large business or governmental entities, multiple sub-organizations may want access and control of the tokens. The reason for the access and control can be related to the role of the sub-organization within the respective entity. For example, a human resource sub-organization may want access to the token to control the distribution of the token to valid employees while the sub-organization that hired the employee may want access to the token for its respective function. Both sub-organizations prefer not to have the other sub-organization to have access to their respective confidential information based on a shared token. Accordingly, there is a need for a method and/or system to be able to provide exclusive access to areas of the token based on roles.





BRIEF DESCRIPTION OF THE DRAWINGS

Various features of the embodiments can be more fully appreciated, as the same become better understood with reference to the following detailed description of the embodiments when considered in connection with the accompanying figures, in which:



FIG. 1 illustrates an exemplary system in accordance with an embodiment;



FIG. 2 illustrates an exemplary token in accordance with another embodiment;



FIGS. 3A-3F each illustrates an exemplary scenario in accordance with yet another embodiment;



FIG. 4 illustrates an exemplary flow diagram in accordance with yet another embodiment;



FIG. 5 illustrates another exemplary flow diagram in accordance with yet another embodiment; and



FIG. 6 illustrates an exemplary computing platform to execute embodiments of the present teachings.





DETAILED DESCRIPTION OF EMBODIMENTS

For simplicity and illustrative purposes, the principles of the present invention are described by referring mainly to exemplary embodiments thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of secure computing applications, and that any such variations do not depart from the true spirit and scope of the present invention. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific embodiments. Electrical, mechanical, logical and structural changes may be made to the embodiments without departing from the spirit and scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present invention is defined by the appended claims and their equivalents.


Embodiments relate generally to systems, methods, and apparatus for providing role-based access to a smart card or token being shared by multiple groups, organizations, entities, etc. More particularly, a role assigner module can be configured to implement a role-assigning protocol to allow a smartcard (or token) to get from an initial state where the token can be managed by both the factory and a first recipient to a second state where the management of the token is split between two or more parties. Each party having exclusive access to their portion of the token with out the ability to access the other party's portion.


Embodiments use cryptographic keys as part of the protocol to move from the initial state to the above-described second state. More particularly, the cryptographic keys can be symmetric or asymmetric. Symmetric cryptographic keys can be derived using known key derivation algorithms that use encryption or hashing algorithms. These algorithms generally take public data and mixing it with a secret key. The mixing can be performed by: (1) hashing the derivation key material and the public data with a hash function (such as SHA-1 or MD-5); and (2) encrypting or decrypting public data with the derivation key and a block cipher (such as DES or AES), where the output (or a portion thereof) is the derived key.


Embodiments can also use multiple key sets. Multiple key sets (each with different purposes) can be derived from a single cryptographic key by varying the public data input. The public data input can be as simple as including a single byte which takes on the value (0, 1, 2, etc.) for A1, A1, A2, etc., respectively. Accordingly, a key set based on a cryptographic key A can be derived from hashing A, 0, and a card identification number (CUID) together to arrive at A0. The CUID can be regarded as a serial number that is embedded by the manufacturer. Similarly, A1 can be derived from hashing A, 1, and the CUID together and so on for the rest of the set.


Embodiments can further use authentication as part of the role assigning protocol to move from the initial state to the second state. More specifically, authentication using symmetric cryptographic keys is based on two parties knowing a secret key. The secret key cannot be shared to any other third party. For the case where one party has to authenticate two different entities, each entity requires its own respective secret key.


Authentication can be generally accomplished by a challenge/response protocol, in which the response with the challenge is transformed by a key known to both parties. The authenticator can issue a random challenge to the authenticatee. The authenticatee “signs” the challenge using a cryptographic primitive called a message authentication code (MAC). The MAC can be generated by hashing algorithms, block ciphers, or other similar algorithms known to those skilled in the art. The MAC is then published back to the authenticator.


Embodiments of the present invention can also use asymmetric cryptographic keys. Asymmetric keys are different from symmetric keys in that asymmetric keys come in pairs. One of the keys is published, i.e., public and the second of the keys is kept private. Like symmetric keys, asymmetric keys can be used in signing/verification, encryption/decryption, and key derivation. Asymmetric keys can also be used to distribute or generate symmetric keys.


Accordingly, some embodiments use symmetric cryptographic keys to implement the role-assigning protocol. More particularly, a factory (or token manufacturer) and a first recipient can agree to share a cryptographic key A. The token manufacturer can embed or inject a first applet onto the token. The first applet can issue commands like “load new application”, “new set of keys to use”, “turn off a key set”, “reset password”, “erase smartcard”, “lock the smartcard”, “unlock the smartcard”, etc.


The token manufacturer can also derive a symmetric key set (A0, A1, . . . AN) based on cryptographic key A, public data and the CUID. The token manufacturer can then attach the symmetric key set (A0, A1, . . . AN) to the first applet by using the command “new set of keys to use”. Accordingly, first applet can now be accessed by a party (token manufacturer and first recipient) with access to cryptographic key A. Subsequently, the token with the first applet associated with the symmetric key set (A0, A1, . . . AN) is forwarded to the first recipient.


In some embodiments, the first recipient can be an organization within a larger entity. For example, a human resource group in a corporation or a federal agency in the federal government. The first recipient can act a gatekeeper to grant access to the received token to other organizations within the entity. The other organizations would prefer not to grant access of their applets to the first recipient.


When the first recipient receives the token with the first applet associated with the symmetric key set (A0, A1, . . . AN), the first recipient can initiate a key changeover to obtain exclusive the first applet can be configured to authenticate to the first applet. Since one of the keys in the symmetric key set (A0, A1, . . . AN) is an authentication key and the first recipient share the cryptographic key A with the token manufacturer, the first recipient can generate a MAC with the authentication key, i.e., signs the challenge. The first applet validates the MAC and allows the first recipient access to the first applet.


Subsequently, the first recipient can use a symmetric cryptographic key B to derive a second set of symmetric keys (B0, B1, . . . BN). The cryptographic key B is not shared and kept private by the first recipient. The first recipient can then load the second set of symmetric keys (B0, B1, . . . BN) onto the token using its knowledge of cryptographic key A. The first recipient can use the first applet to issue commands to discontinue use of the symmetric key set (A0, A1, . . . AN) and to use the second set of symmetric keys (B0, B1, . . . BN). Accordingly, only users with access to the cryptographic key B can access the first applet.


The first recipient can embed additional applets for additional organizations. For the sake of clarity, the case of one additional applet for a second organization as a receiver entity is described. Accordingly, the first recipient and the receiver entity can share a symmetric cryptographic key C and derived a third symmetric key set (C0, C1, . . . CN), where on the keys is an authentication key. The first recipient can authenticate to the first applet using the private cryptographic key B to sign the challenge from the first applet. The first recipient can invoke the first applet to load a second applet and the third symmetric key set (C0, C1, . . . CN) once authenticated. The first recipient can use the second applet to associate the third symmetric key set (C0, C1, . . . CN) with the second applet, i.e., issue a command to use new key set. Accordingly, the token now contains a first applet which is accessible only to the first recipient and a second applet which is accessible to the first recipient and the receiver entity. Subsequently, the token is forwarded to the receiver entity.


When the token is received, the receiver entity can perform a key changeover to obtain exclusive access over the second applet. More particularly, the receiver entity can authenticate to the received token using a MAC derived from the shared cryptographic key C. Once authenticated, the receiver entity can now access the second applet and discontinue the use of the third set of symmetric keys (C0, C1, . . . CN) for the second applet. The receiver entity can derive a fourth set of symmetric keys (D0, D1, . . . DN) based on a private symmetric cryptographic key D. The receiver entity can load the fourth set of symmetric keys (D0, D1, . . . DN) onto the token and set this set of symmetric keys to the second applet. Accordingly, the receiver entity now has exclusive access to the second applet and cannot access the first applet. Similarly, the first recipient has exclusive access to the first applet an now cannot access the second applet. Thus, the protocol from switching to the from an initial state where the token can be managed by both the factory and a first recipient to a second state where the management of the token is split between two or more parties for symmetric keys is described according to some embodiments.


The role-assigning protocol can also be implemented using asymmetric keys. More particularly, the first recipient can send its public key B to the token manufacturer. The token manufacturer loads the first applet associated with the public key B of the first recipient and forward the embedded token to the first recipient.


The first recipient authenticates to the token using a MAC that uses the private key pair of public key B. Once authenticated, the first recipient can insert a second applet associated with a public key D, which was forwarded to the first recipient by the receiver entity. The token can then be forwarded to the receiver entity.


The receiver entity can now authenticate to the second applet using a MAC that uses the private key pair of public key D and access the second applet. The receiver entity does not have access to the first applet because it is associated with the public key of B. Similarly, the first recipient has exclusive access to the first applet and cannot access the second applet because it is associated with the pubic key of D.



FIG. 1 illustrates an exemplary system 100 in accordance with an embodiment. It should be readily apparent to those of ordinary skill in the art that the system 100 depicted in FIG. 1 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified. Moreover, the system 100 may be implemented using software components, hardware components, or combinations thereof.


As shown in FIG. 1, the system 100 can comprise an entity 105. The entity 105 can be the information infrastructure for a government agency, a business entity, an educational entity or combination thereof. The entity can be further comprised of a security server 110 and clients 115a-c. The security server 110 can interface with clients 115ab through a local network 120 to provide a communication channel between the security server 110 and the clients 115ab. The local network 120 can be implemented using local area protocols such as Ethernet, token ring or other similar protocols known to those skilled in the art. Moreover, the local network 120 can be a wired network, a wireless network or combination thereof.


The security server 110 can also interface with a remote client 115c over an external network 125 such as the Internet. The external network 125 can also be a virtual private network implemented over the Internet for security reasons in some embodiments.


The clients 115a-c can be a computing machine or platform configured to execute secure and open applications through a multi-user operating system. The clients 115a-c can be implemented with personal computers, workstations, thin clients, thick clients, or other similar computing platforms as known to those skilled in the art. The clients 115a-c can operate using operating systems such as Linux, Windows, Macintosh or other available multi-tasking operating systems.


Each client 115 can be configured to interface with a respective security device 130. The security device 130a-c can be configured to act as a gatekeeper for the respective client 115a-c. More particularly, a user can use a security token, such as a smart card, to access the respective client 115a-c as well as each client 115a-c to manage an inserted token.


Each client 115a-c can also represent an internal organization, division, and/or sub-organization of the entity 105. For example, client 115a can represent a human resource organization and client 115b can represent an accounting organization. As another example, remote client 115c can represent another internal organization or a third party entity in a relationship with entity 105.


Notwithstanding the embodiments of the client and security server of system 100 can be implemented in a variety of methods without departing from the scope of the claims. For example, a client could be a wireless device such as Blackberry™, where a wearable token provides access to the wireless device via Bluetooth™ interface or the smartcard can be connected with a contactless interface such as an radio frequency identification reader.


The system 100 can further comprise a token manufacturer 140. The token manufacturer 140 can produce tokens for the entity 105 and interface with one of the sub-organizations (e.g., security, human resources, IT, etc.) to manage the exchange of the tokens. The token manufacturer 140 can produce a token as depicted in FIG. 2.



FIG. 2 illustrates an exemplary token 200 in accordance with another embodiment. It should be readily apparent to those of ordinary skill in the art that the token 200 depicted in FIG. 2 represents a generalized schematic illustration and that other components may be added or existing components may be removed or modified.


As shown in FIG. 2, the token 200 can comprise a magnetic strip 205 and a circuit 210. The magnetic strip 205 can be encoded with information for a user to access a client 115 as determined by an issuing security entity. The circuit 210 can be configured, among other things, to provide data storage for applets, storage of keys, and information. In some embodiments, the circuit 210 can include a card identification module 215. The card identification module 215 can be configured to store the card identification number of the token. This card identification number is a unique number which identifies the token and is often referred as a “CUID”. The circuit 210 can also include a storage area or space 220 for applets, such as applets 225A-225N. This area can be allocated based on roles of the different entities. The number of applets can be injected onto the card depending on the space on the circuit 210. However, the first applet (e.g., applet 225A) injected on the circuit 210 can be configured to allow the injection of the rest of the applets. The first applet 225A can be referred to as a manager applet, which can then be configured to manage the token. The other applets 225B-225N can have a variety of functions. Electronic wallets, secure log-on to a web server, decrypting electronic mail are a few examples of applets that can be stored within the token. The applets 225A-225N can also issue commands such as “load new application”, “new set of keys to use”, “turn off a key set”, “reset password”, “erase smartcard”, “lock the smartcard”, “unlock the smartcard”, etc. The applets 225A-225N can communicate with the security device 130 (thus, the clients) using Application Protocol Data Unit (“APDU”) packets under the ISO 7816 standard and related standards.


The circuit 210 can also be configured to with a key storage area 230. The key storage area 230 can be a buffer which stores cryptographic keys. The cryptographic keys can be a single or a set of cryptographic keys. Each key or set of keys can be attached or associated with a respective applet. For example, key storage area 230 can store derived cryptographic keys or sets of cryptographic keys based on respective cryptographic keys A and B and the CUID. Accordingly, a user with access to cryptographic key A can access the first applet 225A while being barred from the second applet 225B. Similarly, a user with the access to cryptographic key B can access the second applet 225B while being barred from the first applet 225A.


Returning to FIG. 1, in some embodiments, the security server 110 can store and execute a role assigner module 135. In other embodiments, the role assigner module 135 can be executed by the client 115a-c locally. The role assigner module 135 can be configured to perform key-changeovers to permit a client 115 to grant exclusive access to a respective section of a token as part of the role-assigning protocol. As an example, a human resource entity, as a first participant or granter, may want access to a token to manage the distribution of the token to the correct user. A second entity (e.g., accounting, finance, information technology, etc.) may want access to the same token to allow the user to access the confidential information of the second entity. The conventional solution is to allow insert keys for both entities on the token. However, this potentially can permit unauthorized access to either system if the token is compromised. Accordingly, the role assigner module 135 can be invoked to assign an applet based on the role of a participant, as depicted in FIGS. 3A-3D.



FIGS. 3A-3D collectively illustrate an exemplary process flow for the system 100 (shown in FIG. 1) and the token 200 (shown in FIG. 2) in accordance with yet another embodiment. It should be readily apparent to those of ordinary skill in the art that the process flow collectively depicted in FIGS. 3A-3D represents a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.



FIG. 3A, more specifically, depicts a scenario 300 in accordance with yet another embodiment. One of the premises of the scenario 300 is that pairs of parties share a symmetric cryptographic key. For example token manufacturer 140 and client 115A can share a symmetric cryptographic key. Client 115A and client 115B can also share a different symmetric cryptographic key.


As shown in FIG. 3A, a token manufacturer 140 can share a symmetric cryptographic key A 302 with client 115A. Client 115A can be organization within an entity, for example a human resources department in a corporation or a federal agency within the federal government. Client 115A can then be referred as a granter entity 115A. The token manufacturer 140 can insert a first applet 225A onto circuit 210 of the token 200 (see FIG. 2). The first applet 225A can have a variety of functions. However, the first applet 225A can issue commands like “load new application”, “new set of keys to use”, “turn off a key set”, “reset password”, “erase smartcard”, “lock the smartcard”, “unlock the smartcard”, etc, along with other predetermined functionality.


The token manufacturer 140 can generate a first set of symmetric keys (A0, A1, . . . AN) 304 based on the symmetric cryptographic key A, an input value, and the CUID stored on the card identification module 215. For the sets of symmetric keys being described, each key within the set can be derived from hashing a cryptographic key, an input data value, and the CUID. The variants within the key set can be based on varying the input data value.


The first set of symmetric keys (A0, A1, . . . AN) 304 can then be stored in the key storage area 230 such as buffer space 230A. The token manufacturer 140 can then attach or associate the first set of symmetric keys (A0, A1, . . . AN) 304 to the first applet 225A as indicated by line 306. More particularly, the token manufacturer 140 can issue a command from the first applet 225A to use the first set of symmetric keys (A0, A1, . . . AN) 304.


The token manufacturer 140 can then forward the token 200 embedded with the first applet 225A to the granter entity 115A. Accordingly, at this point in time, the token manufacturer 140 and the granter entity 115 have access to the first applet 225A based on both entities sharing the symmetric cryptographic key A 302.



FIG. 3B depicts a scenario 308 of the granter entity 115A performing a key changeover to obtain exclusive access of the first applet. More particularly, in the current state of the token 200, the token manufacturer 140 still has access to the first applet 225A because the attached set of symmetric keys (A0, A1, . . . AN) 304 is associated with the token manufacturer 140 and granter entity 115A and both entities share the symmetric cryptographic key A 302. Thus, one of the goals of the key changeover is to obtain exclusive control of the first applet 225A by the granter entity 115A.


As shown in FIG. 3B, the granter entity 115A can be configured to authenticate to the first applet 225A by signing a MAC that uses the cryptographic key A to a challenge from the first applet. The granter entity 115A can be configured to generate a second set of symmetric keys (B0, B1, . . . BN) 312 based on a symmetric cryptographic key B 310 once authenticated. Similar to cryptographic key A 302, the cryptographic key B 310 can be a symmetric cryptographic key generated by respective cryptographic algorithms as known to those skilled in the art. The cryptographic key B 310 is held privately by the granter entity 115A and is not shared with other entities. The second set of symmetric keys (B0, B1, . . . BN) 312 is generated based on hashing the cryptographic key B 310, a varying input data value, and the CUID stored in the card identification module 215 (shown in FIG. 2) as known to those skilled in the art.


The granter entity 115A can then store the second set of symmetric keys (B0, B1, . . . BN) 308 in the key storage area 230, e.g., in buffer space 230B. Subsequently, the granter entity 115A can be configured to sever the association between the first set of symmetric keys (A0, A1, . . . AN) 304, i.e., issue a command to discontinue the use of the first set of symmetric keys (A0, A1, . . . AN) 304, and the first applet 225A 312 as indicated in line 306 and attach or associate the second set of keys (B0, B1, . . . BN) 308 with the first applet 225A as indicated by line 314, i.e., issue a command to use the new key set. Accordingly, granter entity 115A currently has exclusive access and control over the first applet 225A. The granter entity 115A can also be configured to delete the first set of symmetric keys (A0, A1, . . . AN) 304 from the key storage area 230 in some embodiments.



FIG. 3C depicts a scenario 316 where granter entity 115A embeds a second applet 225B for client 115B or a receiver entity 115B. This scenario 316 is premised on that the granter entity 115A and the receiver entity 115B share a symmetric cryptographic key C 318. The cryptographic key C 318 can be a symmetric generated by symmetric cryptographic algorithms as known to those skilled in the art.


The current state of the token is that first applet 225A is exclusively controlled by the granter entity 115A by virtue of being attached to the second set of keys (B0, B1, . . . BN) 308 as indicated by line 314. The granter entity 115A can authenticate to the first applet 225A by signing a challenge from the first applet 225A with a MAC that uses the cryptographic key B. The granter entity 115A can insert a second applet 225B on the circuit 210 once authenticated by issuing a command to add new applet. The second applet 225B can be a variety of applications such as an electronic wallet, secure Web log-on, etc.


The granter entity 115A can then be configured to generate a third set of symmetric keys (C0, C1, . . . CN) 320 based on the symmetric cryptographic key C 318, where the cryptographic key C 318 is shared between granter entity 115A and the receiver entity 115B. More particularly, the granter entity 115A can generate the third set of symmetric keys (C0, C1, . . . CN) 320 based on hashing the symmetric cryptographic key C 318, varying an input value, and the CUID stored in the card identification module 215.


The granter entity 115A can then be configured to associate or attach the third set of symmetric keys (C0, C1, . . . CN) 320 with the second applet 225A as indicated by line 322 by issuing a command to the second applet 225B to use the third set of symmetric keys (C0, C1, . . . CN) 320. As a result, the second applet 225B has been injected on the card and be accessed by the granter entity 115A and the receiver entity 115B. Subsequently, the granter entity 115A can forward the token 200 to the receiver entity 115B.



FIG. 3D depicts a scenario 324 where the receiver entity 115B performs a key changeover to obtain exclusive control of the second applet 225B. More particularly, in the current state of the token 200, the granter entity 115A still has access to the second applet 225B because the attached third set of symmetric keys (C0, C1, . . . CN) 320 is associated with the granter entity 115A as indicated by line 322 and the receiver entity 115B and both entities share the symmetric cryptographic key C 318. Thus, one of the goals of this key changeover is to obtain exclusive control of the second applet 225B by the receiver entity 115B.


As shown in FIG. 3D, the receiver entity 115B can be configured to authenticate to the second applet 225A by signing a MAC with derived key from the cryptographic key C. The receiver entity 115B can issue a command to the second applet 225B to discontinue use of the third set of symmetric keys (C0, C1, . . . CN) 320.


The receiver entity 115B can then be configured to generate a fourth set of symmetric keys (D0, D1, . . . DN) 326 based on a symmetric cryptographic key D 324 similar to the other sets of symmetric keys previously described. The cryptographic key D 324 is held privately by the receiver entity 115B and is not shared with any other entities. Similar to the other cryptographic keys A, B, or C, the cryptographic key D 324 can be a symmetric key generated by cryptographic algorithms known to those skilled in the art.


The receiver entity 115B can then store the fourth set of keys (D0, D1, . . . DN) 326 in the key storage area 230, e.g., in buffer space 230D. The receiver entity 115B can attach or associate the fourth set of symmetric keys (D0, D1, . . . DN) 326 with the second applet 225B as indicated by line 328 by issuing a command to the second applet 225B to use the newest key set. Accordingly, receiver entity 115B now has exclusive access and control over the second applet 225B. Moreover, the receiver entity 115B cannot access first applet 225A and the granter entity 115A cannot access the second applet 225A. Thus, roles have been assigned on a token based on the functions of various parties.



FIG. 3E depicts a scenario 330 where granter entity 115A embeds a third applet 225C for a client 115C or a second receiver entity 115C. This scenario 330 is premised that granter entity 115A and the second receiver entity 115C share an cryptographic key E 332. The cryptographic key E 332 can be a symmetric or asymmetric key generated by respective symmetric and asymmetric encryption algorithms as known to those skilled in the art.


The current state of the token is that first applet 225A is exclusively controlled by the granter entity 115A by virtue of first applet 225A being attached to the second set of keys (B0, B1, . . . BN) 312 as indicated by line 314. Further, the receiver entity 115A has exclusive control over the second applet 225B by virtue of being attached to the fourth set of keys (D0, D1, . . . DN) 320 as indicated by line 322. The granter entity 115A can insert a third applet 225C on the circuit 210 by operation of the first applet 225A once authenticated. The third applet 225C like the second applet 225B can be a variety of applications such as an electronic wallet, secure Web log-on, etc.


The granter entity 115A can be configured to generate a fifth set of symmetric cryptographic keys (E0, E1, . . . EN) 334 based on a symmetric cryptographic key E 332, where the cryptographic key E 326 is shared between granter entity 115A and the second receiver entity 115C. More particularly, the granter entity 115A can generate the fifth set of symmetric keys (E0, E1, . . . EN) 334 like the other key sets previously described. The granter entity can be configured to store the fifth set of keys (E0, E1, . . . EN) 334 in the key storage area 230 such as buffer space 230E.


The granter entity 115A can then be configured to associate or attach the fifth set of symmetric keys (E0, E1, . . . EN) 334 to the third applet 225C as indicated by line 336. As a result, the third applet 225A has been injected on the token 200 and be accessed by the granter entity 115A and the second receiver entity 115B. Subsequently, the granter entity 115A can forward the token 200 to the second receiver entity 115A. The second receiver entity 115C can perform a key changeover similar to the key changeover depicted in FIG. 3D to obtain exclusive control over the third applet 225C.



FIG. 3F depicts a scenario 338 where an applet 225 can subdivide. More particularly, the current state of the token is that first applet 225A is exclusively controlled by the granter entity 115A by virtue of being attached to the second set of keys (B0, B1, . . . BN) 312 as indicated by line 314. Further, the receiver entity 115A has exclusive control over the second applet 225B by virtue of being attached to the fourth set of keys (D0, D1, . . . DN) 320 as indicated by line 322.


One aspect of the space occupied by an applet is that it can be shared. As shown in FIG. 3F, applet 225B can subdivide into partitions 340A, 340B. However, this subdivision can only be done by the receiver entity 115B since it has exclusive control of the second applet 225B. After the subdivision, each partition (340A and 340B) are initially attached to the fourth set of symmetric keys (D0, D1, . . . DN) 320. Similarly, granter entity 115A could subdivide applet 225A by virtue of being attached to the second set of symmetric keys (B0, B1, . . . BN) 312.


One of the premises of scenario 338 is that the receiver entity 115B and the second receiver entity 115C share an cryptographic key E 342. The cryptographic key E 342, similar to cryptographic keys A-D, can be a symmetric or an asymmetric key known to those skilled in the art.


The receiver entity 115B can then generate a fifth set of keys (E0, E1, . . . EN) 344 based on cryptographic key E 342, which is shared by receiver entity 115B and a second receiver entity 115C. Since the cryptographic key E can be symmetric or asymmetric, it follows the fifth set of keys (E0, E1, . . . EN) 344 can also be symmetric or asymmetric depending on the state of the cryptographic key E 342. The fifth set of keys (E0, E1, . . . EN) 344 can be stored in the key storage area 230 such as buffer space 230E. The receiver entity 115B can be configured to sever the attachment of the fourth set of symmetric keys (D0, D1, . . . DN) 320 for partition 340B as indicated by line 322B and attach or associate the fifth set of symmetric keys (E0, E1, . . . EN) 342 with the partition 332B as indicated by line 346. The second receiver entity 115C can perform a key changeover similar to the key changeover depicted in FIG. 3D to obtain exclusive control over the partition 340B.


Although it appears from the previously described scenarios that the cryptographic key sets can be used to control access to the applets, the cryptographic key sets can also be used to control access control lists, data, and other components on the token.



FIG. 3G depicts a scenario 346 using asymmetric keys. As previously described, asymmetric keys come in a pairs: a private key (Kpr) and a public key (Kpu). The private key (Kpr) is held private by the owner. The public key (Kpu) is published and typically held by third party. Users wishing to communicate the owner of the public key (Kpu) can obtain the public key (Kpu) from a third party. The user can then encrypt any information with the public key (Kpu), which is subsequently sent to the owner. The owner can then use the private key (Kpr) to retrieve the sent information.


Accordingly, as shown in FIG. 3G, the token manufacturer 140 can be configured to insert applet 225A onto the circuit 210. The token manufacturer 140 can retrieve a public key Apu 348 of the granter entity 115A and store the public key Apu 348 in a buffer space 230A of the key storage area 230. The token manufacturer 140 can then issue a command for the first applet 225A to use the public key Apu 348. Subsequently, the token manufacturer 140 can forward the embedded token to the granter entity 115A.


The granter entity 115A can now exclusively access the first applet 225A because the granter entity 115A secretly holds the complementary key of the public key Apu 348, which is private key Apr 350. The token manufacturer 140 is barred from accessing the first applet 225A because it does not have access to the private key Apr 350.



FIG. 3H illustrates a scenario 352 of the granter entity 115A inserting a second applet 225B for receiver entity 115B using asymmetric keys. As shown in FIG. 3H, the first applet 225A is attached with the public key Apu. The granter entity 115A can be configured to insert or inject the second applet 225B on the circuit 210. The granter entity 115A can then retrieve a public key Bpu 354 of the receiver entity 115B and store the public key Bpu 354 in buffer space 230B of the key storage area 230. The granter entity 115A can issue a command from the second applet to use the public key Bpu 354. Subsequently, the embedded token can be forwarded to the receiver entity 115B.


When the embedded token is received, the receiver entity 115B has exclusive control over applet 225B. More particularly, since the receiver entity 115B secretly holds the private key Bpr 356, it can authenticate to the second applet 225B by signing with a MAC that uses the private key Bpr 356 and gain access to the second applet 225B. The token manufacturer 140 and the granter entity 115 can only access the public key Bpu 354, and thus are barred from accessing the second applet 225B.



FIG. 4 illustrates an exemplary flow diagram 400 executed by the role assigner module 135 in accordance with yet another embodiment. It should be readily apparent to those of ordinary skill in the art that the flow diagram 400 depicted in FIG. 4 represents a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.


As shown in FIG. 4, the role assigner module 135 can be configured to retrieve an cryptographic key, in step 405. The retrieved cryptographic key can be private key or a shared key. The retrieved cryptographic key can also be asymmetric or symmetric as known to those skilled in the art. The role assigner module 135 can then be configured to generate a set of keys based on the cryptographic key and the CUID of a token, in step 410.



FIG. 5 illustrates an exemplary flow diagram 500 executed by the role assigner module 135 in accordance with yet another embodiment. t should be readily apparent to those of ordinary skill in the art that the flow diagram 500 depicted in FIG. 5 represents a generalized schematic illustration and that other steps may be added or existing steps may be removed or modified.


As shown in FIG. 5, the role assigner module 135 can be configured to secure a new set of keys in step 505. More particularly, the role assigner module 135 can execute the flow diagram shown in FIG. 4 to obtain the set of keys and store the set of keys in the key storage space 230.


In step 510, the role assigner module 135 can be configured to sever the attachment between the current applet and a previous set of keys.


In step 515, the role assigner module 135 can be configured to attach or associate the new set of keys with the current applet.



FIG. 6 illustrates an exemplary block diagram of a computing platform 600 where an embodiment may be practiced. The functions of the role assigner module 135 can be implemented in program code and executed by the computing platform 600. The role assigner module can be implemented in computer languages such as PASCAL, C, C++, JAVA, etc.


As shown in FIG. 6, the computer system 600 includes one or more processors, such as processor 602 that provide an execution platform for embodiments of the role assigner module. Commands and data from the processor 602 are communicated over a communication bus 604. The computer system 600 also includes a main memory 606, such as a Random Access Memory (RAM), where the role assigner module can be executed during runtime, and a secondary memory 608. The secondary memory 608 includes, for example, a hard disk drive 610 and/or a removable storage drive 612, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., where a copy of a computer program embodiment for the role assigner module can be stored. The removable storage drive 612 reads from and/or writes to a removable storage unit 614 in a well-known manner. A user interfaces with the role assigner module with a keyboard 616, a mouse 618, and a display 620. A display adapter 622 interfaces with the communication bus 604 and the display 620. The display adapter also receives display data from the processor 602 and converts the display data into display commands for the display 620.


Certain embodiments may be performed as a computer program. The computer program may exist in a variety of forms both active and inactive. For example, the computer program can exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files. Any of the above can be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Exemplary computer readable storage devices include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Exemplary computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the present invention can be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general.


While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the method has been described by examples, the steps of the method may be performed in a different order than illustrated or simultaneously. Those skilled in the art will recognize that these and other variations are possible within the spirit and scope as defined in the following claims and their equivalents.

Claims
  • 1. A method comprising: receiving, by a client computing machine, a token comprising a first applet, a first symmetric key set associated with the first applet and a card identification number of the token;authenticating, by the client computing machine, with the first applet on the token using the first symmetric key set to establish access to the first applet;generating, by the client computing machine, a second symmetric key set based on a private cryptographic key and the card identification number of the token in response to authenticating with the first applet;associating, by the client computing machine, the second symmetric key set with the first applet; andsevering, by the client computing machine, the association between the first symmetric key set with the first applet.
  • 2. The method of claim 1, further comprising: authenticating with the first applet on the token using the second symmetric key set; andembedding a second applet on the token in response to authenticating with the first applet.
  • 3. The method of claim 2, further comprising: generating a third symmetric key set based on a second private cryptographic key;storing the third symmetric key set on the token;associating the third symmetric key set with the second applet; andforwarding, by the client computing machine, the token to a second computing machine.
  • 4. The method of claim 3, further comprising: generating, by the second computing machine, a fourth symmetric key set based on a third private cryptographic key;storing the fourth symmetric key set on the token;associating the fourth symmetric key set with the second applet; andsevering, by the second computing machine, the association between the third symmetric key set with the second applet.
  • 5. A system comprising: an interface to receive a token comprising a first applet, a first symmetric key set that is associated with the first applet and a card identification number of the token;a processor coupled to the interface and configured to authenticate with the first applet on the token using the first symmetric key set to establish access to the first applet;generate a second symmetric key set based on a private cryptographic key and the card identification number of the token in response to authenticating with the first applet;associate the second symmetric key set with the first applet; andsevere the association between the first symmetric key set with the first applet.
  • 6. The system of claim 5 wherein the processor is further configured to: authenticate with the first applet on the token using the second symmetric key set; andembed a second applet on the token in response to authenticating with the first applet.
  • 7. The system of claim 6, wherein the processor is further configured to: generate a third symmetric key set based on a second private cryptographic key;store the third symmetric key set on the token;associate the third symmetric key set with the second applet; andforward the token to a computing machine.
  • 8. A method comprising: storing, by a token, a first applet, a first symmetric key set associated with the first applet, and a card identification number of the token;authenticating a client computing machine by the first applet on the token based on the first symmetric key set;receiving, by the token, a second symmetric key set from the client computing machine in response to authenticating the client computing machine, wherein the second symmetric key is based on a private cryptographic key and the card identification number of the token;associating, by the token, the second symmetric key set with the first applet; andexecuting, by the token, a command to sever the association between the first symmetric key set with the first applet.
  • 9. The method of claim 8, the method further comprising: authenticating, by the first applet on the token, the client computing machine using the second symmetric key set; andstoring a second applet by the token in response to authenticating the client computing machine.
  • 10. The method of claim 9, the method further comprising: receiving a third symmetric key set based on a second private cryptographic key;storing the third symmetric key set by the token;associating the third symmetric key set with the second applet.
  • 11. The method of claim 10, the method further comprising: receiving a fourth symmetric key set based on a third private cryptographic key;storing the fourth symmetric key set by the token;associating the fourth key set with the second applet; andexecuting, by the token, a command to sever the association between the third symmetric key set with the second applet.
  • 12. A non-transitory computer readable storage medium including instructions that, when executed by a processing system, cause the processing system to perform a method comprising: receiving a token comprising a first applet, a first symmetric key set that is associated with the first applet and a card identification number of the token;generating, by the processing system, a second symmetric key set based on a private cryptographic key and the card identification number of the token in response to authenticating with the first applet;associating the second symmetric key set with the first applet; andsevering the association between the first symmetric key set with the first applet.
  • 13. The non-transitory computer readable storage medium of claim 12, further comprising: authenticating with the first applet on the token using the second symmetric key set; andembedding a second applet on the token in response to authenticating with the first applet.
  • 14. The non-transitory computer readable storage medium of claim 13, further comprising: generating a third symmetric key set based on a second private cryptographic key;storing the third symmetric key set on the token;associating the third symmetric key set with the second applet; andforwarding, by the processing system, the token to a computing machine, wherein the computing machine generates a fourth symmetric key set based on a third private cryptographic key, stores the fourth symmetric key set on the token, associates the fourth symmetric key set with the second applet, and severs the association between the third symmetric key set with the second applet.
US Referenced Citations (209)
Number Name Date Kind
4108367 Hannan Aug 1978 A
4849614 Watanabe et al. Jul 1989 A
4924330 Seamons et al. May 1990 A
5247163 Ohno et al. Sep 1993 A
5355414 Hale et al. Oct 1994 A
5499371 Henninger et al. Mar 1996 A
5594227 Deo Jan 1997 A
5631961 Mills et al. May 1997 A
5666415 Kaufman Sep 1997 A
5721781 Deo et al. Feb 1998 A
5745576 Abraham et al. Apr 1998 A
5745678 Herzberg et al. Apr 1998 A
5768373 Lohstroh et al. Jun 1998 A
5862310 Crawford et al. Jan 1999 A
5923884 Peyret et al. Jul 1999 A
5937066 Gennaro et al. Aug 1999 A
5943423 Muftic Aug 1999 A
5991411 Kaufman et al. Nov 1999 A
5991882 O'Connell Nov 1999 A
6005942 Chan et al. Dec 1999 A
6005945 Whitehouse Dec 1999 A
6011847 Follendore, III Jan 2000 A
6016476 Maes et al. Jan 2000 A
6044155 Thomlinson et al. Mar 2000 A
6072876 Obata et al. Jun 2000 A
6141420 Vanstone et al. Oct 2000 A
6178507 Vanstone Jan 2001 B1
6179205 Sloan Jan 2001 B1
6226744 Murphy et al. May 2001 B1
6377825 Kennedy et al. Apr 2002 B1
6490680 Scheidt et al. Dec 2002 B1
6502108 Day et al. Dec 2002 B1
6539093 Asad et al. Mar 2003 B1
6636975 Khidekel et al. Oct 2003 B1
6643701 Aziz et al. Nov 2003 B1
6687190 Momich et al. Feb 2004 B2
6691137 Kishi Feb 2004 B1
6698654 Zuppicich Mar 2004 B1
6734886 Hagan et al. May 2004 B1
6760752 Liu et al. Jul 2004 B1
6804687 Sampson Oct 2004 B2
6819766 Weidong Nov 2004 B1
6826686 Peyravian Nov 2004 B1
6829712 Madoukh Dec 2004 B1
6880037 Boyer Apr 2005 B2
6880084 Brittenham et al. Apr 2005 B1
6898605 Constantino May 2005 B2
6898714 Nadalin et al. May 2005 B1
6931133 Andrews et al. Aug 2005 B2
6941326 Kadyk et al. Sep 2005 B2
6970970 Jung et al. Nov 2005 B2
6978933 Yap et al. Dec 2005 B2
6986040 Kramer et al. Jan 2006 B1
7007105 Sullivan et al. Feb 2006 B1
7010600 Prasad et al. Mar 2006 B1
7050589 Kwan May 2006 B2
7051213 Kobayashi et al. May 2006 B1
7085386 Audebert et al. Aug 2006 B2
7114028 Green et al. Sep 2006 B1
7156302 Yap et al. Jan 2007 B2
7159763 Yap et al. Jan 2007 B2
7185018 Archbold et al. Feb 2007 B2
7251728 Toh et al. Jul 2007 B2
7278581 Ong Oct 2007 B2
7299364 Noble et al. Nov 2007 B2
7302585 Proudler et al. Nov 2007 B1
7356688 Wang Apr 2008 B1
7374099 de Jong May 2008 B2
7386705 Low et al. Jun 2008 B2
7437757 Holdsworth Oct 2008 B2
7451921 Dowling et al. Nov 2008 B2
7469837 Mizushima Dec 2008 B2
7475250 Aull et al. Jan 2009 B2
7475256 Cook Jan 2009 B2
7480384 Peyravian et al. Jan 2009 B2
7502793 Snible et al. Mar 2009 B2
7571321 Appenzeller et al. Aug 2009 B2
7602910 Johansson et al. Oct 2009 B2
7702917 Tevosyan et al. Apr 2010 B2
7769996 Randle et al. Aug 2010 B2
7822209 Fu et al. Oct 2010 B2
7860243 Zheng et al. Dec 2010 B2
8146141 Grandcolas et al. Mar 2012 B1
20010008012 Kausik Jul 2001 A1
20010036276 Ober et al. Nov 2001 A1
20010054148 Hoornaert et al. Dec 2001 A1
20020004816 Vange et al. Jan 2002 A1
20020007351 Hillegass et al. Jan 2002 A1
20020007359 Nguyen Jan 2002 A1
20020010679 Felsher Jan 2002 A1
20020029343 Kurita Mar 2002 A1
20020056044 Andersson May 2002 A1
20020059144 Meffert et al. May 2002 A1
20020064095 Momich et al. May 2002 A1
20020080958 Ober et al. Jun 2002 A1
20020099727 Kadyk et al. Jul 2002 A1
20020112156 Gien et al. Aug 2002 A1
20020120842 Bragstad et al. Aug 2002 A1
20020133707 Newcombe Sep 2002 A1
20020171546 Evans et al. Nov 2002 A1
20020184149 Jones Dec 2002 A1
20020188848 Buttiker Dec 2002 A1
20030005291 Burn Jan 2003 A1
20030012386 Kim et al. Jan 2003 A1
20030028664 Tan et al. Feb 2003 A1
20030035548 Kwan Feb 2003 A1
20030056099 Asanoma et al. Mar 2003 A1
20030075610 Ong Apr 2003 A1
20030093695 Dutta May 2003 A1
20030115455 Aull et al. Jun 2003 A1
20030115466 Aull et al. Jun 2003 A1
20030115467 Aull et al. Jun 2003 A1
20030115468 Aull et al. Jun 2003 A1
20030167399 Audebert et al. Sep 2003 A1
20030172034 Schneck et al. Sep 2003 A1
20030177392 Hiltgen Sep 2003 A1
20030204732 Audebert et al. Oct 2003 A1
20040042620 Andrews et al. Mar 2004 A1
20040053642 Sandberg et al. Mar 2004 A1
20040066274 Bailey Apr 2004 A1
20040088562 Vassilev et al. May 2004 A1
20040096055 Williams et al. May 2004 A1
20040103324 Band May 2004 A1
20040103325 Priebatsch May 2004 A1
20040120525 Miskimmin et al. Jun 2004 A1
20040144840 Lee et al. Jul 2004 A1
20040146163 Asokan et al. Jul 2004 A1
20040153451 Phillips et al. Aug 2004 A1
20040162786 Cross et al. Aug 2004 A1
20040230831 Spelman et al. Nov 2004 A1
20050022123 Constantino Jan 2005 A1
20050033703 Holdsworth Feb 2005 A1
20050109841 Ryan et al. May 2005 A1
20050114673 Raikar et al. May 2005 A1
20050119978 Ates Jun 2005 A1
20050123142 Freeman et al. Jun 2005 A1
20050138386 Le Saint Jun 2005 A1
20050138390 Adams et al. Jun 2005 A1
20050144312 Kadyk et al. Jun 2005 A1
20050184163 de Jong Aug 2005 A1
20050184164 de Jong Aug 2005 A1
20050184165 de Jong Aug 2005 A1
20050188360 de Jong Aug 2005 A1
20050216732 Kipnis et al. Sep 2005 A1
20050262361 Thibadeau Nov 2005 A1
20050279827 Mascavage et al. Dec 2005 A1
20050289652 Sharma et al. Dec 2005 A1
20060005028 Labaton Jan 2006 A1
20060010325 Liu et al. Jan 2006 A1
20060015933 Ballinger et al. Jan 2006 A1
20060036868 Cicchitto Feb 2006 A1
20060043164 Dowling et al. Mar 2006 A1
20060072747 Wood et al. Apr 2006 A1
20060073812 Punaganti Venkata et al. Apr 2006 A1
20060075133 Kakivaya et al. Apr 2006 A1
20060075486 Lin et al. Apr 2006 A1
20060101111 Bouse et al. May 2006 A1
20060101506 Gallo et al. May 2006 A1
20060173848 Peterson et al. Aug 2006 A1
20060174104 Crichton et al. Aug 2006 A1
20060206932 Chong Sep 2006 A1
20060208066 Finn et al. Sep 2006 A1
20060226243 Dariel Oct 2006 A1
20060291664 Suarez et al. Dec 2006 A1
20060294583 Cowburn et al. Dec 2006 A1
20070014416 Rivera et al. Jan 2007 A1
20070074034 Adams et al. Mar 2007 A1
20070112721 Archbold et al. May 2007 A1
20070113267 Iwanski et al. May 2007 A1
20070113271 Pleunis May 2007 A1
20070118891 Buer May 2007 A1
20070162967 de Jong et al. Jul 2007 A1
20070169084 Frank et al. Jul 2007 A1
20070189534 Wood et al. Aug 2007 A1
20070204333 Lear et al. Aug 2007 A1
20070230706 Youn Oct 2007 A1
20070271601 Pomerantz Nov 2007 A1
20070277032 Relyea Nov 2007 A1
20070280483 Fu Dec 2007 A1
20070282881 Relyea Dec 2007 A1
20070283163 Relyea Dec 2007 A1
20070283427 Gupta et al. Dec 2007 A1
20070288745 Kwan Dec 2007 A1
20070288747 Kwan Dec 2007 A1
20080005339 Kwan Jan 2008 A1
20080019526 Fu Jan 2008 A1
20080022086 Ho Jan 2008 A1
20080022088 Fu et al. Jan 2008 A1
20080022121 Fu et al. Jan 2008 A1
20080022122 Parkinson et al. Jan 2008 A1
20080022128 Proudler et al. Jan 2008 A1
20080034216 Law Feb 2008 A1
20080046982 Parkinson Feb 2008 A1
20080056496 Parkinson Mar 2008 A1
20080059790 Parkinson Mar 2008 A1
20080059793 Lord et al. Mar 2008 A1
20080069338 Relyea Mar 2008 A1
20080069341 Relyea Mar 2008 A1
20080072283 Relyea Mar 2008 A1
20080077794 Arnold et al. Mar 2008 A1
20080077803 Leach et al. Mar 2008 A1
20080133514 Relyea Jun 2008 A1
20080148047 Appenzeller et al. Jun 2008 A1
20080189543 Parkinson Aug 2008 A1
20080209224 Lord Aug 2008 A1
20080229401 Magne Sep 2008 A1
20090003608 Lee et al. Jan 2009 A1
20090133107 Thoursie May 2009 A1
20100313027 Taylor Dec 2010 A1
Foreign Referenced Citations (3)
Number Date Country
9724831 Jul 1997 WO
0048064 Aug 2000 WO
2007096590 Aug 2007 WO
Non-Patent Literature Citations (10)
Entry
ATM and Credit Card Notification, Feb. 2005 (internet archive) pp. 1-2 www.thereareplaces.com/infgdes/money.atmnotif.htm.
AMD Announces Specification for Open Platform Management Architecture, Feb. 28, 2005, pp. 1-2 http://www.thefreelibrary.com/AMD+Announces+Specification+for+Open+Platform+Management+Architecture-a0129342307.
Bellvin and Merritt, “Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise”, Proceedings of the 1st ACM Conference on Computer and Communications Security, Nov. 1993.
Schneier, “Applied Cryptography: Protocols, Algorithms, and Secure Code in C”, 1996, John Wiley & Sons, Inc., Second Edition, pp. 455-456.
Zuccherato, Robert, Elliptic Curve Cryptography Support in Entrust, May 9, 2000.
Red Hat Certificate System, http://www.redhat.com/f/pdf/rhas/DirSecProductSheetCertificateSystem.pdf, Jun. 2005.
PKCS# v2.20: Cryptographic Token Interface Standard, RSA Laboratories, Jun. 28, 2004 (see, e.g. Chapter 10, Objects) (see www.rsasecurity.com, 407 pages).
Cryptographic Message Syntax, R. Housley, Request for Comments (RFC) 2630, Network Working Group, The Internet Society, Jun. 1999.
Balfanz (Dirk ABalfanz, “Access Control for Ad-Hoc Collaboration”, Princeton University Jan. 2001).
Schneier, Bruce. Applied Cryptography, Second Edition. 1996 John Wiley and Sons, pp. 480-481.
Related Publications (1)
Number Date Country
20080209225 A1 Aug 2008 US