The present invention relates, in general, to computer hardware security devices. In particular, the present invention is a hardware authentication token that incorporates flexible solar cell technology as a power source, event trigger, and communication interface.
A solar cell is typically used to power a device or detect the presence of light. Prior art solar cells are multi-layer fabrications that typically include a power conductor layer, a p-type silicon layer, an n-type silicon layer, a ground conductor grid layer, and an anti-reflective coating layer. Recent advances in solar cell technology and nanotechnology have allowed solar cells to be constructed from plastic and organic materials. These flexible solar cells easily fit within the form factor of a credit card, smart card, or other portable device and are attractive because they are flexible, significantly thinner than their silicon-based predecessor, and efficient. These characteristics have permitted the use of flexible solar cells in applications that were not possible with the prior art glass-based solar cell products.
Authentication is the process of identifying an individual to ensure that they are who they claim to be. Typically, a computer system authenticates each individual entering the system by requiring them to enter a username and a password. This is referred to as one-factor authentication or authentication based on something you know. Recently, some computer systems have begun to authenticate each individual entering the system by requiring them to use something they have (e.g., a hardware authorization token) combined with something they know (e.g., a personal identification number). This is referred to as two-factor authorization.
A hardware authorization token, such as the SecurID Token from RSA Security, Inc. or the credit card device from TRI-D, is a computing device that periodically generates a random number. In a computer system that uses two-factor authorization, an individual entering the system would combine the random number generated by the hardware authentication token (something they have) with a personal identification number (something they know) to gain entry to the system. A disadvantage of the hardware authentication token is the inability to verify the identity of the individual holding the token before releasing the random number. Another disadvantage of the hardware authentication token is battery management and replacement, and power management.
Thus, there is a need for a hardware authentication token that incorporates flexible solar cell technology. The present invention addresses this need.
An authentication token that comprises a flexible solar cell array, a display, a processor, and a memory disposed in communication with the processor. Wherein the processor is configured to receive a signal from the flexible solar cell array, and, if the authentication token has been activated, compute a one-time passcode, and send the one-time passcode to the display. A device for communicating with the authentication token comprises a slot for receiving the authentication token; an optical character reader for recognizing characters on the display of the authentication token, and a hi-intensity strobe light for sending light pulses to the flexible solar cell array.
Additional objects, advantages, and novel features of the invention will be set forth in part in the description, examples, and figures which follow, all of which are intended to be for illustrative purposes only, and not intended in any way to limit the invention, and in part will become apparent to the skilled in the art on examination of the following, or may be learned by practice of the invention.
The accompanying figures illustrate details of the hardware authentication token that incorporates flexible solar cell technology. Reference numbers and designations that are alike in the accompanying figures refer to like elements.
Credit card 100 comprises a solar cell array 110, display 120, and fingerprint swipe sensor 130, which are embedded in the credit card 100 and do not add to the thickness of credit card 100. The solar cell array 110 is a flexible and thin power source for the credit card 100 and fabricated from a plastic material or an organic material. In one embodiment, the solar cell array 110 measures 1 centimeter by 7 centimeters in size. The display 120 is a flexible and thin visual communication device for credit card 100 that displays a one-time passcode to the card holder. The fingerprint swipe sensor 130 is a standard, reinforced fingerprint sensor or a flexible and thin device for verifying the identity of the card holder before generating a one-time passcode.
The smart card 200 comprises a solar cell array 210, display 220, fingerprint swipe sensor 230, and smart card connection pad 240, which are embedded in the smart card 200 and do not add to the thickness of smart card 200. The solar cell array 210 is a flexible and thin power source for the smart card 200 and fabricated from a plastic material, such as a polymer, or an organic material. In one embodiment, the solar cell array 210 measures 1 centimeter by 7 centimeters in size. The display 220 is a flexible and thin visual communication device for smart card 200 that displays a one-time passcode to the card holder. The fingerprint swipe sensor 230 is a standard, reinforced fingerprint sensor or a flexible and thin device for verifying the identity of the card holder before generating a one-time passcode. The smart card connection pad 240 is the communication device that allows the smart card 200 to communicate with a smart card reader (not shown).
The solar cell array 305 is the trigger to activate the functions performed by the authentication token 300. A card holder activates the solar cell array 305 by exposing it to a sufficiently activating light, for example, by removing the authentication token 300 from a wallet, purse, or blackout container or the like, or by covering the solar cell array 305 for a short time period when the card is in a lighted environment. The solar cell array 305 on the exemplary authentication token 300 shown in
The activation of the authentication token 300 requires an interface with the token. Since credit card-based tokens typically do not include any physical connections, the solar cell array 305 can be used for this function. Light hitting the solar cell array 305 triggers the solar cell array 305 to send a “wake-up” signal and power to the microprocessor 330. The microprocessor 330, a management processor, will review its memory 350. If the memory 350 state indicates that the authentication token 300 has not been activated, the microprocessor 330 will start the full activation and enrollment process. Following completion of the full activation and enrollment process, the microprocessor 330 will update the state of memory 350 to indicate that the authentication token 300 is activated and the card holder is enrolled. If the card holder places the solar cell array 305 in a dark, or blackout, environment before the microprocessor 330 updates the state of the memory 350, the activation and enrollment process will begin anew the next time the token is removed from the blackout environment (exposed to light).
In the embodiment shown in
Each time the card holder uses the authentication token 300 to gain entry to a computer system it may be necessary to initialize the authentication token 300. This will be particularly important in battery-powered tokens where the authentication token 300 may go into a very low power standby or sleep mode when the authentication token 300 is not in use for a pre-determined period of time. This should not be inconvenient for the card holder since the authentication token 300 will typically be used only a few times a day and put away (in a wallet, purse, pocket, desk, etc.) after the microprocessor 330 displays an authentication code on display 325. Exposing the solar cell to light can cause the authentication token 300 to wakeup into a fully functioning mode.
For authentication tokens that require very little power, the solar cell can be the primary, or only, source of power. In the embodiment shown in
In one embodiment, the battery 310 is rechargeable. Since the solar cell array 305 can function as a supplemental source of power, the solar cell array 305 can provide a trickle current that will recharge the battery 310 or keep the battery 310 fully charged. This may be especially helpful when the authentication token 300 goes into a standby or sleep mode and does not require much power. In this case, the excess power from the solar cell array 305 is available to charge the battery 310. For an authentication token 300 designed to enter a sleep mode, simply covering the solar cell array 305 for a few seconds, and then uncovering the solar cell array 305, will cause the authentication token 300 to wakeup. As an added advantage, if the solar cell array 305 can provide enough power to charge the battery 310 while the token is awake, then a sleep mode may not be necessary as long as a trickle charge is present.
After light triggers the solar cell array 305 to activate the microprocessor 330, the microprocessor 330 sends a signal to wake-up other heavy-duty devices present on the authentication token 300. For example, although without intended limitation, the embodiment shown in
The fingerprint swipe sensor 335 is a fingerprint capture device appropriate for a credit card device such as the authentication token 300. If the card holder does not use the fingerprint swipe sensor 335 within a given time period after activation, the microprocessor 330 will signal the fingerprint swipe sensor 335 to power down, thereby reducing the power drain on the battery 310. If the card holder uses the fingerprint swipe sensor 335 within the given time period, the microprocessor 330 stores the captured fingerprint image in the memory 350, compares the captured fingerprint image to a known image retrieved from the card holder during initial activation of the authentication token 300, and verifies whether the card holder is the appropriate and authorized user of the authentication token 300. In one embodiment, the authentication token 300 includes a separate fingerprint processor (not shown) that is more capable to perform the image retrieval and comparison.
The geo-location receiver 340 and antenna 345 function as a position locator device appropriate for a credit card device such as the authentication token 300. The position locator device may include a global positioning satellite device, or a cellular network locator. If the card holder does not use the position locator device within a given time period after activation, the microprocessor 330 signals the position locator device to power down, thereby reducing the power drain on the battery 310. If the card holder uses the position locator device within the given time period, the microprocessor 330 receives a position location via the antenna 345, stores the position in the memory 350, and displays the position information to the card holder via the display 325 or incorporate this information into the generation of the one-time passcode displayed to the user via the display 325.
The solar cell array 310 can be used to communicate with the authentication token 300. For authentication tokens in a form which does not have a corresponding physical terminal, the solar cell array 310 can be used to program the authentication token 300, reset the authentication token 300, or for other general communication with the authentication token 300. However, these functions require a special communications terminal, such as terminal 400 shown in
This communications capability is especially important for mass production of the authentication tokens. Special data, such as an encryption key, can be programmed into the token after it has been manufactured, but before delivery to a card holder. A clock on the token can be enabled and set before delivery to a user. Even the battery on the token can be logically disconnected until the token is enabled.
This communications capability is also important for maintenance of the authentication tokens. A person authorized to administer the token will be able to reset a token if it appears to not be working or for re-issue to a different user. The administrator can be given a number of “blank” tokens to be programmed just before issuing to a user. The clock-reset option will restart a clock on the authentication token and re-sync the authentication token with the computer system that the card holder will access using the authentication token.
The communications protocol must be secure. The token may contain a generic or batch produced encryption key that will be issued to the administrator. This key will be needed to communicate with the token and can be permanently deactivated once the unique key of the user has been programmed onto the token.
The communication protocol can also be used to obtain information from the token. This can include the current date/time on the token, the number of times the token has been used, the last time it was used, and status information about the token, such as the voltage in the battery.
Although the disclosed embodiments describe a fully functioning hardware authentication token that incorporates flexible solar cell technology, the reader should understand that other equivalent embodiments exist. Since numerous modifications and variations will occur to those reviewing this disclosure, the hardware authentication token that incorporates flexible solar cell technology is not limited to the exact construction and operation illustrated and disclosed. Accordingly, this disclosure intends all suitable modifications and equivalents to fall within the scope of the claims.
This application for letters patent is related to and incorporates by reference provisional application Ser. No. 60/544,651, titled “Multi-Function Solar Cell in Authentication Token,” and filed in the United States Patent and Trademark Office on Feb. 13, 2004.
Number | Date | Country | |
---|---|---|---|
60544651 | Feb 2004 | US |