The embodiments herein relate to security systems and, more particularly, to remotely controlled and biometrically operated security systems.
Present day electronic security systems provide locking mechanisms that employ a combination of hardware and software. Such security mechanisms use PIN (Personal Identification Number) codes, sensors, smartcards, biometrics and a combination of the same in order to increase the levels of security provided by the security systems.
Present day security systems employ a single, two or three factor authentication. In single factor authentication the user is required to enter a PIN (Personal Identification Number). In two factor authentication the user is expected to insert a smartcard and enter the PIN. In three factor authentication the user is expected to produce a smartcard, enter a PIN and also provide a biometric, such as a fingerprint, to authenticate herself.
Further, some of these systems also operate under the custodianship of multiple persons, because with the increase of the number of persons controlling the security system, the level of security provided to the system increases. Since the system would require all the persons to be physically present to provide access to the system the level of security of the system is increased. Each person would physically authenticate the other persons. No one person would be able to access the security system independently. However, there are limitations associated with the existing multiple party systems. For example, in case of personal bank locker, all parties are to be physically present at the site for the operation of the locker. Even if one among the parties is not present at the site of the locker, the locker cannot be operated. This limitation could prove to be cumbersome in many scenarios. For example, if such a security system is employed at the loading bay of an ATM machine, then the parties controlling the access to the system have to be all present at the ATM machine at the same time.
In addition, if scalability of the security of the system is to be increased by adding more people controlling the lock or the same person is to be deployed at multiple locations, the requirement of physical presence of the people controlling the lock does not easily support the same.
In view of the foregoing, an embodiment herein provides a method for providing access to a secure location, wherein the access is provided with one person at the secure location and other people operating from remote locations. In brief, the system achieves controlling the opening of a lock at a secure location by multiple persons, who need not all be physically present at the site. Thus the system is a multi-party controlled system. It is also remote as all the controlling parties need not be physically present at the site of the lock. The system also employs biometric comparisons to authenticate the users. Hence, it is also a biometric security lock. In total, the system being proposed is a multi-party controlled remote biometric security lock. The embodiment requires at least one person to be at the site of the lock, the on-site controller, and one or many parties who could be at remote sites, the remote controllers. The method comprises steps of the on-site controller inserting a smartcard and scanning her biometric details; details of the on-site controller being verified; a first encrypted message being generated using a first private key, if details of the on-site controller are verified; the first encrypted message being sent to at least one remote controller; the remote controller inserting a smartcard and scanning her biometric on receiving the encrypted message, on a terminal provided to her; details of the remote controller being verified; the first encrypted message being verified by the remote controller; a second encrypted message being generated using a second private key; and the second encrypted message being sent to the lock, granting access to the lock. Failure of any verification step generates a negative acknowledgement message by the second user and prevents access to the lock.
When more than one remote controller is associated with the lock, the first encrypted message is sent to all the remote controllers. Second to (N+1)th remote controllers, where N is the number of remote controllers, being verified; the first encrypted message being verified by the all the remote controllers; second to (N+1)th encrypted messages being generated by the remote controllers using corresponding private keys; the second to (N+1)th encrypted messages being sent to the lock; and received by the lock granting access to the lock. Failure of any verification step generates a negative acknowledgement message by the remote controllers and prevents access to the lock.
A number of remote controllers would be configured on the smartcard of the on-site controller. At the time of operation, a random subset of remote controllers is selected for granting access. The number of remote controllers chosen could be constant or variable, based on a configuration setting.
Embodiments further disclose a system for providing access to a secure location, wherein the access is provided to at least one on-site controller and at least one remote controller, the system comprising at least one means adapted for enabling a first user to scan his biometric details; verify details of the first user; generating a first encrypted message using a private key, if details of the first user are verified; sending the first encrypted message to a second user; and receiving a second encrypted message from the second user. The system is adapted for scanning biometric details of the first user on the first user scanning a smartcard and for using the private key from the smartcard. The system is adapted for selecting at least one of the remote controllers randomly from a set of remote controllers.
These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings.
The embodiments herein will be better understood from the following detailed description with reference to the drawings, in which:
The embodiments herein and the various features and advantages thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The embodiments herein disclose a remote security lock by providing systems and methods for accessing the lock. Referring now to the drawings, and more particularly to
A remote security lock is disclosed. A system that supports the functionality of the lock and a method for enabling access to the lock are also disclosed. The method employs multiple parties for providing access to the lock. The method also enables a subset of people from the multiple parties to access the lock, while keeping the security level nearly equivalent to that of involving the full complement of the multiple parties. The access to the lock is provided to a set of people called Remote Controllers (RCs) and at least one Onsite Controller (OC). Remote controllers may include one or more than one person and may generally operate from a location that may not be necessarily the site of the security lock. In an embodiment, the RCs may also be located at the site of the lock. A set of the RCs may be operating from a location that is away from the site of the lock and a set of RCs may be at the location of the lock. Also, various combinations of a pre-defined set of RCs are possible. Onsite Controller is a single person who operates the lock at the site where the lock is present i.e., the OC is physically present at the site where the lock is used. The RCs and OC together may be referred to as controllers throughout the application.
Further, a measure for determining the security level is proposed. The measure chosen for this is the number of controls that need to be broken to gain access to the controlled resource. Let this measure be named security strength. To understand the enhancement provided by this security system which uses multiple controllers, with respect to other systems, the same measure may be used to quantify the security provided by those systems and then compared. For example, consider the conventional system of letting the cash boy open the physical lock and load the ATM. The security strength of this system would be 1, as access to the key is all that is required. Anyone getting the possession of the key would be able to open the ATM. It may be noted that the presence of the cash boy is not required for this operation. Thus, an attacker has to overcome one control (that of obtaining the key). On the other hand, consider the remote lock system with two controllers. To break this system an attacker has to have access to both the smartcards and the presence of both the individuals at different locations (to scan their fingerprints). Thus, the security strength of this system could be assigned as 4. Thus, it is an improvement of 4 times over the conventional (existing) system. The security of the system increases with the addition of each controller. The strength of the system goes up by 2 with the addition of each remote controller, i.e., the security strength increases linearly with the number of remote controllers. Thus, for an N RC system, the security strength is 2(N+1). To break this system an attacker has to have access to the smartcards of all the controllers and ensure the acquiescence of all the controllers to scan their biometrics.
The system employs a device, as depicted in
The method employs cryptosystems for encryption and digital signing of data exchanged between the devices. Information from the OC to RCs may include location of the lock, asset name, time, name of the OC, digital signature and so on. Information from the RCs to OC may include location of the controller, asset name, time, name of the RC, approval status (acknowledgement or negative acknowledgement), digital signature and so on. Further, the method also employs randomization techniques for selection of a non-zero subset of the RCs identified in the smartcard of the OC. With the randomization techniques employed, the number of RCs employed to control the lock is reduced. However, the security strength of the lock remains nearly equivalent to that provided by the full set of the RCs. Also, randomization introduces scalability into the system in that the number of RCs required providing access to the lock, without compromising the security strength, is reduced.
The keypad and display 102 at the site of the remote security lock 101 may be used by the OC to enter any details and to view the system messages. For instance, the OC may employ the keypad and display 102 in order to input the time of access of the lock. Similarly, the keypad and display 102 may be used by the OC to view the acknowledgement messages of the RCs.
The smartcard reader 103 may be a device that reads the details stored on the smartcard. The OC may insert her smartcard on the smartcard reader 103 during the access of the lock. The possession of the smartcard may be employed as one of the factors to authenticate the OC. Further, any changes made regarding the information of the OC such as her private key, RCs that the OC may contact and so on may be stored on the smartcard.
A biometric may be employed as one of the factors to authenticate the OC. The biometric scanner 104 may include a fingerprint scanner, palm scanner, iris scanner and so on. The biometric details of the OC are also stored on her smartcard. At the time of access of the lock, the same biometric detail is captured by the lock and a match is performed with the stored details. If there is a match, then the authentication is complete, else it is not. For the purposes of illustration, the biometric scanner 104 may be a fingerprint scanner. However, it is not limited to the same.
The GPS receiver 105 may be employed for tracking the location of the lock 101. This information may be communicated to the RCs, in the messages sent by the OC.
The modem 106 may be employed to send and receive messages from the lock to the RCs. When the OC is authenticated by the lock system, a message is produced to indicate the success of verification and sent to the RCs through the modem. The acknowledgement messages from the RCs are received through the modem.
The Physical lock with control logic 107 houses the lock. The Physical lock with control logic 107 also comprises of the logic that drives the operation of the lock. The control logic opens the lock only when all the conditions necessary for the opening of the lock have been satisfied.
The RCs may use the keypad and display 102 in order to view the messages from the OC once the OC is verified by the system. The keypad and display 102 may be used by the RCs to enter details such as time of providing the permission for access of the lock. In addition, alerts and system messages may be viewed on the keypad and display 102.
The smartcard reader 103 may be a device that reads the details stored on the smartcard. The RCs may insert their smartcard on their respective smartcard reader 103 during the access of the lock. The possession of the smartcard may be employed as one of the factors to authenticate the RC. Further, any changes made regarding the information of the RC such as her private key, OCs that may contact the RC and so on may be stored on the smartcard.
A biometric may be employed as one of the factors to authenticate the RC. The biometric scanner 104 may include a fingerprint scanner, palm scanner, iris scanner and so on. The biometric details of the RC are stored on her smartcard. At the time of access of the lock, the same biometric detail is captured by the device 201 in possession of the RC and a match is performed with the stored details. If there is a match, then the authentication is complete, else it is not. For the purposes of illustration, the biometric scanner 104 may be a fingerprint scanner however it is not limited to the same.
The GPS receiver 105 may be employed for tracking the location of the RC using the RC device 201. This information may be communicated to the OC in the acknowledgement messages, for the purpose of logging.
The modem 106 may be employed to send and receive messages from the lock to the RCs. When the OC is authenticated by the lock system, a message is produced to indicate the success of verification and received by the RCs through the modem. The acknowledgement messages from the RCs are sent through the modem.
The OC 301 refers to the person who is present at the resource or asset that should be accessed. The system assigns at least one person to work as OC 301.
The RCs 201 may be people who operate the lock from remote locations or locations that are away from the site of the remote security lock 101. The system may assign any number of persons as RCs 201. Also, all the RCs 201 are not required to control the opening of the lock, a random subset (non-zero subset) of RCs may be chosen from the defined set of RCs 201 to open the remote security lock 101. It may be noted that the security strength of the lock, when a random subset of RCs is chosen from the full set of RCs, is nearly the same as that when all RCs are deployed on providing the control to the access of the lock 101.
Further, a random set of RCs are selected (509) from the RCs stored in the smartcard of the OC and each RC 201 is contacted (510) in the order specified by the system. The RCs 201 may be contacted using the modem 106. They receive an alert (511) informing them of the success of an OC trying to access the security lock 101. The RCs 201 insert (514) their smartcards on their devices in order to authenticate themselves and the RCs' smartcards are validated by their devices. A biometric scan of the RCs 201 is carried out. The RC 201 scans (516) her biometric means on the biometric scanner 104 on the local unit. This data is transferred to the smartcard for matching (517). If there is no match on the data, a negative acknowledgement message is sent to the OC 301. If the biometric data matches, then the 2-factor authentication of the RC 201 is complete and a success message is sent to the RC's device. It would have been verified that the RC 201 ‘has’ the smartcard and ‘is’ the person with the necessary biometric. The device with RC 201 then decrypts (518) the success message from OC 301. This uses the public key of the OC stored within the smartcard of the RC 201. The signature of the success message from decrypted in the previous step (518) is then computed (519). This also uses the public key of the OC stored within the smartcard of RC 201. A check is made (520) by the RCs 201 to verify the signature of the message computed by them with the signature of the message received from the OC 301. Once the signatures match, the OC 301 and the other details in the message are verified. If there is some mismatch in any information, such as asset name mismatch, the RC 201 sends a (521) negative acknowledge message to OC. This is encrypted and signed by the RC 201, using the private key on her smartcard. On the other hand, if there is a match with the details on the smartcard of the RC 201, the success message from OC 301 is recorded (522) on the RC's device and an acknowledgement message permitting access is generated (523) by the RC 201. The acknowledgement message may be include RC name, asset name, location, time and approval status. The location could be pre-programmed for stationary location of the RC 201. For RCs 201 on the move, a GPS module 105 could be used to determine the location. Then, a signature of the above message is generated (524) by the smartcard of the RC 201 and encrypted (525) using the private key within the smartcard. The encrypted message and signature are returned (526) to the onsite device, through the modem 106. The message from the RC is received (527) on the OC's device.
The acknowledgment messages from the RCs are verified (528, 529, 530) by the OC 301, individually, on her smartcard. The verification involves decrypting the received message and verifying the signature. This uses the public key of the corresponding RC 201. On the failure of verification (530), the access of the lock is cancelled and an unauthorized access event is recorded (505). On the success of verification (530), the message from RC 201 is analyzed (531) to check if it is a positive acknowledgement or negative acknowledgement fro RC 201. If the message received from RC 201 is a negative acknowledgement, the access of the lock is cancelled and an unauthorized access event is recorded (505). If the message received from RC 201 is a positive acknowledgement message, the message is stored (532) on the OC's device. This ensures non-repudiation by the RC 201. Further, the process is repeated for each of the RC 201 contacted by OC 301. If all RCs 201 are verified correctly and acknowledgement messages are received from each RC 201, then the lock is enabled for opening (513). The various actions in method 500 may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some actions listed in
In an embodiment, the system may employ random selection of the RCs for the operation of the remote security lock 101. In one of the randomization schemes assume there are N remote controllers. However, at the time of access any non-zero subset of this N could be selected randomly. This system has the advantage of being operationally more efficient as it is more likely that lesser number of RCs 201 would be contacted. Here, the set of RCs 201 registered is fixed (N), but the number of RCs 201 selected varies.
In another embodiment herein, only one of the N RCs may be selected randomly.
The embodiment herein discloses the security strength of the randomization scheme where one in N RCs is employed for operation of the lock 101. Here two controllers are required to open the lock, i.e., one OC 301 and one RC 201. Even though only one remote controller is required, more than one RC 201 could be registered, say, for instance, two, RC1 and RC2. At the time of opening the lock, the lock device will randomly choose one of the two RCs, RC1 or RC2. The following are the characteristics of such a system.
Thus, the security strength of the system becomes a discrete random variable, s. It takes the values of 4 (with probability 0.5) and 6 (with probability 0.5). The expected value of security strength of the system, E(s), where s is the random variable denoting the security strength is
In fact, if the attacker is interested in the deterministic (probability of 1) event of gaining access to the controlled resource, he will have to assume a system of security strength 6. The impact of this enhancement is that while the system is operated by lesser RCs, the security strength of the system is closer to the system operated by the full number of RCs.
The 1-in-N remote security lock could be generalized for arbitrary N as follows.
The security strength random variable takes the values of 4, 6 . . . 2(N+1). The expected value of security strength is
For large N, this can be approximated as
˜3N/2+5/2
The security strength of the system is proportional to 3N/2, as against 2N of a fully utilized remote controller set of N.
The embodiment herein discloses the security strength of the randomization scheme for selecting k RCs 201 out of the defined N RCs 201. Let an arbitrary number, N, of RCs be registered. The lock device will initially pick a random number from 1 to N, say k. It then picks k random RCs from the registered N. The attacker succeeds only when she picks the same subset as the system. Depending on k, the security strength random variable takes the values of 2(k+1) if the attacker guesses the subset correctly or 2(N+1) otherwise. Each of these events has different probabilities. Further, k varies from 1 to N−1. Thus, the expected value of security strength is
For large N, this can be approximated as ˜2*(N+1).
It is interesting to note that the security of this system is as good as that of the fully utilised remote controller set of N. Further, it should be noted that there is no assumption on N in the system. It is not known a priori and its knowledge is not coded into the steps of operation of the system. Changing N does not require change in any part of the system. It should be noted that for a deterministic outcome (probability of 1) of breaking the lock, the security strength of the randomized security lock is 2(N+1). Thus, the randomized controller set system provides operational efficiency while not compromising the security.
In an embodiment herein, the smartcard of the OC 301 is programmed with an unrestrained set of RCs 201 as P. At the time of access, N of these RCs 201 are selected randomly and a request for authentication is sent to them. The security strength random variable takes the values of
The second term is highest in value when N=1. Therefore, the expected measure of security is lowest when N=1. This value is approximately 1.5*(P+1). It is interesting to note that the security of this system is proportional to the total population of the RCs, i.e., P. It should be noted that for a deterministic outcome (probability of 1) of breaking the lock, the security strength of the randomized security lock is 2(P+1).
Embodiments disclosed herein enable the same RCs 201 to be used to provide the required security strength to multiple access points. Thus, the operations could be scaled easily. The scaling requires the addition of one OC 301 per every access point that needs to be controlled simultaneously.
Further, embodiments using randomization of the controllers indicate that choosing random subsets of the controllers allow the security strength of the system to remain nearly close to that of the system with the full complement of the controllers, while enhancing the scalability of the system further, due to the use of lesser number of controllers in providing access to a lock.
The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the claims as described herein.
Number | Date | Country | Kind |
---|---|---|---|
4012/CHE/2010 | Dec 2010 | IN | national |