Replacing blinded authentication authority

Abstract
A manufacturing entity providing a blinded signature to a secure device, associating a time with the blinded signature, and if a signing key is compromised, providing a time of the compromise to a replacement authority and providing the time associated with the blinded signature to the replacement authority.
Description
BACKGROUND

A general purpose device such as a processor based system, for example, a personal or handheld computer, or a dedicated device such as an automated teller machine, may communicate with an entity, such as a server for a service provider, in a secure manner. The device, when interacting in such a manner may be termed a secure device. In one example, a personal computer user may desire to use the computer, including software such as a browser executing on an operating system, as a secure device to access a stock account on the web.


The interacting entity may require that the device possess specific security related attributes before the entity communicates with the device. In the above example, prior to providing access, the stockbroker's web server may seek reliable information regarding security related characteristics of the user's computer and software executing on the computer. In general, this problem is solved by a certificate such as a digital certificate signed by the manufacturer of the secure device that makes a representation about the attributes of the secure device. In the example under consideration, this may be a signed digital certificate provided by the browser and signed by the manufacturer of the browser, or one provided by the operating system, and signed by the manufacturer of the operating system, or provided directly by the computer hardware, and signed by the hardware manufacturer, or some other type of certificate that assures the interacting entity, in this case the stockbroker's web server, that the device has certain characteristics or meets certain standards. Such a certificate could represent, for example, the level of encryption supported by the browser, or the existence and type of secure interconnection between the computer and any external peripherals. Such a certificate could also represent a hardware device in the platform that holds a cryptographic key and was manufactured to protect the key using specified protections.


In general, therefore, a manufacturing entity that is either the manufacturer itself or authorized by the manufacturer, may have signed several certificates that provide information about the capabilities of several secure devices provided by the manufacturer.


Occasionally, the signing key of the manufacturer may be compromised, for example, it may become known to an unauthorized party. This consequently prevents any device that subsequently authenticates itself to another entity using the manufacturer's signed certificate from guaranteeing its security related characteristics, because the unauthorized party may have signed the certificate and the device certificate may thereby make a false representation about its security characteristics. Thus, bona fide devices that have been provided using the manufacturing entity's certificate prior to the signing key compromise must be issued a new certificate signed by a new un-compromised key that provides the same level of trust in the certificate as before the compromise.


The mechanism by which this may be achieved requires the manufacturing entity to maintain a list of the secure devices to which it has provided a signed certificate, and a secure time stamp recording a time earlier than the time at which the certificate was signed, for each secure device so authenticated. The combination of the signed certificate and the time stamp provides a guaranteed record of the secure device's state at that time of the signing with respect to the attributes represented by the certificate. Once a compromise occurs, a replacement authority, which may actually be the manufacturing entity itself, or a physically separate entity, can then use the record to assign new certificates to the secure devices that are known to have been certified by the manufacturing entity prior to the compromise.


The replacement authority on being notified of the compromise generates a replacement signing key. Using the replacement key, the replacement authority then generates a new certificate for every secure device known to have a bona fide certificate previously provided by the manufacturing entity and not created as a result of the compromise. These certificates are then distributed to the bona fide secure devices; in one instance by having the secure devices download them from a distribution server.


The above replacement scenario is complicated when the process of signing certificates for secured devices is blinded. In a blinded signing, a secure device may obtain certificates from a manufacturing entity while keeping its identity hidden from the manufacturing entity. A secure device may in one class of implementations provide a manufacturing entity with information placing it in a known class of trusted devices without revealing its identity. This may be achieved by a protocol such as that described in, for example, Chaum, D. Security without identification: transaction systems to make big brother obsolete. Comm. of the ACM. 28(10): 1030-1044; 1985 (Chaum). However, in such a blinded signing scenario, because the identity of the secure device is essentially unknowable to the manufacturing entity, it is not possible for the entity to provide information about the secure devices that have bona fide certificates to a replacement authority in the straightforward manner described earlier if a compromise of the manufacturing entity's signing key occurs.




BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 Depicts a flowchart of processing in one embodiment of the claimed subject matter.



FIG. 2 Depicts a processor based system in one embodiment of the claimed subject matter.



FIG. 3 Depicts a processor based system including a trusted module in one embodiment of the claimed subject matter.




DETAILED DESCRIPTION


FIG. 1 depicts processing in accordance with one embodiment of the claimed subject matter. In the figure, the processing at three sites is depicted, viz. at a manufacturing entity, at a secure device, and at a replacement authority. The depicted processing can be divided into four phases as shown in the figure. In the first phase, initialization, represented by box 191, a secure device and a manufacturing entity participate to create a signed certificate for the secure device signed by the manufacturing entity using a blinded signing process. In the second phase, compromise detection, represented by box 192, the manufacturing entity detects a compromise and notifies a replacement authority. In the third phase, authentication, represented by box 193, the replacement authority and the secure device communicate in order to establish to the replacement authority that the secure device is bona fide and has been properly certified by the manufacturing authority prior to the compromise. In the final phase, obtain new identity signature, the secure device and the replacement authority interact to create a new signed certificate for the secure device, once again using a blinded signing process.


The phases depicted in the figure are meant to teach a specific embodiment of the claimed subject matter. In other embodiments many variations of the depicted processing are possible. For example, the replacement authority may be identical to the manufacturing entity in some embodiments. A single secure device in some embodiments may interact with multiple manufacturing entities and/or multiple replacement authorities. Conversely, the manufacturing entity may interact with multiple secure devices in some embodiments. In some embodiments, more than one certificate may be provided by a manufacturing entity to a particular secure device.


Next, initialization for this embodiment, as depicted in FIG. 1 at 191, is considered in detail. In this phase, the secure device first generates a secret identity, 100. This may be done, in one embodiment, by a process that generates a randomized sequence of bits to be used as the secret identity. In other embodiments the identity may be pre-provided by the manufacturer of the secure device or by a user, for example by entering a pass-phrase. In order to prevent the manufacturing entity from learning the device's secret identity while obtaining a certificate from the entity, the secure device then computes a blinded identity, 105, using a method such as that described in Chaum. The blinded identity is provided to the manufacturing entity for a signature in order to obtain a certificate. In addition, the secure device also generates a blinded identity ticket at step 110. This identity ticket is generated, in one embodiment, by applying a one-way function to the secret identity of the device. The ticket is transmitted to the manufacturing entity in this step.


The generation of the blinded identity ticket is done in a manner that allows later authentication by a replacement authority that the ticket was generated using the secret identity of the secure device, without requiring the secure device to actually disclose the secret identity. A method to achieve this property for a blinded identity ticket is described in detail in the pending U.S. patent application entitled SYSTEM AND METHOD FOR ESTABLISHING TRUST WITHOUT REVEALING IDENTITY, applicant Ernie F. Brickell, application Ser. No. 10/306,336, and assigned to Intel Corporation (Brickell). This method is termed the Direct Proof method and is used in this embodiment of the claimed subject matter. Specifically, the one-way function referenced above and used to compute the blinded identity ticket for the secure device from the secret identity of the device at step 110 is in accordance with Brickell. The Direct Proof method of Brickell is not detailed further in this application because the referenced co-pending application describes the method in detail. Of course, other methods that allow the creation of a blinded identity ticket that allows a replacement authority to authenticate a secure device without requiring the revelation of the secret identity of the secure device may be used in other embodiments in a step analogous to step 110 of this embodiment. Using the Brickell method, the identity ticket can be created by having the device perform a Direct Proof with a named base provided by the manufacturer or by the replacement authority, as described in the Brickell application.


Once the manufacturing entity has received the blinded identity and the identity ticket, it signs the blinded identity and returns it to the secure device at step 145 and then obtains a secure timestamp on the identity ticket indicating the time of signing and stores the identity ticket and the time stamp at step 150. Using a method such as that described in Chaum, the secure device in 115 then removes the blinding from the signed blinded identity to obtain a signed certificate from the manufacturing entity and stores the certificate for normal authentication of the device as a secure device as described in the Background section above.


The next stage of processing begins when the manufacturing entity detects a compromise of its signing key and in response to the compromise contacts the replacement authority, at 155, to initiate a certificate replacement process for secure devices that have previously received bona fide certificates from the manufacturing entity. The manufacturing entity at this stage has already provided or provides in a communication to the replacement authority the identity tickets of all bona fide secure devices whose certificates are to be replaced. In response to the request from the manufacturing entity, the replacement authority generates a new signing key for the new certificates to be issued at 160.


The first step in the certificate replacement process, box 193, is for the replacement authority to authenticate any secure device which is seeking a replacement for its original certificate. The replacement authority initiates a zero knowledge protocol with the secure device using, for example, the Direct Proof techniques of Brickell, and authenticates it using the information contained in the identity ticket, at 165 and 120. Once the secure device is authenticated as a possessor of the secret identity that was used to create the identity ticket using for example Direct Proof techniques, the replacement authority then checks to ensure that the secure device had a bona fide certificate provided by the manufacturing entity prior to the compromise by comparing the time stamp associated with the identity ticket with the estimated time of compromise, 170. The estimated time of compromise in general is no later than the time at which the compromise is detected. Once the time stamp has been validated to have been created earlier than the estimated time of compromise, the replacement authority and secure device in box 194 repeat a process similar to the previously described initialization process (box 191) to generate a new certificate using the new signing key. The difference is that in this instance the replacement authority is providing the certificate to the secure device instead of the manufacturing entity (though in practice the replacement authority may in some embodiments be identical to the manufacturing entity). As before, this process includes the secure device computing a blinded identity and generating an identity ticket at 130 and 135; the replacement authority signing the blinded identity and storing the identity ticket and the time of signing of the identity as a time stamp on the identity ticket at 175 and 180; and the secure device obtaining a certificate by removing the blinding from the signed blinded identity at 140. The secure device may also optionally choose to generate an entirely new secret identity at the start of the process at 125; or alternatively it may continue to use its former secret identity because the secrecy of that identity is uncompromised in the scenario described here.



FIGS. 2 and 3 depict two embodiments of a system including a secure device. In FIG. 2, the system is a processor based system including a processor 200, a memory 260 to store data and programs executable by the processor, a communication interface such as the network interface 280 that allows the system to communicate with other devices on a network, and a storage unit such as a disk 240 all interconnected by a bus system 220. In this system the secure device is embodied as a software program that is stored in the storage unit and loaded into memory and executed by the processor to perform the protocols described above, relating to the generation of certificates and their replacement. FIG. 3 represents another system including a secure device, however in this system the secure device is at least in part implemented as a hardware module termed a trusted module 310. As before the system includes a processor 300, interface 330, memory 50 and disk 340, but additionally includes the trusted module 310 implemented in hardware. In the system of FIG. 3, the operation of the secure device is performed at least in part by the trusted module and optionally by software loaded from the disk and stored in the memory to be executed by the processor. In an exemplary system, the trusted module may generate secret identities, provide security attribute information regarding the system and perform blinding and one way function generation to generate blinded identities; while the software portion of the secure device might initiate communication with outside entities and call upon the trusted module only for the functions listed above.


Many other implementations are, of course, possible including, in one instance an embodiment where the secure device is implemented entirely as a logic circuit and does not have an architecture as depicted in FIGS. 2 and 3.


While certain exemplary embodiments of the invention have been described above and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not restrictive on the broad aspects of various embodiments of the invention, and that these embodiments not be limited to the specific constructions and arrangements shown and described, since various other modifications are possible. It is possible to implement the embodiments of the invention or some of their features in hardware, programmable devices, firmware, software or a combination thereof.


Embodiments in accordance with the claimed subject matter may be provided as a computer program product that may include a machine-readable medium having stored thereon data which when accessed by a machine may cause the machine to perform a process according to the claimed subject matter. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, DVD-ROM disks, DVD-RAM disks, DVD-RW disks, DVD+RW disks, CD-R disks, CD-RW disks, CD-ROM disks, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnet or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions. Moreover, embodiments of the claimed subject matter may also be downloaded as a computer program product, wherein the program may be transferred from a remote computer to a requesting computer by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).


Many of the methods are described in their most basic form but steps can be added to or deleted from any of the methods and information can be added or subtracted from any of the described messages without departing from the basic scope of the claimed subject matter. It will be apparent to those skilled in the art that many further modifications and adaptations can be made. The particular embodiments are not provided to limit the invention but to illustrate it. The scope of the claimed subject matter is not to be determined by the specific examples provided above but only by the claims below.

Claims
  • 1. At a manufacturing entity, a method comprising: providing a blinded signature to a secure device; associating a time with the blinded signature; and if a signing key is compromised, providing a time of the compromise to a replacement authority; and providing the time associated with the blinded signature to the replacement authority.
  • 2. The method of claim 1 wherein providing a blinded signature to a secure device further comprises: receiving a blinded identity and an associated blinded identity ticket from a secure device; and signing the blinded identity and sending the signed blinded identity to the secure device.
  • 3. The method of claim 2 wherein associating a time with the blinded signature further comprises: obtaining a time stamp based on the time of creation of the blinded identity ticket and storing the time stamp.
  • 4. The method of claim 3 wherein providing the time associated with the blinded signature to the replacement authority further comprises: providing access to the time stamp to the replacement authority.
  • 5. At a replacement authority, a method comprising: receiving, from a manufacturing entity, a time of a signing key compromise; and a first time associated with a first blinded signature provided to a secure device by the manufacturing entity.
  • 6. The method of claim 5 further comprising, at the replacement authority, authenticating the secure device; providing a second blinded signature to the secure device; and recording a second time associated with the second blinded signature.
  • 7. The method of claim 6 wherein receiving a time associated with a first blinded signature further comprises receiving access to a first time stamp based on the time of creation of a first blinded identity ticket associated with a first blinded identity of the secure device.
  • 8. The method of claim 7 wherein authenticating the secure device further comprises: initiating a zero knowledge protocol for communicating with the secure device; and comparing the first time stamp to the time of the signing key compromise.
  • 9. The method of claim 8 wherein providing a second blinded signature to the secure device further comprises receiving a second blinded identity and an associated second blinded identity ticket from the secure device; signing the second blinded identity and sending the signed second blinded identity to the secure device.
  • 10. The method of claim 9 wherein recording a time associated with the second blinded signature further comprises: obtaining a second time stamp based on the time of creation of the second blinded identity ticket; and storing the second time stamp.
  • 11. At a secure device, a method comprising: receiving a first blinded signature from a manufacturing entity; and if a signing key of the manufacturing entity is compromised, authenticating the secure device to a replacement authority; and receiving a second blinded signature from the replacement authority.
  • 12. The method of claim 11 wherein receiving a first blinded signature from a manufacturing entity further comprises: sending a first blinded identity and an associated first blinded identity ticket to the manufacturing entity; and receiving the signed first blinded identity from the manufacturing entity.
  • 13. The method of claim 12 wherein authenticating the secure device to a replacement authority further comprises: initiating a zero knowledge protocol for communicating with the replacement authority.
  • 14. The method of claim 12 wherein receiving a second blinded signature from the replacement authority further comprises: sending a second blinded identity and an associated second blinded identity ticket to the replacement authority; and receiving the signed second blinded identity from the replacement authority.
  • 15. A method comprising: a manufacturing entity receiving a first blinded identity and a first time stamped blinded identity ticket from a secure device; the manufacturing entity signing the first blinded identity and sending the signed first blinded identity to the secure device; the manufacturing entity obtaining and storing a first time stamp based on the time of creation of the first blinded identity ticket; and if a signing key of the manufacturing entity is compromised, the manufacturing entity providing a time of the compromise to a replacement authority; the manufacturing entity providing the first time stamp to the replacement authority; the replacement authority receiving the time of the compromise; the replacement authority receiving the first time stamp and comparing the time of the first time stamp to the time of the compromise; the replacement authority initiating a zero knowledge protocol for authenticating the secure device using the identity ticket; the replacement authority receiving a second blinded identity and a second blinded identity ticket from the secure device; the replacement authority signing the second blinded identity and sending the signed second blinded identity to the secure device; and the replacement authority obtaining and storing a second time stamp based on the time of creation of the second blinded identity ticket.
  • 16. A system comprising: a processor to execute programs of the system; a storage unit, communicatively coupled to the processor, to store programs of the system; a communication interface, communicatively coupled to the processor, to communicate with a network; and a trusted program stored in the storage unit and executable on the processor of the system, the trusted program to send a first blinded identity and an associated first blinded identity ticket to a manufacturing entity using the communication interface; receive the signed first blinded identity from the manufacturing entity using the communication interface; initiate a zero knowledge protocol for communicating with the replacement authority using the communication interface; send a second blinded identity and an associated second blinded identity ticket to the replacement authority using the communication interface; and receive the signed second blinded identity from the replacement authority using the communication interface.
  • 17. A machine readable medium having stored thereon data which when accessed by a machine causes the machine to perform the method of claim 1.
  • 18. The machine readable medium of claim 17 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 2.
  • 19. The machine readable medium of claim 18 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 3.
  • 20. The machine readable medium of claim 19 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 4.
  • 21. A machine readable medium having stored thereon data which when accessed by a machine causes the machine to perform the method of claim 5.
  • 22. The machine readable medium of claim 21 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 6.
  • 23. The machine readable medium of claim 22 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 7.
  • 24. The machine readable medium of claim 23 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 8.
  • 25. The machine readable medium of claim 24 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 9.
  • 26. The machine readable medium of claim 25 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 10.
  • 27. A machine readable medium having stored thereon data which when accessed by a machine causes the machine to perform the method of claim 11.
  • 28. The machine readable medium of claim 27 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 12.
  • 29. The machine readable medium of claim 28 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 13.
  • 30. The machine readable medium of claim 29 having stored thereon further data which when accessed by a machine causes the machine causes the machine to perform the method of claim 14.
  • 31. A machine readable medium having stored thereon data which when accessed by a machine causes the machine to perform the method of claim 15.