I. Field of the Invention
The present invention relates to the field of electronic security. More specifically, the present invention relates to a method and apparatus for providing password security for an electronic device.
II. Description of the Related Art
Many electronic devices, as well as software programs operating in conjunction with such electronic devices, have been protected by unauthorized access through the use of password security. Generally, in such applications, a password is pre-stored within an electronic device and also given to an individual for accessing the electronic device sometime in the future. When access is desired, the individual enters the given password into the electronic device to gain access, and the electronic device checks to see that the password that was entered matches the password stored within the device. If a match is detected, the individual is granted access.
Multiple passwords may be used to allow further control and managed access to such electronic devices. In this case, a unique pass code, such as a username and password, may be assigned to several individuals and likewise pre-stored in the electronic device. When access to the electronic device is desired, an individual enters his or her pre-assigned pass code into the electronic device to gain access to information contained within the electronic device. This method of password protection allows for easy revocation of access for one or more individuals, without having to change the password for other individuals who are still authorized to access the electronic device.
Variations to the above scenarios have also been widely used. For example, each username and password combination may allow a different level of access to the electronic device. Thus, the level of access to the electronic device can be tailored to the needs of each individual.
One problem with the password systems described above is that they are often difficult to manage. As permission to access the electronic device is granted or revoked, a change to the electronic device is generally needed. For example, if an individual no longer requires access to an electronic device, generally a corresponding username and password must be removed from the electronic device. This often involves having to physically access the electronic device—something that may be difficult, inconvenient, or expensive to do, especially in situations where a large number of electronic devices are concerned.
Another problem with the password systems described above is that it is often difficult to offer time-based authorization to such electronic devices. For example, it may be desirous to provide temporary access to a service technician for repair or service of an electronic device. In this case, it is burdensome to pre-store a username and password into the electronic device for the purposes of such a brief time, and then to remove the password a short time later.
What is needed is a method and apparatus for providing flexible password security to an electronic device without the shortcomings found in the prior art.
The present invention is directed to a method and apparatus for providing password security to an electronic device. In one embodiment, password security is provided by an apparatus, the apparatus comprising an input device for allowing entry of an encrypted password, a memory for storing a decryption function and a decoding function, and a processor. The processor receives the encrypted password from a user wanting access to the electronic device and applies the decryption function to the encrypted password to produce a decrypted password. The processor then applies the decoding function to the decrypted password to determine access rights to the electronic device.
In another embodiment, providing password security to an electronic device is provided by a method, the method comprising storing a decryption function and a decoding function. The method further comprises receiving an encrypted password and decrypting the encrypted password using the decryption function to produce a decrypted password. The decrypted password is then decoded to determine access rights to said electronic device.
The features, advantages, and objects of the present invention will become more apparent from the detailed description as set forth below, when taken in conjunction with the drawings in which like referenced characters identify correspondingly throughout, and wherein:
Processor 102 comprises one of a number of possible digital computing devices, such as a microprocessor, a DSP, an ASIC, or a number of discreet electrical components for operation of electronic device 100. For example, processor 102 might comprise a Pentium-class microprocessor manufactured by Intel Corporation of Santa Clara, Calif. Processor 102 is connected to memory 106 for storing and retrieving digital information pertinent to the operation of electronic device 100. For example, memory 106 typically stores executable computer instructions for processor 102. Memory 106 also typically stores other information, such as data input through input device 104 or pre-programmed data for the operation of the executable computer instructions. As such, memory 106, although shown in
Input device 104 typically comprises a keyboard or keypad for entry of numeric or alpha-numeric information by a user of electronic device 100, such as maintenance personal, a technician, an electronic device operator, and so on. Input device 104 may alternatively, or in addition, allow entry of information other than that supplied by a user, such as any number of operational parameters being monitored by electronic device 100. As such, input device 104, although shown as a single entity in
Output device 108 typically comprises a display device, such as an LED display, a computer monitor, or other visual display device well known in the art.
It is many times desirable to allow access to electronic device 100 to only individuals authorized by, generally, an owner of electronic device 100. In addition, it is often desirable to allow different levels of access to electronic device 100 depending on the type of access needed. For example, a normal user of electronic device 100, such as a field technician, or engineer, in one embodiment, may need to enter information into electronic device and view information captured by electronic device 100. A service technician may need the same access rights as the field technician or engineer, however he or she may need to alter certain parameters associated with electronic device 100 and therefore need additional access rights to enable parameter alterations.
These needs are met by various embodiments of the present invention. In one embodiment, a decryption function and a decoding function is stored in memory 106 inside electronic device 100. In another embodiment, the decrypting function and the decoding function are integrated into a single function. Individuals needing access to electronic device 100 are given an encrypted password that is entered into electronic device 100 via input device 104. Processor 102 receives the encrypted password and applies the decryption function to the encrypted password to produce a decrypted password. The decoding function is then applied by processor 102, the decoding function for determining access rights to electronic device 100, as described below.
The advantages of such embodiments include reduced memory requirements for electronic device 100 as well as a greater security for electronic information. Rather than storing a potentially large number of pass codes, memory 106 need only store the decrypting function and the decoding function, which generally occupy far less memory than the list of pass codes. In addition, electronic device 100 is generally more difficult to reverse-engineer because only the encryption function and decoding function are stored, rather than the pass codes themselves.
In step 202, a decoding function is loaded into memory 106. The decoding function comprises a series of executable computer instructions for performing mathematical operations on the decrypted password to determine access rights to electronic device 100. For example, if the decrypted password comprises a 16-digit number, and access is to be given to decrypted passwords less than a predetermined number, for instance, the number 1,000, the decoding function is applied to the decrypted password to determine if the access right requirements are met. In this way, there can be as many as 1,000 unique passwords that will allow access to electronic device 100. Of course, access can be granted or denied in an almost unlimited fashion by simply increasing the number of digits in the decrypted password and/or changing the criteria for allowing access (for example, only decrypted passwords numbering 1,500 or less are given access). If access is granted, generally an individual will be able to operate electronic device 100 in its intended manner.
In another embodiment, a time reference, such as the present date and/or time, is used to allow access to electronic device 100. In this embodiment, processor 102 decodes the decrypted password by comparing a time reference stored as at least a portion of the decrypted password to the current time, as determined by a timekeeping device 110. The time reference stored in at least a portion of the decrypted password typically comprises a time, a date, or both a time and a date. Time-keeping device 110 comprises, generally, any electronic means known in the art for tracking or determining the current time, time of day, date and time, etc. For example, in one embodiment, time-keeping device 110 comprises an electronic counter, or clock, that is incremented proportionally with respect to time. If the comparison between the present time and the time reference is favorable, access to electronic device 100 is permitted. A favorable comparison results, for example, when the time reference is later, or, in another embodiment, earlier, than the present time as indicated by timekeeping device 110.
In another embodiment, the decrypted password comprises two time references, and access is permitted only if the current time provided by time-keeping device 110 falls between the two time references.
In another embodiment, the decrypted password comprises several fields, each field indicating an additional information regarding access to electronic device 100. For example, if the decrypted password comprises 22 digits, the first 18 digits might comprise a first field and the remaining 4 digits comprising a second field. The first field could be used for determining general access to electronic device 100, as explained above, while the second field could-be used to determine an access level. For example, a first access level could be defined which allows only the most limited access to electronic device 100. A second level could be defined which would allow an individual access to additional functions, data, or capabilities of electronic device 100. Additional levels could be defined to mix and match functions, data, or capabilities. Processor 102 determines access rights by first examining the first field to determine whether or not the 18 digit number allows access to electronic device 100 at all.
Of course, any combination of the above techniques could be used in alternative embodiments for determining access rights to electronic device 100.
In step 204, an unencrypted pass code is received by processor 102 via input device 104. The pass code comprises an alpha-numeric sequence that represents an encrypted password that defines a user's access rights to electronic device 100.
In step 206, processor 102 decrypts the encrypted password using the decryption function stored in memory 106 to generate a decrypted password.
In step 208, processor 102 decodes the decrypted password using the decoding function stored in memory 106 to determine access rights, as explained above. The determination may involve processor 102 determining the present date and/or time and comparing the determined date/time to the decrypted password.
If access rights are given, processing continues to step 210 where, generally, a notification of such access rights are presented to a user of electronic device 100, generally via output device 108. If access rights are denied, processing continues to step 212, where a notification of such denial of access rights are also presented to the user, again, generally, via output device 108.
The previous description of the preferred embodiments is provided to enable any person skilled in the art to make and use the present invention. The various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without the use of the inventive faculty. Thus, the present invention is not intended to be limited to the embodiments discussed herein, but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Number | Name | Date | Kind |
---|---|---|---|
4216375 | Ulch et al. | Aug 1980 | A |
4901307 | Gilhousen et al. | Feb 1990 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5168520 | Weiss | Dec 1992 | A |
5280527 | Gullman et al. | Jan 1994 | A |
5504773 | Padovani et al. | Apr 1996 | A |
5844918 | Kato | Dec 1998 | A |
5850187 | Carrender et al. | Dec 1998 | A |
5930233 | Kanerva et al. | Jul 1999 | A |
6021516 | Okajima et al. | Feb 2000 | A |
6070154 | Tavor et al. | May 2000 | A |
6076181 | Cheng | Jun 2000 | A |
6141784 | Davis et al. | Oct 2000 | A |
6148005 | Paul et al. | Nov 2000 | A |
6173431 | Rittle | Jan 2001 | B1 |
6208663 | Schramm et al. | Mar 2001 | B1 |
6226301 | Cheng et al. | May 2001 | B1 |
6307867 | Roobol et al. | Oct 2001 | B1 |
6327254 | Chuah | Dec 2001 | B1 |
6359877 | Rathonyi et al. | Mar 2002 | B1 |
6452905 | Smith et al. | Sep 2002 | B1 |
6542490 | Ahmadvand et al. | Apr 2003 | B1 |
6609115 | Mehring et al. | Aug 2003 | B1 |
6621799 | Kemp et al. | Sep 2003 | B1 |
6665292 | Bradshaw et al. | Dec 2003 | B1 |
6778499 | Senarath et al. | Aug 2004 | B1 |
6839566 | Casaccia et al. | Jan 2005 | B2 |
6857095 | Suumaki et al. | Feb 2005 | B2 |
6904526 | Hongwei | Jun 2005 | B1 |
6947446 | LoGalbo et al. | Sep 2005 | B2 |
6961326 | Chang et al. | Nov 2005 | B1 |
7031343 | Kuo et al. | Apr 2006 | B1 |
7054316 | Cheng et al. | May 2006 | B2 |
7095719 | Wilhelmsson et al. | Aug 2006 | B1 |
7103025 | Choksi | Sep 2006 | B1 |
7103817 | Choksi | Sep 2006 | B1 |
7197024 | Huo | Mar 2007 | B2 |
7206295 | Seguin | Apr 2007 | B2 |
7218636 | Paul et al. | May 2007 | B2 |
7434257 | Garg et al. | Oct 2008 | B2 |
20010007137 | Suumaki et al. | Jul 2001 | A1 |
20020002577 | Garg et al. | Jan 2002 | A1 |
20020021698 | Lee et al. | Feb 2002 | A1 |
20020021714 | Seguin | Feb 2002 | A1 |
20020073321 | Kinsella | Jun 2002 | A1 |
20020191544 | Cheng et al. | Dec 2002 | A1 |
20030036399 | Casaccia et al. | Feb 2003 | A1 |
Number | Date | Country |
---|---|---|
2315964 | Feb 1998 | GB |
10503075 | Mar 1998 | JP |
11252103 | Sep 1999 | JP |
WO9844755 | Oct 1998 | WO |
WO9953631 | Oct 1999 | WO |
WO0074344 | Dec 2000 | WO |
WO0113542 | Feb 2001 | WO |
WO0137473 | May 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20030204733 A1 | Oct 2003 | US |