Features and advantages of the present invention will become more apparent from the following detailed description of exemplary embodiments thereof taken in conjunction with the accompanying drawings in which:
Referring now to
The techniques set forth herein may be described in the general context of computer-executable instructions, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, and the like, that perform particular tasks or implement particular abstract data types. Typically the functionality of the program modules may be combined or distributed as desired in various embodiments.
Included in
The device 12 may be, for example, a phone, computer, PDA, or video conferencing components. The device may be a wireless or non-wireless device. The particular arrangements and devices used in examples herein are for purposes of illustrating the techniques described herein in connection with configuration of a device in accordance with configuration information associated with a user. Any device that has connectivity to the server 18 and having the functionality described herein may be included in an embodiment. Additionally, although a single device is illustrated in
As will be described in following paragraphs, a user may register at a first point in time with the registration server 16. As part of the registration process, configuration data may be included in a user profile created for the user. The configuration data may include device configuration data for one or more devices. Also, as part of registration, a token may be initialized to include information used by the registration server 16 to identify the registered user. Initialization is described in more detail in following paragraphs and may vary with the particular token to enable the token to be used in connection with the techniques described herein. As described in following paragraphs, the token may also include other information such as configuration data. Subsequent to registration, the token may be used to automatically configure the device 12 in accordance with configuration data of the registered user.
The techniques described in following paragraphs allow a device to be configured for any registered user so that the device may be associated with the user. For example, rather than associate a phone with a phone number, the phone is associated with the user. When the device is configured for the registered user, communications for the user may be routed to the device. If the user performs the configuration process for a second device, subsequent communications for the user may be routed to the second device rather than the previously configured device for the user. As such, the techniques described herein may be used to have a device temporarily configured for a registered user.
As will also be described herein, the token initialized as part of registration is used to identify or represent the registered user to the registration server. Using the techniques described herein, the user is represented by the token and may connect to one or more devices on a temporary, or longer term, basis.
It will be appreciated by those skilled in the art that although the components of
Referring now to
Depending on the configuration and type of device 12, memory 22 may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.) or some combination of the two. Additionally, the device 12 may also have additional features/functionality. For example, the device 12 may also include additional storage (removable and/or non-removable) including, but not limited to, USB devices, magnetic or optical disks, or tape. Such additional storage is illustrated in
By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Memory 22, as well as storage 30, are examples of computer storage media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by device 12. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
The device 12 may also contain communications connection(s) 24 that allow the user's computer to communicate with other devices and components such as, by way of example, input devices and output devices. Input devices may include, for example, a keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) may include, for example, a display, speakers, printer, and the like. These and other devices are well known in the art and need not be discussed at length here. The one or more communications connection(s) 24 are an example of communication media.
In one embodiment, the device 12 may operate in a networked environment as illustrated in
One or more program modules and/or data files may be included in storage 30. During operation of the device 12, one or more of these elements included in the storage 30 may also reside in a portion of memory 22, such as, for example, RAM for controlling the operation of the user computer 12. The example of
The operating system 40 may be any one of a variety of commercially available or proprietary operating systems. The operating system 40, for example, may be loaded into memory in connection with controlling operation of the user computer. One or more application programs 46 may execute in the user computer 12 in connection with performing user tasks and operations. The particular application programs, if any, may vary with device.
The communications module 42 may be used by the device in facilitating communications between the device and other external components, such as the second server 18, to process any incoming/outgoing transmissions that may vary with the particular device.
The token reader module 44 may be used in connection with reading a token as may be initialized with information from the registration of a user as described elsewhere herein. The module 44 may be used to read information from the token, for example, when the token is inserted into the reader. An embodiment may use tokens which operate by coming into direct physical contact with the module 44. For example, the user may have a token which is a card, such as Smart Card. The card may be, for example, a pocket-sized card with embedded information thereon including information from the registration process used by the server 16 for identifying the user. The card may be physically inserted into a Smart Card or other card reader to obtain the information stored thereon. Other examples of tokens may include a USB-token, a SIM card, RFID tokens, and wireless Smart cards.
It should be noted that the module 44 may vary in accordance with the type of device used in an embodiment. The tokens that may be used in an embodiment in connection with the techniques described herein are not limited to those which may be characterized as requiring physical contact with the module 44. An embodiment may also use tokens operating without having the token come into direct physical contact with the module 44.
Referring now to
It should be noted that although the CA 150, registration module 146 and server application 142 are illustrated as residing on the same server, they may reside on one or more physical server systems. Such variations will be readily apparent and appreciated by those skilled in the art.
The one or more server applications 142 may be server applications performing services or tasks in accordance with the particular functionality included in an embodiment.
The certificate authority (CA) 150 is an authority that issues and manages security credentials and public keys for message encryption and decryption. As known in the art, the CA operates as part of a public key infrastructure (PKI). For example, the CA may issue digital certificates for use by other parties. The CA is an example of a trusted third party.
The registration module 14 is used in connection with registering users as part of a communication service. As part of the registration process, a user profile may be created which includes configuration data. The configuration data may include data used to configure one or more devices of varying types. The configuration data may be used in connection with the techniques described herein to configure the particular device in a customized fashion in accordance with a registered user. Configuration data may include, for example, a common set of data that applies to more than one device. Configuration data may also include device-specific data that varies with each device. Configuration data may also vary with a specific model or manufacturer of a device.
A token is initialized to include information identifying the registered user. As described in following paragraphs, the token is the element by which the server authenticates and identifies a registered user. Information on the token may be used by the registration server to authenticate and identify the registered user in connection with device configuration. The token for a registered user may be initialized as part of the registration process. The token may be initialized to include a digital certificate (which includes a public key), a private key, and a personal identifier, such as a user password or PIN (Personal Identification Number). The foregoing three pieces of information may be used in one embodiment in connection with identifying and authenticating a registered user with the techniques described herein for device configuration.
The digital certificate and private key may be obtained using the CA 150. In one embodiment, the CA 150 on the server 16 may generate the digital certificate and the private key and then store these data items on the token. In another embodiment, the token may include a form of storage and a processor. The CA may instruct the token to generate the private key and then store the private key on the token. The user password or PIN may be entered manually or otherwise by the user as part of registration. The user password or PIN may be used in connection with allowing a possessor of the token to utilize information stored on the token at a later time. The user password or PIN may be used to control whether the private key stored on the token is allowed to be used in connection with processing steps for device configuration. The use of the digital certificate, private key and personal identifier, such as a PIN or user password, is described in more detail in following paragraphs.
The configuration data may be stored on the server 16 and/or on the token. One or more factors may affect how the configuration data is apportioned for storage. One factor is the type of token and capabilities of the token. For example, the token may have limited storage capacity and an embodiment may store all the configuration data on the server 16. A second factor that may affect where the configuration data is stored is the type of configuration data. If the configuration data applies to multiple devices, the data may be stored on the token rather than on the server. Since the configuration data applies to multiple devices, it may be used more frequently. The data may be stored on the token to avoid having to download the data from the server 16.
It should be noted that configuration data may be retrieved from the token and/or server as needed in accordance with the particular device being configured.
It should also be noted that even though configuration data may be stored on the token, it may be that the particular module used to read the data is not capable of accessing such configuration data stored thereon.
Once the token is initialized, the registered user may utilize the token at a subsequent time to configure a device using the configuration data associated with the registered user's profile. Such device configuration can occur in an automated fashion with minimal user input.
What will now be described is an example of how the token may be used to configure a device for a registered user.
Referring now to
In the example 200, the registered user 204 has his/her token 202 which is initialized as described above. The token 202 may have been previously initialized as part of the registration process for the user 204 at the registration server 16. The token 202 may be read by the token reader 44, for example, as a result of inserting the token 202 into a slot or other opening of 44. The device 12, via the token reader 44, is able to read the information stored on the token 202. The device 12 enters a setup mode and the user is prompted to enter his/her password or PIN. The device 12 sends the user-entered data to the token. The token compares the user-entered data to the previously entered PIN or password from the registration process as stored on the token. The token notifies the device 12 with an indicator as to whether the user-entered data matches the PIN or password as stored on the token. If there is no match, the user is again prompted.
If there is a match, processing continues with the device sending a randomly generated string or other message to the token. The message will be used in subsequent processing steps. The token encrypts the message with the private key stored on the token. The encrypted message is returned by the token to the device with the digital certificate.
The device 12 then proceeds with authenticating the user to the registration server 16. If such authentication is successful, processing is performed to configure the device 12 using configuration data for the registered user represented by the token 202. The authentication process as may be performed in an embodiment will now be described in more detail.
The device 12 may communicate with the registration server 16 via the second server 18. However, in other embodiments, the device 12 may communicate directly with the server 16. Communications with the registration server 16 may be performed using any method of secure communications such as, for example, over an SSL (secure socket layer) connection, IPSEC tunneling, and the like. The device 12 transmits the digital certificate, the original message, and the encrypted message to the registration server 16.
At the server 16, the registration module 146 receives the communication transmitted from the device 12. The module 146 requests that the CA 150 perform processing to verify the digital certificate received. As known in the art, this includes, for example, using a certificate chain, revocation list, and the like, to verify the authenticity and genuineness of the digital certificate. The CA 150 notifies the registration module 146 regarding the verification results. Processing continues once the certificate has been successfully verified.
The registration module 146 extracts the public key from the digital certificate and decrypts the encrypted message received from the device. The decrypted message is compared to the original message. If there is a match, then the registration server 16 proceeds with downloading any configuration data stored at the server 16 to the device 12. The configuration data, if any, stored at the server 16 may be returned to the device 12 along with a successful status regarding the authentication of the user information as included on the token 202. Upon receiving the successful status, the device 12 proceeds with configuration in accordance with any received configuration data as well as any configuration data stored on the token 202.
When the user is done with the device 12, the user may remove the token 202 from the token reader 44. In one embodiment, removal of the token may terminate the association of the device with the registered user as identified by the token. In another embodiment, once the token is removed, the device may continue to operate as the registered user's device until the device is powered off. Other embodiments may also exhibit other behavior regarding when the association of the device with the registered user is terminated. The particular behavior may vary with device and one or more other policies in an embodiment.
It should be noted that any one of a variety of different techniques may be used in place of the PIN or password allowing processing to proceed with the private key stored on the token. For example, a biometric identifier and reader may be used in an embodiment. The biometric identifier may be a fingerprint, retinal scan, and the like. The particular technique and personal identifier used in connection with controlling access to the private key as stored on the token for processing purposes may vary with embodiment.
Once a device is configured for a registered user, the device may be used as an endpoint in a communications network. The device may be associated with the registered user and communications for the user may be routed to the device. An embodiment may allow a user to specify criteria to be used in connection with routing communications to the user on a currently configured device.
Referring now to
The flowchart 400 of
As will be appreciated by those skilled in the art, other techniques besides the public/private key techniques described herein may be used in an embodiment.
It should be noted that the second server 18, although not described in further detail herein, may also include hardware and/or software components similar to those described in connection with
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.