The present invention relates to the field of digital security using certificates and tokens. In particular, it relates to a system and method for handling digital permits associated with user authentication tokens.
One of the difficulties in dealing with current electronic transactions is ensuring proper security measures are in place to identify the user and the service being used. Most systems rely on user tokens, which contain secure information that is used to validate the identity of the user, preferably through some form of two-factor authentication, such as a One Time Password (OTP) or challenge-response algorithm. User permits, containing digital signatures, identify the user's access and authorizations for services (permissions). Permit issuers' certificates serve to validate the permissions.
Current solutions based on digitally signed permits, such as that disclosed in U.S. Pat. No. 6,216,116 and as used with CCITT X.509 Attribute Certificates rely on a user level digital certificate infrastructure to be in place to support the user identification and authentication process connected with permit verification. Issuance and management of a user PKI (Public Key Infrastructure) is costly and complex and, as a consequence, is not widely deployed today. The result is that digital permits become difficult to deploy.
An alternative solution to the existing user certificate and digital permit system is desirable to promote larger deployment of secure verification systems. Ideally, any such solution should combine the security and validation provided by user authentication tokens and user permits.
It is an object of this invention to provide such a solution.
The invention consists of a method of handling permits, comprising the steps of: (a) providing a user with a user permit linked to a user token, the user permit defining permissions granted to the user and the user token containing identity authentication information for the user; (b) presenting the user token to a gatekeeper to confirm the user's identity; (c) validating the user permit based on the permit issuer's digital signature and (d) granting the user access based on said permissions within the user permit.
Optionally, the user authentication token is either a hardware token or a software token.
Another aspect of the invention is a system for handling permits, comprising: (a) a token granting authority, which provides users with user tokens containing identity authentication information for each user; and (b) a permit granting authority, which provides users with user permits containing permissions granted to each user and binds each of the user permits to one of the user tokens.
Preferably, the permit granting authority has an existing relationship with the token granting authority such that the permit granting authority can efficiently validate the user token when issuing permits for that user. Preferably, the user token identifier contained in the user permit is a globally unique identifier, such that the permit can be validated in an open network outside of the domain in which the token was issued, enabling global interoperability.
According to still another aspect of the invention, there is provided a method of generating user permits for a user, comprising: (a) authenticating the user's identity via a user token held by the user; and (b) generating a user permit for the user which is linked to the user token.
Other and further advantages and features of the invention will be apparent to those skilled in the art from the following detailed description thereof, taken in conjunction with the accompanying drawings.
The invention will now be described in more detail, by way of example only, with reference to the accompanying drawings, in which like numbers refer to like elements, wherein:
The inventive system and method presented herein consists of handling permits in which the user identity in the permit is bound to a user authentication token rather than to a PKI certificate.
There is a need to provide a system and method which overcomes at least one of the limitations in the existing user PKI certificate security models. The inventive system and method present herein is intended to fulfill this need.
A presently preferred embodiment of the method is shown in
The user token associated with the user permit must be unique within the domain where the user permits are used. It could be either a vendor-proprietary token, or utilize a globally unique token identifier such as of the type being proposed by the OATH Consortium (Initiative for Open Authentication, www.openauthentication.org).
Leveraging an existing two-factor authentication system for verification is simpler than authenticating a user certificate when the user permit is bound to that certificate. The permit validation system, rather than verifying user certificates and associated revocation lists, performs a real-time token validation step and then verifies that the associated user permit is digitally signed by the permit issuer. As a result, only a very minimal PKI is required to support a small number of permit issuer certificates, dependent only on the number of permit issuers in the system, not the number of users who are issued permits.
One application for this system is for mobile payments, as shown in
Another application is in the online gaming industry, as shown in
The two above-mentioned applications can be combined, for example, on an online gambling site, the user permit can include not only the user's credentials and history for accessing the site, but also financial information enabling the user to make transfers to and from his bank account (or credit card, etc.) to an account on the site.
The user tokens can take various forms, including physical tokens such as fobs, scratch cards, USB keys, flash memory or SIM cards, and software tokens deployed on smart devices such as mobile phones, PDAs and PCs.
This concludes the description of a presently preferred embodiment of the invention. The foregoing description has been presented for the purpose of illustration and is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching and will be apparent to those skilled in the art. It is intended the scope of the invention be limited not by this description but by the claims that follow.
Number | Date | Country | Kind |
---|---|---|---|
2569355 | Nov 2006 | CA | national |
Number | Name | Date | Kind |
---|---|---|---|
5412717 | Fischer | May 1995 | A |
5615268 | Bisbee et al. | Mar 1997 | A |
5960085 | de la Huerga | Sep 1999 | A |
5978484 | Apperson et al. | Nov 1999 | A |
6003014 | Lee et al. | Dec 1999 | A |
6216116 | Barkan et al. | Apr 2001 | B1 |
7710933 | Sundaralingam et al. | May 2010 | B1 |
7779482 | Yen et al. | Aug 2010 | B1 |
7934005 | Fascenda | Apr 2011 | B2 |
20030182573 | Toneguzzo et al. | Sep 2003 | A1 |
20050005133 | Xia et al. | Jan 2005 | A1 |
20050091483 | Fascenda | Apr 2005 | A1 |
20070051795 | Shipman | Mar 2007 | A1 |
20070101152 | Mercredi et al. | May 2007 | A1 |
20070208928 | Rios et al. | Sep 2007 | A1 |
20070249323 | Lee et al. | Oct 2007 | A1 |
20090251724 | Nakajima | Oct 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20080127321 A1 | May 2008 | US |