The present invention relates generally to computers and like devices, and more particularly to improved methods and apparatuses for use in authenticating credential information.
Computing networks and environments vary in size and purpose. Most computer networks and computing systems require potential users to present some sort of proof that they are allowed to access the computing resources. Typically, users are required to enter a qualifying user name and password prior to accessing the system. Some network security schemes require potential users to present a portable token or other like mechanism to help verify that they are authorized to access certain resources. For example, smartcards are becoming more popular for authenticating users.
Other trends have lead to the use of biometric information. Here, biometric information is gathered using various devices/sensors and the resulting credential information is logically compared to previously stored credential information for the user.
Authentication technologies such as biometrics have certain inherent qualities that make them both desirable and difficult to implement, however. One problem is that the gathered credential information that is provided for authentication is public in nature (i.e. fingerprints, irises, faces, etc. . . . ) as opposed to secret passwords, etc. Indeed, biometric data for a given user may be left in hundreds of places every day. An additional difficulty is that, unlike the current secure forms of authentication today (e.g., passwords and smartcards) where the credentials themselves are used as (or to create) key blobs which are consistent across multiple sessions, biometric credential data is not consistent across multiple sessions. This means that to authenticate an entity, the gathered credential information will likely need to be transmitted to wherever the authentication process is to take place; in the case of network user authentication, this means that the credential may need to be transmitted in its entirety to an authentication server.
Consequently, there is a need for methods and apparatuses for use in authenticating credential information and that allow such credential information to be exchanged over non-secure channels in a safe and protected manner.
The above stated needs and others are met, for example, by a method that includes establishing authentication information. The authentication information includes time information associated with authenticating logic. The method further includes establishing credential information with first logic, and outputting an authentication request including the authentication information and the credential information. The authentication request has been cryptographically modified for protection.
The authentication request may then be provided to second logic and passed on to applicable authenticating logic. The authentication request may be cryptographically modified by first logic or by the second logic. In certain implementations, the second logic may also include certificate or other like information in the authentication requests that is passed on to the authenticating logic.
The authenticating logic may be configured to receive the authentication request, and at least validate the authentication information, and authenticate the credential information. The authenticating logic may then output an authentication response including, for example, authentication approval information and corresponding cryptography information.
As part of certain methods, the first logic may be configured to access at least a portion of the authentication response to retrieve the corresponding cryptography information, which is then provided to the second logic for use in decrypting the encrypted authentication response.
In other implementations, the second logic may be configured to access at least a portion of the authentication response to directly retrieve the corresponding cryptography information without using the first logic.
In certain implementations, the method also includes having the authenticating logic establish a temporary key, and using the temporary key to encrypt authentication approval information. A copy of the temporary key may also be encrypted using a public key. In certain implementations, the temporary key includes a symmetric key.
The first logic may be substantially provided in a first device that includes a credential gathering mechanism that is configurable to establish the credential information. The credential gathering mechanism may be configurable to establish biometric information. The second logic may be provided at least partially in a second device, and the authenticating logic may be provided at least partially in a third device. The second device may include, for example, at least one computer or like device that is operatively configured as a client, and the third device may include at least one computer or like device that is operatively configured as a server.
The authenticating logic may be configured to validate the authentication information based on at least nonce data and timestamp data within the authentication information.
A more complete understanding of the various methods and apparatuses of the present invention may be had by reference to the following detailed description when taken in conjunction with the accompanying drawings wherein:
Turning to the drawings, wherein like reference numerals refer to like elements, the invention is illustrated as being implemented in a suitable computing environment. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a personal computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multi-processor systems, microprocessor based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
Exemplary computing environment 120 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the improved methods and apparatuses described herein. Neither should computing environment 120 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in computing environment 120.
The improved methods and apparatuses herein are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable include, but are not limited to, personal computers, server computers, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
As shown in
Bus 136 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus also known as Mezzanine bus.
Computer 130 typically includes a variety of computer readable media. Such media may be any available media that is accessible by computer 130, and it includes both volatile and non-volatile media, removable and non-removable media.
In
Computer 130 may further include other removable/non-removable, volatile/non-volatile computer storage media. For example,
The drives and associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules, and other data for computer 130. Although the exemplary environment described herein employs a hard disk, a removable magnetic disk 148 and a removable optical disk 152, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, random access memories (RAMs), read only memories (ROM), and the like, may also be used in the exemplary operating environment.
A number of program modules may be stored on the hard disk, magnetic disk 148, optical disk 152, ROM 138, or RAM 140, including, e.g., an operating system 158, one or more application programs 160, other program modules 162, and program data 164.
The improved methods and apparatuses described herein may be implemented within operating system 158, one or more application programs 160, other program modules 162, and/or program data 164.
A user may provide commands and information into computer 130 through input devices such as keyboard 166 and pointing device 168 (such as a “mouse”). Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, serial port, scanner, camera, etc. These and other input devices are connected to the processing unit 132 through a user input interface 170 that is coupled to bus 136, but may be connected by other interface and bus structures, such as a parallel port, game port, or a universal serial bus (USB).
A monitor 172 or other type of display device is also connected to bus 136 via an interface, such as a video adapter 174. In addition to monitor 172, personal computers typically include other peripheral output devices (not shown), such as speakers and printers, which may be connected through output peripheral interface 175.
Computer 130 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 182. Remote computer 182 may include many or all of the elements and features described herein relative to computer 130.
Logical connections shown in
When used in a LAN networking environment, computer 130 is connected to LAN 177 via network interface or adapter 186. When used in a WAN networking environment, the computer typically includes a modem 178 or other means for establishing communications over WAN 179. Modem 178, which may be internal or external, may be connected to system bus 136 via the user input interface 170 or other appropriate mechanism.
Depicted in
In a networked environment, program modules depicted relative to computer 130, or portions thereof, may be stored in a remote memory storage device. Thus, e.g., as depicted in
Attention is now drawn to
System 200 includes first device 202, second device 204 and third device 206. At a minimum, first device 202 is operatively coupled to second device 204, and second device 204 is operatively coupled to third device 206. In other implementations, additional connectively may be provided as well as additional requisite or otherwise supporting interconnecting resources.
In this example, first device 202 includes first logic 208 and credential 11 gathering mechanism 210. It is noted that the term “logic” as used herein is intended to represent a broad range of technical implementation techniques. Such techniques may include, for example, hardware, firmware, software, and/or any combination thereof. Additionally, the term “logic” may respect any additional circuitry, including analog circuitry, etc. that may be used to assist in the performance of one or more functions, processes, and other like tasks in accordance with the methods and apparatuses described and shown herein.
With this in mind, first logic 208 is configured to receive or otherwise access credential information that is gathered/produced by credential gathering mechanism 210. Credential gathering mechanism 210 may include a user input device or other like data/sample gathering tool that is capable of identifying credential information that may be authenticated in some manner by authenticating logic 224 in third device 206. In certain exemplary implementations, for example, credential gathering mechanism 210 gathers biometric information associated with a user (e.g. source 212). In such an implementation, the resulting credential information would include sensed biometric data that can be (at least) logically compared/analyzed by authentication logic 224 to one or more known samples maintained within stored credential information 228. Such data gathering and authentication techniques (and other like techniques) are well known.
Also illustratively shown in first device 202 are private key 214 and related public key 216. In this example, private key 214 and public key 216 are associated with first logic 208 and/or first device 202. In other examples, such key-pairs may also be associated with second logic and/or second device 204. Cryptographic keys such as these and related cryptographic techniques are also well known. The methods and apparatuses provided herein can be adapted for use with a wide variety of such cryptographic techniques.
First logic 208 is configured to provide credential information from credential gathering mechanism to second device 204, and more specifically, second logic 218 therein. In certain exemplary implementations, first logic 208 is configured to simply provide the credential information to second logic 218 without significantly modifying the sample data. In yet other more complex exemplary implementations, first logic 208 is configured to modify the sample data and/or credential information to better secure/protect the data before it is passed from first device 202 to second device 204. These two exemplary implementations are described in more detail below.
In implementations where first logic 208 is configured to modify the credential information before it is provided to second device 204, authentication information 230 is generated and provided to first device 202. Authentication information 230 may be generated, for example, by second logic 218 and/or authenticating logic 224. By way of example, in certain implementations, second logic 218 is configured to request a timestamp 232 and a server nonce (or other like data) from authenticating logic 224. In response to the request, authenticating logic 224 generates and returns timestamp 232 and a server nonce to logic 218. In other implementations, second logic 218 may generate a client nonce, for example. Regardless as to how the resulting nonce 234 is generated (e.g., server or client based), second logic 218 provides authentication information 230 having timestamp 232, nonce 234 and an identifier 236 (associated with the entity being authenticated) to first logic 208.
Having received authentication information 230, first logic 208 then combines authentication information 230 with the credential information from mechanism 210 to form an authentication request. The authentication request is then signed, encrypted or otherwise cryptographically modified by first logic 208 using private key 214. The resulting encrypted authentication request is then provided to second logic 218.
Second logic 218 then passes the encrypted authentication request on to authentication logic 224. In certain implementations, logic 218 may also modify the encrypted authentication request by attaching or otherwise including a certificate 220 to the encrypted authentication request. This “modified” encrypted authentication request is them provided to authentication logic 224. Authentication logic 224 may then, for example, verify the certificate accordingly and/or access public key 216 (or 238) therein.
In other implementations where first logic 208 is not configured to modify the credential information before it is provided to second device 204, authentication information 230 may be generated and provided instead to second device 204 and second logic 218 further configured to combine authentication information 230 with the credential information from first logic 208/mechanism 210 to form an authentication request. The authentication request is then signed, encrypted or otherwise cryptographically modified by second logic 218 using a private key 240 associated with a public key 238, each being further associated with second logic 218 and/or second device 204. The resulting encrypted authentication request (or modified encrypted authentication request) is then provided to authenticating logic 224.
Authenticating logic 224 in third device 206 is configured to receive the encrypted authentication request (or encrypted authentication request with attached certificate) and process it accordingly. For example, authenticating logic 224 can be configured to decrypt the encrypted authentication request using the appropriate public key 216 (or 238), and in doing so verify that the signature is valid. Authenticating logic 224 may then verify that the authentication information 230 is valid, for example, analyzing timestamp 232, nonce 234 and/or identifier 236. Authenticating logic 224 may then authenticate the credential information, for example, by logically comparing the credential information to stored credential information 228. Authentication logic 224 may also check the cache to determine if authentication information 230 is already present in the cache.
If the verification and authentication requirements are satisfied, then authenticating logic 224 generates an authentication response. In certain implementations, authenticating logic 224 may also cache all or part of the authentication request for a period of time to provide a validity window associated with the authentication and/or authentication response.
Exemplary authentication logic 224 creates a temporary key 226 (e.g., a symmetric key) and uses temporary key 226 to sign, encrypt or otherwise cryptographically modify the authentication response. The authentication response may include, for example, an access token or other like information that allows second device 204 to access third device 206 or other related authentication controlled devices. Authentication logic 224 also signs, encrypts or otherwise cryptographically modifies a copy of temporary key 226 using public key 216 (or 238). The resulting encrypted authentication response and encrypted temporary key are then provided to second logic 218.
In those implementations where first logic 208 earlier modified the credential information, then first logic 208 can be used to retrieve the temporary key from the encrypted temporary key received from authentication logic 224. Thus, second logic 218 passes at least the encrypted temporary key to first logic 208, which then uses private key 214 to retrieve temporary key 226. First logic 208 then provides retrieved temporary key 226 to second logic 218.
In other implementations where second logic 218 earlier modified the credential information itself, then second logic 218 can be used to retrieve the temporary key directly from the encrypted temporary key received from authentication logic 224. Thus, second logic 218 uses private key 240 to retrieve temporary key 226.
Once in possession of retrieved temporary key 226, second logic 218 is able to retrieve an access token 222 or other like data from the received encrypted authentication response using temporary key 226.
Attention is now drawn to
In act 302, authentication information 230 is established. For example, in certain implementations second logic 218 and/or authentication logic 224 may be configured to establish authentication information 230. In act 304, an authentication request is generated. First logic 208 and/or second logic 218 may be configured to generate the authentication request.
Act 306 is optional and includes certifying the authentication request generated in act 304. In certain implementations, for example, second logic 218 is configured to certify the authentication request by including certificate 220. In act 308, the authentication request is processed. For example, authentication logic 224 can be configured to verify and/or authenticate information in the authentication request. If the authentication request is authenticated in act 308, then in act 310 a corresponding authentication response is generated, for example, by authentication logic 224 and provided to at least second logic 218.
In act 312, at least a portion of the authentication response is processed by second logic 218. In certain implementations, act 314 is also implemented such that at least a portion of the authentication response is processed by first logic 208. As a result of act 312 (and if used, act 314) access token 222 or other like information is provided to second logic 218 and/or second device 204.
Acts 402, 404 and 406 may be included within act 302. In act 402, second logic 218 requests timestamp 232 and nonce 234 from authenticating logic 224. In act 404, authenticating logic 224 generates a nonce (N) and timestamp (T). In act 406, second logic 218 generates an authenticator (A) and provides authenticator (A) to first logic 208. For example, in certain implementations, authenticator (A) include authentication information 230.
Acts 408, 410 and 412 may be included in act 304. In act 408, credential information (C) is gathered or otherwise acquired. For example, credential gathering mechanism 210 and/or first logic 208 may be used in act 408. In act 410, the authenticator (A) from act 406 is signed using a private key (Kv). In act 412, the resulting authentication request ([A+C]Kv) is provided to second logic 218.
Acts 414 and 416 may be included in act 306. In act 414, if applicable, certificate (Cert.) information is added or otherwise included in the authentication request. In act 416, the authentication request ([A+C]Kv) and (optional) Cert. are provided to authentication logic 224.
Acts 501, 502, 504, 506, and 508 may be included in act 308. In act 501 it is determined if ([A+C]Kv) is already in the cache. If a Cert. is included with the authentication request, then in accordance with act 502, authentication logic 224 may verify the certificate. In act 504, authentication logic 224 verifies that the signature for ([A+C]Kv) is valid, for example, using the public key Kp associated with private key Kv. The public key Kp may be acquired in various conventional ways and/or received in an accompanying certificate. In act 506, the authenticator (A) is verified. In act 508, the credential information (C) is authenticated, for example, using mathematical and/or logical comparison/analysis based on stored or otherwise accessible credential information (C′).
Those skilled in the art will recognize that in other implementations, these and/or other acts may be implemented in differing orders, simultaneously, etc. to that illustrated in the drawings herein. By way of example, in certain implementations, act 504 is performed prior to act 502.
Acts 510, 512, 514, 516, and 518 may be included in act 310. In act 510, if applicable, all or part of the authentication request ([A+C]Kv) may be cached or otherwise maintained for a period time. In act 512, a temporary key (e.g., a symmetric key) Ks is created. In act 514, an authentication response (R) is generated and encrypted using temporary key Ks. In act 516, temporary key Ks is itself encrypted using a public key Kp. In act 518, the encrypted authentication 11 response [R]Ks and encrypted temporary key [Ks]Kp are provided to second logic 218.
Acts 602, 604 and 610 may be included in act 312. Acts 606 and 608 may be included in act 314.
In act 602, encrypted authentication response [R]Ks and encrypted temporary key [Ks]Kp are received by second logic 218. In act 604, at least encrypted temporary key [Ks]Kp is provided to first logic 208. In act 606, first logic 208 decrypts encrypted temporary key [Ks]Kp using private key Kv. In act 608, retrieved temporary key Ks is provided to second logic 218. In act 610, the access token or other like information in encrypted authentication response [R]Ks is retrieved using temporary key Ks from act 608.
Here, as described in earlier examples, second logic 218 may be configured to perform certain acts is first logic 208 cannot be so configured. Thus, for example, alternative act 304′ may include acts 408 (previously described) and act 702. In act 702, second logic 218 is configured to sign the authenticator (A) and credential information (C) using private key Kv associated with of second device 204 and/or second logic 218 to produce ([A+C]Kv).
Alternative act 312′ may include acts 602 (previously described) and acts 704 and 706. In act 704, second logic 218 is configured to decrypt encrypted temporary key [Ks]Kp using private key Kv. In act 706, with temporary key Ks, second logic 218 is able to retrieve the access token or other like information in encrypted authentication response [R]Ks using temporary key Ks from act 704.
Although some preferred embodiments of the various methods and apparatuses of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the exemplary implementations disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth and defined by the following claims.