US20050138364A1 - Digital certificate proxy - Google Patents

Digital certificate proxy Download PDF

Info

Publication number
US20050138364A1
US20050138364A1 US11/053,157 US5315705A US2005138364A1 US 20050138364 A1 US20050138364 A1 US 20050138364A1 US 5315705 A US5315705 A US 5315705A US 2005138364 A1 US2005138364 A1 US 2005138364A1
Authority
US
United States
Prior art keywords
digital certificate
short
user
time
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/053,157
Inventor
James Roskind
Terry Hayes
Robert Lord
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/053,157 priority Critical patent/US20050138364A1/en
Publication of US20050138364A1 publication Critical patent/US20050138364A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the invention relates to so-called “smart cards” used in digital computer communication and networks, and more particularly, to digital certificate surrogates that do not require users to leave their smart cards in a reader for the duration of the secure communication.
  • PCs Personal computers
  • Home and recreational PC use has increased dramatically.
  • Internet access now allows users to connect to the World Wide Web, newsgroups, and e-mail.
  • Home users and businesses are also finding online shopping, or e-commerce, appealing because of the convenience, simplicity, and robustness. This widespread availability and acceptance of computers has dramatically increased the number of people with the ability to compromise data.
  • FORTEZZA National Security Agency's FORTEZZA program addresses this demand by providing the technology to enable value-added security services for unclassified but sensitive information.
  • FORTEZZA technology provides data integrity, originator authentication, non-repudiation (undeniable proof of one's identity), and confidentiality (data privacy).
  • FORTEZZA personalizes security through an individualized cryptographic device, a PC Card called the FORTEZZA Crypto Card.
  • the Crypto Card includes the user's unique cryptographic key material and related information, and executes the cryptologic algorithms.
  • a sophisticated infrastructure has been designed to generate, distribute, and control the cryptographic keys, control the integrity of the data on the Card, and disseminate required cryptographic and system information.
  • FORTEZZA interfaces and specifications are designed with an “open system” philosophy. This permits seamless integration of the FORTEZZA technology into most data communication hardware platforms, operating systems, software application packages, and computer network configurations and protocols.
  • Data integrity means the data has been processed by both the originator and the recipient, e.g., through a “hash” function.
  • a typical “hash” function the data in the message is read through a mathematical algorithm which uses every bit in the message to form a uniformly sized string of bits unique to that message. Any change in the message, even a single bit, will cause the recipient's hash value to differ from the sender's hash value.
  • Hash value integrity requires a method to secure the value and verify the originator of the hash function. This requires the message to have the user authentication attribute.
  • Non-repudiation is a condition whereby the author of the data cannot repudiate the validity of the result used to authenticate the identity of that user. The technique used to identify the author must be strong enough so the authenticity of the message originator can be proven to a third party. Non-repudiation can be realized by using digital signatures, for example.
  • Confidentiality provides data privacy by encrypting and decrypting data, whereby only the intended recipient can read a message. Encrypted data renders the sensitive data, non-sensitive. Thus, encrypted data needs less physical data protection.
  • a technique must be established to provide a unique “key” for encryption of the data and the capability to transmit the key and other necessary information to the recipient to decrypt the data. The key provides a variable for each encryption session. This means that multiple encryption of the same plaintext will result in different cipher (encrypted) text.
  • Some algorithms also require an Initialization Vector (IV), for added variability.
  • IV Initialization Vector
  • DoD is incorporating the FORTEZZA technology into its Defense Message System (DMS) to secure its unclassified but sensitive information.
  • DMS Defense Message System
  • the FORTEZZA technology satisfies the DMS security architecture with a user friendly, inexpensive, cryptographic mechanism that provides writer to reader message confidentiality, integrity, authentication, non-repudiation, and access control to messages, components, and systems. While the DMS exposed the DoD to the need for the FORTEZZA technology, the same security requirements are valid today for civilian agencies, commercial businesses, and private citizens.
  • ATMs automated teller machines
  • a temporary digital certificate is generated having a useful life of a relatively short period of time, for example, a few minutes to a few hours.
  • An expiration time is attached to the temporary digital certificate by a secure computer platform that is presented with a user's long-term digital certificate, which may be contained in a smart card, for example.
  • the long-term digital certificate issued by a central authority is carried within the smart card.
  • a short-term proxy is generated from the long-term digital certificate in the smart card and copied into the secure computer platform.
  • This temporary digital certificate functions as a surrogate for the long-term digital certificate and allows the user to immediately remove the smart card from a card reader and pocket the smart card, thus avoiding the possibility of forgetting the card in a card reader.
  • FIG. 1 is a block diagram of a computer-user authentication system according to the present invention.
  • FIG. 1 represents a computer-user authentication system according to the present invention, and is referred to herein by the general reference numeral 100 .
  • System 100 includes smart-card 102 with embedded microcomputer 104 that includes a digital certificate 106 .
  • An expiration date is associated with digital certificate 106 that will make possession of smart card 102 unavailing after the expiration date.
  • the expiration date of the digital certificate 106 may be one year after the date of first issuance, so the digital certificate 106 is referred to herein as a long-term digital certificate.
  • Radio antenna 108 allows for wireless communication of digital certificate 106 by microcomputer 104 .
  • a set of electrical contacts 110 allows for wireline communication of digital certificate 106 by microcomputer 104 .
  • Alternate embodiments of the present invention may not use both radio antenna 108 and electrical contacts 110 .
  • the secure communication can be continued as long as the smart card maintains its radio contact through the radio antenna 108 .
  • smart-card 102 is kept and used as a physical token or key by a user to enable secure communication with other users.
  • Smart-card 102 is inserted into smart-card reader 112 that connects to electrical contacts 110 .
  • Reader 112 then can read the signed statements (digital certificate 106 ).
  • radio transceiver 114 having antenna 116 may read digital certificate 106 over radio link 118 .
  • Secure digital communication platform 120 operates radio transceiver 114 and smart-card reader 112 as peripherals.
  • Secure digital communication platform 120 may comprise, for example, a conventional personal computer system with a network interface.
  • a time standard 122 is input to secure digital communication platform 120 and is used to generate short-term digital certificate 123 from information included in long-term digital certificate 106 .
  • short-term digital certificate 123 is a proxy (e.g. an authorized replica) of long-term digital certificate 106 that will automatically become ineffective after smart card 102 has left the immediate area of secure digital communication platform 120 and/or after an expiration time has run.
  • a principal advantage of the present invention is that a user will not leave a smart card in a reader.
  • the smart card is needed only to initiate a secure communication.
  • the continuation and maintenance of the secure communication is thereafter dependent on a “virtual smart card” that is constructed for temporary use in the computer platform, e.g., short-term digital certificate 123 . Therefore, typical expiration times attached to a short-term digital certificate will be on the order of a few minutes to a few hours.
  • An unauthorized user will no longer be able to take advantage of a smart-card mistakenly left in a card reader, and cannot come in later after a secure communication has ended to resume any use.
  • secure digital communication platform 120 has a network connection 124 to the Internet 126 .
  • Central certificate authority 128 is also connected to the Internet 126 and has a time-standard input 130 .
  • Central certificate authority 128 is the original issuer of long-term digital certificate 106 and keeps records as to its expiration date.
  • Central certificate authority 128 can also recognize short-term digital certificate 123 as being a legitimate proxy of long-term digital certificate 106 .
  • the built-in expiration time included in short-term digital certificate 123 will be used to validate and authenticate communications as belonging to the corresponding users.
  • Network connection 132 connects the Internet 126 to remote platform 134 .
  • a time-standard input 136 allows remote platform 134 to test the expiration time of short-term digital certificate 123 and/or the expiration date of long-term digital certificate 106 .
  • Remote platform 134 must verify the identity of a user at secure digital communication platform 120 . The user's identity is confirmed by reading and testing short-term digital certificate 123 and/or long-term digital certificate 106 , and then checking these certificates with those obtained from central certificate authority 128 .
  • Short-term digital certificate 123 is then usable as a key to encrypt and decrypt messages according to conventional methods.
  • Time-standard inputs 122 , 130 and 136 may be ordinary electronic clocks, but may also be government radio broadcasts of time, e.g., radio station WWV in the United States or microwave transmissions from orbiting GPS navigation satellites. It can also be beneficial to equip microcomputer 104 to be able to read government radio transmissions through radio antenna 108 , e.g., for ant-spoofing or self-destruction.
  • Embodiments of the present invention can be used in conjunction with any of several security-industry devices, protocols, and encryption methods, including, merely by way of example, FORTEZZA, SSL, or Client Auth.
  • Computer-user authentication system embodiments of the present invention comprise a physical token that can be carried by a user and introduced to a computing platform.
  • a long-term digital certificate is disposed in the physical token.
  • a short-term digital certificate is generated from the long-term digital certificate by the smart card whenever the physical token is proximate.
  • the physical token comprises a smart-card and is introduced to the secure computing platform by bringing it into electrical contact such that the long-term digital certificate can be read.
  • the long-term digital certificate is issued by a centralized certificate authentication authority and includes an expiration date.
  • the short-term digital certificate is substantially an authorized proxy of the long-term digital certificate and includes an expiration time that is dependent on a separation time at which the physical token leaves its proximity with the secure computing platform.
  • the physical token comprises a microcomputer that is introduced to the secure computing platform by establishing contact such that the long-term digital certificate can be read.
  • the physical token comprises a microcomputer and is introduced to the secure computing platform by bringing it first into actual electrical contact and then keeping it near enough to maintain contact such that a short-term proxy can be periodically read.
  • Such short-term digital certificate includes an expiration time that is dependent on a separation time in which the radio contact discontinues.
  • a centralized certificate authentication authority in network communication with the secure computing platform is the original issuer of the long-term digital certificates.
  • a time standard is preferably supplied to both the centralized certificate authentication authority and the secure computing platform, and provides for a test of the expiration time for the short-term digital certificate and the expiration date of the long-term digital certificate.

Abstract

The invention generates a temporary digital certificate with a useful life of only a few minutes to a few hours. An expiration time is attached to such temporary digital certificate by a secure computer platform that is presented with a user's smart-card. Expiration dates one or two years after the issuance of the smart-card are conventional. A digital certificate issued by a central authority is carried within the smart card and is used by the secure computer platform to generate temporary digital certificate. The temporary digital certificate functions as a proxy digital certificate that will allow the user to immediately pocket the smart card and thus avoid the possibility of forgetting it in a card reader.

Description

  • This application is a continuation of U.S. patent application Ser. No. 09/948,381, filed on Sep. 6, 2001, and entitled Digital Certificate Proxy, which is incorporated by reference herein in its entirety.
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The invention relates to so-called “smart cards” used in digital computer communication and networks, and more particularly, to digital certificate surrogates that do not require users to leave their smart cards in a reader for the duration of the secure communication.
  • 2. Description of the Prior Art
  • Personal computers (PCs) are no longer used exclusively at the office. Home and recreational PC use has increased dramatically. Internet access now allows users to connect to the World Wide Web, newsgroups, and e-mail. Home users and businesses are also finding online shopping, or e-commerce, appealing because of the convenience, simplicity, and robustness. This widespread availability and acceptance of computers has dramatically increased the number of people with the ability to compromise data.
  • As prices continue to drop, and people become more comfortable with technology, the reliance on computer-based resources will continue to increase. As this dependence develops, security exposures may lead to disastrous results with possible financial and legal ramifications. At a minimum, a security breach will result in lost time and decreased productivity while a “clean up” effort occurs. More than likely however, the results will be much worse. Financial losses as well as non-monetary effects could occur.
  • Businesses today demand accurate and secure handling of electronic information. The National Security Agency's FORTEZZA program addresses this demand by providing the technology to enable value-added security services for unclassified but sensitive information. FORTEZZA technology provides data integrity, originator authentication, non-repudiation (undeniable proof of one's identity), and confidentiality (data privacy). FORTEZZA personalizes security through an individualized cryptographic device, a PC Card called the FORTEZZA Crypto Card.
  • The Crypto Card includes the user's unique cryptographic key material and related information, and executes the cryptologic algorithms. A sophisticated infrastructure has been designed to generate, distribute, and control the cryptographic keys, control the integrity of the data on the Card, and disseminate required cryptographic and system information. FORTEZZA interfaces and specifications are designed with an “open system” philosophy. This permits seamless integration of the FORTEZZA technology into most data communication hardware platforms, operating systems, software application packages, and computer network configurations and protocols.
  • The increasing availability and use of electronic data presents new problems for individuals and businesses. The parties involved in the exchange of information can no longer use a person's voice, handwriting, or face to recognize the other party. However, the recipient must still have confidence in the integrity of the information and the identity of its originator. Developers of electronic messaging and data handling products must provide security services so parties can have confidence in the information.
  • Accurate and secure data must have four security attributes: data integrity, user authentication, user non-repudiation, and data confidentiality. Data integrity means the data has been processed by both the originator and the recipient, e.g., through a “hash” function. In a typical “hash” function, the data in the message is read through a mathematical algorithm which uses every bit in the message to form a uniformly sized string of bits unique to that message. Any change in the message, even a single bit, will cause the recipient's hash value to differ from the sender's hash value. Hash value integrity requires a method to secure the value and verify the originator of the hash function. This requires the message to have the user authentication attribute. User Authentication assures the recipient of the originator's identity by cryptographically processing the data with an algorithm which incorporates parameters unique to the originator. The mechanism to perform this check must assure that the data could only be sent from the declared author. The algorithm must produce a result that is easy to verify yet difficult to forge. Authenticating the originator of a message can be performed by the hash and digital signature functions. Non-repudiation is a condition whereby the author of the data cannot repudiate the validity of the result used to authenticate the identity of that user. The technique used to identify the author must be strong enough so the authenticity of the message originator can be proven to a third party. Non-repudiation can be realized by using digital signatures, for example.
  • Confidentiality provides data privacy by encrypting and decrypting data, whereby only the intended recipient can read a message. Encrypted data renders the sensitive data, non-sensitive. Thus, encrypted data needs less physical data protection. To provide confidentiality, a technique must be established to provide a unique “key” for encryption of the data and the capability to transmit the key and other necessary information to the recipient to decrypt the data. The key provides a variable for each encryption session. This means that multiple encryption of the same plaintext will result in different cipher (encrypted) text. Some algorithms also require an Initialization Vector (IV), for added variability.
  • The National Security Agency (NSA) developed the FORTEZZA program for the Department of Defense (DoD) in response to the growing need for economical and secure electronic messaging. The DoD is incorporating the FORTEZZA technology into its Defense Message System (DMS) to secure its unclassified but sensitive information. The FORTEZZA technology satisfies the DMS security architecture with a user friendly, inexpensive, cryptographic mechanism that provides writer to reader message confidentiality, integrity, authentication, non-repudiation, and access control to messages, components, and systems. While the DMS exposed the DoD to the need for the FORTEZZA technology, the same security requirements are valid today for civilian agencies, commercial businesses, and private citizens.
  • Microsoft announced at the Cartes '98 conference in Paris a standards-based platform that provides secure storage for security, loyalty and ePurse solutions in the Microsoft WINDOWS operating system. Smart Cards for Windows makes Windows-based development and run-time environments available to the smart card industry. Microsoft was joined at the announcement at the Cartes '98 conference in Paris by Schlumberger Electronic Transactions and Gemplus Associates International, and by pilot customers Merrill Lynch Company Inc. and Cable & Wireless. This enables card issuers and designers to employ their existing expertise in Windows to develop and deploy a broader range of smart card usage and applications than with other smart card systems. Typical solutions enabled by smart cards are secure network authentication, secure corporate transactions, online banking, debit, credit, electronic cash and customer loyalty programs.
  • A common, and all too human, problem with smart cards is that they are left in card readers. The problem even extends to automated teller machines (ATMs), where bank customers forget to take their cards. Some ATMs now avoid this problem by allowing the bank customer to hold his ATM card throughout the transaction, requiring only that the card be “swiped” through a card reader.
  • SUMMARY OF THE INVENTION
  • According to the present invention, a temporary digital certificate is generated having a useful life of a relatively short period of time, for example, a few minutes to a few hours. An expiration time is attached to the temporary digital certificate by a secure computer platform that is presented with a user's long-term digital certificate, which may be contained in a smart card, for example. The long-term digital certificate issued by a central authority is carried within the smart card. A short-term proxy is generated from the long-term digital certificate in the smart card and copied into the secure computer platform. This temporary digital certificate functions as a surrogate for the long-term digital certificate and allows the user to immediately remove the smart card from a card reader and pocket the smart card, thus avoiding the possibility of forgetting the card in a card reader.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a computer-user authentication system according to the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 represents a computer-user authentication system according to the present invention, and is referred to herein by the general reference numeral 100. System 100 includes smart-card 102 with embedded microcomputer 104 that includes a digital certificate 106. An expiration date is associated with digital certificate 106 that will make possession of smart card 102 unavailing after the expiration date. In practice, the expiration date of the digital certificate 106 may be one year after the date of first issuance, so the digital certificate 106 is referred to herein as a long-term digital certificate.
  • Radio antenna 108 allows for wireless communication of digital certificate 106 by microcomputer 104. A set of electrical contacts 110 allows for wireline communication of digital certificate 106 by microcomputer 104. Alternate embodiments of the present invention may not use both radio antenna 108 and electrical contacts 110. As an example, It may be advantageous in particular applications to require the use of electrical contacts 110 as a first step so that accidental collocation of smart card 102 with a secure access computer is not possible. Once the intent-to-authorize a secure communication has been determined, the secure communication can be continued as long as the smart card maintains its radio contact through the radio antenna 108.
  • In operation, smart-card 102 is kept and used as a physical token or key by a user to enable secure communication with other users. Smart-card 102 is inserted into smart-card reader 112 that connects to electrical contacts 110. Reader 112 then can read the signed statements (digital certificate 106). Alternatively, radio transceiver 114 having antenna 116 may read digital certificate 106 over radio link 118. Secure digital communication platform 120 operates radio transceiver 114 and smart-card reader 112 as peripherals. Secure digital communication platform 120 may comprise, for example, a conventional personal computer system with a network interface.
  • A time standard 122 is input to secure digital communication platform 120 and is used to generate short-term digital certificate 123 from information included in long-term digital certificate 106. In essence, short-term digital certificate 123 is a proxy (e.g. an authorized replica) of long-term digital certificate 106 that will automatically become ineffective after smart card 102 has left the immediate area of secure digital communication platform 120 and/or after an expiration time has run.
  • A principal advantage of the present invention is that a user will not leave a smart card in a reader. The smart card is needed only to initiate a secure communication. The continuation and maintenance of the secure communication is thereafter dependent on a “virtual smart card” that is constructed for temporary use in the computer platform, e.g., short-term digital certificate 123. Therefore, typical expiration times attached to a short-term digital certificate will be on the order of a few minutes to a few hours. An unauthorized user will no longer be able to take advantage of a smart-card mistakenly left in a card reader, and cannot come in later after a secure communication has ended to resume any use.
  • In FIG. 1, secure digital communication platform 120 has a network connection 124 to the Internet 126. Central certificate authority 128 is also connected to the Internet 126 and has a time-standard input 130. Central certificate authority 128 is the original issuer of long-term digital certificate 106 and keeps records as to its expiration date. Central certificate authority 128 can also recognize short-term digital certificate 123 as being a legitimate proxy of long-term digital certificate 106. The built-in expiration time included in short-term digital certificate 123 will be used to validate and authenticate communications as belonging to the corresponding users.
  • Network connection 132 connects the Internet 126 to remote platform 134. A time-standard input 136 allows remote platform 134 to test the expiration time of short-term digital certificate 123 and/or the expiration date of long-term digital certificate 106. Remote platform 134 must verify the identity of a user at secure digital communication platform 120. The user's identity is confirmed by reading and testing short-term digital certificate 123 and/or long-term digital certificate 106, and then checking these certificates with those obtained from central certificate authority 128. Short-term digital certificate 123 is then usable as a key to encrypt and decrypt messages according to conventional methods.
  • Time- standard inputs 122, 130 and 136 may be ordinary electronic clocks, but may also be government radio broadcasts of time, e.g., radio station WWV in the United States or microwave transmissions from orbiting GPS navigation satellites. It can also be beneficial to equip microcomputer 104 to be able to read government radio transmissions through radio antenna 108, e.g., for ant-spoofing or self-destruction.
  • Embodiments of the present invention can be used in conjunction with any of several security-industry devices, protocols, and encryption methods, including, merely by way of example, FORTEZZA, SSL, or Client Auth.
  • Computer-user authentication system embodiments of the present invention comprise a physical token that can be carried by a user and introduced to a computing platform. A long-term digital certificate is disposed in the physical token. A short-term digital certificate is generated from the long-term digital certificate by the smart card whenever the physical token is proximate. In alternative embodiments, the physical token comprises a smart-card and is introduced to the secure computing platform by bringing it into electrical contact such that the long-term digital certificate can be read. In other alternative embodiments, the long-term digital certificate is issued by a centralized certificate authentication authority and includes an expiration date. The short-term digital certificate is substantially an authorized proxy of the long-term digital certificate and includes an expiration time that is dependent on a separation time at which the physical token leaves its proximity with the secure computing platform.
  • In alternative embodiments of the present invention, the physical token comprises a microcomputer that is introduced to the secure computing platform by establishing contact such that the long-term digital certificate can be read. The physical token comprises a microcomputer and is introduced to the secure computing platform by bringing it first into actual electrical contact and then keeping it near enough to maintain contact such that a short-term proxy can be periodically read. Such short-term digital certificate includes an expiration time that is dependent on a separation time in which the radio contact discontinues.
  • A centralized certificate authentication authority in network communication with the secure computing platform is the original issuer of the long-term digital certificates. A time standard is preferably supplied to both the centralized certificate authentication authority and the secure computing platform, and provides for a test of the expiration time for the short-term digital certificate and the expiration date of the long-term digital certificate.
  • Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the claims included below.

Claims (20)

1. A method comprising the steps of:
receiving a request to authenticate identity of a user at a communication platform;
receiving a digital certificate and a short-term proxy of said digital certificate from said platform, wherein said short-term proxy expires after a predetermined expiration time; and
comparing said digital certificate and said short-term proxy with a plurality of digital certificates issued by a central certificate authority to enable authentication of said user's identity.
2. The method according to claim 1, wherein said comparing step further comprises the steps of:
providing a time-standard input to enable testing of said expiration time of said short-term proxy.
3. The method according to claim 1, wherein said comparing step further comprises the steps of:
providing a time-standard input to enable testing of an expiration date of said digital certificate.
4. The method according to claim 1, wherein said short-term proxy is created upon physical action of said user at said communication platform to position a token containing said digital certificate proximate to said communication platform.
5. The method according to claim 1, further comprising the step of:
using said short-term proxy as a key to encrypt and decrypt messages at said communications platform.
6. The method according to claim 2, wherein said time-standard input comprises any of an electronic dock, a radio station time broadcast, and a microwave transmission from a navigation satellite.
7. A user authentication system comprising:
a communication platform coupled to a network for securing communications for a user; and
a remote platform coupled to said network, wherein said remote platform further receives a request to authenticate identity of said user at said communication platform, receives a digital certificate and a short-term proxy of said digital certificate from said communication platform, wherein said short-term proxy expires after a predetermined expiration time, and compares said digital certificate and said short-term proxy with a plurality of digital certificates issued by a central certificate authority to enable authentication of said user's identity.
8. The system according to claim 7, wherein said remote platform further receives a time-standard input to enable testing of said expiration time of said short-term proxy and an expiration date of said digital certificate.
9. The system according to claim 8, wherein said time-standard input comprises any of an electronic clock, a radio station time broadcast, and a microwave transmission from a navigation satellite.
10. The system according to claim 7, wherein said short-term proxy is created upon physical action of said user at said communication platform to position a token containing said digital certificate proximate to said communication platform.
11. A user authentication system comprising:
means for receiving a request to authenticate identity of a user at a communication platform;
means for receiving a digital certificate and a short-term proxy of said digital certificate from said platform, wherein said short-term proxy expires after a predetermined expiration time; and
means for comparing said digital certificate and said short-term proxy with a plurality of digital certificates issued by a central certificate authority to enable authentication of said user's identity.
12. The system according to claim 11, further comprising:
means for providing a time-standard input to enable testing of said expiration time of said short-term proxy and an expiration date of said digital certificate.
13. The system according to claim 11, wherein said short-term proxy is created upon physical action of said user at said communication platform to position a token containing said digital certificate proximate to said communication platform.
14. The system according to claim 11, further comprising:
means for using said short-term proxy as a key to encrypt and decrypt messages at said communications platform.
15. The system according to claim 12, wherein said time-standard input comprises any of an electronic dock, a radio station time broadcast, and a microwave transmission from a navigation satellite.
16. A computer readable medium containing executable instructions, which, when executed in a processing system, cause said processing system to perform a method comprising the steps of:
receiving a request to authenticate identity of a user at a communication platform;
receiving a digital certificate and a short-term proxy of said digital certificate from said platform, wherein said short-term proxy expires after a predetermined expiration time; and
comparing said digital certificate and said short-term proxy with a plurality of digital certificates issued by a central certificate authority to enable authentication of said user's identity.
17. The computer readable medium according to claim 16, wherein said method further comprises the step of:
providing a time-standard input to enable testing of said expiration time of said short-term proxy and an expiration date of said digital certificate.
18. The computer readable medium according to claim 16, wherein said short-term proxy is created upon physical action of said user at said communication platform to position a token containing said digital certificate proximate to said communication platform.
19. The computer readable medium according to claim 16, wherein said method further comprises:
using said short-term proxy as a key to encrypt and decrypt messages at said communications platform.
20. The computer readable medium according to claim 17, wherein said time-standard input comprises any of an electronic clock, a radio station time broadcast, and a microwave transmission from a navigation satellite.
US11/053,157 2001-09-06 2005-02-07 Digital certificate proxy Abandoned US20050138364A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/053,157 US20050138364A1 (en) 2001-09-06 2005-02-07 Digital certificate proxy

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/948,381 US6854057B2 (en) 2001-09-06 2001-09-06 Digital certificate proxy
US11/053,157 US20050138364A1 (en) 2001-09-06 2005-02-07 Digital certificate proxy

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/948,381 Continuation US6854057B2 (en) 2001-09-06 2001-09-06 Digital certificate proxy

Publications (1)

Publication Number Publication Date
US20050138364A1 true US20050138364A1 (en) 2005-06-23

Family

ID=25487764

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/948,381 Expired - Lifetime US6854057B2 (en) 2001-09-06 2001-09-06 Digital certificate proxy
US11/053,157 Abandoned US20050138364A1 (en) 2001-09-06 2005-02-07 Digital certificate proxy

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/948,381 Expired - Lifetime US6854057B2 (en) 2001-09-06 2001-09-06 Digital certificate proxy

Country Status (3)

Country Link
US (2) US6854057B2 (en)
AU (1) AU2002326634A1 (en)
WO (1) WO2003023686A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210772A1 (en) * 2002-11-20 2004-10-21 Jeff Hooker Method and apparatus for secure instant messaging utilizing server-supervised publication
US20050204164A1 (en) * 2004-01-09 2005-09-15 Hiroshi Kakii Method of transferring digital certificate,apparatus for transferring digital certificate, and system, program, and recording medium for transferring digital certificate
US20070130617A1 (en) * 2005-12-02 2007-06-07 Durfee Glenn E System and method for establishing temporary and permanent credentials for secure online commerce
US20090126001A1 (en) * 2007-11-08 2009-05-14 Microsoft Corporation Techniques to manage security certificates
US20100146601A1 (en) * 2008-12-09 2010-06-10 Motorola, Inc. Method for Exercising Digital Rights via a Proxy
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US20140059174A1 (en) * 2004-06-30 2014-02-27 Oracle International Corporation Method and System for Automatic Distribution and Installation of A Client Certificate in A Secure Manner
US9071597B2 (en) 2003-02-20 2015-06-30 Google Inc. Secure instant messaging system
US20180102905A1 (en) * 2014-12-15 2018-04-12 Amazon Technologies, Inc. Short-duration digital certificate issuance based on long-duration digital certificate validation

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003041338A1 (en) 2001-11-06 2003-05-15 International Business Machines Corporation Method and system for the supply of data, transactions and electronic voting
US20030097582A1 (en) * 2001-11-19 2003-05-22 Yves Audebert Method and system for reducing personal security device latency
JP4778210B2 (en) * 2003-09-12 2011-09-21 株式会社リコー COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
JP4671638B2 (en) * 2003-09-12 2011-04-20 株式会社リコー COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND PROGRAM
US8015399B2 (en) * 2003-09-30 2011-09-06 Ricoh Company, Ltd. Communication apparatus, communication system, certificate transmission method and program
BRPI0418234B1 (en) 2004-01-06 2018-04-24 Thomson Licensing Device, access card, digital information destination device, and methods for transferring information
EP1654828B1 (en) 2004-05-05 2018-09-05 BlackBerry Limited System and method for sending secure messages
JP2008545323A (en) * 2005-07-07 2008-12-11 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Method, apparatus and system for verifying authenticity of an object
US8689287B2 (en) * 2006-08-17 2014-04-01 Northrop Grumman Systems Corporation Federated credentialing system and method
FR2916592B1 (en) * 2007-05-25 2017-04-14 Groupe Des Ecoles De Telecommunications(Get)-Ecole Nat Superieure Des Telecommunications(Enst) INFORMATION EXCHANGE SECURING METHOD, DEVICE, AND CORRESPONDING COMPUTER PROGRAM PRODUCT
US9181080B2 (en) 2013-06-28 2015-11-10 Infineon Technologies Ag MEMS microphone with low pressure region between diaphragm and counter electrode
US10454899B1 (en) 2015-03-16 2019-10-22 Amazon Technologies, Inc. Controlling firewall ports in virtualized environments through public key cryptography

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6016476A (en) * 1997-08-11 2000-01-18 International Business Machines Corporation Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security
US6125349A (en) * 1997-10-01 2000-09-26 At&T Corp. Method and apparatus using digital credentials and other electronic certificates for electronic transactions
US6216231B1 (en) * 1996-04-30 2001-04-10 At & T Corp. Specifying security protocols and policy constraints in distributed systems
US6233341B1 (en) * 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US20010032310A1 (en) * 2000-01-14 2001-10-18 Francisco Corella Public key validation service
US20010056409A1 (en) * 2000-05-15 2001-12-27 Bellovin Steven Michael Offline one time credit card numbers for secure e-commerce
US6393563B1 (en) * 1997-11-11 2002-05-21 International Business Machines Corporation Temporary digital signature method and system
US20020073045A1 (en) * 2000-10-23 2002-06-13 Rubin Aviel D. Off-line generation of limited-use credit card numbers
US6510523B1 (en) * 1999-02-22 2003-01-21 Sun Microsystems Inc. Method and system for providing limited access privileges with an untrusted terminal
US7069439B1 (en) * 1999-03-05 2006-06-27 Hewlett-Packard Development Company, L.P. Computing apparatus and methods using secure authentication arrangements

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763459B1 (en) 2000-01-14 2004-07-13 Hewlett-Packard Company, L.P. Lightweight public key infrastructure employing disposable certificates

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6216231B1 (en) * 1996-04-30 2001-04-10 At & T Corp. Specifying security protocols and policy constraints in distributed systems
US6016476A (en) * 1997-08-11 2000-01-18 International Business Machines Corporation Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security
US6125349A (en) * 1997-10-01 2000-09-26 At&T Corp. Method and apparatus using digital credentials and other electronic certificates for electronic transactions
US6393563B1 (en) * 1997-11-11 2002-05-21 International Business Machines Corporation Temporary digital signature method and system
US6233341B1 (en) * 1998-05-19 2001-05-15 Visto Corporation System and method for installing and using a temporary certificate at a remote site
US6510523B1 (en) * 1999-02-22 2003-01-21 Sun Microsystems Inc. Method and system for providing limited access privileges with an untrusted terminal
US7069439B1 (en) * 1999-03-05 2006-06-27 Hewlett-Packard Development Company, L.P. Computing apparatus and methods using secure authentication arrangements
US20010032310A1 (en) * 2000-01-14 2001-10-18 Francisco Corella Public key validation service
US20010056409A1 (en) * 2000-05-15 2001-12-27 Bellovin Steven Michael Offline one time credit card numbers for secure e-commerce
US20020073045A1 (en) * 2000-10-23 2002-06-13 Rubin Aviel D. Off-line generation of limited-use credit card numbers

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7558955B2 (en) * 2002-11-20 2009-07-07 Aol Llc, A Delaware Limited Liability Company Method and apparatus for secure instant messaging utilizing server-supervised publication
US20040210772A1 (en) * 2002-11-20 2004-10-21 Jeff Hooker Method and apparatus for secure instant messaging utilizing server-supervised publication
US9985790B2 (en) 2003-02-20 2018-05-29 Google Llc Secure instant messaging system
US9509681B2 (en) 2003-02-20 2016-11-29 Google Inc. Secure instant messaging system
US9071597B2 (en) 2003-02-20 2015-06-30 Google Inc. Secure instant messaging system
US10313135B2 (en) 2003-02-20 2019-06-04 Google Llc Secure instant messaging system
US7584351B2 (en) * 2004-01-09 2009-09-01 Ricoh Company, Ltd. Method of transferring digital certificate,apparatus for transferring digital certificate, and system, program, and recording medium for transferring digital certificate
US20050204164A1 (en) * 2004-01-09 2005-09-15 Hiroshi Kakii Method of transferring digital certificate,apparatus for transferring digital certificate, and system, program, and recording medium for transferring digital certificate
US9077719B2 (en) * 2004-06-30 2015-07-07 Oracle International Corporation Method and system for automatic distribution and installation of a client certificate in a secure manner
US20140059174A1 (en) * 2004-06-30 2014-02-27 Oracle International Corporation Method and System for Automatic Distribution and Installation of A Client Certificate in A Secure Manner
US20070130617A1 (en) * 2005-12-02 2007-06-07 Durfee Glenn E System and method for establishing temporary and permanent credentials for secure online commerce
US7725928B2 (en) * 2005-12-02 2010-05-25 Palo Alto Research Center Incorporated System and method for establishing temporary and permanent credentials for secure online commerce
JP2007159134A (en) * 2005-12-02 2007-06-21 Palo Alto Research Center Inc System and method for setting temporary and permanent credential for safe, on-line commercial transaction
US20090126001A1 (en) * 2007-11-08 2009-05-14 Microsoft Corporation Techniques to manage security certificates
US20100146601A1 (en) * 2008-12-09 2010-06-10 Motorola, Inc. Method for Exercising Digital Rights via a Proxy
US9027141B2 (en) * 2012-04-12 2015-05-05 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US9953173B2 (en) * 2012-04-12 2018-04-24 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US20150235035A1 (en) * 2012-04-12 2015-08-20 Netflix, Inc Method and system for improving security and reliability in a networked application environment
US10691814B2 (en) 2012-04-12 2020-06-23 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US20180102905A1 (en) * 2014-12-15 2018-04-12 Amazon Technologies, Inc. Short-duration digital certificate issuance based on long-duration digital certificate validation
US11936797B1 (en) 2014-12-15 2024-03-19 Amazon Technologies, Inc. Short-duration digital certificate issuance based on long-duration digital certificate validation
JP2019165492A (en) * 2014-12-15 2019-09-26 アマゾン・テクノロジーズ、インコーポレイテッド Short-duration digital certificate issuance based on long-duration digital certificate validation
JP7131756B2 (en) 2014-12-15 2022-09-06 アマゾン・テクノロジーズ、インコーポレイテッド Issuance of short-term digital certificates based on verification of long-term digital certificates
US11575522B2 (en) * 2014-12-15 2023-02-07 Amazon Technologies, Inc. Short-duration digital certificate issuance based on long-duration digital certificate validation

Also Published As

Publication number Publication date
WO2003023686A2 (en) 2003-03-20
US6854057B2 (en) 2005-02-08
WO2003023686A3 (en) 2003-04-24
US20030046544A1 (en) 2003-03-06
AU2002326634A1 (en) 2003-03-24

Similar Documents

Publication Publication Date Title
US20050138364A1 (en) Digital certificate proxy
CN112805967B (en) System and method for password authentication of contactless card
RU2645593C2 (en) Verification of portable consumer devices
US9904919B2 (en) Verification of portable consumer devices
AU2008203506B2 (en) Trusted authentication digital signature (TADS) system
US7552333B2 (en) Trusted authentication digital signature (tads) system
US7380125B2 (en) Smart card data transaction system and methods for providing high levels of storage and transmission security
US7287692B1 (en) System and method for securing transactions in a contact center environment
US20160063491A1 (en) Secure online transactions using a trusted digital identity
CN113168635A (en) System and method for password authentication of contactless cards
EP2380308B1 (en) Secure remote authentication through an untrusted network
US20130219481A1 (en) Cyberspace Trusted Identity (CTI) Module
US20080216172A1 (en) Systems, methods, and apparatus for secure transactions in trusted systems
TW200402224A (en) Biometric private key infrastructure
CN112789643A (en) System and method for password authentication of contactless cards
CN112655010A (en) System and method for password authentication of contactless cards
CN111949335A (en) Method and apparatus for sharing financial data
M'Raı̈hi et al. E-commerce applications of smart cards
KR100349888B1 (en) PKI system for and method of using micro explorer on mobile terminals
CN116195231A (en) Token fault protection system and method
Yeh et al. Greater Privacy Protection for Online Credit Card Payment
KR20010103061A (en) E-mail banking business method using electronic signature and encryption of pki

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION