Method and system for securing a computer network and personal identification device used therein for controlling access to network components
First Claim
1. A personal digital identifier device for controlling access to a computer network, said network comprising a plurality of workstations each having a base unit associated therewith, said base unit being configured for wireless communications with said personal digital identifier device, and said network further comprising a central server utilizing a security manager component and network storage, said security manager component associated with a private key and a corresponding public key and said network storage containing a public key corresponding to a private key held by said personal digital identifier device, said personal digital identifier device being lightweight, configured for wearing and/or carrying by a user registered thereto and comprising:
- (a) a wireless communications component comprising a transceiver for communicating with said base unit;
(b) a biometric acquisition component for obtaining a user'"'"'s input biometric and producing a digital representation thereof;
(c) a processor configured for communicating with said transceiver and said biometric component and operable for;
(i) evaluating whether a template derived from said digital representation corresponds to a master template derived from a user'"'"'s biometric digital representation previously produced by said biometric component and generating a matching signal when such a correspondence is determined;
(ii) generating said private key held by said personal digital identifier device and said public key corresponding thereto and outputting said generated public key for transmission by said transceiver;
(iii) producing a digital signature using said private key; and
, (iv) verifying, using said public key for said private key associated with said security manager component, that the source of an encrypted message ostensibly received from said security manager is said security manager component;
(d) secure storage containing said master template of a user'"'"'s biometric, said generated private key and said public key for said private key associated with said security manager component;
(e) a power source; and
, (f) a housing, said personal digital identifier device being configured for producing, using said generated private key, a digitally signed challenge response message following said generating of said matching signal in response to a challenge message received from said security manager component and for transmitting said response message, and said personal digital identifier device being configured to prevent transmission of any of said master template of a user'"'"'s biometric and said private key.
2 Assignments
0 Petitions
Accused Products
Abstract
An improved computer network security system and method, and a personal identifier device used for controlling network access, to provide real time authentication of both a person'"'"'s identity and presence at a computer workstation. A new user is registered to a portable personal digital identifier device and, within the portable personal digital identifier device, an input biometric of the user is received and a master template is derived therefrom and securely maintained in storage. A private key is also generated and securely maintained in the storage and a public key corresponding to the private key is generated and provided for external storage (in the network). A public key corresponding to a private key associated with a network security manager component is also stored in the device storage. When the personal digital identifier device is within an envelope area proximate the workstation a first signal is transmitted from a base unit associated with the workstation to the personal digital identifier device and the personal digital identifier device automatically transmits a response signal establishing communications between the base unit and the personal digital identifier device. The personal digital identifier device verifies the origin of a digitally signed challenge message from the network security manager component. A digitally and biometrically signed challenge response message is produced and transmitted by the personal digital identifier device in response to the verified challenge message. An image of the user may be displayed on the workstation screen when the user'"'"'s personal digital identifier device is located within the envelope.
-
Citations
22 Claims
-
1. A personal digital identifier device for controlling access to a computer network, said network comprising a plurality of workstations each having a base unit associated therewith, said base unit being configured for wireless communications with said personal digital identifier device, and said network further comprising a central server utilizing a security manager component and network storage, said security manager component associated with a private key and a corresponding public key and said network storage containing a public key corresponding to a private key held by said personal digital identifier device, said personal digital identifier device being lightweight, configured for wearing and/or carrying by a user registered thereto and comprising:
-
(a) a wireless communications component comprising a transceiver for communicating with said base unit;
(b) a biometric acquisition component for obtaining a user'"'"'s input biometric and producing a digital representation thereof;
(c) a processor configured for communicating with said transceiver and said biometric component and operable for;
(i) evaluating whether a template derived from said digital representation corresponds to a master template derived from a user'"'"'s biometric digital representation previously produced by said biometric component and generating a matching signal when such a correspondence is determined;
(ii) generating said private key held by said personal digital identifier device and said public key corresponding thereto and outputting said generated public key for transmission by said transceiver;
(iii) producing a digital signature using said private key; and
,(iv) verifying, using said public key for said private key associated with said security manager component, that the source of an encrypted message ostensibly received from said security manager is said security manager component;
(d) secure storage containing said master template of a user'"'"'s biometric, said generated private key and said public key for said private key associated with said security manager component;
(e) a power source; and
,(f) a housing, said personal digital identifier device being configured for producing, using said generated private key, a digitally signed challenge response message following said generating of said matching signal in response to a challenge message received from said security manager component and for transmitting said response message, and said personal digital identifier device being configured to prevent transmission of any of said master template of a user'"'"'s biometric and said private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A security system for controlling access to a computer network at a network access point comprising a workstation, said system comprising:
-
A. a personal digital identifier device comprising;
(a) a wireless communications component comprising a transceiver;
(b) a biometric acquisition component for obtaining a user'"'"'s input biometric and producing a digital representation thereof;
(c) a processor configured for communicating with said transceiver and said biometric component and operable for;
(i) evaluating whether a template derived from said digital representation corresponds to a master template derived from a user'"'"'s biometric digital representation previously produced by said biometric component and generating a matching signal when such a correspondence is determined;
(ii) generating a private key to be held by said personal digital identifier device and a public key corresponding thereto and outputting said generated public key for transmission by said transceiver;
(iii) producing a digital signature using said private key; and
,(iv) verifying that an encrypted received message is from a security manager component using a public key for a private key associated with said security manager component; and
,(d) secure storage containing said master template of a user'"'"'s biometric, said generated private key and said public key for said private key associated with said security manager component, said personal digital identifier device being configured for producing, using said generated private key, a digitally signed challenge response message following said generating of said matching signal in response to a challenge received from said security manager component and for transmitting said response message, and said personal digital identifier device being configured to prevent transmission of any of said master template of a user'"'"'s biometric and said private key;
B. a base unit associated with said workstation and configured for initiating and maintaining wireless communications with said personal digital identifier device, said communications extending over an area defined by an envelope associated with said workstation; and
,C. a central server having access to network storage and utilizing said security manager component and said personal digital identifier device for authenticating said user, said network storage containing a public key corresponding to said private key generated by said personal digital identifier device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21, 22)
-
-
17. A method for controlling access to a computer network in which workstations provide points of access to said network, said network including a central server communicating with said workstations and secure network storage, and a base unit configured for initiating and maintaining wireless communications with a portable personal digital identifier device carried or held by a user being associated with each said workstation, said wireless communications extending over an area defined by an envelope associated with said workstation, said method comprising the steps:
-
(a) on registration of a portable personal digital identifier device to a user, within said portable personal digital identifier device;
receiving an input biometric of said user, producing a digital representation thereof, deriving from said digital representation a master template, securely maintaining said master template in storage, generating and securely maintaining in said storage a private key, generating a public key corresponding to said generated private key and providing said generated public key for storage in said network storage and receiving and storing in said storage a public key for a private key associated with a network security manager component;
(b) transmitting a first signal from a base unit associated with one said workstation to said personal digital identifier device and automatically transmitting from said personal digital identifier device a response signal establishing communications between said base unit and said personal digital identifier device in response to said first signal when said personal digital identifier device is within said envelope;
(c) receiving at said personal digital identifier device a digitally signed challenge message ostensibly from said network security manager component and verifying within said personal digital identifier device the origin of said challenge using said public key for said private key associated with said security manager component;
(d) acquiring on said portable personal digital identifier device an input biometric of said user, producing a digital representation thereof and deriving from said digital representation a biometric template;
(e) evaluating within said portable personal digital identifier device whether said biometric template corresponds to said master template and generating a matching signal when such a correspondence is determined;
(f) producing within said personal digital identifier device, using said generated private key, a digitally signed challenge response message following said generating of said matching signal in response to said challenge message and transmitting said response message to said security manager component to authenticate said user; and
,(g) permitting said authenticated user to access said computer network through said workstation.
-
Specification