System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
First Claim
1. A manufactured passport signal structured for operable use by a machine system that maintains confidential digital information in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a user-associated password and a user-associated passport said manufactured passport signal defining for each of an associated one or more authorized users, a passport data structure comprising:
- (a) a first field containing a first secured-by-encryption key, where said first secured key is covered by a first covering signal derived from a valid password of the passport-associated user;
(b) a second field containing a second secured-by-encryption key, where said second secured key is covered by a plaintext version of the first secured key; and
(c) a third field that is blank or is filled with irrelevant information, (c.1) where said third field can be overwritten to contain a third secured-by-encryption key that is different from the first secured key in situations where the corresponding passport data structure is physically-secured within said machine system; and
(d) where said machine system requires local presence of a physically-secured, in-system version of the corresponding passport data structure and a verified local uncovering from said in-system version of the corresponding passport data structure of the secured keys in the second and third fields of the in-system version before the machine system locally grants to a requesting user, intelligible access to corresponding confidential information.
1 Assignment
0 Petitions
Accused Products
Abstract
A system is disclosed for controlling intelligible access to secured files by means of a user-memorized password in combination with a user-associated passport record. The passport record takes on two forms, one when it is physically secured within the workstation and a different second form when the passport record is in-transit. Log-in privileges are granted after a presented passport record passes a number of tests including digital signature authentication, and the ability to extract two different encrypted keys from the passport record. The in-transit record does not carry one of those two keys.
86 Citations
13 Claims
-
1. A manufactured passport signal structured for operable use by a machine system that maintains confidential digital information in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a user-associated password and a user-associated passport said manufactured passport signal defining for each of an associated one or more authorized users, a passport data structure comprising:
-
(a) a first field containing a first secured-by-encryption key, where said first secured key is covered by a first covering signal derived from a valid password of the passport-associated user;
(b) a second field containing a second secured-by-encryption key, where said second secured key is covered by a plaintext version of the first secured key; and
(c) a third field that is blank or is filled with irrelevant information, (c.1) where said third field can be overwritten to contain a third secured-by-encryption key that is different from the first secured key in situations where the corresponding passport data structure is physically-secured within said machine system; and
(d) where said machine system requires local presence of a physically-secured, in-system version of the corresponding passport data structure and a verified local uncovering from said in-system version of the corresponding passport data structure of the secured keys in the second and third fields of the in-system version before the machine system locally grants to a requesting user, intelligible access to corresponding confidential information. - View Dependent Claims (2, 3)
(e) a fourth field storing a digital signature that covers data contained in at least the first, second and third fields.
-
-
3. A manufactured passport signal according to claim 2 and further characterized as being transmitted over an unsecured communications network.
-
4. A manufactured instruction signal structured for instructing a prespecified, instructable machine to carry out a method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the access request includes submission of a password and submission of an identification of a requesting user, said instruction-defined method comprising:
-
(a) finding a machine-readable passport associated with the submitted identification, wherein said passport includes;
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key; and
(a.4) a fourth field containing a third secured key that is different from the first secured key; and
(a.5) a fifth field containing a fourth secured key, where a plaintext version of the fourth secured key covers the third secured key of the fourth field;
(b) using the submitted password to attempt decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key;
(c) using the putative first uncovering to attempt decryption of the second secured key, said attempt producing a putative second uncovering of the second secured key; and
(d) attempting to generate a plaintext version of the third secured key by using the fourth field in combination with at least the second field. - View Dependent Claims (5, 6, 7, 8, 9)
(a.6) a sixth field storing an origination flag that indicates whether the plaintext version of the first secured key originated locally or was imported; and
wherein said instruction-defined method performs the steps of;
(d.1) in response to the origination flag indicating that first secured key originated locally, using the putative first uncovering to attempt decryption of the third secured key; and
(d.2) in response to the origination flag indicating that first secured key did not originate locally, using the putative first uncovering in combination with an attempted uncovering of the second secured key and an attempted uncovering of the fourth secured key to attempt decryption of the third secured key.
-
-
7. The manufactured instruction signal of claim 4 and further wherein said instruction-defined method does not require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for providing said intelligible access to the algorithmically-secured data if the machine readable passport is found to be physically secured within a local workstation of the requesting user and pre-authenticated within said local workstation.
-
8. The manufactured instruction signal of claim 7 and further wherein said instruction-defined method does require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for providing said intelligible access to the algorithmically-secured data if the machine-readable passport is to be formed by importing an in-transit version of the passport into a physically secured area within the local workstation of the requesting user, where the corresponding fourth field and fifth field of the in-transit version are each blank or filled with irrelevant information, and the system administrator or other, like-privileged user has to release a plaintext version of the third secured key for use in filling in the fourth field of the machine-readable passport during its formation.
-
9. The manufactured instruction signal of claim 4 and further wherein said instruction-defined method does not require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for changing the valid password of the requesting user if the machine-readable passport is found to be physically secured within a local workstation of the requesting user and pre-authenticated within said local workstation.
-
10. A manufactured signal structured for loading into a prespecified, programmable machine and thereby causing the machine to carry out a method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the machine has a physically secured storage wherein the access request includes submission of a user identification and submission of a putative password of a user identified by said user identification, where said access providing method comprises:
-
(a) obtaining from said physically secured storage, a machine-readable passport that is associated with the submitted identification, wherein said passport includes;
(a.1) a first field containing data of a first algorithmically-secured key which data is derived from a valid password of a passport-associated user and from a plaintext version of the first secured key;
(a.2) a second field containing data of a second algorithmically-secured key that is covered by said plaintext version of the first secured key; and
(a.3) a third field containing data of a third algorithmically-secured key that is different from the first algorithmically-secured key; and
(a.4) a fourth field containing data of a fourth algorithmically-secured key (a.3a) where the third secured key of the third field is covered by a plaintext version of the fourth secured key;
(b) using the submitted, putative password to attempt a decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key from the data of said first field;
(c) using the putative first uncovering to attempt a further decryption of the second secured key, said further attempt producing a putative second uncovering of the second secured key from the data of said second field; and
(d) attempting to generate a plaintext version of the third secured key by trying to decrypt the data of said fourth field while using at least the putative first uncovering for forming a decryption key for decrypting the data of said fourth field. - View Dependent Claims (11, 12)
said passport includes: (a.5) a fifth field containing an algorithmically-secured data string that is produced by using the first algorithmically-secured key to cover a plaintext version of said algorithmically-secured data string; and
said access-providing method includes the steps of;
(e) attempting to generate the plaintext version of the algorithmically-secured data string by trying to decrypt the data of said fifth field while using the putative first uncovering as a decryption key; and
(f) checking the generated plaintext version of the data string for correctness, and if the check fails, denying entry into the machine based on said obtained passport and the supplied user identification, and the submitted putative password.
-
-
13. A manufactured instruction signal adapted for instructing a prespecified, instructable machine to carry out a machine-implemented method for protecting algorithmically-secured data from being intelligibly accessed by other than authorized users, where an access request includes submission of a putative password of an authorized user, and submission of a putative identification of the same authorized user to a request-servicing station that has physically secured, storage and processing facilities, where said instructed method comprises:
-
(a) requiring presentation within said physically secured, storage facilities of the request-servicing station, of an authenticated passport record associated with a user identified by the putative identification, where the presented passport record includes;
(a.1) a first field containing data of a first algorithmically-secured key where said first secured key is derived from a valid password of the passport-associated user and from a first counterpart-plaintext key that is temporarily originated in either the physically secured facilities of the request servicing station or in physically secured facilities of a like, external station;
(a.2) a second field containing data of a second algorithmically-secured key, where said second secured key is derived from a second counterpart and private key of the passport-associated user and from said first counterpart plaintext key;
(a.3) a third field containing data of a third algorithmically-secured key where said third secured key is derived from a public key of the passport-associated user and from a third counterpart-plaintext key that is temporarily created in the physically secured facilities of the request-servicing station, where the third counterpart-plaintext key may be the same as the first counterpart-plaintext key if both of the first and third counterpart-plaintext keys originate in the physically secured facilities of the request-servicing station;
(a.4) a fourth field containing data of a fourth algorithmically-secured key, where said fourth secured key is derived from a fourth counterpart and private key of the request-servicing station and from said third counterpart-plaintext key;
(b) requiring use of the data of said fourth field and use of the data of at least of said first field for reproducing in the physically secured facilities of the request-servicing station, said fourth counterpart and private key of the request servicing station; and
(c) requiring use of the data of said second field and use of the data of said first field for reproducing in the physically secured facilities of the request servicing station, said second counterpart and private key of the passport-associated user.
-
Specification