Method and system for camouflaging access-controlled data
First Claim
1. A method for operating an access control system to camouflage a secret so as to be accessible by an authorized user yet protected against unauthorized access, said method comprising the steps of:
- (a) representing in digital form a secret to be protected against unauthorized access;
(b) storing a plurality of computer-represented objects related to said secret;
(i) at least one of said objects being accessible by an authorized user as a password;
(ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and
(c) representing said secret as a function of said plurality of objects, using a composition function; and
(d) storing, in a computer-readable memory, said composition function;
(i) in a manner accessible to said access control system;
(ii) so as to be executable to generate a candidate secret using a user-inputted candidate password in conjunction with at least said another object stored in said wallet;
(iii) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; and
(iv) wherein said candidate secret comprises said secret if said candidate password is said password;
thereby protecting said secret against unauthorized access by camouflaging the secret from persons not having said password.
10 Assignments
0 Petitions
Accused Products
Abstract
A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user'"'"'s knowledge that he has been exposed.
38 Citations
66 Claims
-
1. A method for operating an access control system to camouflage a secret so as to be accessible by an authorized user yet protected against unauthorized access, said method comprising the steps of:
-
(a) representing in digital form a secret to be protected against unauthorized access; (b) storing a plurality of computer-represented objects related to said secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (c) representing said secret as a function of said plurality of objects, using a composition function; and (d) storing, in a computer-readable memory, said composition function; (i) in a manner accessible to said access control system; (ii) so as to be executable to generate a candidate secret using a user-inputted candidate password in conjunction with at least said another object stored in said wallet; (iii) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; and (iv) wherein said candidate secret comprises said secret if said candidate password is said password; thereby protecting said secret against unauthorized access by camouflaging the secret from persons not having said password. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for operating an access control system to release a secret camouflaged to be accessible to an authorized user yet protected against unauthorized access, said method comprising the steps of:
-
(a) accessing a plurality of computer-represented objects related to a secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (b) accessing a composition function representing said secret as a function of said plurality of objects; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said another object stored in said wallet; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method for operating an access control system to protect state information against unauthorized access, said method comprising the steps of:
-
(a) obtaining state information represented in digital form; (b) deriving from said state information a first matrix; (c) storing said first matrix as a password usable by an authorized user; (d) deriving from said state information a second matrix; (e) storing said second matrix in a computer-readable wallet accessible to said access control system; and (f) storing, in a computer-readable memory, a composition function executable to generate a candidate matrix using a user-inputted candidate password in conjunction with said second matrix; (i) wherein said candidate matrix comprises a pseudo-valid matrix configured to camouflage said matrix if said candidate password is not said password; and (ii) wherein said candidate matrix comprises said matrix if said candidate password is said password; thereby protecting said state information against unauthorized access by camouflaging said matrix from persons not having said password. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for operating an access control system to protect state information against unauthorized access, said method comprising the steps of:
-
(a) retrieving a first matrix related to said state information from a computer-readable wallet accessible to said access control system; (b) accessing a composition function representing said state information as a function of said first matrix and a password stored as a second matrix; (c) receiving a candidate password inputted by a user; (d) generating candidate state information for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first matrix stored in said wallet; (i) wherein said candidate state information comprises pseudo-valid state information to camouflage said state information if said candidate password is not said password; (ii) wherein said candidate state information comprises said state information if said candidate password is said password; and (e) outputting said candidate state information or bogus candidate state information to said user of said access control system. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer-readable medium containing logic instructions for operating an access control system to camouflage a secret so as to be accessible by an authorized user yet protected against unauthorized access, said logic instructions when executed:
-
(a) representing in digital form a secret to be protected against unauthorized access; (b) storing a plurality of computer-represented objects related to said secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (c) representing said secret as a function of said plurality of objects, using a composition function; and (d) storing, in a computer-readable memory, said composition function; (i) in a manner accessible to said access control system; (ii) so as to be executable to generate a candidate secret using a user-inputted candidate password in conjunction with at least said another object stored in said wallet; (iii) wherein said candidate secret comprises a pseudo-valid secret to camouflage said secret if said candidate password is not said password; and (iv) wherein said candidate secret comprises said secret if said candidate password is said password; thereby protecting said secret against unauthorized access by persons not having said password. - View Dependent Claims (40, 41)
-
-
42. A computer-readable medium containing logic instructions for operating an access control system to release a secret camouflaged to be accessible to an authorized user yet protected against unauthorized access, said logic instructions when executed:
-
(a) accessing a plurality of computer-represented objects related to a secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (b) accessing a composition function representing said secret as a function of said plurality of objects; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said another object stored in said wallet; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system. - View Dependent Claims (43, 44)
-
-
45. A computer-readable medium containing logic instructions for operating an access control system to protect state information against unauthorized access, said logic instructions when executed:
-
(a) obtaining state information represented in digital form; (b) deriving from said state information a first matrix; (c) storing said first matrix as a password usable by an authorized user; (d) deriving from said state information a second matrix; (e) storing said second matrix in a computer-readable wallet accessible to said access control system; and (f) storing, in a computer-readable memory, a composition function executable to generate a candidate matrix using a user-inputted candidate password in conjunction with said second matrix; (i) wherein said candidate matrix comprises a pseudo-valid matrix configured to camouflage the matrix if said candidate password is not said password; and (ii) wherein said candidate matrix comprises said state information if said candidate password is said password; thereby protecting said state information against unauthorized access by persons not having said password. - View Dependent Claims (46, 47)
-
-
48. A computer-readable medium containing logic instructions for operating an access control system to protect state information against unauthorized access, said logic instructions when executed:
-
(a) retrieving a first matrix related to said state information from a computer-readable wallet accessible to said access control system; (b) accessing a composition function representing said state information as a function of said first matrix and a password stored as a second matrix; (c) receiving a candidate password inputted by a user; (d) generating candidate state information for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first matrix stored in said wallet; (i) wherein said candidate state information comprises pseudo-valid state information configured to camouflage said state information if said candidate password is not said password; (ii) wherein said candidate state information comprises said state information if said candidate password is said password; and (e) outputting said candidate state information to said user of said access control system. - View Dependent Claims (49, 50)
-
-
51. An access control server configured to camouflage a secret so as to be accessible by an authorized user yet protected against unauthorized access, comprising:
-
(a) a computer processor; (b) an interface configured to receive in digital form a secret to be protected against unauthorized access; (c) a memory configured to store a plurality of computer-represented objects related to said secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (d) a memory configured to store a composition function representing said secret as a function of said plurality of objects; (i) in a manner accessible to said access control system; (ii) so as to be executable by said processor to generate a candidate secret using a user-inputted candidate password in conjunction with at least said another object stored in said wallet; (iii) wherein said candidate comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; and (iv) wherein said candidate secret comprises said secret if said candidate password is said password; thereby protecting said secret against unauthorized access by persons not having said password.
-
-
52. An access control server to release a secret camouflaged to be accessible to an authorized user yet protected against unauthorized access, comprising:
-
(a) a memory configured to store a plurality of computer-represented objects related to a secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control server; and (b) a memory configured to store a composition function representing said secret as a function of said plurality of objects; (c) an interface configured to receive a candidate password inputted by a user; (d) a computer processor configured to execute said composition function to generate a candidate secret for said user by using as operands thereto said candidate password in conjunction with at least said another object stored in said wallet; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) an interface configured to output said candidate secret to said user of said access control server.
-
-
53. An access control server to protect state information against unauthorized access, comprising:
-
(a) a computer processor; (b) an interface configured to obtain state information represented in digital form; (c) a decomposition module configured to decompose said state information into at least a first matrix and a second matrix; (d) a memory configured to store said first matrix as a password usable by an authorized user; (e) a memory configured to store said second matrix in a computer-readable wallet accessible to said access control server; and (f) a memory configured to store a composition function executable by said processor to generate a candidate matrix using a user-inputted candidate password in conjunction with said second matrix; (i) wherein said candidate state information comprises pseudo-valid state information to camouflage said state information if said candidate password is not said password; and (ii) wherein said candidate state information comprises said state information if said candidate password is said password; thereby camouflaging said state information to protect said state information against unauthorized access by persons not having said password.
-
-
54. An access control server to protect state information against unauthorized access, comprising:
-
(a) a computer-readable wallet configured to store a first matrix related to said state information accessible to said access control server; (b) a memory configured to store a composition function representing said state information as a function of said first matrix and a password stored as a second matrix; (c) an interface configured to receive a candidate password inputted by a user; (d) a computer processor configured to execute said composition function to generate candidate state information for said user by using as operands to said composition function said candidate password in conjunction with at least said first matrix stored in said wallet; (i) wherein said candidate state information comprises pseudo-valid state information to camouflage said state information if said candidate password is not said password; (ii) wherein said candidate state information comprises said state information if said candidate password is said password; and (e) an interface configured to output said candidate state information to said user of said access control server.
-
-
55. An access control system to camouflage a secret so as to be accessible by an authorized user yet protected against unauthorized access, comprising:
-
(a) means for representing in digital form a secret to be protected against unauthorized access; (b) means for storing a plurality of computer-represented objects related to said secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (c) means for representing said secret as a function of said plurality of objects, using a composition function; and (d) means for storing, in a computer-readable memory, said composition function; (i) in a manner accessible to said access control system; (ii) so as to be executable to generate a candidate secret using a user-inputted candidate password in conjunction with at least said another object stored in said wallet; (iii) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; and (iv) wherein said candidate secret comprises said secret if said candidate password is said password; thereby camouflaging said secret to protect said secret against unauthorized access by persons not having said password.
-
-
56. An access control system releasing a secret camouflaged to be accessible to an authorized user yet protecting against unauthorized access, said method comprising the steps of:
-
(a) means for accessing a plurality of computer-represented objects related to a secret; (i) at least one of said objects being accessible by an authorized user as a password; (ii) at least another of said objects being stored in a computer-readable wallet accessible to said access control system; and (b) means for accessing a composition function representing said secret as a function of said objects; (c) means for receiving a candidate password inputted by a user; (d) means for generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said another object stored in said wallet; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) means for outputting said candidate secret to said user of said access control system.
-
-
57. An access control system to protect state information against unauthorized access, comprising:
-
(a) means for obtaining state information represented in digital form; (b) means for deriving from said state information a first matrix; (c) means for storing said first matrix as a password usable by an authorized user; (d) means for deriving from said state information a second matrix; (e) means for storing said second matrix in a computer-readable wallet accessible to said access control system; and (f) means for storing, in a computer-readable memory, a composition function executable to generate a candidate matrix using a user-inputted candidate password in conjunction with said second matrix; (i) wherein said candidate state information comprises pseudo-valid state information configured to camouflage said state information if said candidate password is not said password; and (ii) wherein said candidate secret comprises said state information if said candidate password is said password; thereby camouflaging said state information to protect said state information against unauthorized access by persons not having said password.
-
-
58. An access control system to protect state information against unauthorized access, comprising:
-
(a) means for retrieving a first matrix related to said state information from a computer-readable wallet accessible to said access control system; (b) means for accessing a composition function representing said state information as a function of said first matrix and a password stored as a second matrix; (c) means for receiving a candidate password inputted by a user; (d) means for generating candidate state information for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first matrix stored in said wallet; (i) wherein said candidate state information comprises pseudo-valid state information configured to camouflage said state information if said candidate password is not said password; (ii) wherein said candidate secret comprises said state information if said candidate password is said password; and (e) means for outputting said candidate state information to said user of said access control system.
-
-
59. A method for operating an access control system to protect a secret against unauthorized access, said method comprising the steps of:
-
(a) obtaining a secret in digital form; (b) modeling said secret as a graph; (c) camouflaging said secret by decomposing said graph into; (i) a first sub-graph to be distributed as a password to an authorized user of said system; and (ii) a second sub-graph to be stored in a manner accessible to said system; (iii) by relating said first and second sub-graphs to said graph via a composition function configured to regenerate said secret using a user-inputted candidate password in conjunction with said second sub-graph when said candidate password is said password and generate a pseudo-valid secret to camouflage said secret when said candidate password is not said password; and (d) storing said camouflaged secret for subsequent access by a user; thereby camouflaging said secret against unauthorized access by persons not having said password.
-
-
60. A method for operating an access control system to protect a secret against unauthorized access, said method comprising the steps of:
-
(a) obtaining a secret in digital form; (b) modeling said secret as a matrix representing at least a portion of a truth table corresponding to a Boolean function; (c) camouflaging said secret by decomposing said matrix into; (i) a first portion to be distributed as a password to an authorized user of said system; and (ii) a second portion to be stored in a manner accessible to said system; (iii) by relating said first and second portions to said matrix via a composition function configured to regenerate said secret using a user-inputted candidate password in conjunction with said second portion when said candidate password is said password and generate a pseudo-valid secret to camouflage said secret when said candidate password is not said password; and (d) storing said camouflaged secret for subsequent access by a user; thereby camouflaging said secret against unauthorized access by persons not having said password.
-
-
61. A method for operating an access control system to protect a secret against unauthorized access, said method comprising the steps of:
-
(a) retrieving, from a computer-readable wallet, a first sub-graph; (i) related to a secret camouflaged as a graph by said system; and (ii) accessible to an authorized user as a password; (b) accessing a composition function representing said secret as a function of said first sub-graph and a stored second sub-graph accessible to said system; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first sub-graph; (i) wherein said candidate secret comprises a pseudo-valid secret in lieu of said secret to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system.
-
-
62. A method for operating an access control system to protect a secret against unauthorized access, said method comprising the steps of:
-
(a) retrieving, from a computer-readable wallet, a first matrix; (i) related to a secret camouflaged as a Boolean function by said system; and (ii) accessible to an authorized user as a password; (b) accessing a composition function representing said secret as a function of said first matrix and a stored second matrix accessible to said system; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first matrix; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system.
-
-
63. A computer-readable medium containing logic instructions for operating an access control system to protect a secret against unauthorized access, said logic instructions when executed:
-
(a) obtaining a secret in digital form; (b) modeling said secret as a graph; (c) camouflaging said secret by decomposing said graph into; (i) a first sub-graph to be distributed as a password to an authorized user of said system; and (ii) a second sub-graph to be stored in a manner accessible to said system; (iii) by relating said first and second sub-graphs to said graph via a composition function configured to regenerate said secret using a user-inputted candidate password in conjunction with said second sub-graph when said candidate password is said password and generating a pseudo-valid secret to camouflage said secret when said candidate password is not said password; and (d) storing said camouflaged secret for subsequent access by a user; thereby camouflaging said secret against unauthorized access by persons not having said password.
-
-
64. A computer-readable medium containing logic instructions for operating an access control system to protect a secret against unauthorized access, said logic instructions when executed:
-
(a) obtaining a secret in digital form; (b) modeling said secret as a matrix representing at least a portion of a truth table corresponding to a Boolean function; (c) camouflaging said secret by decomposing said matrix into; (i) a first portion to be distributed as a password to an authorized user of said system; and (ii) a second portion to be stored in a manner accessible to said system; (iii) by relating said first and second portions to said matrix via a composition function configured to regenerate said secret using a user-inputted candidate password in conjunction with said second portion when said candidate password is said password and generating a pseudo-valid secret to camouflage said secret when said candidate password is not said password; and (d) storing said camouflaged secret for subsequent access by a user; thereby camouflaging said secret against unauthorized access by persons not having said password.
-
-
65. A computer-readable medium containing logic instructions for operating an access control system to protect a secret against unauthorized access, said logic instructions when executed:
-
(a) retrieving, from a computer-readable wallet, a first sub-graph; (i) related to a secret camouflaged as a graph by said system; and (ii) accessible to an authorized user as a password; (b) accessing a composition function representing said secret as a function of said first sub-graph and a stored second sub-graph accessible to said system; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first sub-graph; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system.
-
-
66. A computer-readable medium containing logic instructions for operating an access control system to protect a secret against unauthorized access, said logic instructions when executed:
-
(a) retrieving, from a computer-readable wallet, a first matrix; (i) related to a secret camouflaged as a Boolean function by said system; and (ii) accessible to an authorized user as a password; (b) accessing a composition function representing said secret as a function of said first matrix and a stored second matrix accessible to said system; (c) receiving a candidate password inputted by a user; (d) generating a candidate secret for said user by executing said composition function using as operands thereto said candidate password in conjunction with at least said first matrix; (i) wherein said candidate secret comprises a pseudo-valid secret configured to camouflage said secret if said candidate password is not said password; (ii) wherein said candidate secret comprises said secret if said candidate password is said password; and (e) outputting said candidate secret to said user of said access control system.
-
Specification