WO2002073875A1 - A system and method for providing integration via a dial-up interface - Google Patents

A system and method for providing integration via a dial-up interface Download PDF

Info

Publication number
WO2002073875A1
WO2002073875A1 PCT/US2002/002234 US0202234W WO02073875A1 WO 2002073875 A1 WO2002073875 A1 WO 2002073875A1 US 0202234 W US0202234 W US 0202234W WO 02073875 A1 WO02073875 A1 WO 02073875A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
client
cryptographic function
dial
side cryptographic
Prior art date
Application number
PCT/US2002/002234
Other languages
French (fr)
Inventor
Glen Mullen
Matthew T. Novi
Shaun E. Neumann
Abdullah Zahur
Alexandre J. C. Gaulene
Sacha Dawes
Johann Bazzali
Original Assignee
Schlumberger Omnes, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/982,072 external-priority patent/US7246238B2/en
Application filed by Schlumberger Omnes, Inc. filed Critical Schlumberger Omnes, Inc.
Priority to CA002436385A priority Critical patent/CA2436385C/en
Priority to EP02720851A priority patent/EP1374478A4/en
Publication of WO2002073875A1 publication Critical patent/WO2002073875A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Definitions

  • a network workgroup is made up of a first client (10), a second client (12), a third client (14), and a shared printer (16) each having a network connection (18), for example, an Ethernet connection.
  • a router (20) Using a router (20), a connection is made to a remote network via a hub (22). Connected to the hub (22) are a remote shared printer (28), a first remote client (24), a second remote client (26), and a file server (30).
  • the entire networked workgroup is able to connect to a wide area network (32), e.g., the Internet, via the router (20). Connecting to the network via remote access is increasing in popularity as users seek to use computers away from the central network workgroup.
  • a remote client computer is connected to the central network group via a telephone line and a communication device known as a modem.
  • RADIUS Remote Authentication Dial-In User Service
  • TCP/IP Transfer Control Protocol/Internet Protocol
  • Telnet is a protocol that enables an Internet user to log on to and enter commands on a remote computer linked to the Internet, as if the user were using a text-based terminal directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. Rlogin is a protocol used to log on to a networked computer in which the local system automatically supplies the user's login name.
  • a Network Access Server operates as a client of a server.
  • the NAS provides a service to the dial-in user, such as PPP or Telnet.
  • the client is responsible for passing user information to designated servers, and then acting on the response returned.
  • Servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to deliver service to the user.
  • the server can also act as a proxy client to other servers or other kinds of authentication servers.
  • the server authenticates the user name and password through an authentication mechanism.
  • the authentication mechanism is typically one of the following mechanisms: PPP, Extensible Authentication Protocol (EAP), Challenge Handshake Authentication Protocol (CHAP), or UNIX login. New attribute values can be added to the authentication mechanisms without disturbing existing implementations of the RADIUS server protocol.
  • any user of the client presents authentication information . to the client. This might be with a customizable login prompt, where the user enters a username and password. Alternatively, the user might use a link framing protocol such as PPP or EAP, which has authentication packets carrying this information. Once the client obtains such information, the client may choose to authenticate using RADIUS.
  • PPP provides a standard method for transporting multi-protocol datagrams (packets of information, along with relevant delivery information such as the destination address that is sent through a packet-switching network) over point-to-point links.
  • PPP also defines an extensible Link Control Protocol (LCP), which can be used to negotiate authentication methods, as well as an Encryption Control Protocol (ECP), used to negotiate data encryption over PPP links, and a Compression Control Protocol (CCP), used to negotiate compression methods.
  • LCP Link Control Protocol
  • ECP Encryption Control Protocol
  • CCP Compression Control Protocol
  • EAP is a general protocol for PPP authentication that supports multiple authentication mechanisms. EAP does not select a specific authentication mechanism at a Link Control Phase. Rather, the specific authentication mechanism selection is postponed until an Authentication Phase. This postponement allows a PPP authenticator to request more information before determining the specific authentication mechanism. This also permits the use of a "back-end" server, such as a RADIUS server, which actually implements the various mechanisms while the PPP authenticator merely acts as a conduit for the authentication exchange.
  • a back-end server such as a RADIUS server
  • RADIUS Remote Authentication Protocol
  • EAP Through the use of EAP, support for a number of authentication schemes may be added, including smart card, public key, one time password, etc. To date, however, EAP methods have focused on authenticating a client to a server.
  • the EAP protocol allows a PPP peer to take advantage of the integrity-protected ciphersuite (scrambled or otherwise encoded text) negotiation, mutual authentication, and
  • a smart card is a credit card-sized, tamper-resistant security device that offers functions for secure information storage and information processing that relies on Nery-Large-Scale Integration (VLSI) chip technology.
  • VLSI is generally considered to encompass the range from 5,000 to 50,000 components densely packed in an integrated circuit.
  • a smart card contains a secure microprocessor chip embedded in the card. The chip can implement a secure file system, compute cryptographic functions, and actively detect invalid access attempts. With proper application of file system access rights, a smart card can be safely used by multiple, independent applications.
  • PKI Public Key Infrastructure
  • keys the basic principle of Public Key Infrastructure (PKI) technology is a mathematical concept that can be used to relate certain pairs of large numbers (called keys) in a special way. If one of the keys is used to encrypt a message, the other key can be used to decrypt the message, and vice versa. Fundamental to this scheme is that only these two keys (called a key pair) are related in this way. So, in other words, if a message is encrypted with one key, the message can be decrypted only by the matching key in the pair.
  • One key is called a private key and the other is called a public key.
  • the private key is known only by the user; the public key is published as widely as the user desires.
  • a certificate binds a public key to an identity (and possibly other information about that identity).
  • the sender and recipient share a trusted third party (e.g. a mutual friend, an organizational administrator, or a government agency).
  • a notable property of certificates is that public key tampering can be readily detected.
  • the certificate is signed by the trusted third party (called a certificate authority, or CA). If the certificate is tampered with, the sender can tell because the CA is not recognized or the certification is improperly signed. Further, the sender can look at the certificate and verify that the certificate was, in fact, signed by the intended trusted third party. This mechanism assures that the recipient's public key really belongs to the recipient, at least to the level that trust exists in the CA.
  • CA certificate authority
  • a security management system for instance, Entrust/Entelligence developed by Entrust Technologies of Piano, TX, manages certificates, time stamping, encryption, digital signatures, and other security issues on behalf of users.
  • Security management systems such as Entrust/Entelligence, also have features such as automatic key and certificate management, and centrally managed policies and settings.
  • Entrust/Entelligence integrates into a client computer environment. Also, instead of a separate log in procedure for each application stored on the computer, a user logs in only once to securely access all applications that are secured with a product such as Entrust/Entelligence.
  • Certificates used to verify a signed document may be stored on a server running a directory service.
  • a directory service is a service running on a network that enables users to locate hosts and services, e.g., a certificate management service.
  • An example of a directory service is Lightweight Directory Access Protocol (LDAP).
  • LDAP Lightweight Directory Access Protocol
  • LDAP is the Internet standard for directory lookups, just as the Simple
  • LDAP is defined as an "on the wire" bit protocol (similar to HTTP) that runs over Transmission Control Protocol/Internet Protocol (TCP/IP). LDAP creates a standard way for applications to request and manage directory information.
  • An LDAP-compliant directory leverages a single, master directory that owns all user, group, and access control information.
  • the directory is hierarchical, not relational, and is optimized for reading, reliability, and scalability.
  • This directory becomes a specialized, central repository that contains information about objects and provides user, group, and access control information to all applications on the network.
  • the directory can be used to provide a security management system with a user list, a user's public key information, or user identification for all users in a widely distributed enterprise.
  • the invention comprises a network system providing integration.
  • the network system comprises a client computer, a server, a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, a remote access switch providing an interface between the client computer and the server, a client-side cryptographic function providing cryptographic services located on the client computer, a dial-up client providing dialing services to access the remote access switch, and a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function.
  • the invention comprises a network system providing integration.
  • the network system comprises a client computer, a server, a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, a remote access switch providing an interface between the client computer and the server, a client-side cryptographic function providing cryptographic services located on the client computer, a dial-up client providing dialing services to access the remote access switch, a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function, a security device holding authentication information, a card reader attached to the client computer for reading the security device, and a directory service accessed by the server-side cryptographic function.
  • the invention comprises a client computer.
  • the client computer comprises a dial-up client providing dialing services to the client computer, a client-side cryptographic function providing cryptographic services located on the client computer, a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function, and a card reader attached to the client computer for reading a security device.
  • the invention comprises a server.
  • the server comprises a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, and a directory service accessed by the server-side cryptographic function.
  • the invention comprises a method of integrating via a dial-up interface.
  • Session initiation information is sent from a dial-up client to a PKI-Bridge. Session initiation information is checked by the PKI-Bridge.
  • a challenge string is generated by a server-side cryptographic function. The challenge string is forwarded to a custom script dynamically linked library. The challenge string is forwarded to a client-side cryptographic function from the custom script dynamically linked library.
  • a private key is retrieved from a security device.
  • a response string is generated. The response string is signed with the private key of a dial-in user. A signed response string is forwarded to the custom script dynamically linked library. The signed response string is divided into packets.
  • Packets are forwarded to the PKI- Bridge.
  • the signed response string is reconstructed from packets.
  • a reconstructed signed response string is forwarded to the server-side cryptographic function.
  • a public key of the dial-in user is obtained.
  • the reconstructed signed response string is verified using the server-side cryptographic function.
  • the invention comprises a method of integrating via a dial-up interface. Session initiation information is sent from a dial-up client to a PKI-Bridge. Session initiation information is checked by the PKI-Bridge.
  • a challenge string is generated by a server-side cryptographic function. The challenge string is forwarded to a custom script dynamically linked library.
  • the challenge string is forwarded to a client-side cryptographic function from the custom script dynamically linked library.
  • a private key is retrieved from a security device.
  • a response string is generated.
  • the response string is signed with the private key of a dial-in user.
  • a signed response string is forwarded to the custom script dynamically linked library.
  • the signed response string is divided into packets. Packets are forwarded to the PKI- Bridge.
  • the signed response string is reconstructed from packets.
  • a reconstructed signed response string is forwarded to the server-side cryptographic function.
  • a public key of the dial-in user is obtained.
  • the reconstructed signed response string is verified using the server-side cryptographic function.
  • a card reader reads the security device.
  • the signed response string is encoded.
  • the signed response string is decoded.
  • the challenge string is forwarded to the dial-up client.
  • the challenge string is forwarded to the PKI-Bridge. Packets are forwarded from the custom script dynamically
  • the invention comprises an apparatus of integrating via a dial-up interface.
  • the invention comprises means for sending session initiation information from a dial-up client to a PKI-Bridge, means for checking session initiation information by the PKI-Bridge, means for generating a challenge string by a server-side cryptographic function, means for forwarding the challenge string to a custom script dynamically linked library, means for forwarding the challenge string to a client-side cryptographic function from the custom script dynamically linked library, means for retrieving a private key from a security device, means for generating a response string, means for signing the response string with the private key of a dial-in user, means for forwarding a signed response string to the custom script dynamically linked library, means for dividing the signed response string into packets, means for forwarding packets to the PKI-Bridge, means for reconstructing the signed response string from packets, means for forwarding a reconstructed signed response string to the server-side cryptographic function, means for obtaining a public key of
  • Figure 1 illustrates a typical network workgroup.
  • Figure 2 illustrates a typical computer system.
  • Figure 3 illustrates a block diagram of a system in accordance with an embodiment of the present invention.
  • Figure 4 illustrates a user interface for a phone number and modem setup dialog box, in accordance with one or more embodiments of the present invention.
  • Figure 5 illustrates a user interface for a connection information dialog box, in accordance with one or more embodiments of the present invention.
  • Figure 6 illustrates a password input dialog box, in accordance with one or more embodiments of the present invention.
  • Figure 7 illustrates an error dialog box, in accordance with one or more embodiments of the present invention.
  • Figure 8 illustrates a flow chart describing a process, in accordance with one or more embodiments of the present invention.
  • Figure 9 illustrates a flow chart describing a process, in accordance with one or more embodiments of the present invention.
  • a typical computer has a processor (42), memory (44), and numerous other elements and functionalities typical to today's computers (not shown).
  • the computer (40) has associated therewith input means such as a keyboard (46), a mouse (48), and a card reader (50), although in an accessible environment these input means may take other forms.
  • the computer (40) is also associated with an output device such as a display (52), which may also take a different form in an accessible environment.
  • the computer (40) is connected to a wide area network (32), such as the Internet.
  • SmartDial is a Remote Access Server (RAS)-Public Key Infrastructure (PKI) product that integrates security devices, (e.g., smart cards), a PKI encryption system (e.g., Entrust), and a server (e.g., RADIUS) via a dial-up interface.
  • RAS Remote Access Server
  • PKI Public Key Infrastructure
  • SmartDial involves the integration of numerous components including a client computer (102), a card reader (50) with reader firmware (105), a security device (106) (e.g., a smart card) with an embedded CPU (107), a PC modem (108) individually or as part of a modem pool (not shown), a Network Access Point (NAP), e.g., Remote Access Switch (110) with an Access Control and a RADIUS Proxy library (109), a server (112), e.g., a RADIUS server, and a Directory Service (113), e.g., a LDAP-compliant directory, located on a directory server (114).
  • NAP Network Access Point
  • server (112 e.g., a RADIUS server
  • a Directory Service e.g., a LDAP-compliant directory, located on a directory server (114).
  • a first custom module is a dial-up client (120), which is an executable program.
  • a second custom module is a Custom Script Dynamically Linked Library (DLL) (122).
  • DLL Dynamically Linked Library
  • a DLL is a feature of the Microsoft Windows ® operating system and OS/2 that allows executable routines to be stored as files with DLL extensions and to be loaded only when needed by a program.
  • the Custom Script DLL implements integration between a Security Management System with a client-side cryptographic function (128), e.g., Entrust/Entelligence, and a PKI-Bridge (124) using a SmartDial Authentication Protocol (SDAP).
  • SDAP SmartDial Authentication Protocol
  • the first and second custom modules are considered part of the client computer (102).
  • a third custom element is the PKI-Bridge (124), which is a library and is stored on the server (112).
  • SmartDial may also contain a number of programming interfaces, such as an Application Programming Interface (API).
  • API is a set of routines used by an application program to direct the performance of procedures by the computer operating system.
  • a first programming interface is a TCP/IP and Microsoft ® RAS library (126) to allow the client computer (102) to connect to the server (112) through the PC modem (108) and the Remote Access Switch (110).
  • a second programming interface is a client-side cryptographic function (128) allowing the dial-up client (120) and the Custom Script DLL (122) to connect to the card reader (104) for integration with a security device (106).
  • Schlumberger (SLB) proprietary Middleware which is a library together with a proprietary smart card interface, e.g., Microsoft ® PCSC (127), and a proprietary smart card device driver, e.g., Microsoft ® SC drivers (129), facilitate the connection between the Custom Script DLL (122) and the card reader (104).
  • a fourth programming interface is a server-side cryptographic function (130) to allow the server (112) and a Steel Belted RADIUS library (131) to integrate with a directory service (113) on the directory server (114).
  • the dial-up client (120) is an executable file that loads and executes the code in the Custom Script DLL (122). Further, in one or more embodiments, there are two primary components within the dial-up client (120) that provide the necessary functionality to the dial-up client (120): a SDLogin component and a SDSetupDial component.
  • the SDLogin component is called by the dial-up client (120) when it is initially started, i.e., the user double clicks an icon to start the application.
  • the SDLogin component may be called again when dialing is about to begin.
  • the SDLogin component allows the dial-up client (120) to logon onto the client- side cryptographic function (128).
  • the SDSetupDial component is called by the dial-up client (120) immediately before the dialing begins.
  • the SDSetupDial component allows a user to terminate dialing, and provides the user information about the sending status updates and errors.
  • information provided to a user is stored on a shared memory page.
  • dial-up client (120) using the above- mentioned components, automates the authentication process using a hidden terminal operating in terminal mode.
  • Terminal mode allows data to be transferred via a traditional telephone line in text (ACSII) format. Additionally, the data may be encoded, e.g., base 64 encoding.
  • the dial-up client (120) provides an interface between the Security Management System with a client-side cryptographic function (128), e.g., Entrust/Entelligence, and the Remote Access Switch (110).
  • the client-side cryptographic function (128) provides an interface that can be used to access user certificates from a security device (106) via the appropriate hardware and software components.
  • the client-side cryptographic function (128) is also responsible for responding to a challenge, from the server-side cryptographic function (130) with a signed response string.
  • the signing of the response string includes first hashing data to be sent using a hashing algorithm, such as MD5.
  • the hashed data is then encrypted using a PKI encryption algorithm using the private key of the sender.
  • the result is a digital signature of the response string.
  • PKI-Bridge (124) is modified by the Custom Script DLL (122) to coincide with SDAP. Further, when sending the signed response string, the formatted signed response string is divided into packets and sent to the PKI-Bridge (124). This is required because response strings are typically large, e.g., 3K bytes, thus it is difficult to send as one package due to bandwidth limitations of a data line, e.g., telephone lines.
  • the dial-up client (120) may perform several additional functions.
  • the dial-up client (120) allows a dial-up user to dial into the Remote Access Switch (110) (e.g., Shiva, Cisco, or other access vendor that support RADIUS servers) using a number selected by the user and provide status information about the dial-up connection.
  • the dial-up client (120) also establishes PPP protocol and interfaces with e-mail service components for a phone book and associated protocols.
  • the dial-up client (120) does not store any part of the information obtained from the client-side cryptographic function (128). Also, the dial-up client (120) does not store the challenge string or the signed response string.
  • the dial-up client (120) provides several user interface components, including a phone number and modem setup screen, a connection information dialog box, a dial-up monitor, numerous error dialog boxes, and numerous reconnection dialog boxes. In the case that the user has not connected to the certificate manager, an input screen for the user password is displayed.
  • the dial-up client (120) allows for the termination of a session via a cancel button on the connection information dialog box.
  • Each service provided by the Remote Access Switch (110) to a dial-in user constitutes a session, with the beginning of the session defined as the point where service is first provided and the end of the session defined as the point where service is ended.
  • the dial-up client (120) automatically displays a reconnection dialog box to allow the user to re- establish the session.
  • the dial-up client (120) also announces a desire to use SDAP before any other authentication protocols.
  • a typical phone number and modem setup dialog box in accordance with one or more embodiments of the present invention, is shown in Figure 4.
  • a dialog box (52) contains a listing of phone book entries (54) associated with phone numbers to access a remote server.
  • the dialog box (52) also contains a button to add a phone book entry (60), a button to remove a phone book entry (62), and a button to edit a phone book entry (58).
  • the dialog box (52) contains a button to dial the phone number associated with a selected phone book entry (56).
  • a typical connection information dialog box in accordance with one or more embodiments of the present invention, is shown in Figure 5.
  • a dialog box (64) informs the user of the progress of the connection.
  • the dialog box (64) includes a text dialog (65) that indicates the current state of the dialing/authentication process. Additionally, the dialog box (64) contains a cancel button (66) that may be used to terminate the connection at any time during the dialing/authentication process.
  • a typical input dialog box for a user name and password in accordance with one or more embodiments of the present invention, is shown in Figure 6.
  • a dialog box (68) contains a drop-down text input field (70) to select a user profile name and a text input field (72) to enter a user password. Once the user has entered both the user profile name and password, an OK button (74) may be clicked to continue the dialing/authentication process.
  • a typical error dialog box in accordance with one or more embodiments of the present invention, is shown in Figure 7.
  • a dialog box (76) contains a text message field (78) indicating an error that was encountered.
  • An OK button (80) may be clicked to continue running the SmartDial application.
  • the PKI-Bridge ( 124) resides on the server (112) and uses the RADIUS
  • the PKI-Bridge (124) is the interface on the server (112) that supports the integration of the server (112) and the server- side cryptographic function (130), for CHAP authentication.
  • the PKI-Bridge (124) forwards a challenge string from the server-side cryptographic function (130) to the client computer (102).
  • the PKI-Bridge (124) reconstructs the signed response packets, sent from the client computer (102) and forwards them to the server-side cryptographic function (130).
  • the signed response string is verified by the server-side cryptographic function (130). If the verification is successful, the server (112) is instructed, by the server-side cryptographic function (130) via the PKI-Bridge (124), to send an allow connection message to the Remote Access Switch (110). If the verification is unsuccessful, the server (112) is instructed, by the server-side cryptographic function (130) via the PKI-Bridge (124), to send a deny connection message to the Remote Access Switch (110).
  • the PKI-Bridge (124) does not store the challenge string or the signed response.
  • the PKI-Bridge (124) constructs a random string of characters for the challenge string based on a timestamp, the previous response, and a randomly generated number. The challenge string is only valid for one session and times out after a configurable time period.
  • the client-side cryptographic function (128). and the server-side cryptographic function (130) are developed by the same vendor and employ the same cryptographic scheme.
  • the client-side cryptographic function (128) and the server-side cryptographic function (130) are developed by different vendors and employ the same cryptographic scheme.
  • a typical implementation of SmartDial starts with a user attempting to dial into the Remote Access Switch (110) (Step 140). If the attempt to connect to the Remote Access Switch (110) is unsuccessful (Step 142), a dialog box appears to ask whether to retry the attempt to dial into the Remote Access Switch (110) (Step 144). If the user chooses not to retry, SmartDial terminates (Step 164). If the user chooses to retry, a dialog box for determining whether the same access number should be used appears (Step 146). If the user chooses the same access number, the process starts again with an attempt to dial into the Remote Access Switch (110) (Step 140). If the user chooses not to use the same number, an alternate number is then selected by the user (Step 148) and the process starts again with an attempt to dial into the Remote Access Switch (110) (Step 140).
  • the client computer (102) requests a SmartDial authentication through the Remote Access Switch (110) to the server (112) (Step 150).
  • the request and all the subsequent data transmission between the client computer (102) and the Remote Access Switch (110) is conducted via a hidden terminal using a 64-bit encoding.
  • the SmartDial system proceeds to authenticate the dial-up user (Step 151). If authentication is successful (Step 152), SmartDial is complete (Step 153). If authentication is not successful, SmartDial terminates (154).
  • FIG. 9 provides a more detailed explanation of the authentication of the dial-in user referred to as Step 151 in Figure 8.
  • a dial-up client (120) sends version information and a distinguished name (DN) of a dial-up client user to a PKI-Bridge (124) via the RAS (110) (Step 155).
  • the PKI-Bridge (124) checks the version information and forwards the DN to the server-side cryptographic function (130) (Step 156).
  • the server-side cryptographic function (130) generates a challenge string and forwards it to the PKI-Bridge (124) (Step 157).
  • An example of the challenge string is described in detail below.
  • the PKI-Bridge (124) forwards the challenge string to the dial-up client (120) (Step 158).
  • the dial-up client (120) forwards the challenge string to the Custom Script DLL (122) (Step 159).
  • the Custom Script DLL (122) forwards the challenge string to the client-side cryptographic function (128) (Step 160).
  • the client-side cryptographic function (128) uses the dial-up user's private key on security device, and generates a signed response string (Step 161).
  • the signed response string is generated by the client-side cryptographic function (128) with the dial-up user's private key never being transferred off the security device.
  • An example of the signed response string is described in detail below.
  • the client-side cryptographic function (128) forwards the signed response string to the Custom Script DLL (122) (Step 162).
  • the Custom Script DLL (122) encodes the signed response string and divides the encoded signed response string into packets (Step 163).
  • the Custom Script DLL (122) forwards the packets to the PKI-Bridge via dial-up client (120) and RAS (110) (Step 164).
  • the PKI-Bridge (124) receives the packets, reconstructs the encoded signed response string, and decodes the encoded response string (Step 165).
  • the PKI-Bridge (124) forwards the reconstructed signed response string to the server-side cryptographic function (130) (Step 166).
  • the server-side cryptographic function (130) obtains the user's public key from a directory server (114) using the DN provided by the dial-up user (Step 167).
  • the server- side cryptographic function (130) then verifies the reconstructed signed response string (Step 168).
  • the client computer (102) responds to a challenge from the server-side cryptographic function (130) when connecting via SmartDial.
  • the server-side cryptographic function (130) generates a random challenge for the client computer (102). To ensure that this challenge is not easily predictable, it is based on three factors: last sent challenge, current server time, and a randomly generated number. The entire challenge string is 16 octets in length. A summary of an authentication packet sent by the server (112) is shown below. 0 1 2 3
  • a Code field value is 1.
  • An Identifier field is one octet and aids in matching responses with requests. The Identifier field is changed on each request packet containing a different identifier.
  • a Length field value is 21.
  • the Type field value is to be determined by the Internet Assigned Numbers Authority (IANA). IANA is an organization that assigns protocol identification numbers.
  • a ChallengeVal field is 16 octets of data, which is generated in a way to not be predictable by anyone. The ChallengeVal is sent only once, including those cases where no reply is given and the server re-transmits a challenge authentication packet.
  • the client computer (102) uses the server-side cryptographic function (130) to perform normal certificate retrieval and signing functions when replying to the challenge.
  • server-side cryptographic function 130
  • An example of a correct response to the challenge authentication packet from the server (112) is shown below.
  • the Code field is 2.
  • the identifier field is one octet and matches the Identifier field from the corresponding request.
  • the Length field is a two octet field and indicates the length of the authentication reply packet including the Code, Identifier, Length, Type, Certificate, Random Data, Echo Value, Signature Length, and Signature fields.
  • the Type field value is to be determined by the IAAN.
  • a Certificate Type field identifies the type of certificate the dial-up client (120) is presenting. In this implementation, the Certificate Type field is set to 1 to represent a X.509 certificate.
  • the Certificate field is the dial-up client's (120) X.509 certificate from the server- side cryptographic function (130).
  • the ResponseVal field is a sixteen-octet field. The field is generated by the dial-up client (120) in such a way that a hacker cannot predict the field.
  • a shared secret is added to the initial challenge and a pre-determined hashing algorithm is used so that the secret is not sent insecurely across a wire.
  • the ChallengeVal field is a sixteen-octet field that matches the
  • the Signature Length field is the length in octets of a signature.
  • the signature field is the signature of the client computer (102) applied to the combination of ChallengeVal and ResponseVal.
  • the client computer (102) takes the thirty- two octets formed by the ChallengeVal followed by the ResponseVal and produces a secure hash known by the server-side cryptographic function (130).
  • the 128-bit message is then signed by the client-side cryptographic function (128) using the dial-up user's (120) private key.
  • the server-side cryptographic function (128) verifies the dial-up user's (120) signature using the dial-up user's (120) public key.
  • the server-side cryptographic function (128) also produces a 128-bit hash using the ChallengeVal followed by the ResponseVal. The two results are then compared for equality.
  • SmartDial may be implemented.
  • the dial-up client (120) may be isolated from the modem by a plurality of device drivers (140).
  • the Microsoft ® telephony API (TAPI) For example, the Microsoft ® telephony API (TAPI).
  • TAPI Microsoft ® telephony API
  • the security management system insulates SmartDial from the device that contains the certificate (i.e., smart card). SmartDial supports any device for storage of a certificate that is supported by the security management system.
  • SmartDial may support only certificates issued by Entrust/Entelligence and only interfaces using the Entrust tool kit.
  • SmartDial may support Steel Belted RADIUS (131) and use an SDK provided by Funk Software to interface with the LDAP-compliant directory service (113) and an Entrust toolkit of high level APIs (130) on the server (112).
  • the dial-up client (120) may support Microsoft Windows NT and/or Windows 2000.
  • the certificate is managed by and is the responsibility of an external management system. Management of the smart card (106) may be external to SmartDial. Any security device (106) and card reader (104) that is supported by a Security Management System with a client- side cryptographic function (128) may be supported by SmartDial.
  • SmartDial provides a secure way to handle network security with remote dial-up clients.
  • SmartDial is a PKI-based authentication via dial-up connection while using security devices to digitally sign challenge. The private key is secure, as the key never leaves the card.
  • SmartDial also supports two- way verification. Secure communication is also provided between the Remote Access Switch and the Server.
  • SmartDial is also advantageous because the system uses industry standards to facilitate transition from existing methods. Because preexisting components are used, SmartDial can be integrated into existing systems to allow other trusted systems to perform authentication until all components are installed.
  • SmartDial is also advantageous because the system supports numerous protocols, including PPP, CHAP, EAP, RADIUS, and LDAP. Because SmartDial' s Authentication Protocol is modeled after EAP, the implementation of SmartDial could easily tie into a Virtual Private Network (VPN) system to create end-to-end security when deemed necessary or cost effective. SmartDial uses PKI and can generate access tokens or encrypt data. Thus, the system can be extended to almost any VPN solution. Also, the software does not require any specialized training or skills to use and user documentation is included in the form of an on-line context sensitive help system. Those skilled in the art will appreciate that the present invention may have further advantages.
  • VPN Virtual Private Network

Abstract

A network system providing integration. The network system includes a client computer (102), a server (112), a server-side cryptographic function (130), a PKI-Bridge (124), a remote access switch (110), a client-side cryptographic function (128), a dial-up client (120), and a custom script dynamically linked library (122). The server-side cryptographic function (130) is located on the server (112) and provides cryptographic services. The PKI-Bridge (124) provides an interface between the server (112) and the server-side cryptographic function (130). The remote access switch (110) provides an interface between the client computer (102) and the server (112). The client-side cryptographic function (128) is loaded on the client computer (102) and provides cryptographic service. The dial up client (120) provides dial-up services to access the remote access switch (110). The custom script dynamically lined library (122) provides an interface between the dial-up client (120) and the client-side cryptographic function (128).

Description

A SYSTEM AND METHOD FOR PROVIDING INTEGRATION VIA A DIAL-UP INTERFACE
Cross-reference to related applications
This application claims priority from provisional application serial no. 60/246,101, filed January 25, 2001.
Background of Invention
[0001] Computers are used to perform a wide assortment of tasks. Often computers are connected together as a group of computers known as a network workgroup. Referring to Figure 1, a network workgroup is made up of a first client (10), a second client (12), a third client (14), and a shared printer (16) each having a network connection (18), for example, an Ethernet connection. Using a router (20), a connection is made to a remote network via a hub (22). Connected to the hub (22) are a remote shared printer (28), a first remote client (24), a second remote client (26), and a file server (30). The entire networked workgroup is able to connect to a wide area network (32), e.g., the Internet, via the router (20). Connecting to the network via remote access is increasing in popularity as users seek to use computers away from the central network workgroup. In such cases, a remote client computer is connected to the central network group via a telephone line and a communication device known as a modem.
[0002] Managing dispersed serial connections and modem pools for large numbers of users creates the need for significant administrative support. Because modem pools are a link to the outside world, modem pools require careful attention to security and authorization. Remote Authentication Dial-In User Service (RADIUS) handles these authentication and configuration issues by managing a single "database" of users. This allows for authentication (verifying user name and password) as well as configuration information detailing the type of service to deliver to the user (e.g., Point-to-Point Protocol (PPP), telnet, or rlogin). PPP is a widely used data link protocol for transmitting Transfer Control Protocol/Internet Protocol (TCP/IP) packets over dial-up telephone connections. Telnet is a protocol that enables an Internet user to log on to and enter commands on a remote computer linked to the Internet, as if the user were using a text-based terminal directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. Rlogin is a protocol used to log on to a networked computer in which the local system automatically supplies the user's login name.
[0003] In a network workgroup, a Network Access Server (NAS) operates as a client of a server. The NAS provides a service to the dial-in user, such as PPP or Telnet. The client is responsible for passing user information to designated servers, and then acting on the response returned. Servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to deliver service to the user. The server can also act as a proxy client to other servers or other kinds of authentication servers.
[0004] In an effort to maintain network security, transactions between the client and server are authenticated through the use of a secret shared between the client and the server. This secret is never sent over the network. In addition, any user passwords sent between the client and server use a mechanism to maintain data integrity, e.g., MD5 Checksum, to eliminate the possibility that someone snooping on an unsecured network can determine a user password.
[0005] When the server is provided with the user name and original password input by the user, the server authenticates the user name and password through an authentication mechanism. The authentication mechanism is typically one of the following mechanisms: PPP, Extensible Authentication Protocol (EAP), Challenge Handshake Authentication Protocol (CHAP), or UNIX login. New attribute values can be added to the authentication mechanisms without disturbing existing implementations of the RADIUS server protocol.
[0006] When a client is configured to use RADIUS, any user of the client presents authentication information . to the client. This might be with a customizable login prompt, where the user enters a username and password. Alternatively, the user might use a link framing protocol such as PPP or EAP, which has authentication packets carrying this information. Once the client obtains such information, the client may choose to authenticate using RADIUS.
[0007] PPP provides a standard method for transporting multi-protocol datagrams (packets of information, along with relevant delivery information such as the destination address that is sent through a packet-switching network) over point-to-point links. PPP also defines an extensible Link Control Protocol (LCP), which can be used to negotiate authentication methods, as well as an Encryption Control Protocol (ECP), used to negotiate data encryption over PPP links, and a Compression Control Protocol (CCP), used to negotiate compression methods.
[0008] EAP is a general protocol for PPP authentication that supports multiple authentication mechanisms. EAP does not select a specific authentication mechanism at a Link Control Phase. Rather, the specific authentication mechanism selection is postponed until an Authentication Phase. This postponement allows a PPP authenticator to request more information before determining the specific authentication mechanism. This also permits the use of a "back-end" server, such as a RADIUS server, which actually implements the various mechanisms while the PPP authenticator merely acts as a conduit for the authentication exchange. Through the use of EAP, support for a number of authentication schemes may be added, including smart card, public key, one time password, etc. To date, however, EAP methods have focused on authenticating a client to a server. The EAP protocol allows a PPP peer to take advantage of the integrity-protected ciphersuite (scrambled or otherwise encoded text) negotiation, mutual authentication, and key management capabilities of the Transfer Level Security (TLS) protocol.
[0009] A smart card is a credit card-sized, tamper-resistant security device that offers functions for secure information storage and information processing that relies on Nery-Large-Scale Integration (VLSI) chip technology. VLSI is generally considered to encompass the range from 5,000 to 50,000 components densely packed in an integrated circuit. A smart card contains a secure microprocessor chip embedded in the card. The chip can implement a secure file system, compute cryptographic functions, and actively detect invalid access attempts. With proper application of file system access rights, a smart card can be safely used by multiple, independent applications.
[0010] The basic principle of Public Key Infrastructure (PKI) technology is a mathematical concept that can be used to relate certain pairs of large numbers (called keys) in a special way. If one of the keys is used to encrypt a message, the other key can be used to decrypt the message, and vice versa. Fundamental to this scheme is that only these two keys (called a key pair) are related in this way. So, in other words, if a message is encrypted with one key, the message can be decrypted only by the matching key in the pair. One key is called a private key and the other is called a public key. The private key is known only by the user; the public key is published as widely as the user desires.
[0011] The following is an example of how a private message is sent from a sender to a recipient. The recipient's public key is used to encrypt the message, which is then sent to the recipient. The recipient uses his/her private key to decrypt the message. The sender knows that only the recipient can read the message because the message can only be decrypted using the recipient's private key. One concern with this arrangement is that the sender does not know whether the recipient's true public key is being used to encrypt the message. To overcome this concern, a certificate is employed. [0012] A certificate binds a public key to an identity (and possibly other information about that identity). The sender and recipient share a trusted third party (e.g. a mutual friend, an organizational administrator, or a government agency). If the recipient goes to that trusted third party and proves his/her identity and presents his/her public key, that third party bundles and "signs," or verifies the authenticity of the public key along with the recipient's identity and any other appropriate information. This bundle of information is called a certificate, and the process of obtaining one is called certificate issuance.
[0013] A notable property of certificates is that public key tampering can be readily detected. The certificate is signed by the trusted third party (called a certificate authority, or CA). If the certificate is tampered with, the sender can tell because the CA is not recognized or the certification is improperly signed. Further, the sender can look at the certificate and verify that the certificate was, in fact, signed by the intended trusted third party. This mechanism assures that the recipient's public key really belongs to the recipient, at least to the level that trust exists in the CA.
[0014] A security management system, for instance, Entrust/Entelligence developed by Entrust Technologies of Piano, TX, manages certificates, time stamping, encryption, digital signatures, and other security issues on behalf of users. Security management systems, such as Entrust/Entelligence, also have features such as automatic key and certificate management, and centrally managed policies and settings. Entrust/Entelligence integrates into a client computer environment. Also, instead of a separate log in procedure for each application stored on the computer, a user logs in only once to securely access all applications that are secured with a product such as Entrust/Entelligence.
[0015] Certificates used to verify a signed document may be stored on a server running a directory service. A directory service is a service running on a network that enables users to locate hosts and services, e.g., a certificate management service. An example of a directory service is Lightweight Directory Access Protocol (LDAP).
[0016] LDAP is the Internet standard for directory lookups, just as the Simple
Mail Transfer Protocol (SMTP) is the Internet standard for delivering e-mail, and the Hypertext Transfer Protocol (HTTP) is the Internet standard for delivering documents. Technically, LDAP is defined as an "on the wire" bit protocol (similar to HTTP) that runs over Transmission Control Protocol/Internet Protocol (TCP/IP). LDAP creates a standard way for applications to request and manage directory information.
[0017] An LDAP-compliant directory leverages a single, master directory that owns all user, group, and access control information. The directory is hierarchical, not relational, and is optimized for reading, reliability, and scalability. This directory becomes a specialized, central repository that contains information about objects and provides user, group, and access control information to all applications on the network. For example, the directory can be used to provide a security management system with a user list, a user's public key information, or user identification for all users in a widely distributed enterprise.
Summary of Invention
[0018] In general, in one aspect, the invention comprises a network system providing integration. The network system comprises a client computer, a server, a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, a remote access switch providing an interface between the client computer and the server, a client-side cryptographic function providing cryptographic services located on the client computer, a dial-up client providing dialing services to access the remote access switch, and a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function.
[0019] In general, in one aspect, the invention comprises a network system providing integration. The network system comprises a client computer, a server, a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, a remote access switch providing an interface between the client computer and the server, a client-side cryptographic function providing cryptographic services located on the client computer, a dial-up client providing dialing services to access the remote access switch, a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function, a security device holding authentication information, a card reader attached to the client computer for reading the security device, and a directory service accessed by the server-side cryptographic function.
[0020] In general, in one aspect, the invention comprises a client computer.
The client computer comprises a dial-up client providing dialing services to the client computer, a client-side cryptographic function providing cryptographic services located on the client computer, a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function, and a card reader attached to the client computer for reading a security device.
[0021] In general, in one aspect, the invention comprises a server. The server comprises a server-side cryptographic function providing cryptographic services located on the server, a PKI-Bridge providing an interface between the server and the server-side cryptographic function, and a directory service accessed by the server-side cryptographic function.
[0022] In general, in one aspect, the invention comprises a method of integrating via a dial-up interface. Session initiation information is sent from a dial-up client to a PKI-Bridge. Session initiation information is checked by the PKI-Bridge. A challenge string is generated by a server-side cryptographic function. The challenge string is forwarded to a custom script dynamically linked library. The challenge string is forwarded to a client-side cryptographic function from the custom script dynamically linked library. A private key is retrieved from a security device. A response string is generated. The response string is signed with the private key of a dial-in user. A signed response string is forwarded to the custom script dynamically linked library. The signed response string is divided into packets. Packets are forwarded to the PKI- Bridge. The signed response string is reconstructed from packets. A reconstructed signed response string is forwarded to the server-side cryptographic function. A public key of the dial-in user is obtained. The reconstructed signed response string is verified using the server-side cryptographic function. In general, in one aspect, the invention comprises a method of integrating via a dial-up interface. Session initiation information is sent from a dial-up client to a PKI-Bridge. Session initiation information is checked by the PKI-Bridge. A challenge string is generated by a server-side cryptographic function. The challenge string is forwarded to a custom script dynamically linked library. The challenge string is forwarded to a client-side cryptographic function from the custom script dynamically linked library. A private key is retrieved from a security device. A response string is generated. The response string is signed with the private key of a dial-in user. A signed response string is forwarded to the custom script dynamically linked library. The signed response string is divided into packets. Packets are forwarded to the PKI- Bridge. The signed response string is reconstructed from packets. A reconstructed signed response string is forwarded to the server-side cryptographic function. A public key of the dial-in user is obtained. The reconstructed signed response string is verified using the server-side cryptographic function. A card reader reads the security device. The signed response string is encoded. The signed response string is decoded. The challenge string is forwarded to the dial-up client. The challenge string is forwarded to the PKI-Bridge. Packets are forwarded from the custom script dynamically linked library.
[0024] In general, in one aspect, the invention comprises an apparatus of integrating via a dial-up interface. The invention comprises means for sending session initiation information from a dial-up client to a PKI-Bridge, means for checking session initiation information by the PKI-Bridge, means for generating a challenge string by a server-side cryptographic function, means for forwarding the challenge string to a custom script dynamically linked library, means for forwarding the challenge string to a client-side cryptographic function from the custom script dynamically linked library, means for retrieving a private key from a security device, means for generating a response string, means for signing the response string with the private key of a dial-in user, means for forwarding a signed response string to the custom script dynamically linked library, means for dividing the signed response string into packets, means for forwarding packets to the PKI-Bridge, means for reconstructing the signed response string from packets, means for forwarding a reconstructed signed response string to the server-side cryptographic function, means for obtaining a public key of the dial-in user, and means for verifying the reconstructed signed response string using the server-side cryptographic function.
[0025] Other aspects and advantages of the invention will be apparent from the following description and the appended claims.
Brief Description of Drawings
[0026] Figure 1 illustrates a typical network workgroup.
[0027] Figure 2 illustrates a typical computer system. [0028] Figure 3 illustrates a block diagram of a system in accordance with an embodiment of the present invention.
[0029] Figure 4 illustrates a user interface for a phone number and modem setup dialog box, in accordance with one or more embodiments of the present invention.
[0030] Figure 5 illustrates a user interface for a connection information dialog box, in accordance with one or more embodiments of the present invention.
[0031] Figure 6 illustrates a password input dialog box, in accordance with one or more embodiments of the present invention.
[0032] Figure 7 illustrates an error dialog box, in accordance with one or more embodiments of the present invention.
[0033] Figure 8 illustrates a flow chart describing a process, in accordance with one or more embodiments of the present invention.
[0034] Figure 9 illustrates a flow chart describing a process, in accordance with one or more embodiments of the present invention.
Detailed Description
[0035] Specific embodiments of the invention will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.
[0036] In the following detailed description of the invention, numerous specific details are set forth in order to provide a more thorough understanding of the invention. However, it will be apparent to one of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid obscuring the invention.
[0037] The invention described herein may involve any computer regardless of the platform being used. For example, as shown in Figure 2, a typical computer (40) has a processor (42), memory (44), and numerous other elements and functionalities typical to today's computers (not shown). The computer (40) has associated therewith input means such as a keyboard (46), a mouse (48), and a card reader (50), although in an accessible environment these input means may take other forms. The computer (40) is also associated with an output device such as a display (52), which may also take a different form in an accessible environment. Finally, the computer (40) is connected to a wide area network (32), such as the Internet.
[0038] In one or more embodiments, the present invention involves a network system described herein as SmartDial. SmartDial is a Remote Access Server (RAS)-Public Key Infrastructure (PKI) product that integrates security devices, (e.g., smart cards), a PKI encryption system (e.g., Entrust), and a server (e.g., RADIUS) via a dial-up interface. Referring to Figure 3, SmartDial involves the integration of numerous components including a client computer (102), a card reader (50) with reader firmware (105), a security device (106) (e.g., a smart card) with an embedded CPU (107), a PC modem (108) individually or as part of a modem pool (not shown), a Network Access Point (NAP), e.g., Remote Access Switch (110) with an Access Control and a RADIUS Proxy library (109), a server (112), e.g., a RADIUS server, and a Directory Service (113), e.g., a LDAP-compliant directory, located on a directory server (114).
[0039] For successful integration of all components, a plurality of custom modules and programming interfaces are required. Referring to Figure 3, a first custom module is a dial-up client (120), which is an executable program. A second custom module is a Custom Script Dynamically Linked Library (DLL) (122). A DLL is a feature of the Microsoft Windows® operating system and OS/2 that allows executable routines to be stored as files with DLL extensions and to be loaded only when needed by a program. In the present invention, the Custom Script DLL implements integration between a Security Management System with a client-side cryptographic function (128), e.g., Entrust/Entelligence, and a PKI-Bridge (124) using a SmartDial Authentication Protocol (SDAP). The first and second custom modules are considered part of the client computer (102). A third custom element is the PKI-Bridge (124), which is a library and is stored on the server (112).
[0040] In addition to the custom modules, in one or more embodiments
SmartDial may also contain a number of programming interfaces, such as an Application Programming Interface (API). The API is a set of routines used by an application program to direct the performance of procedures by the computer operating system. A first programming interface is a TCP/IP and Microsoft® RAS library (126) to allow the client computer (102) to connect to the server (112) through the PC modem (108) and the Remote Access Switch (110). A second programming interface is a client-side cryptographic function (128) allowing the dial-up client (120) and the Custom Script DLL (122) to connect to the card reader (104) for integration with a security device (106). Additionally, Schlumberger (SLB) proprietary Middleware (123), which is a library together with a proprietary smart card interface, e.g., Microsoft® PCSC (127), and a proprietary smart card device driver, e.g., Microsoft® SC drivers (129), facilitate the connection between the Custom Script DLL (122) and the card reader (104). A fourth programming interface is a server-side cryptographic function (130) to allow the server (112) and a Steel Belted RADIUS library (131) to integrate with a directory service (113) on the directory server (114).
[0041] Several of the main components of SmartDial listed above are described in greater detail below. Following the discussion of the main components is a description of a typical implementation of the components of SmartDial.
[0042] The dial-up client (120) is an executable file that loads and executes the code in the Custom Script DLL (122). Further, in one or more embodiments, there are two primary components within the dial-up client (120) that provide the necessary functionality to the dial-up client (120): a SDLogin component and a SDSetupDial component.
[0043] The SDLogin component is called by the dial-up client (120) when it is initially started, i.e., the user double clicks an icon to start the application. The SDLogin component may be called again when dialing is about to begin. The SDLogin component allows the dial-up client (120) to logon onto the client- side cryptographic function (128).
[0044] The SDSetupDial component is called by the dial-up client (120) immediately before the dialing begins. The SDSetupDial component allows a user to terminate dialing, and provides the user information about the sending status updates and errors. In one embodiment of the present invention, information provided to a user is stored on a shared memory page.
[0045] In one or more embodiments of the dial-up client (120), using the above- mentioned components, automates the authentication process using a hidden terminal operating in terminal mode. Terminal mode allows data to be transferred via a traditional telephone line in text (ACSII) format. Additionally, the data may be encoded, e.g., base 64 encoding. The dial-up client (120) provides an interface between the Security Management System with a client-side cryptographic function (128), e.g., Entrust/Entelligence, and the Remote Access Switch (110). The client-side cryptographic function (128) provides an interface that can be used to access user certificates from a security device (106) via the appropriate hardware and software components. The client-side cryptographic function (128) is also responsible for responding to a challenge, from the server-side cryptographic function (130) with a signed response string. The signing of the response string includes first hashing data to be sent using a hashing algorithm, such as MD5. The hashed data is then encrypted using a PKI encryption algorithm using the private key of the sender. The result is a digital signature of the response string. [0046] Additionally, all data passed between the client computer (102) and the
PKI-Bridge (124) is modified by the Custom Script DLL (122) to coincide with SDAP. Further, when sending the signed response string, the formatted signed response string is divided into packets and sent to the PKI-Bridge (124). This is required because response strings are typically large, e.g., 3K bytes, thus it is difficult to send as one package due to bandwidth limitations of a data line, e.g., telephone lines.
[0047] In one or more embodiments, the dial-up client (120) may perform several additional functions. The dial-up client (120) allows a dial-up user to dial into the Remote Access Switch (110) (e.g., Shiva, Cisco, or other access vendor that support RADIUS servers) using a number selected by the user and provide status information about the dial-up connection. The dial-up client (120) also establishes PPP protocol and interfaces with e-mail service components for a phone book and associated protocols. For security purposes, the dial-up client (120) does not store any part of the information obtained from the client-side cryptographic function (128). Also, the dial-up client (120) does not store the challenge string or the signed response string.
[0048] In one or more embodiments, the dial-up client (120) provides several user interface components, including a phone number and modem setup screen, a connection information dialog box, a dial-up monitor, numerous error dialog boxes, and numerous reconnection dialog boxes. In the case that the user has not connected to the certificate manager, an input screen for the user password is displayed. The dial-up client (120) allows for the termination of a session via a cancel button on the connection information dialog box. Each service provided by the Remote Access Switch (110) to a dial-in user constitutes a session, with the beginning of the session defined as the point where service is first provided and the end of the session defined as the point where service is ended. In the case of abnormal termination of the session, the dial-up client (120) automatically displays a reconnection dialog box to allow the user to re- establish the session. The dial-up client (120) also announces a desire to use SDAP before any other authentication protocols.
[0049] A typical phone number and modem setup dialog box, in accordance with one or more embodiments of the present invention, is shown in Figure 4. A dialog box (52) contains a listing of phone book entries (54) associated with phone numbers to access a remote server. The dialog box (52) also contains a button to add a phone book entry (60), a button to remove a phone book entry (62), and a button to edit a phone book entry (58). Further, the dialog box (52) contains a button to dial the phone number associated with a selected phone book entry (56).
[0050] A typical connection information dialog box, in accordance with one or more embodiments of the present invention, is shown in Figure 5. A dialog box (64) informs the user of the progress of the connection. The dialog box (64) includes a text dialog (65) that indicates the current state of the dialing/authentication process. Additionally, the dialog box (64) contains a cancel button (66) that may be used to terminate the connection at any time during the dialing/authentication process.
[0051] A typical input dialog box for a user name and password, in accordance with one or more embodiments of the present invention, is shown in Figure 6. A dialog box (68) contains a drop-down text input field (70) to select a user profile name and a text input field (72) to enter a user password. Once the user has entered both the user profile name and password, an OK button (74) may be clicked to continue the dialing/authentication process.
[0052] A typical error dialog box, in accordance with one or more embodiments of the present invention, is shown in Figure 7. A dialog box (76) contains a text message field (78) indicating an error that was encountered. An OK button (80) may be clicked to continue running the SmartDial application.
[0053] The PKI-Bridge ( 124) resides on the server (112) and uses the RADIUS
Software Development Kit (SDK). The PKI-Bridge (124) is the interface on the server (112) that supports the integration of the server (112) and the server- side cryptographic function (130), for CHAP authentication. The PKI-Bridge (124) forwards a challenge string from the server-side cryptographic function (130) to the client computer (102).
[0054] Further, the PKI-Bridge (124) reconstructs the signed response packets, sent from the client computer (102) and forwards them to the server-side cryptographic function (130). The signed response string is verified by the server-side cryptographic function (130). If the verification is successful, the server (112) is instructed, by the server-side cryptographic function (130) via the PKI-Bridge (124), to send an allow connection message to the Remote Access Switch (110). If the verification is unsuccessful, the server (112) is instructed, by the server-side cryptographic function (130) via the PKI-Bridge (124), to send a deny connection message to the Remote Access Switch (110). For security purposes, the PKI-Bridge (124) does not store the challenge string or the signed response. The PKI-Bridge (124) constructs a random string of characters for the challenge string based on a timestamp, the previous response, and a randomly generated number. The challenge string is only valid for one session and times out after a configurable time period.
[0055] In an embodiment of the present invention, the client-side cryptographic function (128). and the server-side cryptographic function (130) are developed by the same vendor and employ the same cryptographic scheme.
[0056] In another embodiment of the present invention, the client-side cryptographic function (128) and the server-side cryptographic function (130) are developed by different vendors and employ the same cryptographic scheme.
[0057] Referring to Figure 8, a typical implementation of SmartDial starts with a user attempting to dial into the Remote Access Switch (110) (Step 140). If the attempt to connect to the Remote Access Switch (110) is unsuccessful (Step 142), a dialog box appears to ask whether to retry the attempt to dial into the Remote Access Switch (110) (Step 144). If the user chooses not to retry, SmartDial terminates (Step 164). If the user chooses to retry, a dialog box for determining whether the same access number should be used appears (Step 146). If the user chooses the same access number, the process starts again with an attempt to dial into the Remote Access Switch (110) (Step 140). If the user chooses not to use the same number, an alternate number is then selected by the user (Step 148) and the process starts again with an attempt to dial into the Remote Access Switch (110) (Step 140).
[0058] If the attempt to connect to the Remote Access Switch (110) is successful (step 142), the client computer (102) requests a SmartDial authentication through the Remote Access Switch (110) to the server (112) (Step 150). In one embodiment of the present invention, the request and all the subsequent data transmission between the client computer (102) and the Remote Access Switch (110) is conducted via a hidden terminal using a 64-bit encoding. The SmartDial system proceeds to authenticate the dial-up user (Step 151). If authentication is successful (Step 152), SmartDial is complete (Step 153). If authentication is not successful, SmartDial terminates (154).
[0059] Figure 9 provides a more detailed explanation of the authentication of the dial-in user referred to as Step 151 in Figure 8. A dial-up client (120) sends version information and a distinguished name (DN) of a dial-up client user to a PKI-Bridge (124) via the RAS (110) (Step 155). The PKI-Bridge (124) checks the version information and forwards the DN to the server-side cryptographic function (130) (Step 156). The server-side cryptographic function (130) generates a challenge string and forwards it to the PKI-Bridge (124) (Step 157). An example of the challenge string is described in detail below.
[0060] Next, the PKI-Bridge (124) forwards the challenge string to the dial-up client (120) (Step 158). The dial-up client (120) forwards the challenge string to the Custom Script DLL (122) (Step 159). The Custom Script DLL (122) forwards the challenge string to the client-side cryptographic function (128) (Step 160). The client-side cryptographic function (128) uses the dial-up user's private key on security device, and generates a signed response string (Step 161). In one embodiment of the invention, the signed response string is generated by the client-side cryptographic function (128) with the dial-up user's private key never being transferred off the security device. An example of the signed response string is described in detail below.
[0061] Next, the client-side cryptographic function (128) forwards the signed response string to the Custom Script DLL (122) (Step 162). The Custom Script DLL (122) encodes the signed response string and divides the encoded signed response string into packets (Step 163). The Custom Script DLL (122) forwards the packets to the PKI-Bridge via dial-up client (120) and RAS (110) (Step 164).
[0062] The PKI-Bridge (124) receives the packets, reconstructs the encoded signed response string, and decodes the encoded response string (Step 165). The PKI-Bridge (124) forwards the reconstructed signed response string to the server-side cryptographic function (130) (Step 166). The server-side cryptographic function (130) obtains the user's public key from a directory server (114) using the DN provided by the dial-up user (Step 167). The server- side cryptographic function (130) then verifies the reconstructed signed response string (Step 168).
[0063] In accordance with one or more embodiments, the client computer (102) responds to a challenge from the server-side cryptographic function (130) when connecting via SmartDial. The server-side cryptographic function (130) generates a random challenge for the client computer (102). To ensure that this challenge is not easily predictable, it is based on three factors: last sent challenge, current server time, and a randomly generated number. The entire challenge string is 16 octets in length. A summary of an authentication packet sent by the server (112) is shown below. 0 1 2 3
0 1 2 3 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 5 6 7 8 9 0 1
I Code I Identifier | Length |
I Type I Challenge Val ... |
I ...ChallengeVal... |
I ... ChallengeVal ... |
I ... ChallengeVal ... |
I ... ChallengeVal |
[0064] For the purposes of the summary of the authentication packet, a Code field value is 1. An Identifier field is one octet and aids in matching responses with requests. The Identifier field is changed on each request packet containing a different identifier. A Length field value is 21. The Type field value is to be determined by the Internet Assigned Numbers Authority (IANA). IANA is an organization that assigns protocol identification numbers. A ChallengeVal field is 16 octets of data, which is generated in a way to not be predictable by anyone. The ChallengeVal is sent only once, including those cases where no reply is given and the server re-transmits a challenge authentication packet.
[0065] In accordance with one or more embodiments, the client computer (102) uses the server-side cryptographic function (130) to perform normal certificate retrieval and signing functions when replying to the challenge. An example of a correct response to the challenge authentication packet from the server (112) is shown below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+- + -+- + - + -+-H -- + - + - + - + - + - + - + - + - + - +- +- + - + - +- + - +- + - + - + - + - + - + - J H- +
I Code I Identifier | Length |
I Type I Cert Type | Certificate...
+-+-+- +-+ - +--I—I-- +- +- +- + - +- +-+- + - +-+- +- +- +- +- +- +- +- +- +- + - +- +- +- +- +
I ResponseVal ... |
+- + - +-+- +- +- + - +- +- +- +- +- +- +- +- +- +- +- +- +-H 1-- +- +- +-+- +- + - +-+- + - +- +
I ...ResponseVal... |
I ...ResponseVal... |
I ...ResponseVal... |
I ChallengeVal... |
+- + - +- +- +- +-H H- +- +- +-+- +- +-+- + - +- +-+-H H-+- +-+-+- +- +- +- + - +- +-H ^
I ...ChallengeVal... |
I ...ChallengeVal... | a !-_ +- +- +- +- +- +- +- +- + - +- +_ +- +- +- +- +- +- + -+- +- +- +- +- +- +- + - +- +_ + - +- +
I ...ChallengeVal |
I Signature Len | Signature...
+--I I-- +- +- +-+- + - +- +- +-+- +- + - +- +- +
[0066] For the purposes of the correct response to the challenge authentication packet from the server (112), the Code field is 2. The identifier field is one octet and matches the Identifier field from the corresponding request. The Length field is a two octet field and indicates the length of the authentication reply packet including the Code, Identifier, Length, Type, Certificate, Random Data, Echo Value, Signature Length, and Signature fields. The Type field value is to be determined by the IAAN. A Certificate Type field identifies the type of certificate the dial-up client (120) is presenting. In this implementation, the Certificate Type field is set to 1 to represent a X.509 certificate. The Certificate field is the dial-up client's (120) X.509 certificate from the server- side cryptographic function (130). The ResponseVal field is a sixteen-octet field. The field is generated by the dial-up client (120) in such a way that a hacker cannot predict the field. A shared secret is added to the initial challenge and a pre-determined hashing algorithm is used so that the secret is not sent insecurely across a wire.
[0067] The ChallengeVal field is a sixteen-octet field that matches the
ChallengeVal that appeared in a corresponding request packet. The Signature Length field is the length in octets of a signature. The signature field is the signature of the client computer (102) applied to the combination of ChallengeVal and ResponseVal. The client computer (102) takes the thirty- two octets formed by the ChallengeVal followed by the ResponseVal and produces a secure hash known by the server-side cryptographic function (130). The 128-bit message is then signed by the client-side cryptographic function (128) using the dial-up user's (120) private key. To verify this signature, the server-side cryptographic function (128) verifies the dial-up user's (120) signature using the dial-up user's (120) public key. The server-side cryptographic function (128) also produces a 128-bit hash using the ChallengeVal followed by the ResponseVal. The two results are then compared for equality.
[0068] In one or more embodiments, various different configurations of
SmartDial may be implemented. Referring back to Figure 3, the dial-up client (120) may be isolated from the modem by a plurality of device drivers (140). For example, the Microsoft® telephony API (TAPI). The security management system insulates SmartDial from the device that contains the certificate (i.e., smart card). SmartDial supports any device for storage of a certificate that is supported by the security management system.
[0069] In a particular embodiment, SmartDial may support only certificates issued by Entrust/Entelligence and only interfaces using the Entrust tool kit. SmartDial may support Steel Belted RADIUS (131) and use an SDK provided by Funk Software to interface with the LDAP-compliant directory service (113) and an Entrust toolkit of high level APIs (130) on the server (112). The dial-up client (120) may support Microsoft Windows NT and/or Windows 2000. In one embodiment, the certificate is managed by and is the responsibility of an external management system. Management of the smart card (106) may be external to SmartDial. Any security device (106) and card reader (104) that is supported by a Security Management System with a client- side cryptographic function (128) may be supported by SmartDial. Those skilled in the art will appreciate that the present invention is applicable to various other platforms and may be implemented in other ways.
[0070] Advantages of the present invention may include one or more of the following. SmartDial provides a secure way to handle network security with remote dial-up clients. SmartDial is a PKI-based authentication via dial-up connection while using security devices to digitally sign challenge. The private key is secure, as the key never leaves the card. SmartDial also supports two- way verification. Secure communication is also provided between the Remote Access Switch and the Server. SmartDial is also advantageous because the system uses industry standards to facilitate transition from existing methods. Because preexisting components are used, SmartDial can be integrated into existing systems to allow other trusted systems to perform authentication until all components are installed.
[0071] SmartDial is also advantageous because the system supports numerous protocols, including PPP, CHAP, EAP, RADIUS, and LDAP. Because SmartDial' s Authentication Protocol is modeled after EAP, the implementation of SmartDial could easily tie into a Virtual Private Network (VPN) system to create end-to-end security when deemed necessary or cost effective. SmartDial uses PKI and can generate access tokens or encrypt data. Thus, the system can be extended to almost any VPN solution. Also, the software does not require any specialized training or skills to use and user documentation is included in the form of an on-line context sensitive help system. Those skilled in the art will appreciate that the present invention may have further advantages.
[0072] While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as disclosed herein. Accordingly, the scope of the invention should be limited only by the attached claims.

Claims

Claims
What is claimed is:
[cl] A network system providing integration, comprising: a client computer; a server; a server-side cryptographic function providing cryptographic services located on the server; a PKI-Bridge providing an interface between the server and the server-side cryptographic function; a remote access switch providing an interface between the client computer and the server; a client-side cryptographic function providing cryptographic services located on the client computer; a dial-up client providing dialing services to access the remote access switch; and a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function.
[c2] The network system of claim 1, further comprising: a security device holding authentication information; and a security device reader attached to the client computer for reading the security device
[c3] The network system of claim 2, wherein a certificate is stored on the security device.
[c4] The network system of claim 2, wherein the security device is a smart card.
[c5] The network system of claim 1, further comprising: a directory service accessed by the server-side cryptographic function. [c6] The network system of claim 5, wherein the directory service is lightweight directory access protocol compliant.
[c7] The network system of claim 1, wherein the client-side cryptographic function and the server-side cryptographic function employ the same cryptographic scheme.
[c8] The network system of claim 1 , wherein the server-side cryptographic function uses a random number generator to generate a challenge string.
[c9] The network system of claim 1, wherein a client-side cryptographic function uses a random number generator to generate a response string.
[clO] The network system of claim 1, wherein the client-side cryptographic function generates a signed response string.
[ell] The network system of claim 1, wherein the server-side cryptographic function generates a challenge string.
[cl2] The network system of claim 1, wherein the server-side cryptographic function verifies the signed response string.
[cl3] The network system of claim 1, wherein the dial-up client operates in terminal mode.
[cl4] A network system providing integration, comprising: a client computer; a server; a server-side cryptographic function providing cryptographic services located on the server; a PKI-Bridge providing an interface between the server and the server-side cryptographic function; a remote access switch providing an interface between the client computer and the server; a client-side cryptographic function providing cryptographic services located on the client computer; a dial-up client providing dialing services to access the remote access switch; a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function; a security device holding authentication information; a security device reader attached to the client computer for reading the security device; and a directory service accessed by the server-side cryptographic function.
[cl5] A client computer comprising: a dial-up client providing dialing services to the client computer; a client-side cryptographic function providing cryptographic services located on the client computer; and a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function.
[cl6] The client computer of claim 15, further comprising: a security device reader attached to the client computer for reading a security device.
[cl7] The client computer of claim 15, wherein a security device is a smart card.
[cl8] The client computer of claim 15, wherein the custom script dynamically linked library comprises a SDLogin component and a SDSetupDial component.
[cl9] The client computer of claim 15, wherein the dial-up client automates the authentication process using a hidden terminal operating in terminal mode. [c20] A client computer comprising: a dial-up client providing dialing services to the client computer; a client-side cryptographic function providing cryptographic services located on the client computer; a custom script dynamically linked library providing an interface between the dial-up client and the client-side cryptographic function; and a security device reader attached to the client computer for reading a security device.
[c21] A server comprising: a server-side cryptographic function providing cryptographic services located on the server; and a PKI-Bridge providing an interface between the server and the server-side cryptographic function.
[c22] The server of claim 21, further comprising: a directory service accessed by the server-side cryptographic function.
[c23] A server comprising: a server-side cryptographic function providing cryptographic services located on the server; a PKI-Bridge providing an interface between the server and the server-side cryptographic function; and a directory service accessed by the server-side cryptographic function.
[c24] A method of integrating via a dial-up interface, comprising: sending session initiation information from a dial-up client to a PKI-Bridge; checking session initiation information by the PKI-Bridge; generating a challenge string by a server-side cryptographic function; forwarding the challenge string to a custom script dynamically linked library; forwarding the challenge string to a client-side cryptographic function from the custom script dynamically linked library; utilizing a private key from a security device; generating a response string; signing the response string with the private key of a dial-in user; forwarding a signed response string to the custom script dynamically linked library; dividing the signed response string into packets; forwarding packets to the PKI-Bridge; reconstructing the signed response string from packets; forwarding a reconstructed signed response string to the server-side cryptographic function; obtaining a public key of the dial-in user; and verifying the reconstructed signed response string using the server-side cryptographic function.
[c25] The method of claim 24, further comprising: reading the security device by a security device reader.
[c26] The method of claim 24, further comprising: encoding the signed response string.
[c27] The method of claim 24, further comprising: decoding the signed response string.
[c28] The method of claim 24, further comprising: forwarding the challenge string to the dial-up client; and forwarding the challenge string to the PKI-Bridge. [c29] The method of claim 24, further comprising: forwarding packets from the custom script dynamically linked library.
[c30] The method of claim 24, wherein the security device is a smart card.
[c31] The method of claim 24, wherein the session initiation information comprises version information and a distinguished name.
[c32] The method of claim 24, wherein the public key is stored on a directory service.
[c33] The method of claim 32, wherein the directory service is lightweight directory access protocol compliant.
[c34] A method of integrating via a dial-up interface, comprising: sending session initiation information from a dial-up client to a PKI-Bridge; checking session initiation information by the PKI-Bridge; generating a challenge string by a server-side cryptographic function; forwarding the challenge string to a custom script dynamically linked library; forwarding the challenge string to a client-side cryptographic function from the custom script dynamically linked library; utilizing a private key from a security device; generating a response string; signing the response string with the private key of a dial-in user; forwarding a signed response string to the custom script dynamically linked library; dividing the signed response string into packets; forwarding packets to the PKI-Bridge; reconstructing the signed response string from packets; forwarding a reconstructed signed response string to the server-side cryptographic function; obtaining a public key of the dial-in user; verifying the reconstructed signed response string using the server-side cryptographic function; reading the security device by a security device reader; encoding the signed response string; decoding the signed response string; forwarding the challenge string to the dial-up client; forwarding the challenge string to the PKI-Bridge; and forwarding packets from the custom script dynamically linked library.
An apparatus of integrating via a dial-up interface, comprising: means for sending session initiation information from a dial-up client to a PKI- Bridge; means for checking session initiation information by the PKI-Bridge; means for generating a challenge string by a server-side cryptographic function; means for forwarding the challenge string to a custom script dynamically linked library; means for forwarding the challenge string to a client-side cryptographic function from the custom script dynamically linked library; means for utilizing_a private key from a security device; means for generating a response string; means for signing the response string with the private key of a dial-in user; means for forwarding a signed response string to the custom script dynamically linked library; means for dividing the signed response string into packets; means for forwarding packets to the PKI-Bridge; means for reconstructing the signed response string from packets; means for forwarding a reconstructed signed response string to the server-side cryptographic function; means for obtaining a public key of the dial-in user; and means for verifying the reconstructed signed response string using the server- side cryptographic function.
PCT/US2002/002234 2001-01-25 2002-01-25 A system and method for providing integration via a dial-up interface WO2002073875A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA002436385A CA2436385C (en) 2001-01-25 2002-01-25 A system and method for providing integration via a dial-up interface
EP02720851A EP1374478A4 (en) 2001-01-25 2002-01-25 A system and method for providing integration via a dial-up interface

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US24610101P 2001-01-25 2001-01-25
US60/264,101 2001-01-25
US09/982,072 US7246238B2 (en) 2001-01-25 2001-10-18 System and method for providing integration via a dial-up interface
US09/982,072 2001-10-18

Publications (1)

Publication Number Publication Date
WO2002073875A1 true WO2002073875A1 (en) 2002-09-19

Family

ID=56290244

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/002234 WO2002073875A1 (en) 2001-01-25 2002-01-25 A system and method for providing integration via a dial-up interface

Country Status (2)

Country Link
CA (1) CA2436385C (en)
WO (1) WO2002073875A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596904A (en) * 2020-04-29 2020-08-28 赵新伟 Embedded C language script programming method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691533B (en) * 2021-08-24 2023-02-14 武汉光影智能技术有限公司 Aggregation method and system for router capability interface

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US5602918A (en) 1995-12-22 1997-02-11 Virtual Open Network Environment Corp. Application level security system and method
US5784463A (en) 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
WO1999057846A1 (en) 1998-05-06 1999-11-11 Kyberpass Corp. User authentication using a virtual private key
US6158011A (en) 1997-08-26 2000-12-05 V-One Corporation Multi-access virtual private network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US5602918A (en) 1995-12-22 1997-02-11 Virtual Open Network Environment Corp. Application level security system and method
US5784463A (en) 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US6158011A (en) 1997-08-26 2000-12-05 V-One Corporation Multi-access virtual private network
WO1999057846A1 (en) 1998-05-06 1999-11-11 Kyberpass Corp. User authentication using a virtual private key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1374478A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111596904A (en) * 2020-04-29 2020-08-28 赵新伟 Embedded C language script programming method

Also Published As

Publication number Publication date
CA2436385A1 (en) 2002-09-19
CA2436385C (en) 2008-05-27

Similar Documents

Publication Publication Date Title
US7246238B2 (en) System and method for providing integration via a dial-up interface
US7171556B2 (en) VPN enrollment protocol gateway
US7366900B2 (en) Platform-neutral system and method for providing secure remote operations over an insecure computer network
US7627896B2 (en) Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US6198824B1 (en) System for providing secure remote command execution network
EP1782324B1 (en) A personal token and a method for controlled authentication
US7062781B2 (en) Method for providing simultaneous parallel secure command execution on multiple remote hosts
US7496755B2 (en) Method and system for a single-sign-on operation providing grid access and network access
US7392390B2 (en) Method and system for binding kerberos-style authenticators to single clients
US20040030887A1 (en) System and method for providing secure communications between clients and service providers
US20030217148A1 (en) Method and apparatus for LAN authentication on switch
US20080022085A1 (en) Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system
US20070067835A1 (en) Remote unblocking with a security agent
EP1902539A2 (en) User mapping information extension for protocols
JP2001186122A (en) Authentication system and authentication method
JP5186648B2 (en) System and method for facilitating secure online transactions
CA2436385C (en) A system and method for providing integration via a dial-up interface
WO2007030517A2 (en) Systems and methods for third-party authentication

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2002720851

Country of ref document: EP

Ref document number: 2436385

Country of ref document: CA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2002720851

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Ref document number: JP