WO2011090432A1 - Portable memory device with authentication and authentication method and system - Google Patents

Portable memory device with authentication and authentication method and system Download PDF

Info

Publication number
WO2011090432A1
WO2011090432A1 PCT/SG2010/000013 SG2010000013W WO2011090432A1 WO 2011090432 A1 WO2011090432 A1 WO 2011090432A1 SG 2010000013 W SG2010000013 W SG 2010000013W WO 2011090432 A1 WO2011090432 A1 WO 2011090432A1
Authority
WO
WIPO (PCT)
Prior art keywords
code
unique code
encryption
module
memory device
Prior art date
Application number
PCT/SG2010/000013
Other languages
French (fr)
Inventor
Joon Yong Wayne Tan
Original Assignee
T-Data Systems (S) Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by T-Data Systems (S) Pte Ltd filed Critical T-Data Systems (S) Pte Ltd
Priority to PCT/SG2010/000013 priority Critical patent/WO2011090432A1/en
Publication of WO2011090432A1 publication Critical patent/WO2011090432A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • This invention relates to a portable memory device with authentication and an authentication method and system; and relates particularly, though not exclusively, to such a device, method and system to secure an authentication process.
  • Security of the authentication process may be required if there is a possibility of a "sniffing" of the password and/or a replay attack.
  • a method to secure an authentication process for a portable memory device operatively connected to a host computer includes an encryption module of the portable memory device generating a unique code and sending it to a login software module of the host computer.
  • the login software module encrypts the unique code and sends the encrypted unique code and a password to the encryption module.
  • the encryption module decrypts the encrypted code to obtain the code for validation, and authenticates the password.
  • a system to secure an. authentication process for a portable memory device operatively connectable to a host computer comprising an encryption module and the host computer comprising a login software module.
  • the encryption module is configured to generate a unique code and send it to the login software module.
  • the login software module is configured to encrypt the unique code and send the encrypted unique code and a password to the encryption module.
  • the encryption module is further configured to decrypt the encrypted code to obtain the code for validation, and to authenticate the password.
  • a portable memory device configured to be operatively connected to a host computer.
  • the portable memory device comprises an encryption module configured to generate a unique code and send the unique code to a login software module of the host computer.
  • the encryption module is further configured to receive from the login software module an encryption of the unique code and a password, and to decrypt the encrypted code to obtain the code for validation, and also to authenticate the password
  • the password may be encrypted or hashed by the login software module before being sent to the encryption module.
  • the encryption or hashing of the password may be by use of the code or a derivative of the code.
  • the login software module may establish a secure communication channel between the login software module and the encryption module before the encryption module generates the unique code. All communication between the login software module and the encryption module may be over the secure communication channel.
  • the unique code may be selected from: a number, a series of letters, a series of numbers, characters, or any combination of them.
  • the unique code may be used for the one communication session. A different unique code may be generated for each communication session.
  • Encryption may comprise hashing and decryption may comprise unhashing.
  • Figure 1 is a schematic view of an exemplary system of a portable memory device connectable to ' a host apparatus to enable authentication of a user;
  • Figure 2 is a block diagram illustrating the exemplary portable memory device and a part of the host apparatus of Figure 1 ;
  • Figure 3 is flow chart for the operation of the exemplary embodiment of Figures 1 and 2; and Figure 4 is a flow chart illustrating an additional process to that of Figure 3.
  • the host computer 100 may be of any suitable form such as, for example, desktop computer, personal computer, laptop computer, notebook computer, server, tablet computer, personal digital assistant, digital diary, or mobile/cellular telephone.
  • connection of the portable memory device 200 with the host computer 100 may be direct or indirect. If direct it may be by the USB connector 208 of the portable memory device 200 engaging with a USB port 108 of the host computer 100. If indirect, it may be by any suitable wireless connection such as Bluetooth or WiFi; or by use of a cable (not shown).
  • the portable memory device 200 has the USB connector 208 and a USB interface 212 operatively connected to a controller 204.
  • a memory module 202 is also operatively connected to the controller 204.
  • the memory module 202 may, for example, be a flash memory module. However, it may be of any suitable form of non-volatile memory.
  • a login software module 110 in the host computer 100 establishes a secure channel 300 with the encryption module 210 of the portable memory device 200 (302).
  • This may be by any suitable and known secure channel communication system.
  • the secure channel 300 provides a first level of protection against "sniffing" of the password over the communication channel, and thus the possibility of a replay attack as all communication between the login software module 110 and the encryption module 210 is over the secure
  • a one-time password challenge is used.
  • the encryption module 210 generates a unique challenge code (303).
  • the code may be a number, a series of letters, a series of numbers, characters, or any combination of them.
  • the code is used for the one communication session. A different code is generated for each communication session.
  • the code is sent by the encryption module 210 to the login software module 110 of the host computer 100 over the secure communications channel 300.
  • the login software module 110 encrypts or hashes the code to obtain an encrypted or hashed code (304).
  • the login software module 110 of the host computer 100 uses the secure communication channel 300 to send the encrypted or hashed code and the password of a user of the host computer 00 to the encryption module 210 (305).
  • the encryption module 210 When the encryption module 210 receives the encrypted or hashed code and the password, it decrypts or unhashes the encrypted or hashed code to obtain the code to thus provide validation (306), and authenticates the password (307). This prevents a replay attack. If the validation is not successful (i.e. the code after decryption or unhashing is not the same as the code before encryption) and/or if the password is not authenticated, the secure communication channel 300 is closed and the session ends.
  • Figure 4 shows a variation where following (304) the login software module 110 also hashes or encrypts the password (405) with the code or a derivative of the code. The hashed or encrypted password is then sent with the encrypted or hashed code to the encryption module 210 over the secure channel 300 (406). The encryption module 210 then decrypts the code and the password (407), validates the code and authenticates the password (409). This provides an additional layer of protection against a replay attack.
  • the login software module 110 also hashes or encrypts the password (405) with the code or a derivative of the code.
  • the hashed or encrypted password is then sent with the encrypted or hashed code to the encryption module 210 over the secure channel 300 (406).
  • the encryption module 210 then decrypts the code and the password (407), validates the code and authenticates the password (409). This provides an additional layer of protection against a replay attack.
  • the foregoing description has described exemplary embodiments, it will be understood by those skilled in the technology concerned that many variations in details

Abstract

A method to secure an authentication process for a portable memory device operatively connected to a host computer is disclosed. The method includes an encryption module of the portable memory device generating a unique code and sending it to a login software module of the host computer. The login software module encrypts the unique code and sends the encrypted unique code and a password to the encryption module. The encryption module decrypts the encrypted code to obtain the code for validation, and authenticates the password. A corresponding system and a portable memory device are also disclosed.

Description

Portable Memory Device with Authentication and Authentication Method and System Technical Field
This invention relates to a portable memory device with authentication and an authentication method and system; and relates particularly, though not exclusively, to such a device, method and system to secure an authentication process.
Definitions
Throughout this specification a reference to encryption and its grammatical equivalents is to be taken as including a reference to hashing and its grammatical equivalents; and vice versa.
Background
When using a portable memory device able to be used with a host computer by a USB connection, authentication of the user may be required when secure data is involved.
Security of the authentication process may be required if there is a possibility of a "sniffing" of the password and/or a replay attack. Summary
According to a first exemplary aspect there is provided a method to secure an authentication process for a portable memory device operatively connected to a host computer. The method includes an encryption module of the portable memory device generating a unique code and sending it to a login software module of the host computer. The login software module encrypts the unique code and sends the encrypted unique code and a password to the encryption module. The encryption module decrypts the encrypted code to obtain the code for validation, and authenticates the password.
According to a second aspect there is provided a system to secure an. authentication process for a portable memory device operatively connectable to a host computer. The portable memory device comprises an encryption module and the host computer comprising a login software module. The encryption module is configured to generate a unique code and send it to the login software module. The login software module is configured to encrypt the unique code and send the encrypted unique code and a password to the encryption module. The encryption module is further configured to decrypt the encrypted code to obtain the code for validation, and to authenticate the password. According to a third aspect there is provided a portable memory device configured to be operatively connected to a host computer. The portable memory device comprises an encryption module configured to generate a unique code and send the unique code to a login software module of the host computer. The encryption module is further configured to receive from the login software module an encryption of the unique code and a password, and to decrypt the encrypted code to obtain the code for validation, and also to authenticate the password
For all aspects the password may be encrypted or hashed by the login software module before being sent to the encryption module. The encryption or hashing of the password may be by use of the code or a derivative of the code. The login software module may establish a secure communication channel between the login software module and the encryption module before the encryption module generates the unique code. All communication between the login software module and the encryption module may be over the secure communication channel. The unique code may be selected from: a number, a series of letters, a series of numbers, characters, or any combination of them. The unique code may be used for the one communication session. A different unique code may be generated for each communication session. Encryption may comprise hashing and decryption may comprise unhashing. Brief Description of the Drawings
In order that the invention may be fully understood and readily put into practical effect there shall now be described by way of non-limitative example only exemplary embodiments, the description being with reference to the accompanying illustrative drawings. In the drawings:
Figure 1 is a schematic view of an exemplary system of a portable memory device connectable to' a host apparatus to enable authentication of a user;
Figure 2 is a block diagram illustrating the exemplary portable memory device and a part of the host apparatus of Figure 1 ;
Figure 3 is flow chart for the operation of the exemplary embodiment of Figures 1 and 2; and Figure 4 is a flow chart illustrating an additional process to that of Figure 3.
Detailed Description of the Exemplary Embodiments
To refer to Figures 1 and 2 there is shown a host computer 100 to which is operatively connectable a portable memory device 200. The host computer 100 may be of any suitable form such as, for example, desktop computer, personal computer, laptop computer, notebook computer, server, tablet computer, personal digital assistant, digital diary, or mobile/cellular telephone.
The connection of the portable memory device 200 with the host computer 100 may be direct or indirect. If direct it may be by the USB connector 208 of the portable memory device 200 engaging with a USB port 108 of the host computer 100. If indirect, it may be by any suitable wireless connection such as Bluetooth or WiFi; or by use of a cable (not shown).
The portable memory device 200 has the USB connector 208 and a USB interface 212 operatively connected to a controller 204. A memory module 202 is also operatively connected to the controller 204. The memory module 202 may, for example, be a flash memory module. However, it may be of any suitable form of non-volatile memory.
Also operatively connected to, or integral with, the controller 204 is a firmware module 206. Also operatively connected to, or integral with, the controller 204 is an encryption module 210. The operation is shown in Figures 3 and 4. When the portable memory device 200 is operatively connected with host computer 100 (301 ), a login software module 110 in the host computer 100 establishes a secure channel 300 with the encryption module 210 of the portable memory device 200 (302). This may be by any suitable and known secure channel communication system. The secure channel 300 provides a first level of protection against "sniffing" of the password over the communication channel, and thus the possibility of a replay attack as all communication between the login software module 110 and the encryption module 210 is over the secure
communications channel 300.
To further secure the user authentication process a one-time password challenge is used. For this the encryption module 210 generates a unique challenge code (303). The code may be a number, a series of letters, a series of numbers, characters, or any combination of them. The code is used for the one communication session. A different code is generated for each communication session. The code is sent by the encryption module 210 to the login software module 110 of the host computer 100 over the secure communications channel 300. Upon receiving the code the login software module 110 encrypts or hashes the code to obtain an encrypted or hashed code (304). The login software module 110 of the host computer 100 uses the secure communication channel 300 to send the encrypted or hashed code and the password of a user of the host computer 00 to the encryption module 210 (305).
When the encryption module 210 receives the encrypted or hashed code and the password, it decrypts or unhashes the encrypted or hashed code to obtain the code to thus provide validation (306), and authenticates the password (307). This prevents a replay attack. If the validation is not successful (i.e. the code after decryption or unhashing is not the same as the code before encryption) and/or if the password is not authenticated, the secure communication channel 300 is closed and the session ends.
Figure 4 shows a variation where following (304) the login software module 110 also hashes or encrypts the password (405) with the code or a derivative of the code. The hashed or encrypted password is then sent with the encrypted or hashed code to the encryption module 210 over the secure channel 300 (406). The encryption module 210 then decrypts the code and the password (407), validates the code and authenticates the password (409). This provides an additional layer of protection against a replay attack. Whilst the foregoing description has described exemplary embodiments, it will be understood by those skilled in the technology concerned that many variations in details of design, construction and/or operation may be made without departing from the present invention.

Claims

The Claims:
1. A method to secure an authentication process for a portable memory device operatively connected to a host computer, the method comprising:
an encryption module of the portable memory device generating a unique code and sending it to a login software module of the host computer;
the login software module encrypts the unique code and sends the encrypted unique code and a password to the encryption module;
the encryption module decrypts the encrypted code to obtain the code for validation; and
the encryption module authenticates the password.
2. A method as claimed in claim 1 , wherein the password is encrypted or hashed by the login software module before being sent to the encryption module.
3. A method as claimed in claim 2, wherein the encryption or hashing of the password is by use of the code or a derivative of the code.
4. A method as claimed in any one of claims 1 to 3, wherein the login software module establishes a secure communication channel between the login software module and the encryption module before the encryption module generates the unique code.
5. A method as claimed in claim 4, wherein all communication between the login software module and the encryption module is over the secure communication channel.
6. A method as claimed in any one of claims 1 to 5, wherein the unique code is selected from the group consisting of: a number, a series of letters, a series of numbers, characters, or any combination of them.
7. A method as claimed in any one of claims 1 to 6, wherein the unique code is used for the one communication session.
8. ' A method as claimed in any one of claims 1 to 7, wherein a different unique code is generated for each communication session.
9. A method as claimed in any one of claims 1 to 8, wherein encryption comprises hashing, and decryption comprises unhashing.
10. A system to secure an authentication process for a portable memory device operatively connectable to a host computer, the portable memory device comprising an encryption module and the host computer comprising a login software module; the encryption module being configured to generate a unique code and send it to the login software module; the login software module being configured to encrypt the unique code and send the encrypted unique code and a password to the encryption module; the encryption module being configured to decrypt the encrypted code to obtain the code for validation and to authenticate the password.
11. A system as claimed in claim 10, wherein the login software module is configured to encrypt the password or obtain a hash of the password before being sent to the encryption module.
12. A system method as claimed in claim 11 , wherein the encryption or hashing of the password is by use of the code or a derivative of the code.
13. A system as claimed in any one of claims 10 to 12, wherein the login software module is configured to establish a secure communication channel between the login software module and the encryption module before the encryption module generates the unique code.
14. A system as claimed in claim 13, wherein all communication between the login software module and the encryption module is over the secure communication channel.
15. A system as claimed in any one of claims 10 to 14, wherein the unique code is selected from the group consisting of: a number, a series of letters, a series of numbers, characters, or any combination of them.
16. A system as claimed in any one of claims 10 to 15, wherein the unique code is used for the one communication session.
17. A system as claimed in any one of claims 10 to 16, wherein a different unique code is generated for each communication session.
18. A system as claimed in any one of claims 10 to 17, wherein encryption comprises hashing, and decryption comprises unhashing.
19. A portable memory device configured to be operatively connected to a host computer, the portable memory device comprising:
an encryption module configured to generate a unique code and send the unique code to a login software module of the host computer;
the encryption module being further configured to receive from the login software module an encryption of the unique code and a password, and to decrypt the encrypted code to obtain the code for validation and also to authenticate the password.
20. A portable memory device as claimed in claim 19, wherein the unique code is selected from the group consisting of: a number, a series of letters, a series of numbers, characters, or any combination of them.
21. A portable memory device as claimed in claim 19 or claim 20, wherein the unique code is used for the one communication session.
22. A portable memory device as claimed in any one of claims 19 to 21 , wherein a different unique code is generated for each communication session.
23. A portable memory device as claimed in any one of claims 19 to 22, wherein encryption comprises hashing, and decryption comprises unhashing.
PCT/SG2010/000013 2010-01-19 2010-01-19 Portable memory device with authentication and authentication method and system WO2011090432A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2010/000013 WO2011090432A1 (en) 2010-01-19 2010-01-19 Portable memory device with authentication and authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2010/000013 WO2011090432A1 (en) 2010-01-19 2010-01-19 Portable memory device with authentication and authentication method and system

Publications (1)

Publication Number Publication Date
WO2011090432A1 true WO2011090432A1 (en) 2011-07-28

Family

ID=44307068

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2010/000013 WO2011090432A1 (en) 2010-01-19 2010-01-19 Portable memory device with authentication and authentication method and system

Country Status (1)

Country Link
WO (1) WO2011090432A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106817671A (en) * 2017-02-14 2017-06-09 腾讯科技(深圳)有限公司 A kind of networked information sharing method, first terminal and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050250473A1 (en) * 2004-05-04 2005-11-10 Research In Motion Limited Challenge response system and method
US7139915B2 (en) * 1998-10-26 2006-11-21 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US20090193511A1 (en) * 2008-01-30 2009-07-30 Vasco Data Security, Inc. Two-factor usb authentication token

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7139915B2 (en) * 1998-10-26 2006-11-21 Microsoft Corporation Method and apparatus for authenticating an open system application to a portable IC device
US20050250473A1 (en) * 2004-05-04 2005-11-10 Research In Motion Limited Challenge response system and method
US20090193511A1 (en) * 2008-01-30 2009-07-30 Vasco Data Security, Inc. Two-factor usb authentication token

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106817671A (en) * 2017-02-14 2017-06-09 腾讯科技(深圳)有限公司 A kind of networked information sharing method, first terminal and system

Similar Documents

Publication Publication Date Title
US9455830B2 (en) Method for securing credentials in a remote repository
CN109923830B (en) System and method for configuring wireless network access device
EP2314090B1 (en) Portable device association
CN103152366B (en) Obtain the method for terminal authorization, terminal and server
US8099761B2 (en) Protocol for device to station association
WO2015180691A1 (en) Key agreement method and device for verification information
KR101239297B1 (en) System for protecting information and method thereof
WO2015192670A1 (en) User identity authentication method, terminal and service terminal
US20110159848A1 (en) Methods and apparatus for provisioning devices with secrets
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
US20100250796A1 (en) Establishing a Secure Channel between a Server and a Portable Device
CN109361508B (en) Data transmission method, electronic device and computer readable storage medium
JP2012530311A5 (en)
US8397281B2 (en) Service assisted secret provisioning
US11196721B2 (en) Systems and methods for establishing a secure communication channel between an information handling system and a docking station
WO2014180198A1 (en) Access method, system, and device of terminal, and computer storage medium
US9313185B1 (en) Systems and methods for authenticating devices
CN101621794A (en) Method for realizing safe authentication of wireless application service system
WO2010023506A1 (en) Methods, apparatuses, computer program products, and systems for providing secure pairing and association for wireless devices
KR100668446B1 (en) Safe --method for transferring digital certificate
CA2813765C (en) A method for securing credentials in a remote repository
CN102404337A (en) Data encryption method and device
US9654455B2 (en) Communication system, communication device, key management apparatus, and communication method
CN108199851B (en) Data secure transmission method, device and system
EP3149883B1 (en) Management of cryptographic keys

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10844084

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10844084

Country of ref document: EP

Kind code of ref document: A1