Language selection

Search

Patent 2317211 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2317211
(54) English Title: FLEXIBLE METHOD OF SECURITY DATA BACKUP
(54) French Title: METHODE FLEXIBLE DE SAUVEGARDE DE DONNEES DE SECURITE
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 12/16 (2006.01)
  • G06F 21/34 (2013.01)
  • H04L 09/08 (2006.01)
  • H04L 09/32 (2006.01)
  • H04L 12/22 (2006.01)
(72) Inventors :
  • HAMID, LAURENCE (Canada)
  • HILLHOUSE, ROBERT D. (Canada)
(73) Owners :
  • ACTIVCARD IRELAND LIMITED
(71) Applicants :
  • ACTIVCARD IRELAND LIMITED (Ireland)
(74) Agent: AVENTUM IP LAW LLP
(74) Associate agent:
(45) Issued:
(22) Filed Date: 2000-09-01
(41) Open to Public Inspection: 2002-03-01
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract


A method of supporting a substantially secure backup copy of a key-server
database, said database comprising security information specific to a
plurality of users,
absent the need for a duplicate key-server is disclosed. According to the
method, each
individual's security data is stored within the key-server database and is
also stored on a
portable data storage device, such as a smart card or a PCMCIA token. If the
key-server
crashes and the database stored thereon is lost, a duplicate key-server
database is
reconstructed using the aggregate of the partial database files stored on each
individual's
portable data storage device. Similarly, when a portable data storage device
is lost, it can
be rebuilt from the data stored within the key-server.


Claims

Note: Claims are shown in the official language in which they were submitted.


Claims
What is claimed is:
1. A method of restoring data of a key-server in communication with a
communication
network comprising the steps of:
providing the key-server in communication with the communication network;
providing to at least a computer in communication with the communication
network, a
plurality of portable data storage devices each having stored thereon security
data relating
to a single authorized user;
copying from each of the plurality of portable data storage devices, security
data relating
to the single authorized user;
2. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 1 wherein the step of copying comprises the steps
of:
forming a secure communication session between at least one of the plurality
of portable
data storage devices and the key-server;
transferring the security data via the secure communication session from the
portable data
storage device to the key-server; and,
storing the transferred security data within memory means of the key-server.
3. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein the plurality of portable data storage
devices
comprise all the security data to be restored in the key-server.
4. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 3 wherein the plurality of portable data storage
devices
includes memory having stored therein security data relating to each single
authorized
user of the communication network.
5. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein the portable data storage device
includes a
15

processor for ciphering data using the security data stored therein and
comprising the
steps of:
providing cryptographic functions within the portable data storage device
using the
security data stored therein.
6. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein the key-server includes a processor for
ciphering
data using the security data stored therein and comprising the steps of
providing cryptographic functions within the key-server using the security
data stored
therein.
7. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 6 comprising the steps of:
determining at least an available user information entry device from a
plurality of known
user information entry devices;
receiving unique user identification information via the at least an available
user
information entry device; and,
registering the received user identification information against security data
for that user
stored in the key-server;
wherein, when the user identification information is indicative of an
authorized user the
step of ciphering data is performed with security data associated with the
authorized user.
8. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 3 wherein each of the plurality of portable data
storage
devices are provided at each of a plurality of computers in communication with
the
network.
9. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 8 wherein the portable data storage device is one
of a token
and a smart card.
16

10. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein the portable data storage device is one
of a token
and a smart card.
11. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein at least a portable data storage device
provides
dedicated cryptographic functions for the at least a computer in communication
with the
communication network using the security data stored internal to the at least
a portable
data storage device.
12. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 11 wherein the security data stored internal to
the at least a
portable data storage device are not accessible in a useable form from outside
of the key-
server and the at least a portable data storage device.
13. A method of restoring data of a key-server in communication with a
communication
network as defined in claim 2 wherein the key-server provides dedicated
cryptographic
functions for the at least a computer in communication with the communication
network
using the security data stored internal to the key-server.
14. A method of backing up data of a key-server in communication with a
communication network comprising the steps of:
providing the key-server in communication with the communication network, the
key-
server having stored thereon the unique user identification information for a
plurality of
authorized users of the communication network and the security data for use by
the
specific authorized user in accessing data within the network;
providing to at least a computer in communication with the communication
network, a
portable data storage device;
receiving user identification data indicative of an authorized user of the
communication
network; and,
17

copying from the key-server to the portable data storage device, security data
relating to
the authorized user for use by the specific authorized user in accessing data
within the
network.
15. A method of backing up data of a key-server in communication with a
communication network as defined in claim 14 wherein the step of copying
comprises the
steps of:
forming a secure communication session between the key-server and the portable
data
storage device;
transferring the security data relating to a specific authorized user via the
secure
communication session from the key-server to the portable data storage device
assigned
to that specific authorized user; and,
storing the transferred security data relating to a specific authorized user
within the
memory means of the portable data storage device.
16. A method of backing up data of a key-server in communication with a
communication network as defined in claim 15 wherein security data specific to
each of a
plurality of authorized users of the communication network is stored on a
separate
portable data storage device assigned uniquely to one of the plurality of
authorized users,
wherein the security data of the key-server is partially stored within each
portable data
storage device and wherein all data within the plurality of portable data
storage devices is
sufficient to restore security data to the key-server in the event of a data
loss thereto.
17. A method of backing up data of a key-server in communication with a
communication network as defined in claim 15 wherein the portable data storage
device
includes a processor for ciphering data using the security data stored therein
and
comprising the steps of
providing cryptographic functions within the portable data storage device
using the
security data stored therein.
18

18. A method of backing up data of a key-server in communication with a
communication network as defined in claim 15 wherein the key-server includes a
processor for ciphering data using the security data stored therein and
comprising the
steps of:
providing cryptographic functions within the key-server using the security
data stored
therein.
19. A method of backing up data of a key-server in communication with a
communication network as defined in claim 18 comprising the steps of:
determining at least an available user information entry device from a
plurality of known
user information entry devices;
receiving unique user identification information via the at least an available
user
information entry device; and,
registering the received user identification information against security data
for that user
stored in the key-server,
wherein, when the user identification information is indicative of an
authorized user, the
step of ciphering data is performed with security data associated with the
authorized user
20. A method of backing up data of a key-server in communication with a
communication network as defined in claim 16 wherein each of the plurality of
portable
data storage devices are provided at each of a plurality of computers in
communication
with the network.
21. A method of backing up data of a key-server in communication with a
communication network as defined in claim 20 wherein the portable storage
device is one
of a smart card and a PCMCIA token.
22. A method of backing up data of a key-server in communication with a
communication network as defined in claim 16 wherein the portable storage
device is one
of a smart card and a PCMCIA token.
19

23. A method of backing up data of a key-server in communication with a
communication network as defined in claim 15 wherein the portable data storage
device
provides dedicated cryptographic functions for the at least a computer in
communication
with the communication network using security data stored internal to the
portable data
storage device.
24. A method of backing up data of a key-server in communication with a
communication network as defined in claim 23 wherein the security data stored
internal
to the portable data storage device are not accessible from outside of the key-
server and
the portable data storage device.
25. A method of backing up data of a key-server in communication with a
communication network as defined in claim 15 wherein the key-server provides
dedicated cryptographic functions for the at least a computer in communication
with the
communication network using security data stored internal to the key-server.
26. A method of backing up data of a key-server in communication with a
communication network as defined in claim 25 wherein the security data stored
internal
to the key-server are not accessible in a useable from outside of the key-
server and the
portable data storage device.
27. A method of authenticating an individual for allowing access to secure
data or secure
keys stored on a communication network when other than in communication with a
central key-server comprising the steps of:
providing at least a computer in communication with the communication network;
determining at least an available user information entry device from a
plurality of known
user information entry devices;
determining the availability of one of a key-server and a portable data
storage device in
communication with the computer;
receiving user identification information via the at least an available user
information
entry device;
20

authenticating the individual for access to at least one of the secure data
and secure keys
stored on the determined one of a key-server and a portable data storage
device.
28. A method as defined in claim 27 wherein when a portable data storage
device is
present the determined one of a key-server and a portable data storage device
is the
portable data storage device and the received user identification information
is registered
against user identification information stored in the memory means of the
portable data
storage device.
29. A method as defined in claim 28 comprising the steps of:
receiving unique user identification information via the at least an available
user
information entry device;
registering the received user identification information against security data
for that user
stored in the portable data storage device; and,
providing secure keys to the user to allow access to encrypted data files that
the user has
been authenticated to access.
30. A method as defined in claim 28 comprising the steps of:
receiving unique user identification information via the at least an available
user
information entry device;
registering the received user identification information against security data
for that user
stored in the portable data storage device; and,
providing cryptographic functions within the portable data storage device
using the
secure keys associated with the authenticated user.
31. A method as defined in claim 28 wherein when a portable data storage
device is other
than present prompting the user to provide a portable data storage device.
32. A method as defined in claim 28 wherein other than when the user provides
a
portable data storage device a key-server in communication with the
communication
network is the determined one of a key-server and a portable data storage
device.
21

33. A method as defined in claim 32 comprising the steps of:
receiving unique user identification information via the at least an available
user
information entry device;
registering the received user identification information against security data
for that user
stored in the key-server; and,
providing secure keys to the user to allow access to encrypted data files that
the user has
been authenticated to access.
34. A method as defined in claim 32 comprising the steps of:
receiving unique user identification information via the at least an available
user
information entry device;
registering the received user identification information against security data
for that user
stored in the key-server; and,
providing cryptographic functions within the key-server using the secure keys
associated
with the authenticated user.
35. A method as defined in claim 31 wherein the portable data storage device
is one of a
smart card and a PCMCIA token
36. A method as defined in claim 35 wherein the portable data storage device
in the form
of a PCMCIA token provides dedicated cryptographic functions for the computer
using
security data stored internal to the PCMCIA token.
37. A method as defined in claim 36 wherein the security data stored internal
to the
PCMCIA token are not accessible from outside of the PCMCIA token and therefore
cannot be extracted or otherwise read by an unauthorized third party.
38. A method as defined in claim 32 wherein the user information entry device
is a
biometric information entry device.
22

39. A method as defined in claim 31 wherein a portable data storage device is
used to
provide an individual with access to a predetermined set of keys in a
plurality of different
locations.
40. A method as defined in claim 39 wherein the method of user authentication
required
at work is other than the method of user authentication required elsewhere.
41. A method as defined in claim 27 wherein the portable data storage device
provides
dedicated cryptographic functions for the computer using security data stored
internal to
the portable data storage device.
42. A method as defined in claim 41 wherein the security data stored internal
to the
portable data storage device are not accessible in a useable from outside of
the key-server
and the portable data storage devices.
43. A method as defined in claim 27 wherein the key-server provides dedicated
cryptographic functions for the computer using security data stored internal
to the key-
server.
44. A method as defined in claim 43 wherein the security data stored internal
to the key-
server are not accessible from outside of the key-server and the portable data
storage
devices.
23

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
Flexible Method of Security Data Backup
Field of the Invention
This invention relates generally to authorization of individuals and more
particularly relates to a method of storing security data in a secure and
retrievable
fashion.
Background of the Invention
Computer security is fast becoming an important issue. With the proliferation
of
computers and computer networks into all aspects of business and daily life -
financial,
medical, education, government, and communications - the concern over secure
file
access is growing. Using passwords is a common method of providing security.
Password
protection and/or combination type locks are employed for computer network
security,
automatic teller machines, telephone banking, calling cards, telephone
answering
services, houses, and safes. These systems generally require the knowledge of
an entry
code that has been selected by a user or has been preset.
Preset codes are often forgotten, as users have no reliable method of
remembering
them. Writing down the codes and storing them in close proximity to an access
control
device (i.e. the combination lock) results in a secure access control system
with a very
insecure code. Alternatively, the nuisance of trying several code variations
renders the
access control system more of a problem than a solution.
Password systems are known to suffer from other disadvantages as well. In most
cases, a user specifies the password . Most users, being unsophisticated users
of security
systems, choose passwords that have a personal connection or significance;
this practice
makes the password not only easy to remember but also relatively insecure. As
such,
many systems that rely solely on password protection are easily accessed by an
unauthorized third party through a simple trial and error process.
A security access system that provides substantially secure access and does
not
require a password or access code is a biometric identification system. A
biometric

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
identification system accepts unique biometric information from a user and
identifies the
user by matching the information against information belonging to registered
users of the
system. One such biometric identification system is a fingerprint recognition
system. In
this type of system, the finger under investigation is usually pressed against
a flat surface,
such as a side of a glass plate; the ridge and valley pattern of the fingertip
is sensed by a
sensing means such as an interrogating light beam. Fingerprint identification
devices of
this nature are routinely used to control the building-access or information-
access of
individuals to buildings, rooms, and devices such as computer terminals.
Various optical devices are known which employ prisms upon which a finger
whose
print is to be identified is placed. The prism has a first surface upon which
a finger is placed,
a second surface disposed at some angle to the first surface through which the
fingerprint is
viewed and a third illumination surface through which light is directed into
the prism. In
some cases, the illumination surface is at an acute angle to the first
surface, as seen for
example, in US Patents 5,187,482 and 5,187,748. In other cases, the
illumination surface is
parallel to the first surface, as seen for example, in US Patents 5,109,427
and 5,233,404.
United States patent number 4,353,056 in the name of Tsikos issued October 5,
1982, discloses an alternative kind of fingerprint sensor that uses a
capacitive sensing
approach. The described sensor has a two-dimensional, row and column, array of
capacitors,
each comprising a pair of spaced electrodes, carried in a sensing member and
covered by an
insulating film. The sensors rely upon deformation to the sensing member
caused by a finger
being placed thereon so as to vary locally the spacing between capacitor
electrodes,
according to the ridge/trough pattern of the fingerprint, and hence, the
capacitance of the
capacitors. In one arrangement, the capacitors of each column are connected in
series with
the columns of capacitors connected in parallel and a voltage is applied
across the columns.
In another arrangement, a voltage is applied to each individual capacitor in
the array.
Sensing in the respective two arrangements is accomplished by detecting the
change of
voltage distribution in the series connected capacitors or by measuring the
voltage values of
the individual capacitances resulting from local deformation. To achieve this,
an individual
connection is required from the detection circuit to each capacitor.
2

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
The analysis of fingerprints is discussed in the following references, which
are
hereby incorporated by reference:
Xiao Qinghan and Bian Zhaoqi,: An approach to Fingerprint Identification By
Using the
Attributes of Feature Lines of Fingerprint," IEEE Pattern Recognition, pp 663,
1986;
C.B. Shelman, " Fingerprint Classification - Theory and Application," Proc. 76
Carnahan
Conference on Electronic Crime Countermeasures, 1976;
Feri Pernus, Stanko Kovacic, and Ludvik Gyergyek, "Minutaie Based Fingerprint
Registration," IEEE Pattern Recognition, pp 1380, 1980;
J.A. Ratkovic, F.W. Blackwell, and H.H. Bailey, "Concepts for a Next
Generation
Automated Fingerprint System," Proc. 78 Carnahan Conference on Electronic
Crime
Countermeasures, 1978;
K. Millard, " An approach to the Automatic Retrieval of Latent Fingerprints,"
Proc. 75
Carnahan Conference on Electronic Crime Countermeasures, 1975;
Moayer and K.S. Fu, "A Syntactic Approach to Fingerprint Pattern Recognition,"
Memo
Np. 73-18, Purdue University, School of Electrical Engineering, 1973;
Wegstein, An Automated Fingerprint Identifrcation System, NBS special
publication,
U.S. Department of Commerce/National Bureau of Standards, ISSN 0083-1883; no.
500-
89, 1982;
Moenssens, Andre A., Fingerprint Techniques, Chilton Book Co., 1971; and,
Wegstein and J.F. Rafferty, The LX39 Latent Fingerprint Matcher, NBS special
publication, U.S. Department of Commerce/National Bureau of Standards; no. 500-
36,
1978.
Although biometric authentication is a secure means of identifying a user, it
has
not penetrated the marketplace sufficiently to be on most desktops. Further,
since most
forms of biometric authentication require specialised hardware, market
penetration is
slow and requires both acceptance of the new hardware and a pressing need. The
motivation for a company to establish such sophisticated user authentication
systems,
despite the considerable time and resources that are involved, is the
potential that they
will incur even greater losses in the event that an unauthorized third party
gains access to
their secure files.
3

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
Secure files are often stored on a computer or network server only in an
encrypted
form. A user wishing to have access to an encrypted file must first be
authenticated as an
authorized user of the system. Once the user has been authenticated, a key is
provided to
the user for the purpose of decrypting the contents of the electronic file and
thus allowing
the user access to the file.
Key management systems are well known. One such system, by Entrust~
Technologies Limited is currently commercially available. Unfortunately,
current key
management systems are designed for installation on a single computer for use
with a
single fixed user authorization method and for portability between computers
having a
same configuration. As such, implementation of enhanced security through
installation of
biometric input devices is costly and greatly limits portability of key
databases. For
example, when using Entrust~ software to protect a key database, the database
is
portable on a smart card or on a floppy disk. The portable key database is a
duplicate of
the existing key database. User authentication for the portable key database
is identical to
that of the original key database. The implications of this are insignificant
when password
user authentication is employed; however, when biometric user authentication
such as
retinal scanning or fingerprint identification are used, the appropriate
biometric
identification system is required at each location wherein the portable key
database is
used.
To minimize the risk of key compromise the members of an organisation are
permitted to travel with limited portable key databases, preferably restricted
to the secure
keys of a single user.
Another system that is known for key management includes a key-server. A key-
server is a single system that provides keys to individuals upon
identification or
authorization. Such a system is useful in large organisations since it permits
changing of
system access codes without requiring every user to provide their personal key
data
storage device. Because of the extreme problems associated with losing secure
keys, it is
essential that a key-server be backed up appropriately. Further, it is
necessary that the
key-server be available at all times. This is currently achieved through
duplication of key-
4

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
servers. Unfortunately, key-servers are costly and this makes their
implementation
problematic in some instances. For example, a company performing a trial of a
new user
access system, such a fingerprint identification system, often purchases and
installs only a
handful of "test" workstations. Thus, to try out ten (10) fingerprint scanners
with a key-
s server configuration requires two robust key-servers having full backup
capabilities, a
main key-server and a duplicate key-server, and 10 fingerprint imagers. Since
a
fingerprint imager is likely to cost much less than 10% of the cost of the key-
servers, the
additional cost is extremely undesirable, dissuading potential customers from
performing
trials. Eliminating a need for a duplicate key-server would be highly
advantageous.
Another serious limitation of key management systems configured with a key-
server is that individuals do not have access to secure files when they are
other than at a
workstation in communication with the key-server. Individuals who are required
to fly
during a business trip may wish to avail themselves of the extra time to edit
a report, for
example, which is stored on a local hard drive within a portable computer. The
electronic
file containing the report, however, is stored only in an encrypted form. In
order to
decrypt the file, the user must first be authenticated by and then receive a
key from a key-
server. Since a key-server is generally other than accessible when the user is
other than
at work, the user's ability to perform tasks from remote locations is greatly
reduced. It
would be advantageous to provide a system to allow a user to gain access to a
system
using a portable key storage device and, as such, have access to a
predetermined set of
keys both at work and elsewhere.
Object of the Invention
In an attempt to overcome these and other limitations of the prior art, it is
an
object of this invention to provide a method of backing-up the secure key
information
stored on a main key-server without a need for a second duplicate key-server.
Summary of the Invention
According to this method, the secure key database that is stored on an
organizations main key-server is backed-up in a distributed fashion. Each user
carnes

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
with them only that part of the whole database that is related specifically to
that user.
Since the portable data storage device contains only those secure keys that
are assigned to
and associated with one specific user, only a small number of secure keys may
be
compromised in the event that a single portable data storage device is lost.
Further, when
the personal data storage device is in the form of a token, the secure keys
stored internal
to the token in non-volatile memory means and are not accessible outside the
module.
The keys cannot be viewed or extracted from the token in the event that it is
lost, thus
providing additional security.
In accordance with the invention there is provided a method of restoring data
of a
key-server in communication with a communication network comprising the steps
of:
providing the key-server in communication with the communication network;
providing
to at least a computer in communication with the communication network, a
plurality of
portable data storage devices each having stored thereon security data
relating to a single
authorized user; copying from each of the plurality of portable data storage
devices,
security data relating to the single authorized user.
In accordance with the invention there is also provided a method of backing up
data of a key-server in communication with a communication network comprising
the
steps of providing the key-server in communication with the communication
network,
the key-server having stored thereon the unique user identification
information for a
plurality of authorized users of the communication network and the security
data for use
by the specific authorized user in accessing data within the network;
providing to at least
a computer in communication with the communication network, a portable data
storage
device; receiving user identification data indicative of an authorized user of
the
communication network; and, copying from the key-server to the portable data
storage
device, security data relating to the authorized user for use by the specific
authorized user
in accessing data within the network.
In accordance with the invention there is further provided a method of
authenticating an individual for allowing access to secure data or secure keys
stored on a
communication network when other than in communication with a central key-
server
6

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
comprising the steps of providing at least a computer in communication with
the
communication network; determining at least an available user information
entry device
from a plurality of known user information entry devices; determining the
availability of
one of a key-server and a portable data storage device in communication with
the
computer; receiving user identification information via the at least an
available user
information entry device; authenticating the individual for access to at least
one of the
secure data and secure keys stored on the determined one of a key-server and a
portable
data storage device.
It is an advantage of the present invention that a user can gain access to a
system
using a portable key storage device and, as such, has access to a
predetermined set of
keys both at work and elsewhere. It is a further advantage that the portable
key storage
device acts as a data backup for a portion of the keys within the key-server
thus
eliminating a need to have a duplicate key-server.
It is another advantage of the present invention that the keys stored on the
key-
server and on the portable backup are secured against access by individuals
and that
security is maintainable even when copying keys.
Brief Description of the Drawings
An exemplary embodiment of the invention will now be described in conjunction
with the attached drawings, in which:
Fig. 1 a is a simplified block diagram of a prior art method of storing key
data on a main
key-server and of storing backup key data on a duplicate key-server is shown.
Fig. 1 b is a simplified block diagram of a prior art method of Fig. 1 a, in
which the
duplicate key-server has been activated following a crash of the main key-
server, is
shown
Fig. 2 is a simplified block diagram of another prior art method of storing
key data on a
users system without backup key data is shown.
7

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
Fig. 3 is a simplified block diagram of yet another prior art method of
storing key data on
a users system with backup key data stored on floppy disks is shown.
Fig. 4 is a method according to the invention of storing key data on a key-
server with
distributed backup key data stored remotely absent a second key-server is
shown.
Fig. 5 is a simplified flow diagram of a method implemented upon key-server
failure is
shown.
Fig. 6a is a simplified flow diagram of a method of user authorization making
use of
security data stored on a portable data storage device is shown.
Fig. 6b is a simplified flow diagram of a method of user authorization making
use of
security data stored on a locally available key-server is shown.
Fig. 7 is a simplified flow diagram of a method of replacing a portable data
storage
device is shown.
Detailed Description of the Invention
The invention is described with respect to passwords, tokens, and biometric
verification in the form of fingerprint registration. The method of this
invention is
applicable to other verification processes as is evident to those of skill in
the art.
One of the many problems associated with the use of a fingerprint biometric is
that a special contact-imaging device is required to image a fingerprint.
Today, many
systems and, in particular, many personal computers are not equipped with a
contact
imaging device. It is well known to outfit a network of workstations with
biometric
imaging devices in order to overcome these limitations. Unfortunately, for
those who
travel on business and need access to sensitive data in the form of network
data or
encrypted email, such a solution is not always possible and convenient.
Another known
solution is to travel with a portable contact-imaging device. Unfortunately,
the cost of
purchasing the special software and the additional hardware that are required
to
implement such a system makes this approach impractical in most cases. Also,
many
different biometric identification techniques are now known and available. It
is

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
impractical to install hardware and software in order to switch between
verification
methods. According to the invention, a method is proposed for providing a
flexible
authentication process that maintains security of an overall system without
causing undue
inconvenience or limitations.
One of the many factors slowing widespread introduction of fingerprint-based
authentication is the need for key-servers. A key-server is a mission critical
system for
providing fingerprint authentication data and other security data.
Unfortunately, in order
to run a trial of a fingerprint security system a main key-server and a
duplicate key-server
are necessary. Thus, a user is forced to purchase two mission critical quality
systems in
order to implement a field trial. When the field trial involves of thousands
of
workstations, it is cost effective. However, when the field trial is, as is
more typical, of 10
or 20 workstations, the costs for that trial are excessive.
Referring to Fig. 1 a, a simplified block diagram of a prior art method of
storing
key data on a main key-server 1 and of storing backup key data on a duplicate
key-server
4 is shown. As seen in the block diagram a main key-server 1 is provided with
all security
data relating to a network 2. A user wishing to access data on the network 2
via a
computer 3 provides user authorization information to the computer 3 using an
available
user information entry device 5, which is peripheral to the computer 3. If the
supplied
user authorization data matches the user authorization data stored on the key-
server, the
user is authenticated. The authorization process may occur within the computer
3 based
on data retrieved from the main key-server 1 or alternatively may occur on the
main key-
server 1 using data stored therein. The user now has access to data secured
with keys
stored on the main key-server 1 and to which the user is provided access. The
user
information entry device 5 may be a standard keyboard, or alternatively a
biometric
imaging device such as a fingerprint imager or a retina scanner. Of course,
the user
information entry device may also comprise any one of a plurality of other
known
devices, either individually or in combination with at least one other known
device,
depending upon the level of security that is required for a specific
application.
9

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
Referring to Fig. lb, a simplified block diagram of a prior art method of Fig.
1 a,
in which the duplicate key-server has been activated following a crash of the
main key-
server, is shown. When the main key-server 1 fails, the duplicate key-server 4
is
automatically activated by the action of some electronic switching means 6,
and
immediately begins providing identical services to those provided by the main
key-server
1. Using data mirroring techniques, the data within the main key-server 1 and
within the
duplicate key-server 4 are identical and as such, no data is lost and no
interruption to use
of the network 2 occurs.
Unfortunately, the prior art systems that require duplicate key-servers are
too
costly to be implemented for smaller networks. In addition, the complete loss
of both the
main key-server 1 and the duplicate key-server 4, for example as the result of
a fire,
flood, electrical system failure or another similar unforeseeable incident,
results in the
permanent or temporary loss of the secure key database. Such a catastrophic
occurrence
will result in the lengthy or even permanent inability of authorized
individuals to access
secure files etc. on the network.
Refernng to Fig. 2, a simplified block diagram of another prior art method of
storing key data on a user's computer system, absent backup key data, is
shown. Here, a
plurality of computers 21 is connected to a network 22. Each computer has
stored
thereon, key data specific to a user of that computer. The user logs onto the
computer and
has access to their key data. Such a system is problematic for many reasons.
Firstly, the
system is only as secure as each computer. Secondly, there is no central
control over keys
and access to keys. Thirdly, keys are easily lost during system upgrades or
crashes.
Fourthly, a user is confined to using a single computer within the network.
With today's
trends toward mobile offices and so forth, it would be advantageous not to
limit users in
any of these ways.
Referring to Fig. 3, a simplified block diagram of yet another prior art
method of
storing key data on a users computer 31 with backup key data stored on floppy
disks 33 is
shown. Here the chances of losing security data are reduced over those
presented with
reference to Fig. 2, but not by much. The floppy disks 33 now must be
centrally managed

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
to ensure correct labelling and to ensure that the data is actually backed up
according to a
regular schedule, and so forth. The use of an insecure medium, such as a
computer floppy
disk 33, also renders the backup key data stored thereon more vulnerable to
extraction
and use by an unauthorized third party.
As such, only the system of Fig. 1 meets the security objectives of most
business
needs. Unfortunately the system of Fig. 1 is too expensive to be implemented
on most
small-scale networks. In the case of a field trial of a small number of
biometric
information entry devices, say approximately fifty (50) fingerprint imagers,
the cost of
purchasing a duplicate key-server is very significant compared to the cost of
purchasing
the biometrics. Obviously, a method that obviates the need for a duplicate key-
server and
additionally provides a method for storing a duplicate secure key database
would be of
great value for use in small-scale networks.
Referring to Fig. 4, a method according to the invention of storing key data
on a
key-server with distributed backup key data stored remotely on portable data
storage
devices and absent a duplicate key-server is shown. Here a key-server 41 is
shown
coupled to a plurality of computers 43. Each computer 43 has an interface (not
shown)
for interfacing with a portable data storage device 44 in the form of a token
or a smart
card. Of course another portable data storage device is also useful, such as a
floppy disk.
Within the key-server 41 is stored all security data including user
authentication
data and secure keys. Each individual also maintains a personal copy of the
secure data
and of the authentication data within their own portable data storage device
44. When a
user seeks to access the network, they provide their portable data storage
device 44 and
then authorize themselves. Thus, the functions of key-server 41 are not
required by most
individuals, such individuals being engaged only in routine activities while
at a
workplace. Occasionally, individuals may be required to provide their portable
data
storage device for the transfer of updated or revised security data from the
key-server;
however, this is not considered a routine activity.
When the user forgets their portable data storage device 44, the data is
available
from the key-server 41. Thus access to the network is still available. When
the portable
11

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
data storage device 44 is lost, it can be reissued by copying the data again
from the key-
server 41. Conversely, when the key-server 41 crashes, its data files are
rebuilt from each
of the portable data storage devices 44. As such, the need for a backup key-
server is
obviated. In particular, the use of portable data storage devices 44 for
storing personal
key data and for use in the authorization and key management functions of
security
results in a situation wherein use of the key-server 41 is limited to very
specific
circumstances -lost portable data storage device, forgotten portable data
storage device,
etc. As long as a portable data storage device isn't lost on the same day as a
key-server
failure including data loss, all data is recoverable. As such the duplicate
key-server is
unnecessary. Similarly, when the key-server crashes, only those individuals
who are
without their portable data storage devices are inconvenienced since everyone
else can
access the network 42 and their secure keys.
When cryptographic functions are performed within the portable storage devices
44, the secure keys are not available outside the portable storage devices 44.
Since most
cryptographic functions are performed on the portable storage devices 44, the
key-server
can support the processing of cryptographic functions for those individuals
with forgotten
portable storage devices 44. If a secure path is initiated between portable
storage devices
44 and the key-server 41, then the keys stored within the two media are not
available for
capture or compromise.
Referring to Fig. 5, a simplified flow diagram of a method implemented upon a
key-server failure is shown. A portable data storage device containing an
individual's
security data and authorization information is mated with an interface
peripheral to a
computer in communication with the key-server. A secure communication session
is
established from the portable data storage device to the key-server. Security
data for an
individual user stored within the memory means of the portable data storage
device is
transferred via the secure communication session to the key-server and stored
within the
memory means thereon. Since each portable data storage device contains only a
portion
of the original secure key database that existed on the key-server, it is
necessary to repeat
this procedure for every individual's portable data storage device. Once all
of the secure
12

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
key data has been transferred from the portable data storage devices, the
original database
is essentially completely reconstructed and normal key-server functions
resume.
Referring to Fig. 6a, a simplified flow diagram of a method of user
authorization
making use of security data stored on a portable data storage device is shown.
Authorization making use of a portable data storage device is likely to occur
when the
user is other than in the workplace, for example during times of travel or
when working
from a home office or other remote location. Of course, the portable data
storage device
is used in the workplace as well, especially when the functions of the key-
server are
limited to specific instances as was previously described. The user wishing to
obtain
authorization for access to secure keys or files on the network provides their
portable data
storage device, in the form of a smart card or a token, containing personal
security
information including authentication methods at a computer in communication
with a
communication network. The presence of available user information entry
devices in
communication with the computer, from a plurality of user information entry
devices, is
1 S determined. The user provides data via at least an available user
information entry
device. This could involve entering a password via a standard computer
keyboard, or
providing biometric data such as a fingerprint using an available fingerprint
imaging
station. The data provided by the user is registered against known data for
that user,
stored in the portable data storage device. If the data provided by the user
matches the
data stored in the portable storage device, the user is authorized for access
to selected
secure keys and secure files.
Referring to Fig. 6b, a simplified flow diagram of a method of user
authorization
making use of security data stored on a key-server is shown. Authorization
making use
of security data stored on a key-server would typically occur only in
instances when an
individual has lost or forgotten their portable data storage device. The
presence of
available user information entry devices in communication with a computer in
communication with a communication network, from a plurality of user
information entry
devices, is determined. The user provides data via at least an available user
information
entry device. This could involve entering a password via a standard computer
keyboard,
or providing biometric data such as a fingerprint using an available
fingerprint imaging
13

CA 02317211 2000-09-O1
Doc. No. 12-51 CA Patent
station. The data provided by the user is registered against known data for
that user,
which is stored on the key-server. If the data provided by the user matches
the data stored
in the key-server, the user is authorized for access to selected secure keys
and secure data
files. Alternatively, the user is authorised for access to selected key-server
functions in
S the form of cryptographic functions.
Referring to Fig. 7, a simplified flow diagram of a method of replacing a
portable
data storage device is shown. This procedure is performed, for example, in the
event that
a user has permanently lost their original portable storage device containing
their
personal security information. A blank portable data storage device, in the
form of a
smart card or token, is inserted into an interface peripheral to a computer in
communication with a communication with a network. The interface includes a
means
for writing data to the portable data storage device. A secure communication
session is
established from the portable data storage device to the key-server. Secure
key data,
specific to an individual user, is transferred from the key-server to the
portable data
storage device via the secure communication session. The transferred secure
key data is
stored within the memory means of the portable data storage device. The
portable data
storage device, containing the transferred personal security data, is removed
from the
interface peripheral to the computer in communication with a network and can
be used
for the purpose of authorizing the user.
Numerous other embodiments may be envisaged without departing from the spirit
and scope of the invention.
14

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Revocation of Agent Requirements Determined Compliant 2022-01-27
Appointment of Agent Requirements Determined Compliant 2022-01-27
Inactive: IPC expired 2022-01-01
Inactive: IPC removed 2013-02-25
Inactive: IPC assigned 2013-02-25
Inactive: IPC removed 2013-01-03
Inactive: First IPC assigned 2013-01-03
Inactive: IPC removed 2013-01-03
Inactive: IPC assigned 2013-01-03
Inactive: IPC assigned 2013-01-03
Inactive: IPC expired 2013-01-01
Inactive: IPC removed 2012-12-31
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Inactive: IPC from MCD 2006-03-12
Application Not Reinstated by Deadline 2004-09-01
Time Limit for Reversal Expired 2004-09-01
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2003-09-02
Letter Sent 2002-12-23
Application Published (Open to Public Inspection) 2002-03-01
Inactive: Cover page published 2002-02-28
Letter Sent 2001-07-31
Inactive: Single transfer 2001-06-15
Inactive: Courtesy letter - Evidence 2001-06-12
Inactive: First IPC assigned 2001-04-12
Inactive: First IPC assigned 2000-10-24
Inactive: IPC assigned 2000-10-24
Inactive: IPC assigned 2000-10-24
Inactive: Courtesy letter - Evidence 2000-09-26
Inactive: Filing certificate - No RFE (English) 2000-09-21
Application Received - Regular National 2000-09-20

Abandonment History

Abandonment Date Reason Reinstatement Date
2003-09-02

Maintenance Fee

The last payment was received on 2002-07-05

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Application fee - standard 2000-09-01
Registration of a document 2001-06-15
MF (application, 2nd anniv.) - standard 02 2002-09-02 2002-07-05
Registration of a document 2002-11-21
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
ACTIVCARD IRELAND LIMITED
Past Owners on Record
LAURENCE HAMID
ROBERT D. HILLHOUSE
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column (Temporarily unavailable). To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.

({010=All Documents, 020=As Filed, 030=As Open to Public Inspection, 040=At Issuance, 050=Examination, 060=Incoming Correspondence, 070=Miscellaneous, 080=Outgoing Correspondence, 090=Payment})


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2002-02-03 1 5
Description 2000-08-31 14 751
Abstract 2000-08-31 1 20
Drawings 2000-08-31 8 116
Claims 2000-08-31 9 372
Filing Certificate (English) 2000-09-20 1 163
Courtesy - Certificate of registration (related document(s)) 2001-07-30 1 112
Reminder of maintenance fee due 2002-05-01 1 111
Courtesy - Abandonment Letter (Maintenance Fee) 2003-10-27 1 176
Correspondence 2001-06-11 1 25
Fees 2002-07-04 1 30
Prosecution correspondence 2001-06-14 1 31