U.S. patent application number 11/047651 was filed with the patent office on 2005-10-06 for authentication method and system.
This patent application is currently assigned to Fujitsu Limited. Invention is credited to Ishidera, Nobutaka.
Application Number | 20050223233 11/047651 |
Document ID | / |
Family ID | 35055756 |
Filed Date | 2005-10-06 |
United States Patent
Application |
20050223233 |
Kind Code |
A1 |
Ishidera, Nobutaka |
October 6, 2005 |
Authentication method and system
Abstract
An authentication method to minimize a number of times a PIN of
a smart card is input to solve a problem related to deterioration
in security caused when storing a password on a memory of a
personal computer and when the smart card is lost and
authentication condition is stored on the smart card. In the
application authentication of the present invention, an input
password code is encrypted and identification information of a
computer which has generated the encrypted password code and the
encrypted password code are transmitted to a storage medium. When
the storage medium is connected with the computer, the encrypted
code is decoded upon determining that the identification
information of the computer is stored in the storage medium.
Inventors: |
Ishidera, Nobutaka; (Inagi,
JP) |
Correspondence
Address: |
STAAS & HALSEY LLP
SUITE 700
1201 NEW YORK AVENUE, N.W.
WASHINGTON
DC
20005
US
|
Assignee: |
Fujitsu Limited
Kawasaki
JP
|
Family ID: |
35055756 |
Appl. No.: |
11/047651 |
Filed: |
February 2, 2005 |
Current U.S.
Class: |
713/185 |
Current CPC
Class: |
G06F 21/34 20130101;
G06F 21/445 20130101; G06F 2221/2129 20130101 |
Class at
Publication: |
713/185 |
International
Class: |
H04K 001/00 |
Foreign Application Data
Date |
Code |
Application Number |
Apr 1, 2004 |
JP |
2004-108938 |
Claims
What is claimed is:
1. A computer-readable medium storing a program which, when
executed by an information processing apparatus, causes the
information processing apparatus to perform operations, comprising:
checking a connection with a storage medium; requesting a password
code for accessing information in the storage medium; encrypting an
input password code to generate an encrypted password code;
transmitting identification information of a computer which has
generated the encrypted password code and corresponding encrypted
password code to the storage medium; and decoding the encrypted
password code for confirming whether the identification information
is stored in the storage medium when connection with the storage
medium is confirmed and for decoding the corresponding encrypted
password code upon confirming that the identification information
is stored in the storage medium.
2. A computer-readable medium storing a program according to the
claim 1, where encrypting the password code is executed by the
computer and includes setting an effective period for the encrypted
password code.
3. An authentication method using a password code for allowing
access to information stored in a storage medium, comprising:
confirming a connection with the storage medium; requesting the
password code for accessing information in the storage medium;
encrypting an input password code to generate an encrypted password
code; transmitting identification information of a computer via
which the encrypted password code is generated and corresponding
encrypted password code to the storage medium; and decoding for
confirming whether the identification information is stored in the
storage medium when the connection with the storage medium is
confirmed and decoding the corresponding encrypted password code
upon confirming that the identification information is stored.
4. An authentication method to enable access to a storage medium
connected with a computer, comprising: encrypting an input password
code input to access a first portion of the storage medium; storing
the encrypted password code in a second portion of the storage
medium and storing a key for decoding the encrypted password code
in the computer; and authenticating access to the first portion of
the storage medium by decoding the encrypted password code stored
in the second portion of the storage medium using the key stored in
the computer.
5. The authentication method according to claim 4, wherein the key
for decoding the encrypted password code is invalidated after a
predetermined period of time.
6. The authentication method according to claim 4, wherein the
encrypted password code in the second portion of the storage medium
is invalidated after a predetermined period of time.
7. An authentication method to enable access to a storage medium
connected with a computer, comprising: receiving a password code
input to access the storage medium and encrypting the password
code; storing the encrypted password code in a predetermined
portion of the storage medium and storing a key for decoding the
encrypted password code in the computer; and authenticating access
to another portion of the storage medium by decoding the encrypted
password code stored in the predetermined portion of the storage
medium using the key stored in the computer.
8. An authentication method to enable access to a storage medium
connected with a computer, comprising: encrypting an authenticated
password code to generate an encrypted password code; correlating
identification information of the computer using which the
encrypted password code is generated and transmitting the
identification information and the encrypted password code to the
storage medium; and authenticating access to the storage medium
upon determining that the identification information of the
computer is stored in the storage medium.
9. An authentication method to enable access to a storage medium
connected with a computer, comprising: issuing a certificate having
a public key corresponding to a password code and storing the
certificate in the computer; encrypting the password code sing the
public key and storing the encrypted password code in a section of
the storage medium accessible without authentication; and
authenticating an input password code by decoding the encrypted
password code using the certificate.
10. An authentication system for accessing a storage medium,
comprising: a storage reading device reading data stored in the
storage medium; an input device inputting a password code to access
the storage medium; and a computer encrypting the password code and
transmitting the encrypted password code and identification
information of the computer to the storage system, where the
encrypted password code is decoded and access to the storage medium
is authenticated upon determining that the identification
information of the computer is stored in the storage medium.
11. The authentication system according to claim 10, wherein the
storage medium includes a portion accessible without inputting the
password code.
12. The authentication system according to claim 10, wherein a
public key is used to encrypt the password code and the encrypted
password code is stored in a portion of the storage medium
accessible without inputting the password code and the public key
is stored in the computer, and the access to the storage medium is
authenticated when the encrypted password code in the storage
medium is decoded using the public key.
Description
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is related to and claims the benefit of
Japanese Patent Application No. 2004-108938, filed Apr. 1, 2004, in
Japan, the disclosure of which is incorporated herein by
reference.
BACKGROUND OF THE INVENTION
[0002] 1. Field of the Invention
[0003] The present invention relates to providing a secured access
to data, such as personal information, etc., stored in a storage
medium of a personal computer.
[0004] 2. Description of the Related Art
[0005] Generally, when using a personal computer or other devices,
a password or a personal identification number (hereinafter,
referred to as a PIN) of a storage medium is input for each access
to data stored in the storage medium to access the data, such as
personal information, in the storage medium.
[0006] While requiring input of a PIN provides security and
prevents unwanted disclosure of data, such as personal information
or other secured data, in the storage medium, it is inconvenient
because the PIN of the storage medium must be repeatedly input for
each access to the data within the storage medium.
[0007] Accordingly, the following methods of accessing a storage
medium have been considered in order to solve this problem. A smart
card will be described as an example of a storage medium.
[0008] The smart card is formed as a plastic card about the size of
a credit card into which an IC chip, such as a CPU, etc., is
provided.
[0009] Initially, the PIN of the smart card is input in a personal
computer or other smart card processing/reading devices to access
data, such as personal information or other secured data, of the
smart card. The input PIN of the smart card is then stored in a
memory of the personal computer.
[0010] When subsequent access is made to the data in the smart
card, the PIN of the smart card stored in the memory is collated or
compared with the PIN stored in the smart card. When these PiNs
match, access can be made to the data in the smart card.
[0011] Accordingly, it is no longer necessary to repeatedly input
the PIN for each access to data in the smart card, applications of
the smart card can be more simplified and the convenience of using
the smart card can also be improved.
[0012] Moreover, Japanese Patent Application Laid-Open No. 6-115287
discloses a means for improving convenience of the smart card in
addition to the previously discussed smart card access method.
[0013] Initially, the PIN of the smart card is input to access the
data, such as personal information, etc., in the smart card using a
personal computer.
[0014] When the PIN of the smart card is collated, "authenticated
condition" information is stored to a nonvolatile memory provided
in the smart card.
[0015] Accordingly, when subsequent access is made to the smart
card and the "authenticated condition" information is stored in the
nonvolatile memory of the smart card, the data in the smart card
can be accessed without collation of the PIN.
[0016] Accordingly, it is no longer necessary to repeatedly input
the PIN for each access to the data in the smart card. As a result,
application of the smart card can be more simplified and use of the
smart card becomes more convenient.
[0017] However, existing methods of accessing a smart card have the
following problems.
[0018] In cases where the PIN of a smart card is stored in the
memory of the personal computer to make subsequent input of the PIN
unnecessary, because the PIN is stored on the memory of the
personal computer, security of the password or the PIN may be
compromised through a network with which the personal computer is
connected, resulting in deterioration of security though
convenience of smart card can be improved.
[0019] Moreover, when subsequent input of the password or the PIN
is no longer required by storing the "authenticated condition"
information in the nonvolatile memory provided in the smart card
after collation of the PIN of smart card, if the smart card is lost
while it is in the authenticated condition, a third party is
capable of accessing the data, such as personal information, etc.,
in the smart card by taking advantage of the authenticated
condition of the smart card.
[0020] For example, if the smart card authenticated by a company is
lost, the third party can freely access the data therein, from
outside of the company. Accordingly, risk of disclosure of data,
such as personal information, stored in a smart card is remarkably
increased.
SUMMARY OF THE INVENTION
[0021] An aspect of the present invention is therefore to only
require a single input of a smart card PIN while improving
convenience of use of the smart card and eliminating a security
problem presented when storing the smart card PIN or a smart card
password on a memory of a personal computer and/or when the smart
card is lost and the authenticated condition is stored on the smart
card.
[0022] In order to solve the problems described above, an
application authentication program is provided that uses a password
code for allowing access to information stored in a storage medium.
The application authentication program controls a computer to
execute operations including, confirming connection with a storage
medium, encrypting an input password code for generating an
encrypted password code, transmitting identification information
for identifying a computer which has generated the encrypted
password code and corresponding encrypted password code to the
storage medium, and decoding the encrypted password code for
confirming whether the identification information is stored in the
storage medium when connection with the storage medium is
subsequently confirmed and for decoding the corresponding encrypted
password code upon determining that the identification information
is stored.
[0023] According to another aspect of the application
authentication program of the present invention, the password code
encrypting includes controlling a computer to generate the
encrypted password code and set an effective period for the
encrypted code password code.
[0024] Moreover, the application authentication method of the
present invention uses a password code for allowing access to
information stored in a storage medium and controls a computer to
execute a storage medium confirming sequence for confirming whether
connection with the storage medium is set up, a password code
requesting sequence for conforming whether connection with the
storage medium is set up, a password code encrypting sequence for
generating the encrypted password code by encrypting an input
password code, a storage medium transmitting sequence for
transmitting identification information for identifying a computer
which has generated the encrypted password code and corresponding
encrypted password code to the storage medium, and an encrypted
password code decoding sequence for confirming whether the
identification information is stored in the storage medium when the
connection with the storage medium is confirmed and for decoding
the corresponding encrypted password code upon determining that the
identification information is stored.
[0025] Additional aspects and/or advantages of the invention will
be set forth in part in the description which follows and, in part,
will be obvious from the description, or may be learned by practice
of the invention.
[0026] Accordingly, the present invention enables data to be
protected from illegal access when a smart card is lost and allows
convenient use of the smart card by requiring a PIN input only
once.
[0027] Moreover, since the PIN is not cached in a memory on the
personal computer, disclosure of the PIN due to the analysis of
memory is prevented.
BRIEF DESCRIPTION OF THE DRAWINGS
[0028] FIG. 1 illustrates an exemplary application of a smart
card.
[0029] FIGS. 2A through 2C illustrate exemplary operations of a PIN
authentication.
[0030] FIG. 3 illustrates a structure of an embodiment of the
present invention.
[0031] FIG. 4 is a flowchart of a log-on display image registration
tool according to the present invention.
[0032] FIG. 5 is a flowchart of a log-on information registration
tool according to the present invention.
[0033] FIG. 6 is a flowchart of a log-on engine according to the
present invention.
[0034] FIG. 7 is a flowchart of a smart card access library
according to the present invention.
[0035] FIG. 8 illustrates examples of information stored in a free
storage area according to the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0036] Reference will now be made in detail to the present
invention, examples of which are illustrated in the accompanying
drawings.
[0037] FIG. 1 is a diagram illustrating an application profile of a
smart card in relation to the present invention.
[0038] FIG. 1 shows a smart card 1; a personal computer 2; a smart
card reader/writer 3; and a PIN input device 4. The smart card
reader/writer 3 is connected with the personal computer 2 and
enables information stored in the smart card 1 to be accessed,
thereby allowing information to be retrieved from and added to the
smart card 1. The PIN input device 4 is also connected with the
personal computer 2 to allow identification information to be
entered into the personal computer 2 for accessing the smart card
1.
[0039] Further, FIG. 1 shows a storage unit 5 in the smart card 1
where the storage unit 5 comprises a PIN protected storage area 6
and a free storage area 7, which can be read without PIN
authentication. The smart card 1 also includes a computer chip (not
shown) for controlling the smart card 1. The personal computer 2
includes a memory 8, as also shown in FIG. 1.
[0040] According to an aspect of the present invention, a user
inserts the smart card 1 into the smart card reader/writer 3
connected with the personal computer 2. The user inputs the PIN via
the PIN input device 4 to access the PIN protected storage area 6
and attempts to cancel/override the data access protection of the
PIN protected storage area 6.
[0041] When the computer of the smart card has authenticated the
PIN, the personal computer 2 issues a certificate 9 (further below
described in relation to FIGS. 2A and 2B) and stores the
certificate 9 into the memory 8 provided in the personal computer
2.
[0042] The certificate 9 issued by the personal computer 2 is given
or assigned a public key. This public key is used to encrypt the
input PIN and the encrypted PIN is stored in the free storage area
7 of the smart card 1 shown in FIG. 1.
[0043] Thereafter, to access the PIN protected storage area 6, the
personal computer 2 reads the encrypted PIN stored in the free
storage area 7, decodes the PIN with a secret key in the
certificate 9 stored in the memory 8 and also cancels data access
protection of the card.
[0044] In this situation, it is possible to designate the term of
validity to the certificate stored in the memory 8. Accordingly, it
is also possible to designate the period in which the encrypted PIN
stored in the free storage area 7 can be used.
[0045] Moreover, since the encrypted PIN stored in the free storage
area 7 can be decoded only with the secret key in the certificate
stored in the memory 8, if the card is lost, it is impossible to
access the PIN protected storage area 6 from other personal
computers or smart card processing devices.
[0046] When a plurality of encrypted PINs are stored in the free
storage area 7, only predetermined user(s) are capable of realizing
or effecting operations with a plurality of personal computers
using the smart card.
[0047] In this case, for example, CPU data of the personal computer
2 and the encrypted PIN are correspondingly stored in order to
identify the certificate on the personal computer 2 using which the
encrypted PIN stored in the free storage area 7 has been
encrypted.
[0048] FIGS. 2A, 2B and 2C illustrate operations related to input
of the PIN via the PIN input device 4, storage of the encrypted PIN
into the smart card 1, and authentication of the PIN in the
personal computer 2. Here, the smart card reader/writer 3 is not
illustrated in FIGS. 2A, 2B and 2C.
[0049] FIG. 2A illustrates the operation of storing the PIN into
the personal computer 2 via the PIN input device 4.
[0050] The smart card 1 is connected with the personal computer 2
in order for the data in the smart card 1 to be read. The PIN is
input using the PIN input device 4 in order to access the data
stored in the PIN protected storage area 6 of the smart card 1. The
input PIN is then stored in the memory 8 of the personal computer
2. When the input PIN is correct, access can be made to the data
stored in the PIN protected storage area 6.
[0051] FIG. 2B illustrates the operation of encrypting the PIN and
storage thereof into the smart card 1.
[0052] The personal computer 2 ciphers or encrypts the PIN stored
in the memory 8 with a public key. Here, the encrypted PIN is
expressed as "@!#?" in FIG. 2B, but the PIN is not always ciphered
into such stream of characters. In this case, since the certificate
9 is issued, the user can designate the period within which the PIN
can be used, for example, by storing validating data in the data
received for the certificate and/or the encrypted PIN. The personal
computer 2 stores the encrypted PIN "@!#?" into the free storage
area 7 of the smart card 1.
[0053] FIG. 2C illustrates the operation in which the personal
computer 2 reads the encrypted PIN "@!#?" forming PIN data to be
deciphered or decrypted upon authentication.
[0054] Here, the smart card 1 is connected with the personal
computer 2 to read the data in the smart card 1. The personal
computer 2 reads the encrypted PIN "@!#?" stored in the free
storage area 7. The PIN data stored in the free storage area 7 is
the PIN data obtained by ciphering or encrypting the PIN.
Accordingly, the data in the smart card 1 is accessed by
authenticating the PIN data.
[0055] Accordingly, since the card PIN is never cached in the
memory 8 of the personal computer 2, disclosure of the PIN data by
analyzing the memory 8 or other types of access, such as through a
network, are prevented.
[0056] Next, an operation of the present invention will be
described in relation to an application log-on function using the
smart card.
[0057] FIG. 3 is a structural diagram in relation to the embodiment
of the present invention.
[0058] As shown in FIG. 3, the present invention includes a log-on
display image of an application 31; a log-on display image
registration tool 32; a log-on information registration tool 33; a
log-on engine 34; a log-on display image information storage file
35; a card access library 36; and an encryption library 37 having a
key 38 stored therein to be used for decrypting or deciphering
log-on information.
[0059] A user stores the log-on display image information for
identifying the log-on display image of application 31 into the
log-on display image information storage file 35 using the log-on
display image registration tool 32.
[0060] The log-on information, such as ID and password, to be input
to the registered application log-on display image 31 is registered
to or stored in the smart card 1 via the card access library 36
using the log-on information registration tool 33. In this case,
the ID and/or password is stored into the PIN protected storage
area 6 and the ID and/or password is protected or is accessible by
using the key 38 stored in the encryption library 37.
[0061] The log-on engine 34 requests, as a permanent program, the
log-on information to the smart card 1 when the log-on information
registered to the smart card 1 matched with the log-on display
image information stored in the log-on display image information
file 35 is displayed. After the PIN protection is cancelled, the
log-on information is read and is then transmitted to the log-on
display image of the application 31. Accordingly, log-on to the
application is attempted using the smart card 1.
[0062] Since the log-on information has generally been stored in
the area protected by the PIN data, the internal application log-on
information has been obtained by accurately collating the PIN data
for the smart card 1 for each access to the smart card 1. But, in
the present invention, such collation of the PIN data is required
only for the first access.
[0063] FIG. 4 is a flowchart of the log-on display image
registration tool according to an aspect of the present invention.
A title name of the application log-on display image is input
(operation 401). Then, a password input field name of the
application log-on display image is input (operation 402), and an
ID input field name of the application log-on display image is
input (operation 403).
[0064] The title name, password input field name, and ID input
field name of the log-on display image of the application input are
then stored in the log-on display image information file 35
(operation 404).
[0065] FIG. 5 is a flowchart of the log-on information registration
tool according to an aspect of the present invention.
[0066] A password for logging on to the application is input
(operation 501). Then, an ID for logging on to the application is
input (operation 502). Access is made to the card access library 36
to store the password and ID input (operation 503).
[0067] FIG. 6 is a flowchart of the log-on engine.
[0068] Reference is made to the log-on display image information
stored within the log-on display image information storage file 35
(operation 601).
[0069] The display image information being displayed at present is
read (operation 602).
[0070] It is decided whether the log-on display image including the
log-on display image information to which the reference is made in
operation 601 is displayed or not (operation 603).
[0071] When the display image information displayed does not match
with the log-on display image information to which the reference is
made, the display image information displayed is read again.
[0072] When the display image information being displayed matches
with the log-on display image information to which the reference is
made, reference is made to the card access library 36 (operation
604).
[0073] It is decided using the card access library 36 whether the
log-on information has been read successfully (operation 605).
[0074] When the log-on information of the log-on display image
being displayed can be read, the log-on information is transmitted
to the log-on display image (operation 606).
[0075] FIG. 7 is a flowchart of the card access library operations
according to an aspect of the present invention
[0076] It is decided or determined whether the smart card is or has
been inserted into the smart card reader/writer (operation
701).
[0077] When the smart card is not inserted, the log-on display
image "Insert the card, please!" is displayed. The decision is
"OK", whether the smart card is inserted is decided again. When the
decision is "cancel", the access to the smart card is terminated
(operation 702).
[0078] When it is decided that the smart card is inserted, the
encrypted PIN is read from the free storage area (operation
703).
[0079] It is then decided or determined whether the encrypted PIN
is read successfully or not (operation 704).
[0080] If the encrypted PIN is not read successfully, the logon
display image "Input the PIN, please!" is displayed (operation
705). When the decision is "cancel", access to the smart card is
terminated. When the PIN is input and the decision is "OK", the PIN
is collated (operation 706).
[0081] If the collation of PIN is not successful, the log-on
display image "Input the PIN, please!" is displayed. When the
collation of PIN is successful, a certificate is issued (operations
707 and 708).
[0082] Encryption of the PIN which has been collated successfully
is requested from the encryption library 37 (operation 709).
[0083] The PIN encrypted by the encryption library 37 is stored in
the free storage area and access is then made to the ID and
password in the smart card (operations 710 and 714).
[0084] When the encrypted PIN is read successfully in operation
704, decoding of the encrypted PIN is requested from the encryption
library (operation 711).
[0085] The decoded PIN is collated (operation 712) and if the
collation of the PIN is not successful, the process shifts to the
operation 705. When the collation of PIN is successful, access is
made to the ID and password in the smart card (operation 714).
[0086] FIG. 8 is a table illustrating examples of information to be
stored in the free storage area 7 of the smart card 1.
[0087] In order to use a plurality of personal computers with one
smart card, the PINs encrypted by respective personal computers are
stored in memory with the data size of 32 bytes and the ID
information of the corresponding personal computer CPUs is stored
with the data size of 16 bytes. The data indicating the number of
PINs encrypted is stored with the data size of one byte.
Accordingly, when it is requested to use the smart card with a
particular personal computer, if the corresponding encrypted PIN
and the ID information of CPU exist within the free storage area,
such information is read to try to read the personal information
stored in the PIN protected storage area.
[0088] Next, modification examples of the embodiment or alternate
embodiment of the smart card in the present invention and the other
technical extension items will be itemized below.
[0089] In the above discussed embodiment, the password code is not
restricted to a string of characters and combination of the ID and
password. For example, it is also possible to protect personal
information of users with authentication of a fingerprint or other
biometric authentication techniques.
[0090] In the embodiment described above, application of the smart
card is not restricted to a personal computer and may also be used
in the other information apparatuses.
[0091] In above embodiment, the public key encryption system is
introduced or described as the PIN encryption system. However, the
present invention is not limited thereto and also allows employment
of other secret key systems.
[0092] In above embodiment, the CPU information of the personal
computer and encrypted PIN are stored correspondingly in order to
identify with which personal computer's certificate the PIN has
been encrypted. However, the present invention is not restricted to
the encrypted PIN and the CPU information being stored
correspondingly as long as the personal computer which has
encrypted the PIN can be identified.
[0093] In above embodiment, the effective period is set with the
certificate on the personal computer, but the present invention is
not restricted thereto.
[0094] In above embodiment, the smart card reader/writer and the
personal computer are not required to be isolated and therefore the
smart card reader/writer may be provided as part of the personal
computer.
[0095] In above embodiment, when the smart card has authenticated
the PIN, the personal computer newly issues a certificate, but it
is also possible to previously register or store the certificate.
Moreover, in the above embodiment, the personal information, etc.,
is stored in the smart card, the present invention is not
restricted thereto and various storage mediums which are capable of
storing data may also be used.
[0096] Although embodiments of the present invention have been
shown and described, it would be appreciated by those skilled in
the art that changes may be made in these embodiments without
departing from the principles and spirit of the invention, the
scope of which is defined in the claims and their equivalents.
* * * * *