GB2445783A - Portable security instrument - Google Patents
Portable security instrument Download PDFInfo
- Publication number
- GB2445783A GB2445783A GB0623347A GB0623347A GB2445783A GB 2445783 A GB2445783 A GB 2445783A GB 0623347 A GB0623347 A GB 0623347A GB 0623347 A GB0623347 A GB 0623347A GB 2445783 A GB2445783 A GB 2445783A
- Authority
- GB
- United Kingdom
- Prior art keywords
- security
- instrument
- user
- level
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A portable multiple user security instrument is connectable to USB, firewire or other interface devices. It is housed in a click and flip housing which provides protection for the device. Without the security instrument being inserted into the appropriate interfacing port of a protected device, the device remains inaccessible (or a secure part of the device remains inaccessible). Upon insertion of the security instrument the user is presented randomly with one of a number of predetermined security questions. Once the user enters the correct answer the user then moves on to the second level of security, where they are prompted to enter two or three characters of their second level security password. The security instrument also has the ability to be centrally controlled via a master users control panel, from which a security manager can grant permission to access multiple devices with a single security instrument.
Description
I
A Portable Multiple User Security Instrument There are numerous security devices on the market today that secure PC's and other devices and they all present the same glaring problem where as they can be easily compromised by key loggers, individuals observing the entry of a user's password, or the user writing down their password and placing it in an obvious place in their office or home. These devices are also limited to accessing only on device and have no means of being assigned to access additional secure devices.
The present invention relates to bringing and end to the compromising and confusion of passwords by allowing the user to select from a series of friendly questions in a two stage approach. The present invention also allows access to multiple secured devices from one secure instrument which is controlled via a master control panel or dashboard by an assigned manager or security manager.
The present invention is housed in a unique Click & Flip housing that protects the mating mechanism from harm while staying attached to the secure instrument at all times.
The present invention has an additional third stage access thus enabling the security manager to access a secured device if an individual was to loose their security instrument. This access is only assigned to a specific security instrument and requires a two stage password to access an individual's secured device.
The invention will now be described solely by way of example and reference to the accomplishing drawings in which: List of Figures I. Figure 1 is a flow diagram showing the installation procedure for the security key 2. Figure 2 is a flow diagram showing the security key lost procedure.
3. Figure 3 is a flow diagram showing the procedure of using a master security key.
4. Figure 4 is a flow diagram showing the Process Flow of T3Pro Security Key.
5. Figure 5 is a screen shot showing the first stage of selecting the stage I multiple passwords.
6. Figure 6 is a screen shot showing the second stage entry screen of the random selection of digits in the password that need to be entered to gain access to the secured device 7. Figure 7 is a screen shot showing the security managers password screen that need to be entered to gain access to either the control console or individual users secured devices.
8: Figure 8 is a screen shot showing the security managers control console or dashboard, which is use to control access to all secured devices.
9. Figure 9 is a drawing of the housing of the security instrument in a close position; this is referred to as Click & Flip.
10. Figure 10 is a drawing of the housing of the security instrument in a sliding open position; this is referred to as Click & Flip.
11. Figure 11 is a drawing of the housing of the security instrument in a swing position; this is referred to as Click & Flip.
12. Figure 12 is a drawing of the housing of the security instrument in a fully open position; this is referred to as Click & Flip Modes for carrying out invention Figure 1 is a flow diagram showing the installation procedure for the security key.
The security key is typically supplied with security software that is loaded by the user onto the computer during the installation process (1).
Firstly, plug in the security key into a USB socket on a computer (2). After the security key has been plugged into the USB socket on the computer, a communication is established between the computer and the devices. Secondly launch the installation of the security software. During the installation (3), it'll validated the security key either is a valid security key or an incorrect security key. If it's not a valid security key, the user can choose either cancel the installation (7) or replace the security key with others valid security key(2). If it's a valid security key (4), the user will has a choice of 10 questions that the user must select 5 questions from the list and answer it. The answer is then encrypted and stored into the security key. Finally, the user will need to create a password (5). The password must have a minimum of 6 characters. The password is then encrypted and stored into the security key.
Reboot the computer and the installation process is complete (6).
Figure 2 is flow diagram showing the security key lost procedure. When users lost theirs security key (8), they have to inform their company's admin which is managing the entire security key application (9). The admin generate a new security key and assign a temporary password for the user (10).
The user uses the new generated key and plugs it into user's computer. The user will have a choice of 10 questions that the user must select 5 questions from the list and answer it (11). The answer is then encrypted and stored into the security key. Finally, the user will need to create a password (12). The password must have a minimum of 6 characters. The password is then encrypted and stored into the security key.
Figure 3 is a flow diagram showing the procedure of using a master security key.
Firstly, plug in the security key into a USB socket on a computer. Launch the pre-installed key generation program (13). Insert the Master key (14). During the master security key generation, the user will be prompt to enter primary master password (15). The password is then encrypted and stored into the master security key.
Plug in the master security key into a USB socket on any computer to unlock the computer. The user will be prompt to enter primary master password and secondary master password (16). If both passwords are correct (17), the computer will unlock (18). The user will be given three attempts to login (19), after three attempts fail the computer will be lock (21). The user has to reboot the computer to try again.
Figure 4 is flow diagram showing the Process Flow of T3Pro Security Key.
Firstly, plug in the security key into a USB socket on a computer (23). After a communication is established between the computer and the security key, T3Pro Security software will identified type of the security key (24). If it's a User Security Key, it will require the user to answer I out of the 5 question (25) user select during installation randomly (26). The user is given 3 attempts to provide a correct answer, if the user fail to enter correct answer (30) the pc will be lock (31) and require reboot the computer to try again. However once the user managed to answer the question, the user will require to provide 3 random character of the password (27). Again, the user is given 3 attempts to enter the answer (28), if the user fail to provide correct answer (29), the computer will be lock (31). If the user manages to enter the answer correctly the computer will unlock (35).
As for Master Security Key, the user will be prompt to enter primary master password and secondary master password (32). If both passwords are correct, the computer will unlock. The user will be given 3 attempts to login (33), after three attempts fail the computer will be lock (34). The user has to reboot the computer to try again.
The memory control instrument of the portable multiple user security instrument comprises of a micro-controller.
The memory control instrument is capable of establishing multiple passwords that are generated randomly to facilitate implementation of access restriction.
The memory control instrument is capable of retrieving and comparing the ransom passwords to verify access authority.
The end user merely inserts the portable multiple user security instrument and the payload is installed on the targeted device without any additional external applications.
Once the payload is installed (Figure 1) the user is presented with a series of personal knowledge questions i.e. "mother maiden name" (Figure 5) which comprise the first level security of which they need to select five or more from the list, and enter their answers which are recorder within the security instruments memory.
Once the first level of security questions (claim 6) are completed the user is presented with the second level security question (Figure 1) which they select a password that is 6 to 8 characters in length (Figure 6), once the passwords are entered they are recorded on the security instrument as well as the targeted device.
Upon insertion of the portable multiple user security instrument the user question is presented randomly with one of their first level security questions (Figure 4).
Once the user enters the correct answer for the first level password the user is then moved on to the second level of security (Figure 4) where they are prompted to enter 2 or 3 characters of their second level security password (Figure 6). An example of this would be the second, third and sixth character of the password, once this has been completed the user has access to the instrument, Having two levels of security questions that are presented randomly to the user thus prevents the security of the instrument being compromised as with traditional methods of previous security devices where a individual can easily oversee the user entering their password.
The portable multiple user security instrument also has the ability to be centrally controlled via a master users control panel or dashboard, (Figure 8) where as and assigned individual such as a security manager can grant permission to access multiple devices with a single security device. The instrument will either work in a single or multiple user mode and the security of the instrument is not compromised.
When the portable multiple user security instrument is used in the multiple mode the instrument gains the third level of security which is an additional password that is assigned to the security instrument by the security manager (Figure 3). If for some reason the individual with the security instrument was to loose the instrument the security manager can invoke the third level of password to unlock the secured instrument and grant permission to the individual (Figure 2) (Figure 7). The individual is then presented with a new security instrument and they must complete the install process again at that time, if they fail to do so at that time and remove their new security instrument they are locked out of the instrument until the security manager can unlock their instrument again.
Unlike other security devices that allow an individual to secure their device the said invention allows for the security manager also can access the secure data on the secured device if the individual were to be terminated from the company (Figure 4) (Figure 7). This is a problem with present day secure devices as the security manager can't access data secured by the individual on the secured device.
The mating connection to the security instrument is protected with a unique swivel cover (Figure 9). An example of this would be the connection of an USB or Firewire device is protected and to expose the connecting end the user simply pulls the instrument open till it clicks (Figure 10) and they swivels the connections cover (Figure 11) 180 degrees end over end to expose the connector (Figure 12). This is referred to as "Click & Flip".
Claims (13)
- Claims 1. A portable multiple user security instrument which isaccessible via the universal serial bus (USB) coupling device, Firewire coupling device or other interface devices, without the presents of the security instrument being inserted into the interfacing port on the said target device the devices remains inaccessible or the part of the device that's secure remains inaccessible and once inserted the user must enter the multi-level security questions and multiple passwords, the security instrument also has memory on board the device that is only accessible through multi-level security questions and multiple passwords, the security instrument also allows for the accessing of multiple secured devices via a single security instrument which is determined by the security manager through the incorporated control panel or dashboard.
- 2. The portable multiple user security instrument of claim 1, wherein the memory control instrument comprises a micro-controller.
- 3. The portable multiple user security instrument of claim 1, wherein the memory control instrument is capable of establishing multiple passwords that are generated randomly to facilitate implementation of said access restriction.
- 4. The portable multiple user security instrument of claim 1, wherein the memory control instrument is capable of retrieving and comparing the ransom passwords to verify access authority.
- 5. A portable multiple user security instrument, where as the end user merely inserts the portable multiple user security instrument and the payload is installed on the targeted device without any additional external applications.
- 6. A method for security authentication, when the payload is installed the user is presented with a series personal knowledge questions, which comprise a first level security of which they need to select five or more from the list, and enter their answers which are encrypted and recorded within the security instruments memory.
- 7. The method of claim 6, when the first level of security questions are completed the user is presented with a second level security question which they select a password, once the passwords are entered they are encrypted and recorded within the security instrument as well as the targeted device.
- 8. The method of claim 6, where as upon insertion of the portable multiple user security instrument the user question is presented randomly with one of their first level security questions.
- 9. The method of claim 6 and 8, where as once the user enters the correct answer for the first level password the user is then moved on to the second level of security where they are prompted to enter selected characters of their second level security password.
- 10. The method of claim 1, where as the portable multiple user security instrument, has the ability to be centrally controlled via a master users control panel or dashboard, where as and assigned individual such as a security manager can grant permission to access multiple devices with a single security device, the security instrument will either work in a single or multiple user mode and the security of the instrument is not compromised.
- 11. A portable multiple user security instrument used in the multiple mode the instrument gains the third level of security.
- 12. The security of claim 11, is an additional password that is assigned to the security instrument by a security manager.
- 13. The mating connection of the security instrument is protected with a unique swivel cover that remains attached the security instrument at all times.13. The security of claim 12, where as the portable multiple user security instrument, allows for a security manager to access the secured data on the device even if the device is secured.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0623347A GB2445783A (en) | 2006-11-23 | 2006-11-23 | Portable security instrument |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0623347A GB2445783A (en) | 2006-11-23 | 2006-11-23 | Portable security instrument |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0623347D0 GB0623347D0 (en) | 2007-01-03 |
| GB2445783A true GB2445783A (en) | 2008-07-23 |
Family
ID=37636364
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0623347A Withdrawn GB2445783A (en) | 2006-11-23 | 2006-11-23 | Portable security instrument |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2445783A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2483239A (en) * | 2010-08-31 | 2012-03-07 | Gsw Technology Ltd | Purging server access traces from client device on removal of key access system |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000042491A1 (en) * | 1999-01-15 | 2000-07-20 | Rainbow Technologies, Inc. | Usb-compliant personal key with integral input and output devices |
| US20050033968A1 (en) * | 2003-08-08 | 2005-02-10 | Metapass, Inc. | Secure digital key for automatic login |
| US20060185020A1 (en) * | 2005-02-16 | 2006-08-17 | Ide Technologies, Inc. | Software piracy protection device |
| EP1701281A1 (en) * | 2005-03-08 | 2006-09-13 | 1&1 Internet AG | Method and system for logging into a service |
| WO2007008540A2 (en) * | 2005-07-08 | 2007-01-18 | Sandisk Corporation | Mass storage device with automated credentials loading |
| WO2007074431A2 (en) * | 2005-12-27 | 2007-07-05 | Atomynet Inc. | Method and apparatus for securing access to applications |
-
2006
- 2006-11-23 GB GB0623347A patent/GB2445783A/en not_active Withdrawn
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000042491A1 (en) * | 1999-01-15 | 2000-07-20 | Rainbow Technologies, Inc. | Usb-compliant personal key with integral input and output devices |
| US20050033968A1 (en) * | 2003-08-08 | 2005-02-10 | Metapass, Inc. | Secure digital key for automatic login |
| US20060185020A1 (en) * | 2005-02-16 | 2006-08-17 | Ide Technologies, Inc. | Software piracy protection device |
| EP1701281A1 (en) * | 2005-03-08 | 2006-09-13 | 1&1 Internet AG | Method and system for logging into a service |
| WO2007008540A2 (en) * | 2005-07-08 | 2007-01-18 | Sandisk Corporation | Mass storage device with automated credentials loading |
| WO2007074431A2 (en) * | 2005-12-27 | 2007-07-05 | Atomynet Inc. | Method and apparatus for securing access to applications |
Non-Patent Citations (2)
| Title |
|---|
| Lexar JumpDrive 360, downloaded 13th May 2008, from www.lexar.com/jumpdrive/jd_360.html * |
| PICstick, downloaded 13th May 2008 from: www.picstick.com/index.html * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2483239A (en) * | 2010-08-31 | 2012-03-07 | Gsw Technology Ltd | Purging server access traces from client device on removal of key access system |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0623347D0 (en) | 2007-01-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9323696B2 (en) | Data security system | |
| CN103097970B (en) | Systems and methods for providing secure remote access to robot controllers | |
| US8099765B2 (en) | Methods and systems for remote password reset using an authentication credential managed by a third party | |
| Bauer | Paranoid penguin: an introduction to Novell AppArmor | |
| KR101052128B1 (en) | Authentication method, device and system of external storage device | |
| ES2264203T3 (en) | GENERALIZED USER IDENTIFICATION AND AUTHENTICATION SYSTEM. | |
| CN102521165B (en) | Safe USB disk and its recognition methods and device | |
| US8479013B2 (en) | Secure portable data transport and storage system | |
| US10289826B2 (en) | Using hidden secrets and token devices to control access to secure systems | |
| US20060071066A1 (en) | PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents | |
| US20080114990A1 (en) | Usable and secure portable storage | |
| US20080209224A1 (en) | Method and system for token recycling | |
| US20050138423A1 (en) | Remote provisioning of secure systems for mandatory control | |
| CN101073235A (en) | System & method for distributing software licenses | |
| CA2767115A1 (en) | Method for remotely controlling and monitoring the data produced on desktop software | |
| CN111199058A (en) | System and method for ensuring data integrity and confidentiality | |
| US20160012260A1 (en) | System and method for securing a computer port using shape memory alloys | |
| US8656179B2 (en) | Using hidden secrets and token devices to create secure volumes | |
| GB2445783A (en) | Portable security instrument | |
| JP2002268766A (en) | Password inputting method | |
| US20070143529A1 (en) | Apparatus and method for PC security and access control | |
| US20030097580A1 (en) | Data encipher/decipher system for a portable rack of a computer | |
| KR100641884B1 (en) | User identification and application driving system and method using unique number of portable storage device. | |
| CN115657542A (en) | Trusted technology-based domestic information security processing system and processing method | |
| JP4303764B2 (en) | USB key |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 720A | Reinstatement of application (patents act 1977, section 20(2)a) |
Free format text: REQUEST FOR REINSTATEMENT FILED |
|
| AT | Applications terminated before publication under section 16(1) | ||
| 720A | Reinstatement of application (patents act 1977, section 20(2)a) |
Free format text: REQUEST FOR REINSTATEMENT ALLOWED |
|
| S20A | Reinstatement of application (sect. 20a/patents act 1977) |
Effective date: 20080313 |
|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |