[go: up one dir, main page]

GB2445783A - Portable security instrument - Google Patents

Portable security instrument Download PDF

Info

Publication number
GB2445783A
GB2445783A GB0623347A GB0623347A GB2445783A GB 2445783 A GB2445783 A GB 2445783A GB 0623347 A GB0623347 A GB 0623347A GB 0623347 A GB0623347 A GB 0623347A GB 2445783 A GB2445783 A GB 2445783A
Authority
GB
United Kingdom
Prior art keywords
security
instrument
user
level
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0623347A
Other versions
GB0623347D0 (en
Inventor
Graham Baldwin
Leong Kim Yoon
Gary Snyder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TISS SINGAPORE Pte Ltd
Original Assignee
TISS SINGAPORE Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TISS SINGAPORE Pte Ltd filed Critical TISS SINGAPORE Pte Ltd
Priority to GB0623347A priority Critical patent/GB2445783A/en
Publication of GB0623347D0 publication Critical patent/GB0623347D0/en
Publication of GB2445783A publication Critical patent/GB2445783A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A portable multiple user security instrument is connectable to USB, firewire or other interface devices. It is housed in a click and flip housing which provides protection for the device. Without the security instrument being inserted into the appropriate interfacing port of a protected device, the device remains inaccessible (or a secure part of the device remains inaccessible). Upon insertion of the security instrument the user is presented randomly with one of a number of predetermined security questions. Once the user enters the correct answer the user then moves on to the second level of security, where they are prompted to enter two or three characters of their second level security password. The security instrument also has the ability to be centrally controlled via a master users control panel, from which a security manager can grant permission to access multiple devices with a single security instrument.

Description

I
A Portable Multiple User Security Instrument There are numerous security devices on the market today that secure PC's and other devices and they all present the same glaring problem where as they can be easily compromised by key loggers, individuals observing the entry of a user's password, or the user writing down their password and placing it in an obvious place in their office or home. These devices are also limited to accessing only on device and have no means of being assigned to access additional secure devices.
The present invention relates to bringing and end to the compromising and confusion of passwords by allowing the user to select from a series of friendly questions in a two stage approach. The present invention also allows access to multiple secured devices from one secure instrument which is controlled via a master control panel or dashboard by an assigned manager or security manager.
The present invention is housed in a unique Click & Flip housing that protects the mating mechanism from harm while staying attached to the secure instrument at all times.
The present invention has an additional third stage access thus enabling the security manager to access a secured device if an individual was to loose their security instrument. This access is only assigned to a specific security instrument and requires a two stage password to access an individual's secured device.
The invention will now be described solely by way of example and reference to the accomplishing drawings in which: List of Figures I. Figure 1 is a flow diagram showing the installation procedure for the security key 2. Figure 2 is a flow diagram showing the security key lost procedure.
3. Figure 3 is a flow diagram showing the procedure of using a master security key.
4. Figure 4 is a flow diagram showing the Process Flow of T3Pro Security Key.
5. Figure 5 is a screen shot showing the first stage of selecting the stage I multiple passwords.
6. Figure 6 is a screen shot showing the second stage entry screen of the random selection of digits in the password that need to be entered to gain access to the secured device 7. Figure 7 is a screen shot showing the security managers password screen that need to be entered to gain access to either the control console or individual users secured devices.
8: Figure 8 is a screen shot showing the security managers control console or dashboard, which is use to control access to all secured devices.
9. Figure 9 is a drawing of the housing of the security instrument in a close position; this is referred to as Click & Flip.
10. Figure 10 is a drawing of the housing of the security instrument in a sliding open position; this is referred to as Click & Flip.
11. Figure 11 is a drawing of the housing of the security instrument in a swing position; this is referred to as Click & Flip.
12. Figure 12 is a drawing of the housing of the security instrument in a fully open position; this is referred to as Click & Flip Modes for carrying out invention Figure 1 is a flow diagram showing the installation procedure for the security key.
The security key is typically supplied with security software that is loaded by the user onto the computer during the installation process (1).
Firstly, plug in the security key into a USB socket on a computer (2). After the security key has been plugged into the USB socket on the computer, a communication is established between the computer and the devices. Secondly launch the installation of the security software. During the installation (3), it'll validated the security key either is a valid security key or an incorrect security key. If it's not a valid security key, the user can choose either cancel the installation (7) or replace the security key with others valid security key(2). If it's a valid security key (4), the user will has a choice of 10 questions that the user must select 5 questions from the list and answer it. The answer is then encrypted and stored into the security key. Finally, the user will need to create a password (5). The password must have a minimum of 6 characters. The password is then encrypted and stored into the security key.
Reboot the computer and the installation process is complete (6).
Figure 2 is flow diagram showing the security key lost procedure. When users lost theirs security key (8), they have to inform their company's admin which is managing the entire security key application (9). The admin generate a new security key and assign a temporary password for the user (10).
The user uses the new generated key and plugs it into user's computer. The user will have a choice of 10 questions that the user must select 5 questions from the list and answer it (11). The answer is then encrypted and stored into the security key. Finally, the user will need to create a password (12). The password must have a minimum of 6 characters. The password is then encrypted and stored into the security key.
Figure 3 is a flow diagram showing the procedure of using a master security key.
Firstly, plug in the security key into a USB socket on a computer. Launch the pre-installed key generation program (13). Insert the Master key (14). During the master security key generation, the user will be prompt to enter primary master password (15). The password is then encrypted and stored into the master security key.
Plug in the master security key into a USB socket on any computer to unlock the computer. The user will be prompt to enter primary master password and secondary master password (16). If both passwords are correct (17), the computer will unlock (18). The user will be given three attempts to login (19), after three attempts fail the computer will be lock (21). The user has to reboot the computer to try again.
Figure 4 is flow diagram showing the Process Flow of T3Pro Security Key.
Firstly, plug in the security key into a USB socket on a computer (23). After a communication is established between the computer and the security key, T3Pro Security software will identified type of the security key (24). If it's a User Security Key, it will require the user to answer I out of the 5 question (25) user select during installation randomly (26). The user is given 3 attempts to provide a correct answer, if the user fail to enter correct answer (30) the pc will be lock (31) and require reboot the computer to try again. However once the user managed to answer the question, the user will require to provide 3 random character of the password (27). Again, the user is given 3 attempts to enter the answer (28), if the user fail to provide correct answer (29), the computer will be lock (31). If the user manages to enter the answer correctly the computer will unlock (35).
As for Master Security Key, the user will be prompt to enter primary master password and secondary master password (32). If both passwords are correct, the computer will unlock. The user will be given 3 attempts to login (33), after three attempts fail the computer will be lock (34). The user has to reboot the computer to try again.
The memory control instrument of the portable multiple user security instrument comprises of a micro-controller.
The memory control instrument is capable of establishing multiple passwords that are generated randomly to facilitate implementation of access restriction.
The memory control instrument is capable of retrieving and comparing the ransom passwords to verify access authority.
The end user merely inserts the portable multiple user security instrument and the payload is installed on the targeted device without any additional external applications.
Once the payload is installed (Figure 1) the user is presented with a series of personal knowledge questions i.e. "mother maiden name" (Figure 5) which comprise the first level security of which they need to select five or more from the list, and enter their answers which are recorder within the security instruments memory.
Once the first level of security questions (claim 6) are completed the user is presented with the second level security question (Figure 1) which they select a password that is 6 to 8 characters in length (Figure 6), once the passwords are entered they are recorded on the security instrument as well as the targeted device.
Upon insertion of the portable multiple user security instrument the user question is presented randomly with one of their first level security questions (Figure 4).
Once the user enters the correct answer for the first level password the user is then moved on to the second level of security (Figure 4) where they are prompted to enter 2 or 3 characters of their second level security password (Figure 6). An example of this would be the second, third and sixth character of the password, once this has been completed the user has access to the instrument, Having two levels of security questions that are presented randomly to the user thus prevents the security of the instrument being compromised as with traditional methods of previous security devices where a individual can easily oversee the user entering their password.
The portable multiple user security instrument also has the ability to be centrally controlled via a master users control panel or dashboard, (Figure 8) where as and assigned individual such as a security manager can grant permission to access multiple devices with a single security device. The instrument will either work in a single or multiple user mode and the security of the instrument is not compromised.
When the portable multiple user security instrument is used in the multiple mode the instrument gains the third level of security which is an additional password that is assigned to the security instrument by the security manager (Figure 3). If for some reason the individual with the security instrument was to loose the instrument the security manager can invoke the third level of password to unlock the secured instrument and grant permission to the individual (Figure 2) (Figure 7). The individual is then presented with a new security instrument and they must complete the install process again at that time, if they fail to do so at that time and remove their new security instrument they are locked out of the instrument until the security manager can unlock their instrument again.
Unlike other security devices that allow an individual to secure their device the said invention allows for the security manager also can access the secure data on the secured device if the individual were to be terminated from the company (Figure 4) (Figure 7). This is a problem with present day secure devices as the security manager can't access data secured by the individual on the secured device.
The mating connection to the security instrument is protected with a unique swivel cover (Figure 9). An example of this would be the connection of an USB or Firewire device is protected and to expose the connecting end the user simply pulls the instrument open till it clicks (Figure 10) and they swivels the connections cover (Figure 11) 180 degrees end over end to expose the connector (Figure 12). This is referred to as "Click & Flip".

Claims (13)

  1. Claims 1. A portable multiple user security instrument which is
    accessible via the universal serial bus (USB) coupling device, Firewire coupling device or other interface devices, without the presents of the security instrument being inserted into the interfacing port on the said target device the devices remains inaccessible or the part of the device that's secure remains inaccessible and once inserted the user must enter the multi-level security questions and multiple passwords, the security instrument also has memory on board the device that is only accessible through multi-level security questions and multiple passwords, the security instrument also allows for the accessing of multiple secured devices via a single security instrument which is determined by the security manager through the incorporated control panel or dashboard.
  2. 2. The portable multiple user security instrument of claim 1, wherein the memory control instrument comprises a micro-controller.
  3. 3. The portable multiple user security instrument of claim 1, wherein the memory control instrument is capable of establishing multiple passwords that are generated randomly to facilitate implementation of said access restriction.
  4. 4. The portable multiple user security instrument of claim 1, wherein the memory control instrument is capable of retrieving and comparing the ransom passwords to verify access authority.
  5. 5. A portable multiple user security instrument, where as the end user merely inserts the portable multiple user security instrument and the payload is installed on the targeted device without any additional external applications.
  6. 6. A method for security authentication, when the payload is installed the user is presented with a series personal knowledge questions, which comprise a first level security of which they need to select five or more from the list, and enter their answers which are encrypted and recorded within the security instruments memory.
  7. 7. The method of claim 6, when the first level of security questions are completed the user is presented with a second level security question which they select a password, once the passwords are entered they are encrypted and recorded within the security instrument as well as the targeted device.
  8. 8. The method of claim 6, where as upon insertion of the portable multiple user security instrument the user question is presented randomly with one of their first level security questions.
  9. 9. The method of claim 6 and 8, where as once the user enters the correct answer for the first level password the user is then moved on to the second level of security where they are prompted to enter selected characters of their second level security password.
  10. 10. The method of claim 1, where as the portable multiple user security instrument, has the ability to be centrally controlled via a master users control panel or dashboard, where as and assigned individual such as a security manager can grant permission to access multiple devices with a single security device, the security instrument will either work in a single or multiple user mode and the security of the instrument is not compromised.
  11. 11. A portable multiple user security instrument used in the multiple mode the instrument gains the third level of security.
  12. 12. The security of claim 11, is an additional password that is assigned to the security instrument by a security manager.
  13. 13. The mating connection of the security instrument is protected with a unique swivel cover that remains attached the security instrument at all times.
    13. The security of claim 12, where as the portable multiple user security instrument, allows for a security manager to access the secured data on the device even if the device is secured.
GB0623347A 2006-11-23 2006-11-23 Portable security instrument Withdrawn GB2445783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0623347A GB2445783A (en) 2006-11-23 2006-11-23 Portable security instrument

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0623347A GB2445783A (en) 2006-11-23 2006-11-23 Portable security instrument

Publications (2)

Publication Number Publication Date
GB0623347D0 GB0623347D0 (en) 2007-01-03
GB2445783A true GB2445783A (en) 2008-07-23

Family

ID=37636364

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0623347A Withdrawn GB2445783A (en) 2006-11-23 2006-11-23 Portable security instrument

Country Status (1)

Country Link
GB (1) GB2445783A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2483239A (en) * 2010-08-31 2012-03-07 Gsw Technology Ltd Purging server access traces from client device on removal of key access system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000042491A1 (en) * 1999-01-15 2000-07-20 Rainbow Technologies, Inc. Usb-compliant personal key with integral input and output devices
US20050033968A1 (en) * 2003-08-08 2005-02-10 Metapass, Inc. Secure digital key for automatic login
US20060185020A1 (en) * 2005-02-16 2006-08-17 Ide Technologies, Inc. Software piracy protection device
EP1701281A1 (en) * 2005-03-08 2006-09-13 1&1 Internet AG Method and system for logging into a service
WO2007008540A2 (en) * 2005-07-08 2007-01-18 Sandisk Corporation Mass storage device with automated credentials loading
WO2007074431A2 (en) * 2005-12-27 2007-07-05 Atomynet Inc. Method and apparatus for securing access to applications

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000042491A1 (en) * 1999-01-15 2000-07-20 Rainbow Technologies, Inc. Usb-compliant personal key with integral input and output devices
US20050033968A1 (en) * 2003-08-08 2005-02-10 Metapass, Inc. Secure digital key for automatic login
US20060185020A1 (en) * 2005-02-16 2006-08-17 Ide Technologies, Inc. Software piracy protection device
EP1701281A1 (en) * 2005-03-08 2006-09-13 1&1 Internet AG Method and system for logging into a service
WO2007008540A2 (en) * 2005-07-08 2007-01-18 Sandisk Corporation Mass storage device with automated credentials loading
WO2007074431A2 (en) * 2005-12-27 2007-07-05 Atomynet Inc. Method and apparatus for securing access to applications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Lexar JumpDrive 360, downloaded 13th May 2008, from www.lexar.com/jumpdrive/jd_360.html *
PICstick, downloaded 13th May 2008 from: www.picstick.com/index.html *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2483239A (en) * 2010-08-31 2012-03-07 Gsw Technology Ltd Purging server access traces from client device on removal of key access system

Also Published As

Publication number Publication date
GB0623347D0 (en) 2007-01-03

Similar Documents

Publication Publication Date Title
US9323696B2 (en) Data security system
CN103097970B (en) Systems and methods for providing secure remote access to robot controllers
US8099765B2 (en) Methods and systems for remote password reset using an authentication credential managed by a third party
Bauer Paranoid penguin: an introduction to Novell AppArmor
KR101052128B1 (en) Authentication method, device and system of external storage device
ES2264203T3 (en) GENERALIZED USER IDENTIFICATION AND AUTHENTICATION SYSTEM.
CN102521165B (en) Safe USB disk and its recognition methods and device
US8479013B2 (en) Secure portable data transport and storage system
US10289826B2 (en) Using hidden secrets and token devices to control access to secure systems
US20060071066A1 (en) PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents
US20080114990A1 (en) Usable and secure portable storage
US20080209224A1 (en) Method and system for token recycling
US20050138423A1 (en) Remote provisioning of secure systems for mandatory control
CN101073235A (en) System & method for distributing software licenses
CA2767115A1 (en) Method for remotely controlling and monitoring the data produced on desktop software
CN111199058A (en) System and method for ensuring data integrity and confidentiality
US20160012260A1 (en) System and method for securing a computer port using shape memory alloys
US8656179B2 (en) Using hidden secrets and token devices to create secure volumes
GB2445783A (en) Portable security instrument
JP2002268766A (en) Password inputting method
US20070143529A1 (en) Apparatus and method for PC security and access control
US20030097580A1 (en) Data encipher/decipher system for a portable rack of a computer
KR100641884B1 (en) User identification and application driving system and method using unique number of portable storage device.
CN115657542A (en) Trusted technology-based domestic information security processing system and processing method
JP4303764B2 (en) USB key

Legal Events

Date Code Title Description
720A Reinstatement of application (patents act 1977, section 20(2)a)

Free format text: REQUEST FOR REINSTATEMENT FILED

AT Applications terminated before publication under section 16(1)
720A Reinstatement of application (patents act 1977, section 20(2)a)

Free format text: REQUEST FOR REINSTATEMENT ALLOWED

S20A Reinstatement of application (sect. 20a/patents act 1977)

Effective date: 20080313

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)