`Morris
`
`USOO646O138B1
`US 6,460,138 B1
`(10) Patent No.:
`Oct. 1, 2002
`(45) Date of Patent:
`
`(54) USER AUTHENTICATION FOR PORTABLE
`ELECTRONIC DEVICES USING
`ASYMMETRICAL CRYPTOGRAPHY
`
`(75) Inventor: Robert Paul Morris, Raleigh, NC (US)
`(73) Assignee: Flashpoint Technology, Inc.,
`Peterborough, NH (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(*) Notice:
`
`(21) Appl. No.: 09/166,344
`(22) Filed:
`Oct. 5, 1998
`(51) Int. Cl. .................................................. H04L 9/30
`(52) U.S. Cl. ........................................ 713/184; 713/168
`(58) Field of Search ................................. 713/184, 168,
`713/179, 170, 172,176, 181, 193; 380/247
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`1/1994 McLean et al. ............. 711/164
`5,282.247 A
`5,293.424. A * 3/1994 Hotley et al. .....
`... 713/193
`5,499.294. A * 3/1996 Friedman ......
`... 713/179
`5,552,897 A
`9/1996. Mandelbaum
`... 358/400
`5,778,072 A
`7/1998 Samar ......................... 380/30
`5,917,913 A * 6/1999 Wang .......................... 705/67
`5,933,328 A * 8/1999 Wallace et al. ............. 361/737
`6,003,135 A * 12/1999 Bialicket al. .............. 713/201
`6,026,293 A * 2/2000 Osborn .........
`... 455/411
`6,038,549 A
`3/2000 Davis et al. .................. 705/35
`6,084.967 A * 7/2000 Kennedy et al. ............ 380/247
`FOREIGN PATENT DOCUMENTS
`
`OTHER PUBLICATIONS
`An Introduction to Cyptography, Entrust Technologies, Dec.
`1997 http://www.entrust.com/resources/pdf/cry.
`Introduction to Public-Key Cryptography, Netscape, 9/2598
`http://developer.netScape.com/docs/manuals.
`Smartcard Invasion Continues, Byte, Apr. 1998 http://ww
`w.byte.com/art/9804/sec19/art1.htm.
`* cited by examiner
`
`Primary Examiner Matthew Smithers
`(74) Attorney, Agent, or Firm-Stephen G. Sullivan;
`Sawyer Law Group LLP
`(57)
`ABSTRACT
`A System and method for authenticating a user of a portable
`electronic device having a removable memory using asym
`metric cryptography, the asymmetric cryptography requiring
`the use of a userprivate key and public key. The method and
`System include Storing the userprivate key and public key
`on the portable electronic device. Thereafter, information
`including the userpersonal identification number (PIN) is
`encrypted using the userprivate key and public key,
`respectively, to create encrypted authentication information.
`The encrypted authentication information is then Stored on
`a Standard removable memory, Such as a flash card. When
`the removable memory is Subsequently inserted into the
`portable electronic device, the portable electronic device
`automatically decrypts the authentication information and
`prompts the user for a PIN code. If the decrypted authenti
`cation information and the entered PIN are verified, the user
`is authenticated without the use of a Smart card or card
`reader and the device is unlocked allowing the user to gain
`CCCSS.
`
`EP
`
`1 017 223 A2 * 7/2000
`
`11 Claims, 3 Drawing Sheets
`
`
`
`
`
`
`
`
`
`
`
`
`
`This is a
`randor
`text
`message
`
`Authentication
`Information
`
`
`
`Authentication
`Information
`
`Private
`Key
`
`PN 144
`
`Removable
`Memory
`118
`
`
`
`150
`Digital
`Signature
`
`Digital
`Message Private Signature
`Digest
`Key
`
`
`
`
`
`
`
`
`
`
`
`
`Hashing
`algorithm
`
`42
`Compare
`
`Message
`Digest
`
`Message
`Digest
`
`110
`
`Portable Electronic Device
`
`Instacart, Ex. 1012
`
`1
`
`
`
`U.S. Patent
`
`Oct. 1, 2002
`
`Sheet 1 of 3
`
`US 6,460,138 B1
`
`Message
`
`This is a
`rardom
`text
`message
`
`
`
`
`
`Hashing
`algorithm
`
`
`
`
`
`
`
`
`
`Hashing
`algorithm
`
`Message
`
`This is a
`random
`text
`message
`
`Message
`Digest
`
`Compare to
`Validate
`
`Digital
`Message Private
`Digest
`Key Signature
`
`Digital
`Signature
`
`Public
`Key
`
`Message
`Digest
`
`PRIOR ART
`
`F.G. 1
`
`
`
`12
`
`122
`
`118
`
`Non-volatile
`Memory
`
`Removable
`Memory
`
`124
`
`
`
`
`
`
`
`
`
`User
`Interface
`
`FG 2
`
`2
`
`
`
`U.S. Patent
`
`Oct. 1, 2002
`
`Sheet 2 of 3
`
`US 6,460,138 B1
`
`FIG 3
`
`Generate Message Digest
`
`200
`
`202
`
`Encrypt the Message and Message Digest with
`Private Key to create Digital Signature
`
`Encrypt the PIN and Digital Signature with Public Key
`
`Store Encrypted Authentication information
`on the Removable Memory
`
`Insert Removable Memory into Electronic Device
`
`204
`
`2O6
`
`208
`
`210
`
`Decrypt Authentication information
`using Private Key
`
`Prompt User to Get PIN
`
`212
`
`214
`
`Decrypt Digital Signature Using Public Key
`to Reveal Orignal Message Digest and Message.
`
`Generate Message Digest by Hashing
`Original Message From Authentication info.
`
`Compare the two Message Digests
`
`AllOW ACCess to the Device if the two
`Message Digests Match
`
`216
`
`8
`21
`
`
`
`22 O
`
`222
`
`3
`
`
`
`U.S. Patent
`
`Oct. 1, 2002
`
`Sheet 3 of 3
`
`US 6,460,138 B1
`
`
`
`
`
`QDIA8QDIU01IE]a|qeyod
`
`yOld
`
`
`bytNidKeyUO!}BWIOJUuoleoiueyinyIIGNd
`Buiyseywapues5Key=ysabiqSri
`
`
`
`
`
`LIsobIqsebiq
`
`wywobye
`abessaw
`
`xay
`
`aiedwo4y
`
`crt
`
`
`
`abessawehessoy
`
`
`
`aleAUduoleoljueyjny
`
`Uol}eWJOjU]hay
`
`jey!51q
`
`ainjeubis
`
`Ost
`
`aqeaowaey
`
`Aloway
`
`Ort
`
`
`
`SIMEUDIS gyealigebessaw
`
`jey51qwyo0bye
`
`Burysey
`
`abessow
`
`Bs}sigs
`
`wopua
`
`x9}
`
`efessaw
`
`
`
`4
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 6,460,138 B1
`
`1
`USER AUTHENTICATION FOR PORTABLE
`ELECTRONIC DEVICES USING
`ASYMMETRICAL CRYPTOGRAPHY
`
`FIELD OF THE INVENTION
`The present invention relates to the Security of portable
`electronic devices, and more particularly to a method and
`System for the authentication of a user of a portable elec
`tronic device using asymmetrical cryptography.
`BACKGROUND OF THE INVENTION
`Security for most electronic devices dealing with Sensitive
`data utilizes one or another form of a password (PIN or
`access code) to prevent unauthorized access. In order to use
`a device the user is requested to enter a password or pin. If
`correct, the user is allowed to use the device, if not, well
`he/she is usually just prompted to try again.
`Password protection, however, has not proven to be a very
`effective means of user authentication due to two funda
`mental problems with passwords. If they are relatively short
`and easy to memorize, they may be easily compromised
`either through guessing (by unauthorized users) or broken
`using a simple password cracking program. Stronger pro
`tection is achieved through longer, meaningless or randomly
`generated passwords, but they are easy to forget (by autho
`rized users). And in many portable electronic devices, the
`Situation is even worse in the cases where passwords are
`Stored in Storage that requires batteries to keep it stable. An
`unauthorized user can simply remove the batteries and wait
`for the password to disappear.
`An improved approach to providing Security for elec
`tronic devices is to create long, invincible passwords using
`public-key cryptography, and to then Store those passwords
`(digital keys) on Smart cards. A Smart card is a plastic credit
`card that carries an imbedded chip instead of a magnetic
`Stripe.
`Public-key cryptography enables two communicating par
`ties to disguise information they send to each other through
`encryption and decryption. Using the digital keys Stored on
`the Smart card, the Sender encrypts, or Scrambles, informa
`tion before Storing it on a Smart card. The encrypted infor
`mation on the Smart card is unintelligible to an intruder.
`When the Smart card is inserted into a Smart card reader
`attached to the device to be accessed, the Smart card reader
`decrypts, or unscrambles, the information. Access to the
`device is allowed once the information is verified.
`Many of today'smart cards use asymmetric cryptographic
`algorithms. With this method, a public key is used in
`combination with a private key that is only used by the
`owner of the Smart card. Typically, the private key is Stored
`on the Smart card, while the public key is stored within the
`protected electronic device. A message Sent using these two
`keys can only be decoded using the complementary keys.
`Thus, anonymous and Secure data transmission is attained
`using the public key and the data can only be read by the
`owner of the private key.
`Before a user can own a Smart card, the user must first
`obtain a certificate from a certificate authority. A certificate
`issued by the certificate authority binds a particular public
`key to the name of the perSon or entity the certificate
`identifies (such as the name of an employee). Certificates
`help prevent the use of fake public keys for imperSonation.
`Only the public key certified by the certificate will work with
`the corresponding private key possessed by the perSon or
`entity identified by the certificate.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`These public and private keys are used to authenticate the
`perSon by creating a digital signature for that perSon, which
`is then stored on the Smart card along with the person's PIN.
`When the user inserts his/her Smart card into a Smart card
`reader to gain access to a particular device, the user is
`prompted for the PIN. If the PIN matches the PIN read from
`the card, the user's digital Signature is then used to authen
`ticate that the user is who he/she claims to be.
`FIG. 1 is diagram illustrating a Standard Smart card
`protocol for creating and Verifying a digital Signature. A
`digital Signature is created by running message text through
`a hashing algorithm. This yields a message digest. The
`message digest along with the message is then encrypted
`using the private key of the individual who is Sending the
`message, turning it into a digital Signature. The digital
`Signature can only be decrypted by the public key of the
`Same individual. The recipient of the message decrypts the
`digital Signature to obtain the original message, and uses the
`original message to recalculate the message digest. The
`value of this newly calculated message digest is compared to
`the value of the message digest found from the digital
`Signature. A match indicates that the message has not been
`tampered with. Since the public key of the Sender was used
`to verify the Signature, the text must have been Signed with
`the private key owned by the Sender.
`This use of digital signatures is the emerging Standard for
`user authentication and Security in network environments. In
`theory, a perSon can use the same digital certificate to gain
`access to any number of Services, rather than having to
`remember and manage a number of different passwords.
`Smart cards are not Subject to tampering or forgery
`(provided the key is long enough). An unauthorized user
`would have to know the user's PIN and also have the user's
`digital certificate to gain access.
`Unfortunately, there is problem with using Smart cards to
`provide Security for portable electronic devices because
`Smart card readers are too bulky to be built in to such
`devices. For example, certain types of portable electronic
`devices, Such as digital cameras and personal digital
`assistants, utilize removable memories that are even Smaller
`than PCMCIA cards. One example of this type of memory
`is a compact flash card. One Solution is to carry an external
`Smart card reader around as a peripheral device and plug it
`into Such a device when the user wishes to use the device.
`This, however, would be inconvenient and burdensome to
`the user. And Simply Storing a pin and a digital certificate on
`a removable memory compatible with the portable elec
`tronic device is not an acceptable alternative because of the
`risk of having the memory lost or stolen. This would allow
`a third party to gain access to the user's PIN and to
`imperSonate the owner in any transaction where asymmetri
`cal cryptography are used for authentication.
`Accordingly, what is needed is a System and method for
`authenticating the user of a portable electronic device with
`out the need of a Smart card and reader. The present
`invention addresses Such a need.
`
`SUMMARY OF THE INVENTION
`The present invention provides a method and System for
`authenticating a user of a portable electronic device having
`a removable memory using asymmetric cryptography, the
`asymmetric cryptography requiring the use of a user's
`private key and public key. The method and System include
`Storing the user's private key and public key on the portable
`electronic device. Thereafter, information including the
`user's personal identification number (PIN) is encrypted
`
`5
`
`
`
`3
`using the user's private key and public key, respectively, to
`create encrypted authentication information. The encrypted
`authentication information is then Stored on a Standard
`removable memory, such as a flash card. Until the removable
`memory containing the correct authentication information is
`inserted into the device and the authentication information
`Verified, the portable electronic device remains locked and
`inaccessible to all would be users.
`When the removable memory is subsequently inserted
`into the portable electronic device, the portable electronic
`device automatically decrypts the authentication informa
`tion using the private and public keys, respectively, and
`prompts the user for a PIN code. If the decrypted authenti
`cation information and the entered PIN are verified, the user
`is authenticated without the use of a Smart card or card
`reader and the device is unlocked allowing the user to gain
`CCCSS.
`According to the System and method disclosed herein, the
`present invention provides enhanced Security for portable
`electronic devices while maintaining the devices's portabil
`ity.
`
`15
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is diagram illustrating a Standard Smart card
`protocol for creating and Verifying a digital Signature.
`FIG. 2 is a block diagram showing one preferred embodi
`ment of a portable electronic device for use in accordance
`with the present invention.
`FIG. 3 is a flowchart depicting the process of user
`authentication in a portable electronic device without the use
`of a Smart card or card reader in accordance with the present
`invention.
`FIG. 4 is a block diagram graphically illustrating the
`process described in FIG. 3.
`DETAILED DESCRIPTION OF THE
`INVENTION
`The present invention relates to a method and System
`authenticating users of portable electronic devices using
`asymmetrical cryptography. The following description is
`presented to enable one of ordinary skill in the art to make
`and use the invention and is provided in the context of a
`patent application and its requirements. Although the present
`invention will be described in the context of a preferred
`embodiment, various modifications to the preferred embodi
`ment will be readily apparent to those skilled in the art and
`the generic principles herein may be applied to other
`embodiments. Thus, the present invention is not intended to
`be limited to the embodiment shown but is to be accorded
`the widest Scope consistent with the principles and features
`described herein.
`The present invention uses asymmetrical cryptoghraphy
`and a PIN for user authentication in an electronic device.
`The present invention assumes that the user, preferrably the
`owner of the portable electronic device, first obtains a
`personal and public key from a given certificate authority.
`Referring now to FIG. 2, a block diagram of one preferred
`embodiment of a portable electronic device 110 is shown for
`use in accordance with the present invention. The portable
`electronic device 110 preferably includes a central proceSS
`ing unit (CPU) 112, a memory 116, a removable memory
`118, a user interface 120, and a non-volatile memory 122.
`Each element of portable electronic device 110 communi
`cates through a common System bus 124. Extra Storage for
`the portable electronic device 110 is typically provided by
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,460,138 B1
`
`4
`inserting a removable memory 118 into the portable elec
`tronic device 110.
`In a preferred embodiment, electronic device 110 is a
`Small-sized, portable electronic device 10, Such as a digital
`camera or a personal digital assistant (PDA). In other
`embodiments, electronic device 110 may alternately be
`implemented as any type and size of electronic device or
`system that includes or utilizes a removable memory 118.
`CPU 112 is preferably a microprocessor for running
`various Software routines. Although CPU 122 is preferably
`a microprocessor, one or more DSPs (digital Signal
`processor) or ASICS (Application Specific Integrated
`Circuit) could also be used. Memory 118 may alternately
`comprise various Storage device configurations, Such as a
`random-access memory (RAM).
`Non-volatile memory 122 preferably comprises an Elec
`trically Erasable Programmable Read Only Memory
`(EEPROM), but may also comprise a conventional read
`only memory, or a flash memory. Non-volatile memory 122
`typically Stores an operating System program 128, which
`when executed by CPU 112, controls the operation of the
`portable electronic. In the case where the portable electronic
`device comprises a digital camera, an example of the oper
`ating system 128 is the DigitaTM Operating Environment
`provided by the assignee of the present application.
`Removable memory 118 serves as an additional image
`data Storage area and is preferably a non-volatile device,
`Such a flash disk, readily removable and replaceable by the
`user via removable memory slot (not shown).
`AS Stated previously, Smart cards provide a Secure way to
`Store asymmetrical cryptography and keys, Since the user's
`private key is stored on the Smart card and his/her public key
`is Stored on the device. However, Smart cards typically
`require a Smart card reader that is too bulky to include in
`today's portable electronic devices.
`In one aspect of the present invention, both the user's
`private key 130 and public key 132 are stored in non-volatile
`memory 122 in the portable electronic device 110, as shown,
`and are accessible via the device's operating System 128. To
`more particularly describe the features of the present
`invention, refer now to FIGS. 3 and 4.
`FIG. 3 is a flowchart depicting the process of authenti
`cating the user of a portable electronic device without the
`use of a Smart card or card reader in accordance with the
`present invention. FIG. 4 is a block diagram graphically
`illustrating the steps described in FIG. 3.
`The process begins by creating a digital Signature 140. AS
`described above, the user enters a message 142 on a PC or
`other computing device in step 200. The message 142 may
`comprise anything from the user's name and for PIN to
`random text, although Stronger protection will result from a
`longer message 142. A message digest 146 is then generated
`by hashing the message 142 using a Standard hashing
`algorithm 148 in step 202. After the message digest 146 is
`generated, it is encrypted (signed) along with the message
`142 using the user's private key 130 in step 204.
`There are several alternative preferred embodiments to
`the present invention.
`The digital signature 140 could be generated by encrypt
`ing the message digest 146 with the PIN 140 and/or the
`message 142 using the user's private key 130. The preferred
`embodiment encrypts the message 142 with the message
`digest 146 because it simulates the use of a Smart card more
`closely. Encrypting all three would be the most Secure
`alternative. The other choices not described in detail modify
`
`6
`
`
`
`S
`the given algorithm only slightly and in ways that are
`obvious to one of ordinary skill in the art.
`After the digital signature 140 is generated, the user's
`public key 132 is used to encrypt his/her PIN 140 with the
`digital Signature 140 to create encrypted authentication
`information 150 in step 206. This encrypted authentication
`information 150 is then stored on the removable memory
`118 in step 208.
`To unlock the portable electronic device 110, the remov
`able memory 118 is inserted into the portable electronic
`device 110 in step 210. Upon detection of the removable
`memory 118, the portable electronic device's operating
`system 128 searches for the authentication information 150
`on the removable memory 118. If the authentication infor
`mation 150 is found, the portable electronic device 110 uses
`the private key 130 stored on the portable electronic device
`110 to decrypt the authentication information 150 in step
`212. Only the owner's private key 130 can decrypt the
`authentication information 150 properly.
`Once the information is decrypted, the user is prompted
`for a PIN, and the user enters the PIN 152 on the user
`interface 120 of the portable electronic device 110 in step
`214. If the PIN 152 entered by the user matches the PIN 144
`from the decrypted authentication information 150, the
`operating System 128 or other program uses the user's public
`key 132 to decrypt the digital signature 140 to obtain the
`original message 142 and message digest 146 in Step 216.
`Another message digest 154 is generated in Step 218 by
`hashing the message 142 obtained in Step 216 using the same
`hashing algorithm 148 used in step 202.
`The two message digests 146 and 154 are then compared
`in step 220. If they match in step 222, the user is authenti
`cated and access to the portable electronic device 110 is
`allowed.
`The present invention thus provides the same level of
`Security as a Smart card, but without the use of a Smart card
`or Smart card reader. Moreover, the user's digital certificate
`is not at risk, if the removable media is lost or Stolen,
`because it is useless without the PIN.
`Those with ordinary skill in the art will appreciate that the
`user could generate their own authentication information
`using Software on their PCS, or the authentication informa
`tion could be generated by a third party as a Service to
`customers (e.g., on a walk-in basis for any customer with a
`PC Smart card, or via the Internet).
`In Summary, a method and System for authenticating users
`of portable electronic devices using cryptography has been
`disclosed. Although the present invention has been
`described in accordance with the embodiments shown, one
`of ordinary skill in the art will readily recognize that there
`could be variations to the embodiments and those variations
`would be within the Spirit and Scope of the present invention.
`In addition, Software written according to the present inven
`tion may be stored on a computer readable medium, Such as
`the removable memory, or transmitted over a network, and
`loaded into the portable electronic device for execution.
`Accordingly, many modifications may be made by one of
`ordinary skill in the art without departing from the Spirit and
`Scope of the appended claims.
`What is claimed is:
`1. A method for authenticating a user of a portable
`electronic device having a removable memory using asym
`metric cryptography, the asymmetric cryptography requiring
`the use of a user's private key and public key, the method
`comprising the Steps of:
`(a) Storing the user's private key and public key in the
`portable electronic device;
`
`1O
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,460,138 B1
`
`6
`(b) encrypting information including the user's personal
`identification number (PIN) using the user's private key
`and public key, respectively, to create encrypted
`authentication information, and
`(i) hashing a message to create a message digest,
`(ii) using the private key to encrypt the message digest
`and the message to create a digital Signature, and
`(ii) encrypting the PIN and the digital signature using
`the user's public key;
`(c) storing the encrypted authentication information on
`the removable memory;
`(d) in response to the removable memory being inserted
`into the portable electronic device, decrypting the
`encrypted authentication information using the user's
`private key and public key, respectively, and prompting
`the user to enter a new PIN; and
`(e) allowing access to the portable electronic device if the
`decrypted authentication information and the new PIN
`are verified, whereby the user is authenticated without
`the need of a Smart card and Smart card reader.
`2. A method as in claim 1 wherein step 1(d) further
`includes the Step of
`(i) decrypting the encrypted authentication information
`using the private key to reveal the PIN and digital
`Signature.
`3. A method as in claim 2 wherein step 1(e) further
`includes the Steps of:
`(i) verifying that the PIN from the decrypted authentica
`tion information matches the new PIN;
`(ii) in response to a match, using the public key to decrypt
`the digital Signature to reveal the message and message
`digest,
`(iii) hashing the message to create a new message digest;
`and
`(iv) authenticating the user if the message digest from the
`digital Signature matches the new message digest.
`4. A System for authenticating a user of for a portable
`electronic device, comprising:
`a random acceSS memory;
`a non-volatile memory for Storing an operating System
`program, a first cryptographic key and Second crypto
`graphic key;
`a removable memory removably inserted into the portable
`electronic device, the removable memory Storing
`encrypted authentication information, the encrypted
`authentication information including a personal identi
`fication number (PIN) and a digital signature; and
`a processor coupled to the random access memory, the
`non-volatile memory, and to the memory for executing
`the operating System program, the operating System
`program responsive to the presence of the encrypted
`authentication information to decrypt the authentica
`tion information using the first and Second crypto
`graphic keys to reveal the PIN and the digital Signature,
`and to prompt the user to enter a new PIN, wherein
`access to the portable electronic device is allowed if the
`decrypted authentication information and the new PIN
`are verified, whereby the user is authenticated without
`the need of a Smart card and Smart card reader.
`5. A System as in claim 4 wherein the operating System
`compares the PIN and the new PIN, and in response to a
`match, decrypts the digital Signature using the Second cryp
`tographic key to reveal the message and the message digest,
`hashes the message to create a new message digest, and
`authenticates the user if the message digest from the digital
`Signature matches the new message digest.
`
`7
`
`
`
`7
`6. A System as in claim 5 wherein the first cryptographic
`key is a private keys and the Second cryptographic key is a
`public key.
`7. A computer-readable medium containing program
`instructions for authenticating a user of a portable electronic
`device having a removable memory using asymmetric
`cryptography, the asymmetric cryptography requiring the
`use of a user's private key and public key, the program
`instructions of:
`(a) Storing the user's private key and public key in the
`portable electronic device
`(b) encrypting information including the user's personal
`identification number (PIN) using the user's private key
`and public key, respectively, to create encrypted
`authentication information, and
`(i) hashing a message to create a message digest,
`(ii) using the private key to encrypt the message digest
`and the message to create a digital Signature, and
`(iii) encrypting the PIN and the digital signature using
`the user's public key;
`(c) Storing the encrypted authentication information on
`the removable memory;
`(d) in response to the removable memory being inserted
`into the portable electronic device, decrypting the
`encrypted authentication information using the user's
`private key and public key, respectively, and prompting
`the user to enter a new PIN; and
`(e) allowing access to the portable electronic device if the
`decrypted authentication information and the new PIN
`are verified, whereby the user is authenticated without
`the need of a Smart card and Smart card reader.
`8. A computer-readable medium as in claim 7 wherein
`instruction 13(d) further includes the instruction of:
`(i) decrypting the encrypted authentication information
`using the private key to reveal the PIN and digital
`Signature.
`
`15
`
`25
`
`35
`
`US 6,460,138 B1
`
`8
`9. A computer-readable medium as in claim 8 wherein
`instruction 13(e) further includes the instructions of:
`(i) verifying that the PIN from authentication information
`matches the new PIN;
`(ii) in response to a match, using the public key to decrypt
`the digital Signature to reveal the message and message
`digest,
`(iii) hashing the message to create a new message digest;
`and
`(iv) authenticating the user if the message digest from the
`digital Signature matches the new message digest.
`10. A method for authenticating the user of a portable
`electronic device having a removable memory using asym
`metric cryptography, the asymmetric cryptography requiring
`the use of a user's private key and public key, the method
`comprising the Steps of:
`(a) encrypting a user's authentication information twice
`using the user's private key and public key,
`respectively, to create encrypted authentication infor
`mation;
`(b) storing the encrypted authentication information on
`the removable memory;
`(c) Storing the user's private key and public key in the
`portable electronic device;
`(d) using the user's private key and public key,
`respectively, to decrypt the twice encrypted authenti
`cation information when the removable memory is
`inserted into the portable electronic device, and
`(e) using the decrypted authentication information to
`authenticate the user, whereby the user is authenticated
`without the need of a Smart card and Smart card reader.
`11. The method of claim 10 further including the step of:
`using a personal identification number (PIN) as the
`authentication information.
`
`8
`
`