WO2000016190A1 - Apparatus and methods for unlocking password protected software systems to recover master password - Google Patents

Apparatus and methods for unlocking password protected software systems to recover master password Download PDF

Info

Publication number
WO2000016190A1
WO2000016190A1 PCT/US1999/021507 US9921507W WO0016190A1 WO 2000016190 A1 WO2000016190 A1 WO 2000016190A1 US 9921507 W US9921507 W US 9921507W WO 0016190 A1 WO0016190 A1 WO 0016190A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
password
central
local system
information
Prior art date
Application number
PCT/US1999/021507
Other languages
French (fr)
Other versions
WO2000016190A9 (en
Inventor
Kenneth S. Hancock
Thomas E. Ward, Iii
Douglas B. Macrae
Original Assignee
Index Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Index Systems, Inc. filed Critical Index Systems, Inc.
Priority to EP99948306A priority Critical patent/EP1121632A1/en
Priority to JP2000570661A priority patent/JP2002525706A/en
Priority to CA002344448A priority patent/CA2344448A1/en
Priority to AU61514/99A priority patent/AU6151499A/en
Publication of WO2000016190A1 publication Critical patent/WO2000016190A1/en
Publication of WO2000016190A9 publication Critical patent/WO2000016190A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Definitions

  • the present invention relates generally to password protected software systems, and more particularly, to password protected software systems with on screen display, such as parental control-equipped electronic programming guide systems for television viewing.
  • Many software systems require the user to enter a password before the system will allow the user to access the system. Passwords must be recognized by the software system as giving the user authority to access the system.
  • An example of a password protected software system is a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
  • Some password protected software systems are available on a network.
  • a networked system there is typically a network administrator, online service provider, or the like, that establishes initial passwords, and assists the user in identifying a forgotten password.
  • the user is provided a first-time password by the network administrator, online service provider, or manufacturer.
  • the system prompts the user for the user ' s password.
  • systems are programmed to recognize if the password is a "first-time " password.
  • the system detects a first-time password, the system prompts the user to choose a personal password.
  • the "first-time" password is set to expire within a relatively short period of time or after a relatively short number of accesses.
  • Systems are typically programmed to recognize the expiration date of a password and notify the user that the user must select a new password before the old password expires.
  • a systems or network administrator can typically recover the identification of the forgotten password for the user.
  • the systems or network administrator who is typically at a location remote from the user, can check security files internal to the system. By reading the internal security files, the systems or network administrator can provide the user with the user's password. Before disclosing the password, the systems administrator typically requires that the user provide the systems administrator with the proper identification.
  • local systems 10 will hereinafter be referred to as "local systems."
  • An example of a local system is an on screen system for parental control of television viewing such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
  • 2Q password would be to allow the user to access the password. That is, the user could select an option in the system that would display the password. However, such a method would be self-defeating, in that others could equally access the password.
  • Still another way to provide the user with the ability to recover the identity of a forgotten password would be to provide a "back door” method, such as: unplugging and
  • the present invention provides apparatus and methods that satisfy these needs, ⁇ Specifically, the present invention provides apparatus and methods for recovering a forgotten password while maintaining the security and integrity of the protected software system.
  • the present invention provides for a centralized contact, hereinafter referred to as the "central administrator " or "central administration.”
  • the present invention further provides for the identification of the particular user to the particular local system, the identification of the particular local system to the central administrator, and the identification c of the particular user to the central administrator. After providing all of the above-described proper identifications, the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user.
  • the invention provides for the identification by the central administrator of a key that will unlock the software system for the user so that the user can access the j Q identification of the user's password.
  • the procedure of identifying a forgotten password is generally referred to hereinafter in this application as the master password recovery procedure.
  • FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal 2 identification information for a user and the user's selection of a master password;
  • FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure
  • FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
  • -, ⁇ - FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
  • a central administration contact hereinafter referred to in this application as the
  • T central administrator is established.
  • the central administrator would be accessible by the user, through, e.g., a 1-800, or 1-900 telephone number, a website, etc.
  • the central administration contact is a completely automated Computer Telephone Interface system.
  • the automated central administration system provides vocal communications to the user and requests that the user
  • -, - provide input to the central administrator by pressing buttons on the user ' s telephone keypad.
  • the automated central administration system is programmed to recognize speech so that the user can speak to the central administration system to provide requested
  • the local system When the user attempts to access the local system, the local system will prompt the user for the password. Typically, the first time that a password protected system is accessed, the system will allow the user to identify a password. This password is hereinafter referred to in this application as a "'master password.”
  • the manufacturer may provide the buyer of the system with a first-time
  • FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure where the user has been supplied a first-time password.
  • the user/buyer is prompted to supply the first- time password 210.
  • Input of the password and other user input referred to herein may be accomplished using a variety of devices 230 and 450, including but not limited to an infra-red ⁇ remote control device, such as a television remote control 232a. 233a, 235a and 452a, or a keyboard 232b. 233b, 235b and 452b.
  • the input device used is not a limitation of the present invention.
  • the system will typically invite the user to choose a personal master password 250.
  • the local system typically asks the user to confirm the master password by entering it a second time (not shown). If the user is unable to confirm the password, the local system typically reverts to the first-time password and the procedure starts all over again.
  • the above-described procedure will be referred to hereinafter in this application as the "master password setup procedure.” .
  • one embodiment of the present invention requires that the user provide some additional identification information.
  • This information would be information that would be known to the user but not typically known to others, such as, e.g., the user's mother's maiden name, the user's mother's birth date, or other such personal information.
  • FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal identification information for a user and the user's selection of a master password.
  • the user is invited to use a pull down menu (not shown) of the alphabet, special characters, and the numbers 0-9, or some other comparable method, to compose the user's r input to the personal identification information screen.
  • the personal identification information to the extent that a particular embodiment of the present invention requires this information, will be referred to hereinafter in this application as "master password identification information.”
  • master password identification information to the extent that a particular embodiment of the present invention requires this information.
  • the embodiment of the setup procedure display screen depicted requests the user to input the user's first name (10), the user's middle initial (20), the user's last name (30). the user's birth date in MM/DD/YYYY format (40), the user's
  • the setup procedure display screen depicted provides for the user the serial number of the unit (70).
  • the serial number is encrypted through a hashing function.
  • the user is also requested to input a selected Master Password (80).
  • the master password setup procedure instructs the ⁇ Q user to contact the central administrator to provide certain user identification information
  • This further personal identification information may be in the way of a credit card number, or may be the same as the master password identification information or may include some personal identification information in addition to the master password identification information.
  • This further personal identification information is referred to ⁇ hereinafter in this application as "counter-identification information.”
  • the master password setup procedure requires confirmation from the central administrator that the counter-identification information has been provided.
  • the local system and the central administration system each use the same hashing function to each calculate a confirmation key.
  • 2Q administration computer system or alternatively, the manual procedure to be performed by the central administrator
  • the local system are both programmed to perform a hashing function on information already "known" to the television, for instance, the date, day of the week, zip code of the location of the television, the cable or other programming service to which the television is connected, the serial number of the television, etc.
  • the hashing function could be programmed to incorporate as part of the calculation of the hashing key, information that was provided to both the local system and to the central administrator by the user as part of the identification information.
  • the central administrator uses the central administration system to calculate the appropriate confirmation key.
  • the local system calculates the corresponding confirmation Q key 290.
  • the user would then be instructed to enter the confirmation key provided by the central administrator into the local system 235a and 235b.
  • the local system would read the confirmation key input by the user 305.
  • the local system would compare the input confirmation key with the key that had been calculated by the local system 310. If the two keys match, then the local system allows the user to proceed with the master password setup c procedure 320.
  • password change procedures typically require that the user identify the current password before entering the new password: once the new password has been entered, password change procedures typically require the user to confirm the new password by entering the new password a second time.
  • password change procedures typically require the user to confirm the new password by entering the new password a second time.
  • the local system prompts the user to supply the master password. If the user is unable to provide the master password, the system will not allow the ⁇ user to pass the security screen of the system.
  • FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
  • FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
  • the user will refer to a user manual or contact the manufacturer or retailer to identify contact information for the central administration system.
  • the local system security processor will ask the user to supply the master password
  • the screen that requests the identification information will look like the setup screen, one embodiment of which is depicted in FIG. 1.
  • the security system will display a screen that will instruct the user to access the central administrator. This screen is hereinafter
  • the instruction screen will tell the user how to contact the central administrator (100), e.g., to dial a particular telephone number, such as a 1-900 number, 1-800 number, or to access a particular website.
  • the instruction screen will display information identifying the particular local system unit, such as the serial number of the particular local system unit (1 10, 405-410).
  • the instruction screen will also display a character string (120, 420-430).
  • the character string displayed will be encrypted and will contain, among other things, the forgotten master password, and to the extent that any was been requested by the local system. the master password identification information.
  • the central administrator will request that the user read from the instruction screen certain information, such as: device unit identification information (1 10), for example, the serial number of the particular local system unit; and/or other information displayed on the user's local system screen, such as an encrypted character string (120).
  • the central administrator will further request that the user provide the counter-identification information previously provided to the central administrator during the master password setup procedure.
  • the central administrator will then use the information provided by the user to either provide the user with the user ' s master password, or with a key to unlock the user's system to, depending upon the embodiment, discover the forgotten master password, or to choose a new master password.
  • the central administrator's function may be manually performed, or alternatively, may be programmed in the central administration computer system.
  • the central administrator may need to de-encrypt the information provided by the user.
  • the central administrator may use a manual procedure or may enter the information into the central administration computer system which is programmed to de-encrypt the user-provided information.
  • the central administrator will then test the de-
  • This comparison procedure may be either a manual procedure performed by the central administrator or may be performed by the central administration computer system.
  • the user reads to the central administrator an encrypted character string containing an encrypted master password, once the central administrator has
  • the central administrator will de- encrypt the character string to identify the forgotten password. In one embodiment of the invention, the central administrator will then instruct the user to request the system to calculate a confirmation key. To do that, the user will choose an on screen option to calculate a confirmation key. In one embodiment, the local system will automatically
  • TQ calculate 440 and 490 a confirmation key (130) and/or a counter-confirmation key (140).
  • the security information system will display a screen that says that a confirmation key has been calculated (see FIG. 3, 130).
  • the central administrator will then calculate a confirmation key and instruct the user to input the confirmation key.
  • the user will then use a pull down menu (not shown), or some other comparable method, to input the confirmation r key.
  • the local system will test the two keys. If the key matches the local system confirmation key.
  • the system will then display on screen a counter-confirmation key (140 and 500) and instruct the user to read the counter- confirmation key to the central administrator.
  • the local system will then set the master password to expire after a set period of time, e.g , a day. 48 hours, a week, a month, or after a set number of accesses, e.g.. after 1. 2 or 3 further accesses by the user of
  • the central administrator will then tell the user the forgotten password.
  • the central administrator will calculate a confirmation key and instruct the user to input the confirmation key into the local system.
  • the user will then use a pull down ⁇ menu (not shown) or some other comparable method to input the confirmation key.
  • the local system will calculate, using the same hashing function used by the central administrator, a local system confirmation key.
  • the local system will then test the two keys. If the key matches the local system confirmation key, the system will then display on screen the user ' s master password (similar to 140 and 500).
  • ⁇ r In another alternative embodiment of the present invention, the central administrator, as described above, will calculate a key, using, e.g..
  • the 20 calculate, as described above, a key, using, e.g., a hashing formula.
  • the local system uses the same hashing formula as is used by the central administrator and/or the central administration computer system. In order for the two keys to match, the hashing formula must be applied by the local system to the same information to which the central administrator's hashing formula was applied. If the unlocking key matches the local system key, the local system will then c display on screen the user's master password (similar to 140 and 500). In an alternative embodiment, in the case where the keys match, the local system will require that the user immediately identify a new master password.
  • the master password setup procedure and the master password recovery procedure described above are implemented in the following manner to allow a parent to unlock and recover the parent ' s master password that governs a parental control-equipped electronic programming guide system such as o Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
  • a parental control-equipped electronic programming guide system such as o Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
  • the parent/user purchases a television equipped with a parental control-equipped electronic programming guide system such as Gemstar ' s Guide Plus+ 99 equipped with V- Chip Plus+ In-Guide User Interface.
  • a parental control-equipped electronic programming guide system such as Gemstar ' s Guide Plus+ 99 equipped with V- Chip Plus+ In-Guide User Interface.
  • the user/parent identifies a master password.
  • the user/parent selects a security system option that displays a screen (the "instruction screen") on the television display monitor that instructs the user/parent to contact a central administrator through a 1 -900 telephone number.
  • the central administrator in this embodiment is a ⁇ Q completely automated Computer Telephone Interface system.
  • the user/parent refers to a user manual or contacts the manufacturer or retailer to identify contact information for the central administration system.
  • the central administration one-way hashing function will be performed on the current date to calculate an unlocking key.
  • the central administrator once contacted. may ask the user to supply the television's serial number, and possibly, some other types of information as was described previously in this application.
  • the user/parent will be instructed to enter the requested information using the user/parent's telephone key pad.
  • Other types of information requested would be information that would be "known" to the television set. such as, e.g., the zip code of the location of the television set, the cable service
  • the central administration computer system will then use a one-way hashing function to calculate an unlocking key.
  • the central administration computer system will read the unlocking key to the user/parent and instruct the user/parent to enter the unlocking key into the user/parent's local television V-Chip Plus+ In-Guide User Interface system.
  • the local system will calculate an unlocking key using the same one-way hashing function as was used by the central administration computer system. The local system will then compare the two keys.
  • the local television V-Chip Plus+ In-Guide User Interface r system will then display on the television display monitor instructions to the user/parent to immediately choose a new master password. The user/parent must then use the appropriate keys on the viewer's remote control device to identify a new master password. Once the user/parent has identified a new master password, the local system replaces the old master password in the system security files with the new master password and allows the
  • the user's system displays notification on the television display monitor notifying the user that the master password has been changed.
  • the notification may be displayed in the form of an information screen, insert, overlay, scrolling message, or other such notification.
  • the notification would be displayed every time the user turns the television on for a certain number of times, or alternatively, for a certain number of days.
  • the present invention can be implemented using a completely automated central administration system capable of recognizing user information input with the user's telephone keypad or capable of recognizing user speech.
  • the present invention can be implemented using a partially or completely manual central administration contact.

Abstract

The present invention provides apparatus and method for recovering a forgotten password while maintaining the security and integrity of protected software system. In particular, the present invention provides for a centralized contact, as the 'central administrator' or 'central administration'. The present invention further provides for the identification of the particular user (10, 20, 30, 40, 50 and 60) to the particular local system, the identification of the particular local system to the central administrator, and the identification of the particular user to the central administrator. After providing all of the above-described proper identifications, the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user. Also alternatively, the invention provides for the identification by the central administrator of a key that will unlock the software system (300) for the user so that the user can access the identification of the user's password.

Description

APPARATUS AND METHODS FOR UNLOCKING PASSWORD PROTECTED SOFTWARE SYSTEMS TO RECOVER MASTER PASSWORD
5 RELATED APPLICATION
This application claims the benefit of provisional Application No. 60/100.753 filed September 17. 1998, the disclosure of which is incorporated fully herein.
FIELD OF THE INVENTION ι Q The present invention relates generally to password protected software systems, and more particularly, to password protected software systems with on screen display, such as parental control-equipped electronic programming guide systems for television viewing.
BACKGROUND OF THE INVENTION ι <■ Many software systems require the user to enter a password before the system will allow the user to access the system. Passwords must be recognized by the software system as giving the user authority to access the system. An example of a password protected software system is a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
2Q It is typically the responsibility of the user to remember the user's own password. If a user forgets the password, the user cannot access the system until the user again learns the password.
Some password protected software systems are available on a network. In a networked system, there is typically a network administrator, online service provider, or the like, that establishes initial passwords, and assists the user in identifying a forgotten password.
In many password protected software systems, the user is provided a first-time password by the network administrator, online service provider, or manufacturer. When the user tries to access the system, the system prompts the user for the user's password. Some
-> systems are programmed to recognize if the password is a "first-time" password. When the system detects a first-time password, the system prompts the user to choose a personal password. Alternatively, the "first-time" password is set to expire within a relatively short period of time or after a relatively short number of accesses. Systems are typically programmed to recognize the expiration date of a password and notify the user that the user must select a new password before the old password expires.
35
If the user forgets the chosen password, in the case of many online network systems, a systems or network administrator can typically recover the identification of the forgotten password for the user. The systems or network administrator, who is typically at a location remote from the user, can check security files internal to the system. By reading the internal security files, the systems or network administrator can provide the user with the user's password. Before disclosing the password, the systems administrator typically requires that the user provide the systems administrator with the proper identification.
On the other hand, in the case of a system that is not networked, or in the case where the systems software is not accessible by the user or by a systems or network administrator, the password, once set, is known only to the system. In the present application, such systems
10 will hereinafter be referred to as "local systems." An example of a local system is an on screen system for parental control of television viewing such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
With a local system, there is no network administrator that can read the files from a location remote from the user and provide the user with the chosen password. With such a j 5 local system, a user could uncover the forgotten password by dismantling the device; detaching the system hardware component that contains the password (e.g., RAM storage); and sending the component to the manufacturer for analysis. This is a cumbersome and impractical solution.
Another way to provide the user with the ability to recover the identity of a forgotten
2Q password would be to allow the user to access the password. That is, the user could select an option in the system that would display the password. However, such a method would be self-defeating, in that others could equally access the password.
Still another way to provide the user with the ability to recover the identity of a forgotten password would be to provide a "back door" method, such as: unplugging and
25 replugging the television; or pressing a combination of input keys, such as the keys on a television remote control device. However, such "back door" methods could quickly become discovered; as more and more households adapt the password protected system, such back door methods would become widely known.
Because it is inevitable that some users will, from time to time, forget their passwords, on some method and apparatus for a user to recover a forgotten password is needed while maintaining the security and integrity of the protected software system.
SUMMARY OF THE INVENTION
The present invention provides apparatus and methods that satisfy these needs, ^ Specifically, the present invention provides apparatus and methods for recovering a forgotten password while maintaining the security and integrity of the protected software system. In particular, the present invention provides for a centralized contact, hereinafter referred to as the "central administrator" or "central administration." The present invention further provides for the identification of the particular user to the particular local system, the identification of the particular local system to the central administrator, and the identification c of the particular user to the central administrator. After providing all of the above-described proper identifications, the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user.
Alternatively, the invention provides for the identification by the central administrator of a key that will unlock the software system for the user so that the user can access the j Q identification of the user's password.
The procedure of identifying a forgotten password is generally referred to hereinafter in this application as the master password recovery procedure.
DESCRIPTION OF THE DRAWINGS ι These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal 2 identification information for a user and the user's selection of a master password;
FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure;
FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen. -,<- FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
DETAILED DESCRIPTION OF THE INVENTION
A central administration contact, hereinafter referred to in this application as the
T central administrator, is established. The central administrator would be accessible by the user, through, e.g., a 1-800, or 1-900 telephone number, a website, etc. In the preferred embodiment, the central administration contact is a completely automated Computer Telephone Interface system. In the preferred embodiment, the automated central administration system provides vocal communications to the user and requests that the user
-, - provide input to the central administrator by pressing buttons on the user's telephone keypad.
Alternatively, the automated central administration system is programmed to recognize speech so that the user can speak to the central administration system to provide requested
-J- information.
A. MASTER PASSWORD SETUP PROCEDURE
When the user attempts to access the local system, the local system will prompt the user for the password. Typically, the first time that a password protected system is accessed, the system will allow the user to identify a password. This password is hereinafter referred to in this application as a "'master password."
Alternatively, the manufacturer may provide the buyer of the system with a first-time
10 password. FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure where the user has been supplied a first-time password. When the local system is first accessed, the user/buyer is prompted to supply the first- time password 210. Input of the password and other user input referred to herein may be accomplished using a variety of devices 230 and 450, including but not limited to an infra-red ι remote control device, such as a television remote control 232a. 233a, 235a and 452a, or a keyboard 232b. 233b, 235b and 452b. The input device used is not a limitation of the present invention.
Once the user/buyer supplies the first-time password 220 and 232a and 232b, the system will typically invite the user to choose a personal master password 250. Once the
2Q user chooses and inputs the master password 270 and FIG. 1 , 80, the local system typically asks the user to confirm the master password by entering it a second time (not shown). If the user is unable to confirm the password, the local system typically reverts to the first-time password and the procedure starts all over again. The above-described procedure will be referred to hereinafter in this application as the "master password setup procedure." .
<7<r During the master password setup procedure, one embodiment of the present invention requires that the user provide some additional identification information. This information would be information that would be known to the user but not typically known to others, such as, e.g., the user's mother's maiden name, the user's mother's birth date, or other such personal information.
-, Q FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal identification information for a user and the user's selection of a master password. In this embodiment, the user is invited to use a pull down menu (not shown) of the alphabet, special characters, and the numbers 0-9, or some other comparable method, to compose the user's r input to the personal identification information screen. The personal identification information, to the extent that a particular embodiment of the present invention requires this information, will be referred to hereinafter in this application as "master password identification information." In FIG. 1 , the embodiment of the setup procedure display screen depicted requests the user to input the user's first name (10), the user's middle initial (20), the user's last name (30). the user's birth date in MM/DD/YYYY format (40), the user's
^ mother's maiden name (50), and the user's mother's birth date in MM/DD/YYYY format
(60). The setup procedure display screen depicted provides for the user the serial number of the unit (70). In one embodiment, the serial number is encrypted through a hashing function. The user is also requested to input a selected Master Password (80).
In one embodiment of the invention, the master password setup procedure instructs the ι Q user to contact the central administrator to provide certain user identification information
280. This further personal identification information may be in the way of a credit card number, or may be the same as the master password identification information or may include some personal identification information in addition to the master password identification information. This further personal identification information is referred to ι hereinafter in this application as "counter-identification information."
In one embodiment of the invention, the master password setup procedure requires confirmation from the central administrator that the counter-identification information has been provided. In this embodiment, the local system and the central administration system each use the same hashing function to each calculate a confirmation key. The central
2Q administration computer system (or alternatively, the manual procedure to be performed by the central administrator) and the local system are both programmed to perform a hashing function on information already "known" to the television, for instance, the date, day of the week, zip code of the location of the television, the cable or other programming service to which the television is connected, the serial number of the television, etc. In an alternative 5 embodiment, the hashing function could be programmed to incorporate as part of the calculation of the hashing key, information that was provided to both the local system and to the central administrator by the user as part of the identification information.
The central administrator uses the central administration system to calculate the appropriate confirmation key. The local system calculates the corresponding confirmation Q key 290. The user would then be instructed to enter the confirmation key provided by the central administrator into the local system 235a and 235b. The local system would read the confirmation key input by the user 305. The local system would compare the input confirmation key with the key that had been calculated by the local system 310. If the two keys match, then the local system allows the user to proceed with the master password setup c procedure 320. B. MASTER PASSWORD CHANGE PROCEDURE
Most password protected systems allow the user to change the password after it has been established. Password change procedures typically require that the user identify the current password before entering the new password: once the new password has been entered, password change procedures typically require the user to confirm the new password by entering the new password a second time. Such a password change procedure is also included in references herein to the "master password setup procedure."
10 C. PASSWORD PROTECTION AND MASTER PASSWORD RECOVERY
Every time after completing the master password setup procedure, whenever the user tries to access the local system, or in some embodiments, whenever the user tries to access protected blocked areas of the system, the local system prompts the user to supply the master password. If the user is unable to provide the master password, the system will not allow the ι user to pass the security screen of the system.
At this point, the invention provides that the user can access security processing for the local system. Specifically, the invention provides for a master password recovery process. FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
2Q FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure. In an alternative embodiment, the user will refer to a user manual or contact the manufacturer or retailer to identify contact information for the central administration system.
The local system security processor will ask the user to supply the master password
?r identification information, to the extent that this information was requested during the master password setup procedure. The screen that requests the identification information will look like the setup screen, one embodiment of which is depicted in FIG. 1.
Once the requested information has been input, the security system will display a screen that will instruct the user to access the central administrator. This screen is hereinafter
-, referred to as the "instruction screen." As seen in FIG. 3, the instruction screen will tell the user how to contact the central administrator (100), e.g., to dial a particular telephone number, such as a 1-900 number, 1-800 number, or to access a particular website. The instruction screen will display information identifying the particular local system unit, such as the serial number of the particular local system unit (1 10, 405-410). In one embodiment, the instruction screen will also display a character string (120, 420-430). In one embodiment, the character string displayed will be encrypted and will contain, among other things, the forgotten master password, and to the extent that any was been requested by the local system. the master password identification information.
Once the user contacts the central administrator, the central administrator will request that the user read from the instruction screen certain information, such as: device unit identification information (1 10), for example, the serial number of the particular local system unit; and/or other information displayed on the user's local system screen, such as an encrypted character string (120). In one embodiment, the central administrator will further request that the user provide the counter-identification information previously provided to the central administrator during the master password setup procedure.
10 The central administrator will then use the information provided by the user to either provide the user with the user's master password, or with a key to unlock the user's system to, depending upon the embodiment, discover the forgotten master password, or to choose a new master password. The central administrator's function may be manually performed, or alternatively, may be programmed in the central administration computer system. Depending on the embodiment, the central administrator may need to de-encrypt the information provided by the user. To de-encrypt the user-provided information, the central administrator may use a manual procedure or may enter the information into the central administration computer system which is programmed to de-encrypt the user-provided information. Depending on the embodiment, the central administrator will then test the de-
2Q encrypted master password identification information against the counter-identification information. This comparison procedure may be either a manual procedure performed by the central administrator or may be performed by the central administration computer system. In an embodiment in which the user reads to the central administrator an encrypted character string containing an encrypted master password, once the central administrator has
? determined that the identification information is in order, the central administrator will de- encrypt the character string to identify the forgotten password. In one embodiment of the invention, the central administrator will then instruct the user to request the system to calculate a confirmation key. To do that, the user will choose an on screen option to calculate a confirmation key. In one embodiment, the local system will automatically
TQ calculate 440 and 490 a confirmation key (130) and/or a counter-confirmation key (140).
The security information system will display a screen that says that a confirmation key has been calculated (see FIG. 3, 130). The central administrator will then calculate a confirmation key and instruct the user to input the confirmation key. The user will then use a pull down menu (not shown), or some other comparable method, to input the confirmation r key. Once the user has input the confirmation key. the local system will test the two keys. If the key matches the local system confirmation key. the system will then display on screen a counter-confirmation key (140 and 500) and instruct the user to read the counter- confirmation key to the central administrator. In one embodiment, the local system will then set the master password to expire after a set period of time, e.g , a day. 48 hours, a week, a month, or after a set number of accesses, e.g.. after 1. 2 or 3 further accesses by the user of
5 the local system.
The central administrator will then tell the user the forgotten password. In an alternative embodiment of the present invention, the central administrator, as described above, will calculate a confirmation key and instruct the user to input the confirmation key into the local system. The user will then use a pull down ι menu (not shown) or some other comparable method to input the confirmation key. Once the user has input the confirmation key, the local system will calculate, using the same hashing function used by the central administrator, a local system confirmation key. The local system will then test the two keys. If the key matches the local system confirmation key, the system will then display on screen the user's master password (similar to 140 and 500). ι r In another alternative embodiment of the present invention, the central administrator, as described above, will calculate a key, using, e.g.. a hashing formula, that will unlock the user's system. The central administrator will then instruct the user to input the unlocking key. The user will then use a pull down menu (not shown) or some other comparable method to input the unlocking key. Once the user has input the unlocking key, the local system will
20 calculate, as described above, a key, using, e.g., a hashing formula. The local system uses the same hashing formula as is used by the central administrator and/or the central administration computer system. In order for the two keys to match, the hashing formula must be applied by the local system to the same information to which the central administrator's hashing formula was applied. If the unlocking key matches the local system key, the local system will then c display on screen the user's master password (similar to 140 and 500). In an alternative embodiment, in the case where the keys match, the local system will require that the user immediately identify a new master password.
D. AN ILLUSTRATIVE EMBODIMENT OF MASTER PASSWORD RECOVERY IN A V-CHIP 30 PLUS+ IN-GUIDE USER INTERFACE.
As an illustrative embodiment of the present invention, the master password setup procedure and the master password recovery procedure described above are implemented in the following manner to allow a parent to unlock and recover the parent's master password that governs a parental control-equipped electronic programming guide system such as o Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
The parent/user purchases a television equipped with a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V- Chip Plus+ In-Guide User Interface. The first time that the parent connects the television to a power supply and turns the system on. the parent is prompted through an initial setup procedure that includes a master password setup procedure. As part of the master password r setup procedure, the user/parent identifies a master password.
Later, in the event that the user/parent forgets the master password, the user/parent selects a security system option that displays a screen (the "instruction screen") on the television display monitor that instructs the user/parent to contact a central administrator through a 1 -900 telephone number. The central administrator in this embodiment is a ι Q completely automated Computer Telephone Interface system.
In an alternative embodiment, the user/parent refers to a user manual or contacts the manufacturer or retailer to identify contact information for the central administration system. The central administration one-way hashing function will be performed on the current date to calculate an unlocking key. Alternatively, the central administrator, once contacted. may ask the user to supply the television's serial number, and possibly, some other types of information as was described previously in this application. The user/parent will be instructed to enter the requested information using the user/parent's telephone key pad. Other types of information requested would be information that would be "known" to the television set. such as, e.g., the zip code of the location of the television set, the cable service
2Q or other programming service to which the television is connected, etc.
The central administration computer system will then use a one-way hashing function to calculate an unlocking key. The central administration computer system will read the unlocking key to the user/parent and instruct the user/parent to enter the unlocking key into the user/parent's local television V-Chip Plus+ In-Guide User Interface system.
? After the user/parent has entered the unlocking key into the local system, the local system will calculate an unlocking key using the same one-way hashing function as was used by the central administration computer system. The local system will then compare the two keys.
If the two keys match, the local television V-Chip Plus+ In-Guide User Interface r, system will then display on the television display monitor instructions to the user/parent to immediately choose a new master password. The user/parent must then use the appropriate keys on the viewer's remote control device to identify a new master password. Once the user/parent has identified a new master password, the local system replaces the old master password in the system security files with the new master password and allows the
33 user/parent to proceed with accessing local system functions.
As an optional feature, the user's system displays notification on the television display monitor notifying the user that the master password has been changed. The notification may be displayed in the form of an information screen, insert, overlay, scrolling message, or other such notification. The notification would be displayed every time the user turns the television on for a certain number of times, or alternatively, for a certain number of days.
Illustrative Embodiments.
The embodiments of the invention described herein are only considered to be preferred and/or illustrative of the inventive concept; the scope of the invention is not to be restricted to such embodiments. Various and numerous other arrangements may be devised by one skilled in the art without departing from the spirit and scope of this invention. For example, the present invention can be implemented using a completely automated central administration system capable of recognizing user information input with the user's telephone keypad or capable of recognizing user speech. Alternatively, the present invention can be implemented using a partially or completely manual central administration contact.

Claims

CLAIMS:
1. A method of resetting a password on a consumer device comprising: r displaying, by a particular consumer device, one or more items of information that are specific to the particular consumer device; communicating the one or more items of information to a central location; performing a mathematical function on the one or more items of information to obtain a central key at the central location; ╬╣ A entering the central key into the consumer device; performing, in the consumer device, a mathematical function on the one or more items of information to obtain a local key; allowing the resetting of a password on the consumer device if the central key is found to have to the local key for a predetermined without entering the original password.
15
2. The method of claim 1 wherein the mathematical functions are one-way hashing functions
3. The method of claim 1 where the one or more items of information that are specific to Q the particular consumer device are unique to the particular consumer device.
4. The method of claim 1 wherein the one or more items of information that are specific to the particular consumer device are rare, but not necessarily unique.
5
3
PCT/US1999/021507 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password WO2000016190A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP99948306A EP1121632A1 (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password
JP2000570661A JP2002525706A (en) 1998-09-17 1999-09-17 Apparatus and method for unlocking a password protected software system to recover a master password
CA002344448A CA2344448A1 (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password
AU61514/99A AU6151499A (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10075398P 1998-09-17 1998-09-17
US60/100,753 1998-09-17

Publications (2)

Publication Number Publication Date
WO2000016190A1 true WO2000016190A1 (en) 2000-03-23
WO2000016190A9 WO2000016190A9 (en) 2000-06-08

Family

ID=22281360

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/021507 WO2000016190A1 (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password

Country Status (6)

Country Link
EP (1) EP1121632A1 (en)
JP (1) JP2002525706A (en)
CN (1) CN1359487A (en)
AU (1) AU6151499A (en)
CA (1) CA2344448A1 (en)
WO (1) WO2000016190A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003062968A1 (en) * 2002-01-24 2003-07-31 Activcard Ireland, Limited Flexible method of user authentication for password based system
EP1429229A1 (en) * 2002-11-27 2004-06-16 Activcard Ireland Limited Authenticated remote unblock of a PIN
WO2006135508A2 (en) * 2005-06-10 2006-12-21 Microsoft Corporation Transparent resource administration using a read-only domain controller
US7191466B1 (en) 2000-07-25 2007-03-13 Laurence Hamid Flexible system and method of user authentication for password based system
EP2061179A1 (en) * 2006-08-24 2009-05-20 Huawei Technologies Co Ltd Method, system and password management server for managing user password of network device
EP2330532A1 (en) * 2002-12-02 2011-06-08 Nokia Corp. Privacy protection in a server
WO2011080613A1 (en) * 2009-12-28 2011-07-07 Nokia Corporation Method and apparatus for user interaction while device is locked
EP2733656A1 (en) * 2003-12-23 2014-05-21 Trust Digital, LLC System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US9998478B2 (en) 2002-08-27 2018-06-12 Mcafee, Llc Enterprise-wide security for computer devices
US11096054B2 (en) 2006-10-23 2021-08-17 Mcafee, Llc System and method for controlling mobile device access to a network

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7602910B2 (en) * 2004-11-17 2009-10-13 Microsoft Corporation Password protection
CN101345622B (en) * 2007-07-10 2012-07-25 北京紫贝龙科技有限责任公司 Information safety device capable of defining authority of apparatus holder
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
CN103310136A (en) * 2012-03-15 2013-09-18 苏州宝时得电动工具有限公司 Automatic walking system and set thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4786900A (en) * 1985-09-30 1988-11-22 Casio Computer Co. Ltd. Electronic key apparatus
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
US5666415A (en) * 1995-07-28 1997-09-09 Digital Equipment Corporation Method and apparatus for cryptographic authentication
US5818345A (en) * 1994-12-03 1998-10-06 Icl Systems Ab Theft protection for electrically-powered articles
US5832214A (en) * 1995-10-26 1998-11-03 Elonex I.P, Holdings, Ltd. Method and apparatus for data security for a computer
US5892906A (en) * 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US5944824A (en) * 1997-04-30 1999-08-31 Mci Communications Corporation System and method for single sign-on to a plurality of network elements

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
US4786900A (en) * 1985-09-30 1988-11-22 Casio Computer Co. Ltd. Electronic key apparatus
US5818345A (en) * 1994-12-03 1998-10-06 Icl Systems Ab Theft protection for electrically-powered articles
US5666415A (en) * 1995-07-28 1997-09-09 Digital Equipment Corporation Method and apparatus for cryptographic authentication
US5832214A (en) * 1995-10-26 1998-11-03 Elonex I.P, Holdings, Ltd. Method and apparatus for data security for a computer
US5892906A (en) * 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US5944824A (en) * 1997-04-30 1999-08-31 Mci Communications Corporation System and method for single sign-on to a plurality of network elements

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191466B1 (en) 2000-07-25 2007-03-13 Laurence Hamid Flexible system and method of user authentication for password based system
WO2003062968A1 (en) * 2002-01-24 2003-07-31 Activcard Ireland, Limited Flexible method of user authentication for password based system
US9998478B2 (en) 2002-08-27 2018-06-12 Mcafee, Llc Enterprise-wide security for computer devices
US9560041B2 (en) * 2002-11-27 2017-01-31 Assa Abloy Ab Authenticated remote pin unblock
EP1429229A1 (en) * 2002-11-27 2004-06-16 Activcard Ireland Limited Authenticated remote unblock of a PIN
US9118668B1 (en) * 2002-11-27 2015-08-25 Assa Abloy Ab Authenticated remote pin unblock
US20160044027A1 (en) * 2002-11-27 2016-02-11 Assa Abloy Ab Authenticated remote pin unblock
US8495381B2 (en) * 2002-11-27 2013-07-23 Activcard Authenticated remote PIN unblock
EP2330532A1 (en) * 2002-12-02 2011-06-08 Nokia Corp. Privacy protection in a server
EP2733656A1 (en) * 2003-12-23 2014-05-21 Trust Digital, LLC System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
WO2006135508A3 (en) * 2005-06-10 2007-02-22 Microsoft Corp Transparent resource administration using a read-only domain controller
US7865600B2 (en) 2005-06-10 2011-01-04 Microsoft Corporation Transparent resource administration using a read-only domain controller
US7631082B2 (en) 2005-06-10 2009-12-08 Microsoft Corporation Transparent resource administration using a read-only domain controller
WO2006135508A2 (en) * 2005-06-10 2006-12-21 Microsoft Corporation Transparent resource administration using a read-only domain controller
US8793356B2 (en) 2005-06-10 2014-07-29 Microsoft Corporation Transparent resource administration using a read-only domain controller
EP2061179A1 (en) * 2006-08-24 2009-05-20 Huawei Technologies Co Ltd Method, system and password management server for managing user password of network device
EP2061179A4 (en) * 2006-08-24 2010-03-31 Huawei Tech Co Ltd Method, system and password management server for managing user password of network device
US11096054B2 (en) 2006-10-23 2021-08-17 Mcafee, Llc System and method for controlling mobile device access to a network
US11950097B2 (en) 2006-10-23 2024-04-02 Skyhigh Security Llc System and method for controlling mobile device access to a network
US8718606B2 (en) 2009-12-28 2014-05-06 Nokia Corporation Method and apparatus for user interaction while device is locked
WO2011080613A1 (en) * 2009-12-28 2011-07-07 Nokia Corporation Method and apparatus for user interaction while device is locked

Also Published As

Publication number Publication date
WO2000016190A9 (en) 2000-06-08
AU6151499A (en) 2000-04-03
CA2344448A1 (en) 2000-03-23
EP1121632A1 (en) 2001-08-08
CN1359487A (en) 2002-07-17
JP2002525706A (en) 2002-08-13

Similar Documents

Publication Publication Date Title
US8024567B2 (en) Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof
EP1540869B1 (en) System and method for user authentication with enhanced passwords
EP2839603B1 (en) Abstracted and randomized one-time passwords for transactional authentication
US5971272A (en) Secured personal identification number
US8561174B2 (en) Authorization method with hints to the authorization code
US20070130618A1 (en) Human-factors authentication
WO2000016190A1 (en) Apparatus and methods for unlocking password protected software systems to recover master password
US20090300732A1 (en) Method and apparatus of otp based on challenge/response
US20080028447A1 (en) Method and system for providing a one time password to work in conjunction with a browser
US8868918B2 (en) Authentication method
JP2004240637A (en) Password authentication system
EP0976017B1 (en) Method and system for providing password protection
JP2007124470A (en) Portable telephone, its user authentication method, and user authentication program
JP2006033780A (en) Network authentication system using identification by calling-back
JP2001117873A (en) Method for identifying terminal
JP2008191942A (en) Authentication device, authentication method and program
EP1119147A1 (en) Provision of secure access for telecommunications system
JPH09218852A (en) Illegality checking system
US20020073345A1 (en) Secure indentification method and apparatus
KR101632582B1 (en) Method and system for user authentication using password included random key
JP3080202B2 (en) IC credit card and IC card terminal
JP2006243868A (en) Content authentication system, content creation device, content using device, content creation program, content using program and content authentication method
WO2007066385A1 (en) Personal authentication system, method of personal authentication and program for executing personal authentication
KR100594437B1 (en) User direct password setting method

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99812581.4

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: C2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

COP Corrected version of pamphlet

Free format text: PAGES 1/4-4/4, DRAWINGS, REPLACED BY NEW PAGES 1/4-4/4; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2344448

Country of ref document: CA

Ref document number: 2344448

Country of ref document: CA

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2000 570661

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1999948306

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09787389

Country of ref document: US

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1999948306

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1999948306

Country of ref document: EP