US20140040986A1 - Protocol to Prevent Replay Attacks on Secured Wireless Transactions - Google Patents
Protocol to Prevent Replay Attacks on Secured Wireless Transactions Download PDFInfo
- Publication number
- US20140040986A1 US20140040986A1 US14/048,420 US201314048420A US2014040986A1 US 20140040986 A1 US20140040986 A1 US 20140040986A1 US 201314048420 A US201314048420 A US 201314048420A US 2014040986 A1 US2014040986 A1 US 2014040986A1
- Authority
- US
- United States
- Prior art keywords
- identification number
- session identification
- computer system
- secure data
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 48
- 230000008878 coupling Effects 0.000 claims abstract description 11
- 238000010168 coupling process Methods 0.000 claims abstract description 11
- 238000005859 coupling reaction Methods 0.000 claims abstract description 11
- 230000004044 response Effects 0.000 claims description 5
- 238000012790 confirmation Methods 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract description 4
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000004891 communication Methods 0.000 description 47
- 230000015654 memory Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 241001422033 Thestylus Species 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000013500 data storage Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 206010010071 Coma Diseases 0.000 description 1
- 208000015976 Corneal dystrophy-perceptive deafness syndrome Diseases 0.000 description 1
- 241001522296 Erithacus rubecula Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
Definitions
- the present invention relates to the field of portable devices such as personal digital assistants or palmtop computer systems. More specifically, embodiments of the present invention relate to wireless communication using a portable computer system and a second (“host”) computer system.
- Palmtop computer system is a computer that is small enough to be held in the hand of a user and can therefore be “palm-sized,” Most palmtop computer systems are used to implement various Personal Information Management (PIM) applications such as an address book, a daily organizer (calendar, datebook, etc.) and electronic notepads, to name a few. Palmtop computers with PIM software have been known as Personal Digital Assistants (PDAs). Many PDAs have a small and flat display screen associated therewith.
- PDAs Personal Digital Assistants
- portable electronic devices are employed while the user is on the run, e.g., in business meetings, on business travel, personal travel, in a vehicle, on foot, etc. Because the user may be occupied or busy while using the portable electronic device, the number of user steps or user tasks required in order to access information from an electronic device (or to store information into the electronic device) is crucial for producing a commercially successful and useful product. That is, the more difficult it is to access data from an electronic device, the less likely the user will perform those tasks to obtain the information. Likewise, the easier information is to obtain, the more likely the portable electronic device will be used to obtain that information and the more likely the portable electronic device will become a part of the user's everyday activities.
- Mobile devices are evolving from a single application device with dedicated specific purpose communication channel (for example, a cell phone or pager), to more general-purpose devices with more flexible data communication capabilities.
- dedicated specific purpose communication channel for example, a cell phone or pager
- wireless technology is advancing, both in the number of options that are available for providing connectivity, and in the flexibility to provide general purpose data communication.
- Different technologies such as cellular technologies (e.g., COMA, TDMA), LAN access technologies (e.g., IEEE 802.11, HomeRF) and PAN technologies (e.g., Bluetooth, IR) each address a different set of needs, and provide a different set of potential services.
- Mobile devices are no longer restricted to a single communication channel. Modular mobile devices allow network interfaces to be attached, allowing for unlimited communications configurations.
- Bluetooth technology allows a single mobile device to simultaneously access multiple piconets through a single interface.
- wireless modem peripheral devices that can be directly connected to the serial interface port of a host computer system thereby providing wireless communication to the internet.
- Wireless communication between two stations via the internet requires security for the users as well as protection of any data being exchanged. More specifically, user identification and verification of authorization to access given data are both important considerations. Equally important is user protection from a replay attack whereby intercepted identification/access data is used by an attacker to gain unauthorized access to an account.
- passwords are considered by many users to be vexing and inconvenient. Passwords can lock out even an authorized user, and experience shows that passwords can be defeated by unauthorized users.
- a password may prevent access to applications and information already existing on the palmtop, it will generally not prevent an unauthorized user from adding new applications and information. Thus, an unauthorized user can simply assume ownership of the palmtop and ignore the password-protected information.
- a unique user identification number such as the manufacturers serial number (MAN) of the PDA being used.
- ID such as the manufacturers serial number (MAN) of the PDA being used.
- MAN manufacturers serial number
- WCP web clipping proxy server
- GSM TCP/IP based wireless networks
- CDPD CDPD
- wire-line networks a MAN number may not exist and the request from a single PDA source may even be directed to other WCP servers.
- Sequence numbers are stored in a given WCP server for each secure transaction.
- This implementation assumes that the request from one PDA will always go to the same WCP server. However, this assumption may not be valid for TCP/IP based wireless or wire-line networks because the dispatcher will not be load balanced. In such cases, the load balance could be a round robin among available servers and the storage of a sequence number in a particular server for security purposes will then result in communication failure. Actually, the assumption may be broken even in the case of multiple meta-cluster Mobitex servers, which would likewise result in failure to communicate.
- a method and system for preventing replay attacks on secure data transactions is described.
- a replay attack occurs when an unauthorized user intercepts a secure data transaction between a device and a central system and uses the intercepted data to gain access to the central system.
- One method for preventing such replay attacks is the use of a unique session identification number that is generated for each secure data transaction request.
- a replay attack is defeated using intercepted data since the unique session identification number is valid only for a completed session and may not be reused.
- the server Upon verification of the correct unique session identification number, the server implements the requested data transaction. Termination of the requested transaction by the device signals the termination of the current secure data transaction. A new unique session identification number must be requested and issued in like fashion for any additional secure data transactions.
- the method and system offer the advantage of use with multiple available servers, in contrast to present methods which require that a device to communicate with a given server. Further, the present method offers reduced operation time since there is a single coupling/uncoupling for each data transaction.
- a device communicates with a server or system which is the World Wide Web site residing on a server computer system in a computer system network (e.g. the internet).
- the proxy server receives a signal from the device requesting a unique session identification number in preparation for a secure data transaction.
- the server generates and communicates a unique session identification number to the device.
- the device then returns a signal to the server which includes the unique identification number along with the request for a secure data transaction.
- the server compares the returned unique session identification number with the original and provided the comparison is satisfactory the requested secure data transaction is implemented. Upon completion of the requested secure data transaction, the session is terminated by the device.
- the device communicating with a server or system is a portable device such as a palmtop computer system or PDA.
- the portable device transmits a signal to a server or system requesting a session identification number in preparation for a secure data transaction.
- the portable device receives a unique session identification number generated by the server or system.
- the portable device transmits a signal to the server or system requesting a secure data transaction and which signal includes the unique session identification number.
- the portable device is permitted to complete the requested secure data transaction.
- the portable device decouples communicatively from the server or system which signals termination of the current secure data transaction.
- FIG. 1A is a block diagram of an exemplary network environment including a portable computer system in accordance with one embodiment of the present invention.
- FIGS. 1B , 1 C, 1 D, 1 E and 1 F are block diagrams showing various embodiments for coupling a portable computer system to other computer systems and to the internet in accordance with the present invention.
- FIG. 2 is a top side perspective view of a portable computer system in accordance with one embodiment of the present invention.
- FIG. 3 is a bottom side perspective view of the portable computer system of FIG. 2 .
- FIG. 4 is a block diagram of one embodiment of a portable computer system in accordance with the present invention.
- FIG. 5 is a perspective view of the cradle device for connecting the portable computer system to other systems via a communication interface in accordance with one embodiment of the present invention.
- FIG. 6 is a block diagram of one embodiment of a server, desktop or laptop computer system in accordance with the present invention.
- FIG. 7 is a flowchart showing the steps in a process for preventing replay attacks on secure data transactions in accordance with one embodiment of the present invention.
- the present invention is discussed primarily in the context of a portable computer system, such as a palmtop or personal digital assistant, with the capability to access via the Internet a World Wide Web (“Web”) site residing on a server computer system.
- a portable computer system such as a palmtop or personal digital assistant
- Web World Wide Web
- the present invention can be used with other types of devices that have the capability to access some type of central device or central site, including but not limited to laptop computer systems.
- FIG. 1A is a block diagram of an exemplary network environment 50 including a portable computer system 100 in accordance with one embodiment of the present invention.
- Portable computer system 100 is also known as a palmtop or palm-sized computer system or as a personal digital assistant (PDA).
- PDA personal digital assistant
- portable computer system 100 has the ability to transmit and receive data and information over a wireless communication interface (e.g., a radio interface).
- the wireless communication interface is integrated into portable computer system 100 ; in another embodiment, the wireless communication interface is accomplished with a wireless modem attachment (not shown).
- base station 32 is both a transmitter and receiver base station, which can be implemented by coupling it into an existing public telephone network 34 .
- base station 32 enables portable computer system 100 to communicate with a proxy server computer system 36 , which is coupled by wire to the existing public telephone network 34 .
- proxy server computer system 36 is coupled to the Internet 52 , thereby enabling portable computer system 100 to communicate with the Internet 52 .
- Coupled with Internet 52 are multiple servers exemplified by server 30 .
- server 30 Residing on server 30 is a Web site 40 .
- protocols such as CTP (Compact Transport Protocol) and CML (Compact Markup Language) can be used by portable computer system 100 in the present embodiment.
- proxy server 36 one of the functions of proxy server 36 is to perform operations over the Internet 52 on behalf of portable computer system 100 .
- proxy server 36 has a particular Internet address and acts as a proxy device for portable computer system 100 over the Internet 52 .
- a wireless connection may be made from portable computer system 100 directly to the Internet 52 .
- the data and information which are communicated between base station 32 and portable computer system 100 are the same type of information and data that can conventionally be transferred and received over a public telephone wire network system.
- a wireless communication interface is utilized to communicate data and information between portable computer system 100 and base station 32 .
- a wireless communication system in accordance with the present invention is the Mobitex wireless communication system.
- FIGS. 1B , 1 C, 1 D, 1 E and 1 F are block diagrams showing various embodiments of a system 51 for coupling a portable computer system 100 to other computer systems and to the Internet 52 in accordance with the present invention.
- System 51 is described in the context of wired connections between its various devices and components; however, it is appreciated that wireless connections (such as but not limited to Bluetooth wireless connections) can also be used.
- system 51 comprises a host computer system 56 which can either be a desktop unit as shown, or, alternatively, can be a laptop system 58 .
- host computer systems can be used within system 51 .
- Host computer systems 58 and 56 are shown connected to a communication bus 54 such as an Ethernet Local Area Network (LAN), but which can instead be any of a number of other types.
- Bus 54 can provide communication with the Internet 52 using a number of well-known protocols. Coupled with Internet 52 are multiple servers exemplified by server 30 . Residing on server 30 is a Web site 40 .
- host computer system 56 is also coupled via connector cable 68 to a cradle 60 for receiving and initiating communication with portable computer system 100 (“handheld computer”) of the present invention.
- Connector cable 66 can be a serial bus (e.g., RS232), a parallel bus, a Universal Serial Bus (USB), or any other type of workable connection.
- Cradle 60 provides an electrical and mechanical communication interface between connector cable 68 and portable computer system 100 for two-way communications with host computer system 56 .
- Portable computer system 100 also contains a wireless infrared communication mechanism 64 for sending and receiving information from other devices.
- laptop system 58 is coupled via connector cable 68 to cradle 60 .
- connector cable 68 can be a serial bus (e.g., RS232), a parallel bus, a USB, or any other type of workable connection for enabling two-way communication between portable computer system 100 and laptop system 58 .
- FIG. 1D shows another embodiment of system 51 in accordance with the present invention.
- host computer system 56 is coupled via connector cable 68 to cradle 60 .
- Host computer system 56 is also coupled to a modem 76 via another connector cable 78 .
- Connector cable 78 can be a serial bus, a parallel bus, a USB, or any other type of workable connection that can be used for allowing two-way communication between host computer system 56 and the internet 52 .
- connector cable 78 is coupled with a wire line 74 to a central office (or cable office, etc.) 81 via modem 76 .
- Modem 76 can be internal to or external to host computer system 56 .
- Modem 76 can be an analog modem, a cable modem, an ADSL (Asymmetric Digital Subscriber Line) modem, or any other such device.
- Central office 81 in turn is communicatively coupled to the Internet 52 via some type of well-known communication line 84 .
- FIG. 1E shows another embodiment of system 51 in accordance with the present invention.
- laptop system 58 is coupled via connector cable 68 to cradle 60 .
- Laptop system 58 is also coupled to modem 76 via connector cable 78 .
- connector cable 78 is coupled with wire line 74 to central office 81 via modem 76 .
- Central office 81 in turn is communicatively coupled to the Internet 52 via communication line 84 .
- FIG. 1F shows another embodiment of system 51 in accordance with the present invention.
- portable computer system 100 is coupled with wire line 74 via a modem 82 .
- portable computer system 100 is a Palm V or other such PDA
- modem 82 is a Palm V modem or PDA modem.
- Wire line 74 is communicatively coupled to central office 81 which in turn is communicatively coupled to the Internet 52 via communication line 84 .
- portable computer system 100 can be used in a network environment combining elements of networks 50 and 51 . That is, as will be seen below, portable computer system 100 can include both a wireless infrared communication mechanism and a signal (e.g., radio) receiver/transmitter device.
- a wireless infrared communication mechanism e.g., Bluetooth
- a signal e.g., radio
- FIG. 2 is a perspective illustration of the top face 100 a of one embodiment of the palmtop computer system 100 of the present invention.
- the top face 100 a contains a display screen 105 surrounded by a bezel or cover.
- a removable stylus 80 is also shown.
- the display screen 105 is a touch screen able to register contact between the screen and the tip of the stylus 80 .
- the stylus 80 can be of any material to make contact with the screen 105 .
- the top face 100 a also contains one or more dedicated and/or programmable buttons 75 for selecting information and causing the computer system to implement functions.
- the on/off button 95 is also shown.
- FIG. 2 also illustrates a handwriting recognition pad or “digitizer” containing two regions 106 a and 106 b .
- Region 106 a is for the drawing of alphabetic characters therein (and not for numeric characters) for automatic recognition
- region 106 b is for the drawing of numeric characters therein (and not for alphabetic characters) for automatic recognition.
- the stylus 80 is used for stroking a character within one of the regions 106 a and 106 b .
- the stroke information is then fed to an internal processor for automatic character recognition. Once characters are recognized, they are typically displayed on the screen 105 for verification and/or modification.
- FIG. 3 illustrates the bottom side 100 b of one embodiment of the palmtop computer system that can be used in accordance with various embodiments of the present invention.
- An extendible antenna 85 is shown, and also a battery storage compartment door 90 is shown.
- a communication interface 180 is also shown.
- the communication interface 180 is a serial communication port, but could also alternatively be of any of a number of well-known communication standards and protocols, e.g., parallel, SCSI (small computer system interface), Firewire (IEEE 1394), Ethernet, etc.
- FIG. 4 illustrates circuitry of computer system 100 .
- Computer system 100 includes an address/data bus 110 for communicating information, a central processor 101 coupled with the bus for processing information and instructions, a volatile memory 102 (e.g., random access memory, RAM) coupled with the bus 110 for storing information and instructions for the central processor 101 and a non-volatile memory 103 (e.g., read only memory, ROM) coupled with the bus 110 for storing static information and instructions for the processor 101 .
- Computer system 100 also includes an optional data storage device 104 (e.g., memory stick) coupled with the bus 110 for storing information and instructions. Device 104 can be removable.
- computer system 100 also contains a display device 105 coupled to the bus 110 for displaying information to the computer user.
- PC board 225 can contain the processor 101 , the bus 110 , the ROM 103 and the RAM 102 .
- computer system 100 also includes a signal transmitter/receiver device 108 , which is coupled to bus 110 for providing a physical communication link between computer system 100 , and a network environment (e.g., network environments 50 and 51 of FIGS. 1A through 1F ).
- signal transmitter/receiver device 108 enables central processor unit 101 to communicate wirelessly with other electronic systems coupled to the network.
- signal transmitter/receiver device 108 is coupled to antenna 85 ( FIG. 4 ) and provides the functionality to transmit and receive information over a wireless communication interface.
- the present embodiment of signal transmitter/receiver device 108 is well suited to be implemented in a wide variety of ways. For example, signal transmitter/receiver device 108 could be implemented as a modem.
- computer system 100 includes a communication circuit 109 coupled to bus 110 .
- Communication circuit 109 includes an optional digital signal processor (DSP) 120 for processing data to be transmitted or data that are received via signal transmitter/receiver device 108 .
- DSP digital signal processor
- processor 101 can perform some or all of the functions performed by DSP 120 .
- an optional alphanumeric input device 106 that in one implementation is a handwriting recognition pad (“digitizer”) having regions 106 a and 106 b ( FIG. 2 ), for instance.
- Alphanumeric input device 106 can communicate information and command selections to processor 101 .
- Computer system 100 also includes an optional cursor control or directing device (on-screen cursor control 107 ) coupled to bus 110 for communicating user input information and command selections to processor 101 .
- on-screen cursor control device 107 is a touch screen device incorporated with display device 105 .
- On-screen cursor control device 107 is capable of registering a position on display device 105 where the stylus makes contact.
- the display device 105 utilized with computer system 100 may be a liquid crystal display device, a cathode ray tube (CRT), a field emission display device (also called a flat panel CRT) or other display device suitable for generating graphic images and alphanumeric characters recognizable to the user.
- display device 105 is a flat panel display.
- FIG. 5 is a perspective illustration of one embodiment of the cradle 60 for receiving the palmtop computer system 100 .
- Cradle 60 contains a mechanical and electrical interface 260 for interfacing with communication interface 108 ( FIG. 3 ) of computer system 100 when system 100 is slid into the cradle 60 in an upright position.
- button 270 can be pressed to initiate two-way communication (e.g., a communication session) between computer system 100 and other computer systems coupled to serial communication 265 .
- Computer system 342 exemplifies desktop computer system 56 or laptop computer system 58 of FIG. 1B .
- Computer system 342 also exemplifies a server computer system in a computer system network (such as server 30 in FIGS. 1A through 1F ) or a proxy server computer (e.g., proxy server 36 of FIG. 1A ).
- computer system 342 comprises bus 700 for communicating information, processor 701 coupled with bus 700 for processing information and instructions, random access (volatile) memory (RAM) 702 coupled with bus 700 for storing information and instructions for processor 701 , read-only (non-volatile) memory (ROM) 703 coupled with bus 700 for storing static information and instructions for processor 701 , data storage device 704 such as a magnetic or optical disk and disk drive coupled with bus 700 for storing information and instructions, an optional user output device such as display device 705 coupled to bus 700 for displaying information to the computer user, an optional user input device such as alphanumeric input device 706 including alphanumeric and function keys coupled to bus 700 for communicating information and command selections to processor 701 , and an optional user input device such as cursor control device 707 coupled to bus 100 for communicating user input information and command selections to processor 701 .
- an optional input/output (I/O) device 708 is used to couple computer system 342 to, for example, a
- display device 705 utilized with computer system 342 may be a liquid crystal device, cathode ray tube, or other display device suitable for creating graphic images and alphanumeric characters recognizable to the user.
- Cursor control device 707 allows the computer user to dynamically signal the two-dimensional movement of a visible symbol (pointer) on a display screen of display device 705 .
- cursor control device are known in the art including a trackball, mouse, joystick or special keys on alphanumeric input device 706 capable of signaling movement of a given direction or manner of displacement.
- the cursor control 707 also may be directed and/or activated via input from the keyboard using special keys and key sequence commands. Alternatively, the cursor may be directed and/or activated via input from a number of specially adapted cursor directing devices.
- FIG. 7 is a flowchart showing the steps in a protocol 800 for preventing unauthorized access to a secure data transaction between a device (e.g. portable computer system 100 of FIGS. 1A through 1F ) and a system or server (e.g. 36 of FIG. 1A ) by utilizing a unique session identification number for each data transaction in one embodiment of the present invention.
- a device e.g. portable computer system 100 of FIGS. 1A through 1F
- a system or server e.g. 36 of FIG. 1A
- the owner or an authorized user of portable computer system 100 (the client) establishes communication with a web clipping proxy (WCP) server, 36 of FIG. 1A .
- WCP web clipping proxy
- the WCP server communicates via the internet, 52 of FIG. 1A , with a web site, 40 of FIG. 1A , on the World Wide Web network, Web site 40 typically resides on a server computer system (e.g. a “central device”) as exemplified by server 30 of FIGS. 1A through 1F .
- the portable computer system 100 communicating with the WCP server 36 is a portable device such as a palmtop computer system or PDA.
- the client 100 desires an exchange of information with web site 40 , and in step 820 transmits a signal to the WCP server 36 requesting a session identification number in preparation for a secure data transaction.
- the WCP server 36 In step 830 , the WCP server 36 generates a session identification number in response to the client request made in step 820 .
- the generated session identification number is singular in form and will only be generated one time for the requesting client. It is to be appreciated that the WCP server 36 has the capacity to recognize the requesting client 100 , correlate the generated session identification number with the requesting client 100 , and prevent any future generation of the same session identification number for the same client 100 .
- the generated session identification number is then communicated by the WCP server 36 to the client 100 where it is stored in preparation for a secure data transaction request.
- the client 100 formulates a request for a secure data transaction which includes the session identification number, and transmits the formulated request to the WCP server 36 .
- the WCP server 36 receives the formulated secure data transaction request from the client 100 .
- the session identification number included with the request is compared by the WCP server 36 with the original session identification number generated by the WCP server 36 .
- the current request for a secure data transaction is denied in step 860 . It is understood that if no response is received by the client 100 from the WCP server 36 , the current request for a secure data transaction is denied Alternatively, the WCP server 36 could be configured to transmit a signal to the client 100 that the current request is denied.
- step 870 the current requested secure data transaction is implemented by the WCP server 36 .
- the current requested secure data transaction could be a transfer of data between the client 100 and a web site 40 of FIG. 1A via the internet 52 of FIG. 1A .
- the termination of the current secure data transaction as signaled by either the client 100 or the web site 40 in FIG. 1A is a signal to the WCP server 36 to terminate the current implementation in step 880 .
- the WCP server discontinues the communication between the client 100 and the web site 40 , and the client 100 is returned to step 810 .
- the client 100 may then request another secure data transaction, whereby a new session identification number is required and the above process must be repeated. Alternately, the client 100 may either continue or discontinue communication with the WCP server 36 .
- the present invention provides a method and system that will prevent an unauthorized user from gaining access to a secure data transaction by utilizing intercepted data in a replay attack. Further, the present invention provides a method and system that overcomes the requirement of prior systems that a client 100 always communicate with the same WCP server 36 . That is, the present method and system may be implemented between any client 100 and WCP server 36 , which is an advantage in larger networks having distributed servers where load balancing might be a problem.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method and system for preventing replay attacks on secure data transactions. A replay attack occurs when an unauthorized user intercepts a secure data transaction between a device and a central system and uses the intercepted data to gain access to the central system. One method for preventing such replay attacks is the use of a unique session identification number that is generated for each secure data transaction request. A replay attack is defeated using intercepted data since the unique session identification number is valid only for a completed session and may not be reused. When a device is connected to a server using either wireless or land-line connection, the device requests a session identification number from the server. The server generates and signals to the device a unique session identification number which the device then transmits back to the server along with a request for a secure data transaction. Upon verification of the correct unique session identification number, the server implements the requested data transaction. Termination of the requested transaction by the device signals the termination of the current secure data transaction. A new unique session identification number must be requested and issued in like fashion for any additional secure data transactions. The method and system offer the advantage of use with multiple available servers, in contrast to present methods which require that a device to communicate with a given server. Further, the present method offers reduced operation time since there is a single coupling/uncoupling for each data transaction.
Description
- 1. Field of the Invention
- The present invention relates to the field of portable devices such as personal digital assistants or palmtop computer systems. More specifically, embodiments of the present invention relate to wireless communication using a portable computer system and a second (“host”) computer system.
- 2. Related Art
- As the components required to build a computer system have reduced in size, new categories of electronic devices and computer systems have emerged. One of the new categories of computer systems is the “palmtop” computer system. A palmtop computer system is a computer that is small enough to be held in the hand of a user and can therefore be “palm-sized,” Most palmtop computer systems are used to implement various Personal Information Management (PIM) applications such as an address book, a daily organizer (calendar, datebook, etc.) and electronic notepads, to name a few. Palmtop computers with PIM software have been known as Personal Digital Assistants (PDAs). Many PDAs have a small and flat display screen associated therewith.
- User convenience and device value are very important factors for portable electronic devices. Typically, portable electronic devices are employed while the user is on the run, e.g., in business meetings, on business travel, personal travel, in a vehicle, on foot, etc. Because the user may be occupied or busy while using the portable electronic device, the number of user steps or user tasks required in order to access information from an electronic device (or to store information into the electronic device) is crucial for producing a commercially successful and useful product. That is, the more difficult it is to access data from an electronic device, the less likely the user will perform those tasks to obtain the information. Likewise, the easier information is to obtain, the more likely the portable electronic device will be used to obtain that information and the more likely the portable electronic device will become a part of the user's everyday activities.
- Similarly, the more useful the device, the more the device will be used and acquired. The functionality of mobile wireless devices is undergoing a transition. Mobile devices are evolving from a single application device with dedicated specific purpose communication channel (for example, a cell phone or pager), to more general-purpose devices with more flexible data communication capabilities.
- More specifically, wireless technology is advancing, both in the number of options that are available for providing connectivity, and in the flexibility to provide general purpose data communication. Different technologies such as cellular technologies (e.g., COMA, TDMA), LAN access technologies (e.g., IEEE 802.11, HomeRF) and PAN technologies (e.g., Bluetooth, IR) each address a different set of needs, and provide a different set of potential services. Mobile devices are no longer restricted to a single communication channel. Modular mobile devices allow network interfaces to be attached, allowing for unlimited communications configurations. In addition, Bluetooth technology allows a single mobile device to simultaneously access multiple piconets through a single interface.
- To facilitate mobile wireless communication, several wireless modem peripheral devices are available that can be directly connected to the serial interface port of a host computer system thereby providing wireless communication to the internet. Wireless communication between two stations via the internet requires security for the users as well as protection of any data being exchanged. More specifically, user identification and verification of authorization to access given data are both important considerations. Equally important is user protection from a replay attack whereby intercepted identification/access data is used by an attacker to gain unauthorized access to an account.
- In the prior art, one method for protecting against unauthorized use of a computer system or against unauthorized access to information stored in a computer system is to use a password. However, passwords are considered by many users to be vexing and inconvenient. Passwords can lock out even an authorized user, and experience shows that passwords can be defeated by unauthorized users. In addition, while a password may prevent access to applications and information already existing on the palmtop, it will generally not prevent an unauthorized user from adding new applications and information. Thus, an unauthorized user can simply assume ownership of the palmtop and ignore the password-protected information.
- In the prior art, user security is often provided by the assignment of a unique user identification number (ID) such as the manufacturers serial number (MAN) of the PDA being used. Such is the case with the Mobitex Network utilized with Palm PDAs. However, an attacker could intercept such a transaction, modify the MAN number and access a different web clipping proxy server (WCP) in order to replay the intercepted message, thereby defeating the intended user security. For other TCP/IP based wireless networks (GSM, CDPD, etc.), or wire-line networks, a MAN number may not exist and the request from a single PDA source may even be directed to other WCP servers.
- A sequence number is used to thwart replay attacks for secure transactions in the prior art. Sequence numbers are stored in a given WCP server for each secure transaction. This implementation assumes that the request from one PDA will always go to the same WCP server. However, this assumption may not be valid for TCP/IP based wireless or wire-line networks because the dispatcher will not be load balanced. In such cases, the load balance could be a round robin among available servers and the storage of a sequence number in a particular server for security purposes will then result in communication failure. Actually, the assumption may be broken even in the case of multiple meta-cluster Mobitex servers, which would likewise result in failure to communicate.
- Accordingly, what is needed is a more generally applicable method or system that offers increased security during secure data transactions. What is also needed is a method or system that will not only increase security but will also prevent unauthorized access to a data transaction by means of intercepted data. In addition, what is needed is a method or system that will function properly without requiring a device to communicate exclusively with a given server or central system.
- A method and system for preventing replay attacks on secure data transactions is described. A replay attack occurs when an unauthorized user intercepts a secure data transaction between a device and a central system and uses the intercepted data to gain access to the central system. One method for preventing such replay attacks is the use of a unique session identification number that is generated for each secure data transaction request. A replay attack is defeated using intercepted data since the unique session identification number is valid only for a completed session and may not be reused. When a device is connected to a server using either wireless or land-line connection, the device requests a session identification number from the server. The server generates and signals to the device a unique session identification number which the device then transmits back to the server along with a request for a secure data transaction. Upon verification of the correct unique session identification number, the server implements the requested data transaction. Termination of the requested transaction by the device signals the termination of the current secure data transaction. A new unique session identification number must be requested and issued in like fashion for any additional secure data transactions. The method and system offer the advantage of use with multiple available servers, in contrast to present methods which require that a device to communicate with a given server. Further, the present method offers reduced operation time since there is a single coupling/uncoupling for each data transaction.
- In one embodiment, a device communicates with a server or system which is the World Wide Web site residing on a server computer system in a computer system network (e.g. the internet). The proxy server receives a signal from the device requesting a unique session identification number in preparation for a secure data transaction. The server generates and communicates a unique session identification number to the device. The device then returns a signal to the server which includes the unique identification number along with the request for a secure data transaction. The server compares the returned unique session identification number with the original and provided the comparison is satisfactory the requested secure data transaction is implemented. Upon completion of the requested secure data transaction, the session is terminated by the device.
- In one embodiment, the device communicating with a server or system is a portable device such as a palmtop computer system or PDA. The portable device transmits a signal to a server or system requesting a session identification number in preparation for a secure data transaction. In response to this request, the portable device receives a unique session identification number generated by the server or system. The portable device then transmits a signal to the server or system requesting a secure data transaction and which signal includes the unique session identification number. Provided the returned unique session identification number matches the original generated by the server, the portable device is permitted to complete the requested secure data transaction. Upon completion of the secure data transaction, the portable device decouples communicatively from the server or system which signals termination of the current secure data transaction.
-
FIG. 1A is a block diagram of an exemplary network environment including a portable computer system in accordance with one embodiment of the present invention. -
FIGS. 1B , 1C, 1D, 1E and 1F are block diagrams showing various embodiments for coupling a portable computer system to other computer systems and to the internet in accordance with the present invention. -
FIG. 2 is a top side perspective view of a portable computer system in accordance with one embodiment of the present invention. -
FIG. 3 is a bottom side perspective view of the portable computer system ofFIG. 2 . -
FIG. 4 is a block diagram of one embodiment of a portable computer system in accordance with the present invention. -
FIG. 5 is a perspective view of the cradle device for connecting the portable computer system to other systems via a communication interface in accordance with one embodiment of the present invention. -
FIG. 6 is a block diagram of one embodiment of a server, desktop or laptop computer system in accordance with the present invention. -
FIG. 7 is a flowchart showing the steps in a process for preventing replay attacks on secure data transactions in accordance with one embodiment of the present invention. - In the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be recognized by one skilled in the art that the present invention may be practiced without these specific details or with equivalents thereof. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
- Some portions of the detailed descriptions, which follow, are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “determining” or “indicating” or “indexing” or “receiving” or “performing” or “initiating” or “sending” or “implementing” or “disabling” or “enabling” or “displaying” or the like, refer to the action and processes of a computer system or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- The present invention is discussed primarily in the context of a portable computer system, such as a palmtop or personal digital assistant, with the capability to access via the Internet a World Wide Web (“Web”) site residing on a server computer system. However, it is appreciated that the present invention can be used with other types of devices that have the capability to access some type of central device or central site, including but not limited to laptop computer systems.
- Exemplary Palmtop Platform
-
FIG. 1A is a block diagram of anexemplary network environment 50 including aportable computer system 100 in accordance with one embodiment of the present invention.Portable computer system 100 is also known as a palmtop or palm-sized computer system or as a personal digital assistant (PDA). In one embodiment,portable computer system 100 has the ability to transmit and receive data and information over a wireless communication interface (e.g., a radio interface). In one embodiment, the wireless communication interface is integrated intoportable computer system 100; in another embodiment, the wireless communication interface is accomplished with a wireless modem attachment (not shown). - In the present embodiment,
base station 32 is both a transmitter and receiver base station, which can be implemented by coupling it into an existingpublic telephone network 34. Implemented in this manner,base station 32 enablesportable computer system 100 to communicate with a proxyserver computer system 36, which is coupled by wire to the existingpublic telephone network 34. Furthermore, proxyserver computer system 36 is coupled to theInternet 52, thereby enablingportable computer system 100 to communicate with theInternet 52. Coupled withInternet 52 are multiple servers exemplified byserver 30. Residing onserver 30 is aWeb site 40. When communicating with a Web site overInternet 52, protocols such as CTP (Compact Transport Protocol) and CML (Compact Markup Language) can be used byportable computer system 100 in the present embodiment. - It should be appreciated that within the present embodiment, one of the functions of
proxy server 36 is to perform operations over theInternet 52 on behalf ofportable computer system 100. For example,proxy server 36 has a particular Internet address and acts as a proxy device forportable computer system 100 over theInternet 52. - It should be further appreciated that other embodiments of a communications network, planned or envisioned, may be utilized in accordance with the present invention. For example, a wireless connection may be made from
portable computer system 100 directly to theInternet 52. - The data and information which are communicated between
base station 32 andportable computer system 100 are the same type of information and data that can conventionally be transferred and received over a public telephone wire network system. However, a wireless communication interface is utilized to communicate data and information betweenportable computer system 100 andbase station 32. It should be appreciated that one embodiment of a wireless communication system in accordance with the present invention is the Mobitex wireless communication system. -
FIGS. 1B , 1C, 1D, 1E and 1F are block diagrams showing various embodiments of asystem 51 for coupling aportable computer system 100 to other computer systems and to theInternet 52 in accordance with the present invention.System 51 is described in the context of wired connections between its various devices and components; however, it is appreciated that wireless connections (such as but not limited to Bluetooth wireless connections) can also be used. - With reference first to
FIG. 1B ,system 51 comprises ahost computer system 56 which can either be a desktop unit as shown, or, alternatively, can be alaptop system 58. Optionally, one or more host computer systems can be used withinsystem 51.Host computer systems communication bus 54 such as an Ethernet Local Area Network (LAN), but which can instead be any of a number of other types.Bus 54 can provide communication with theInternet 52 using a number of well-known protocols. Coupled withInternet 52 are multiple servers exemplified byserver 30. Residing onserver 30 is aWeb site 40. - Importantly, in the present embodiment,
host computer system 56 is also coupled viaconnector cable 68 to acradle 60 for receiving and initiating communication with portable computer system 100 (“handheld computer”) of the present invention. Connector cable 66 can be a serial bus (e.g., RS232), a parallel bus, a Universal Serial Bus (USB), or any other type of workable connection.Cradle 60 provides an electrical and mechanical communication interface betweenconnector cable 68 andportable computer system 100 for two-way communications withhost computer system 56.Portable computer system 100 also contains a wirelessinfrared communication mechanism 64 for sending and receiving information from other devices. - With reference next to
FIG. 1C , in this embodiment,laptop system 58 is coupled viaconnector cable 68 to cradle 60. As described above,connector cable 68 can be a serial bus (e.g., RS232), a parallel bus, a USB, or any other type of workable connection for enabling two-way communication betweenportable computer system 100 andlaptop system 58. -
FIG. 1D shows another embodiment ofsystem 51 in accordance with the present invention. In this embodiment,host computer system 56 is coupled viaconnector cable 68 to cradle 60.Host computer system 56 is also coupled to amodem 76 via anotherconnector cable 78.Connector cable 78 can be a serial bus, a parallel bus, a USB, or any other type of workable connection that can be used for allowing two-way communication betweenhost computer system 56 and theinternet 52. In this embodiment,connector cable 78 is coupled with awire line 74 to a central office (or cable office, etc.) 81 viamodem 76.Modem 76 can be internal to or external tohost computer system 56.Modem 76 can be an analog modem, a cable modem, an ADSL (Asymmetric Digital Subscriber Line) modem, or any other such device.Central office 81 in turn is communicatively coupled to theInternet 52 via some type of well-knowncommunication line 84. -
FIG. 1E shows another embodiment ofsystem 51 in accordance with the present invention. In this embodiment,laptop system 58 is coupled viaconnector cable 68 to cradle 60.Laptop system 58 is also coupled tomodem 76 viaconnector cable 78. In this embodiment,connector cable 78 is coupled withwire line 74 tocentral office 81 viamodem 76.Central office 81 in turn is communicatively coupled to theInternet 52 viacommunication line 84. -
FIG. 1F shows another embodiment ofsystem 51 in accordance with the present invention. In this embodiment,portable computer system 100 is coupled withwire line 74 via amodem 82. In one embodiment,portable computer system 100 is a Palm V or other such PDA, andmodem 82 is a Palm V modem or PDA modem.Wire line 74 is communicatively coupled tocentral office 81 which in turn is communicatively coupled to theInternet 52 viacommunication line 84. - With reference to
FIGS. 1A through 1F , it is appreciated thatportable computer system 100 can be used in a network environment combining elements ofnetworks portable computer system 100 can include both a wireless infrared communication mechanism and a signal (e.g., radio) receiver/transmitter device. -
FIG. 2 is a perspective illustration of thetop face 100 a of one embodiment of thepalmtop computer system 100 of the present invention. Thetop face 100 a contains adisplay screen 105 surrounded by a bezel or cover. Aremovable stylus 80 is also shown. Thedisplay screen 105 is a touch screen able to register contact between the screen and the tip of thestylus 80. Thestylus 80 can be of any material to make contact with thescreen 105. Thetop face 100 a also contains one or more dedicated and/orprogrammable buttons 75 for selecting information and causing the computer system to implement functions. The on/offbutton 95 is also shown. -
FIG. 2 also illustrates a handwriting recognition pad or “digitizer” containing tworegions Region 106 a is for the drawing of alphabetic characters therein (and not for numeric characters) for automatic recognition, andregion 106 b is for the drawing of numeric characters therein (and not for alphabetic characters) for automatic recognition. Thestylus 80 is used for stroking a character within one of theregions screen 105 for verification and/or modification. -
FIG. 3 illustrates thebottom side 100 b of one embodiment of the palmtop computer system that can be used in accordance with various embodiments of the present invention. Anextendible antenna 85 is shown, and also a batterystorage compartment door 90 is shown. Acommunication interface 180 is also shown. In one embodiment of the present invention, thecommunication interface 180 is a serial communication port, but could also alternatively be of any of a number of well-known communication standards and protocols, e.g., parallel, SCSI (small computer system interface), Firewire (IEEE 1394), Ethernet, etc. -
FIG. 4 illustrates circuitry ofcomputer system 100.Computer system 100 includes an address/data bus 110 for communicating information, acentral processor 101 coupled with the bus for processing information and instructions, a volatile memory 102 (e.g., random access memory, RAM) coupled with thebus 110 for storing information and instructions for thecentral processor 101 and a non-volatile memory 103 (e.g., read only memory, ROM) coupled with thebus 110 for storing static information and instructions for theprocessor 101.Computer system 100 also includes an optional data storage device 104 (e.g., memory stick) coupled with thebus 110 for storing information and instructions.Device 104 can be removable. As described above,computer system 100 also contains adisplay device 105 coupled to thebus 110 for displaying information to the computer user.PC board 225 can contain theprocessor 101, thebus 110, theROM 103 and theRAM 102. - With reference still to
FIG. 4 ,computer system 100 also includes a signal transmitter/receiver device 108, which is coupled tobus 110 for providing a physical communication link betweencomputer system 100, and a network environment (e.g.,network environments FIGS. 1A through 1F ). As such, signal transmitter/receiver device 108 enablescentral processor unit 101 to communicate wirelessly with other electronic systems coupled to the network. It should be appreciated that within the present embodiment, signal transmitter/receiver device 108 is coupled to antenna 85 (FIG. 4 ) and provides the functionality to transmit and receive information over a wireless communication interface. It should be further appreciated that the present embodiment of signal transmitter/receiver device 108 is well suited to be implemented in a wide variety of ways. For example, signal transmitter/receiver device 108 could be implemented as a modem. - In one embodiment,
computer system 100 includes acommunication circuit 109 coupled tobus 110.Communication circuit 109 includes an optional digital signal processor (DSP) 120 for processing data to be transmitted or data that are received via signal transmitter/receiver device 108. Alternatively,processor 101 can perform some or all of the functions performed byDSP 120. - Also included in
computer system 100 ofFIG. 4 is an optionalalphanumeric input device 106 that in one implementation is a handwriting recognition pad (“digitizer”) havingregions FIG. 2 ), for instance.Alphanumeric input device 106 can communicate information and command selections toprocessor 101.Computer system 100 also includes an optional cursor control or directing device (on-screen cursor control 107) coupled tobus 110 for communicating user input information and command selections toprocessor 101. In one implementation, on-screencursor control device 107 is a touch screen device incorporated withdisplay device 105. On-screencursor control device 107 is capable of registering a position ondisplay device 105 where the stylus makes contact. Thedisplay device 105 utilized withcomputer system 100 may be a liquid crystal display device, a cathode ray tube (CRT), a field emission display device (also called a flat panel CRT) or other display device suitable for generating graphic images and alphanumeric characters recognizable to the user. In the preferred embodiment,display device 105 is a flat panel display. -
FIG. 5 is a perspective illustration of one embodiment of thecradle 60 for receiving thepalmtop computer system 100.Cradle 60 contains a mechanical andelectrical interface 260 for interfacing with communication interface 108 (FIG. 3 ) ofcomputer system 100 whensystem 100 is slid into thecradle 60 in an upright position. Once inserted,button 270 can be pressed to initiate two-way communication (e.g., a communication session) betweencomputer system 100 and other computer systems coupled toserial communication 265. - Exemplary Desktop/Laptop/Server Platform
- Refer now to
FIG. 6 which illustrates anexemplary computer system 342 with which embodiments of the present invention may be practiced.Computer system 342 exemplifiesdesktop computer system 56 orlaptop computer system 58 ofFIG. 1B .Computer system 342 also exemplifies a server computer system in a computer system network (such asserver 30 inFIGS. 1A through 1F ) or a proxy server computer (e.g.,proxy server 36 ofFIG. 1A ). - Continuing with reference to
FIG. 6 , in general,computer system 342 comprisesbus 700 for communicating information,processor 701 coupled withbus 700 for processing information and instructions, random access (volatile) memory (RAM) 702 coupled withbus 700 for storing information and instructions forprocessor 701, read-only (non-volatile) memory (ROM) 703 coupled withbus 700 for storing static information and instructions forprocessor 701,data storage device 704 such as a magnetic or optical disk and disk drive coupled withbus 700 for storing information and instructions, an optional user output device such asdisplay device 705 coupled tobus 700 for displaying information to the computer user, an optional user input device such asalphanumeric input device 706 including alphanumeric and function keys coupled tobus 700 for communicating information and command selections toprocessor 701, and an optional user input device such ascursor control device 707 coupled tobus 100 for communicating user input information and command selections toprocessor 701. Furthermore, an optional input/output (I/O)device 708 is used to couplecomputer system 342 to, for example, a communication bus (e.g.,communication bus 54 ofFIG. 1B ). - Continuing with reference to
FIG. 6 ,display device 705 utilized withcomputer system 342 may be a liquid crystal device, cathode ray tube, or other display device suitable for creating graphic images and alphanumeric characters recognizable to the user.Cursor control device 707 allows the computer user to dynamically signal the two-dimensional movement of a visible symbol (pointer) on a display screen ofdisplay device 705. Many implementations of the cursor control device are known in the art including a trackball, mouse, joystick or special keys onalphanumeric input device 706 capable of signaling movement of a given direction or manner of displacement. It is to be appreciated that thecursor control 707 also may be directed and/or activated via input from the keyboard using special keys and key sequence commands. Alternatively, the cursor may be directed and/or activated via input from a number of specially adapted cursor directing devices. -
FIG. 7 is a flowchart showing the steps in aprotocol 800 for preventing unauthorized access to a secure data transaction between a device (e.g.portable computer system 100 ofFIGS. 1A through 1F ) and a system or server (e.g. 36 ofFIG. 1A ) by utilizing a unique session identification number for each data transaction in one embodiment of the present invention. - In
step 810 ofFIG. 7 , in the present embodiment, the owner or an authorized user of portable computer system 100 (the client) establishes communication with a web clipping proxy (WCP) server, 36 ofFIG. 1A . The WCP server communicates via the internet, 52 ofFIG. 1A , with a web site, 40 ofFIG. 1A , on the World Wide Web network,Web site 40 typically resides on a server computer system (e.g. a “central device”) as exemplified byserver 30 ofFIGS. 1A through 1F . In one embodiment, theportable computer system 100 communicating with theWCP server 36 is a portable device such as a palmtop computer system or PDA. - With reference still to
FIG. 7 , theclient 100 desires an exchange of information withweb site 40, and instep 820 transmits a signal to theWCP server 36 requesting a session identification number in preparation for a secure data transaction. - In
step 830, theWCP server 36 generates a session identification number in response to the client request made instep 820. The generated session identification number is singular in form and will only be generated one time for the requesting client. It is to be appreciated that theWCP server 36 has the capacity to recognize the requestingclient 100, correlate the generated session identification number with the requestingclient 100, and prevent any future generation of the same session identification number for thesame client 100. The generated session identification number is then communicated by theWCP server 36 to theclient 100 where it is stored in preparation for a secure data transaction request. - Continuing with
step 840 ofFIG. 7 , theclient 100 formulates a request for a secure data transaction which includes the session identification number, and transmits the formulated request to theWCP server 36. - In
step 850, theWCP server 36 receives the formulated secure data transaction request from theclient 100. The session identification number included with the request is compared by theWCP server 36 with the original session identification number generated by theWCP server 36. - If the comparison does not result in an exact match, the current request for a secure data transaction is denied in
step 860. It is understood that if no response is received by theclient 100 from theWCP server 36, the current request for a secure data transaction is denied Alternatively, theWCP server 36 could be configured to transmit a signal to theclient 100 that the current request is denied. - If the comparison in
step 850 results in an exact match, the current request for a secure data transaction is accepted. Instep 870, the current requested secure data transaction is implemented by theWCP server 36. In one embodiment, the current requested secure data transaction could be a transfer of data between theclient 100 and aweb site 40 ofFIG. 1A via theinternet 52 ofFIG. 1A . - The termination of the current secure data transaction as signaled by either the
client 100 or theweb site 40 inFIG. 1A is a signal to theWCP server 36 to terminate the current implementation instep 880. The WCP server discontinues the communication between theclient 100 and theweb site 40, and theclient 100 is returned to step 810. Theclient 100 may then request another secure data transaction, whereby a new session identification number is required and the above process must be repeated. Alternately, theclient 100 may either continue or discontinue communication with theWCP server 36. - Thus the present invention provides a method and system that will prevent an unauthorized user from gaining access to a secure data transaction by utilizing intercepted data in a replay attack. Further, the present invention provides a method and system that overcomes the requirement of prior systems that a
client 100 always communicate with thesame WCP server 36. That is, the present method and system may be implemented between anyclient 100 andWCP server 36, which is an advantage in larger networks having distributed servers where load balancing might be a problem. - The preferred embodiment of the present invention, a protocol to prevent replay attacks on secured wireless transactions, is thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the below claims.
Claims (20)
1. A method for preventing replay attacks on secure data transactions, said method comprising the steps of:
a) establishing a communicative coupling with an authorized device;
b) receiving a signal from said device requesting a session identification number;
c) generating said session identification number and communicating said session identification number to said device;
d) receiving a signal from said device, wherein said signal comprises a request for said secure data transaction and includes said session identification number, and
e) coupling said device communicatively to implement said secure data transaction provided said request is authorized based on said session identification number.
2. The method as recited in claim 1 wherein said step e) comprises the step of:
e1) ensuring that only one said coupling is authorized for each given said session identification number.
3. The method as recited in claim 1 wherein said method is implemented using a server computer system communicatively coupled to said device via the World Wide Web.
4. The method as recited in claim 1 wherein said device is a palmtop computer system.
5. The method as recited in claim 1 wherein said step e) comprises the step of:
e1) encrypting data using certicom.
6. The method as recited in claim 1 wherein termination of said communicative coupling by said device indicates termination of said request.
7. The method as recited in claim 1 wherein said method is implemented using a server computer system communicatively coupled to said device via Mobitex based network.
8. The method as recited in claim 1 wherein said method is implemented using a server computer system communicatively coupled to said device via TCP/IP based network.
9. In a portable device, a method for preventing replay attacks on secure data transactions, said method comprising the steps of:
a) sending a signal to a central device requesting a session identification number;
b) receiving in response a session identification number;
c) sending a signal to said central device requesting a secure data transaction, said signal including said session identification number, and
d) implementing an operating mode wherein said portable device is communicatively coupled for said secure data transaction, based on a positive confirmation of said session identification number.
10. The method as recited in claim 9 wherein said step d) comprises the step of:
d1) ensuring that only one said coupling is authorized for each given said session identification number.
11. The method as recited in claim 9 wherein said portable device is a palmtop computer system.
12. The method as recited in claim 9 wherein said central device is a server computer system communicatively coupled to said portable device via the World Wide Web.
13. The method as recited in claim 9 wherein said step d) comprises the step of:
d2) encrypting data using certicom.
14. The method as recited in claim 9 wherein termination of said communicative coupling by said portable device indicates termination of said request.
15. The method as recited in claim 9 wherein said method is implemented using a server computer system communicatively coupled to said portable device via Mobitex based network.
16. The method as recited in claim 9 wherein said method is implemented using a server computer system communicatively coupled to said portable device via TCP/IP based network.
17. A system for preventing replay attacks on secure data transactions, said system comprising:
a central device having a database comprising registration information for a device, said device communicatively coupled to said central device;
wherein upon use of said device, said device is operable to send to said central device a signal requesting a unique session identification number for a single secure data transaction, and wherein said central device in response is operable to signal to said device said unique session identification number, and
wherein said single secure data transaction is enabled by said central device upon receiving a signal from said device requesting a said secure data transaction, provided said request includes said unique session identification number.
18. The system of claim 17 wherein said device is a palmtop computer system.
19. The system of claim 17 wherein said central device is a server computer system communicatively coupled to said device via the World Wide Web.
20. The system of claim 17 wherein said unique session identification number is distinct for each said secure data transaction request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/048,420 US20140040986A1 (en) | 2001-03-26 | 2013-10-08 | Protocol to Prevent Replay Attacks on Secured Wireless Transactions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/818,082 US8555062B1 (en) | 2001-03-26 | 2001-03-26 | Protocol to prevent replay attacks on secured wireless transactions |
US14/048,420 US20140040986A1 (en) | 2001-03-26 | 2013-10-08 | Protocol to Prevent Replay Attacks on Secured Wireless Transactions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/818,082 Continuation US8555062B1 (en) | 2001-03-26 | 2001-03-26 | Protocol to prevent replay attacks on secured wireless transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140040986A1 true US20140040986A1 (en) | 2014-02-06 |
Family
ID=49262625
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/818,082 Active 2025-12-13 US8555062B1 (en) | 2001-03-26 | 2001-03-26 | Protocol to prevent replay attacks on secured wireless transactions |
US14/048,420 Abandoned US20140040986A1 (en) | 2001-03-26 | 2013-10-08 | Protocol to Prevent Replay Attacks on Secured Wireless Transactions |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/818,082 Active 2025-12-13 US8555062B1 (en) | 2001-03-26 | 2001-03-26 | Protocol to prevent replay attacks on secured wireless transactions |
Country Status (1)
Country | Link |
---|---|
US (2) | US8555062B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111163097A (en) * | 2019-12-31 | 2020-05-15 | 新浪网技术(中国)有限公司 | Web application firewall implementation system and method |
CN113098880A (en) * | 2021-04-06 | 2021-07-09 | 杭州和利时自动化有限公司 | Method, system, equipment and readable storage medium for identifying replay attack |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8531334B2 (en) * | 2009-11-06 | 2013-09-10 | Microsoft Corporation | Location proofs |
EP3545665B1 (en) * | 2018-12-29 | 2023-05-03 | Advanced New Technologies Co., Ltd. | System and method for detecting replay attack |
US11303672B2 (en) | 2020-04-02 | 2022-04-12 | International Business Machines Corporation | Detecting replay attacks using action windows |
CN111767543B (en) * | 2020-06-15 | 2024-04-05 | 招商银行股份有限公司 | Replay attack vulnerability determination method, device, equipment and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6233608B1 (en) * | 1997-12-09 | 2001-05-15 | Openwave Systems Inc. | Method and system for securely interacting with managed data from multiple devices |
US6779033B1 (en) * | 2000-12-28 | 2004-08-17 | Networks Associates Technology, Inc. | System and method for transacting a validated application session in a networked computing environment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US7366900B2 (en) * | 1997-02-12 | 2008-04-29 | Verizon Laboratories, Inc. | Platform-neutral system and method for providing secure remote operations over an insecure computer network |
US6148405A (en) * | 1997-11-10 | 2000-11-14 | Phone.Com, Inc. | Method and system for secure lightweight transactions in wireless data networks |
US6199113B1 (en) * | 1998-04-15 | 2001-03-06 | Sun Microsystems, Inc. | Apparatus and method for providing trusted network security |
US6081900A (en) * | 1999-03-16 | 2000-06-27 | Novell, Inc. | Secure intranet access |
CA2370471A1 (en) * | 1999-04-09 | 2000-10-19 | General Instrument Corporation | Built-in manufacturer's certificates for a cable telephony adapter to provide device and service certification |
US6742126B1 (en) * | 1999-10-07 | 2004-05-25 | Cisco Technology, Inc. | Method and apparatus for identifying a data communications session |
WO2001067708A2 (en) * | 2000-03-07 | 2001-09-13 | General Instrument Corporation | Authenticated dynamic address assignment |
AU2001271302A1 (en) * | 2000-06-12 | 2001-12-24 | Zendit | Encryption system that dynamically locates keys |
US7512792B2 (en) * | 2005-12-15 | 2009-03-31 | International Business Machines Corporation | Reference monitor method for enforcing information flow policies |
-
2001
- 2001-03-26 US US09/818,082 patent/US8555062B1/en active Active
-
2013
- 2013-10-08 US US14/048,420 patent/US20140040986A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6233608B1 (en) * | 1997-12-09 | 2001-05-15 | Openwave Systems Inc. | Method and system for securely interacting with managed data from multiple devices |
US6779033B1 (en) * | 2000-12-28 | 2004-08-17 | Networks Associates Technology, Inc. | System and method for transacting a validated application session in a networked computing environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111163097A (en) * | 2019-12-31 | 2020-05-15 | 新浪网技术(中国)有限公司 | Web application firewall implementation system and method |
CN113098880A (en) * | 2021-04-06 | 2021-07-09 | 杭州和利时自动化有限公司 | Method, system, equipment and readable storage medium for identifying replay attack |
Also Published As
Publication number | Publication date |
---|---|
US8555062B1 (en) | 2013-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6804699B1 (en) | Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server | |
US20140040986A1 (en) | Protocol to Prevent Replay Attacks on Secured Wireless Transactions | |
US6982728B1 (en) | Portable electronic system having multiple display modes for reorienting the display of data on a display screen | |
US8010798B1 (en) | Handheld computer system configured to authenticate a user and power-up in response to a single action by the user | |
US8353002B2 (en) | Chaining information card selectors | |
CN100362786C (en) | Method and apparatus for executing secure data transfer in wireless network | |
US7142194B1 (en) | Segmented keyboard for portable computer system | |
CN1832472B (en) | Message exchange protocol extension negotiation | |
US20080032673A1 (en) | Method and apparatus for selective and automatic two-way beaming of related information to and from personal information management systems | |
US20030065952A1 (en) | Authentication system using device address to verify authenticity of terminal | |
JP2003108519A (en) | File transfer system and program | |
US20070143615A1 (en) | Method of generating a pin code based on target device class in wireless device pairing | |
JP2002361984A (en) | Printer and its controlling method, print system, program, and storage medium | |
US7870290B2 (en) | Handheld computer system that attempts to establish an alternative network link upon failing to establish a requested network link | |
US6970418B1 (en) | Swapping a nonoperational networked electronic system for an operational networked electronic system | |
US8416705B2 (en) | User profile or user account association with multiple computers | |
US20050220060A1 (en) | Inter-terminal information transfer system | |
US20090100149A1 (en) | Method and system for using tokens to conduct file sharing transactions between handhelds and a web service | |
JP2006174383A (en) | Radio information terminal | |
Berger et al. | Using symbiotic displays to view sensitive information in public | |
JP2009017294A (en) | Information processing system and information processing method | |
EP1351466B1 (en) | A method of exchanging secured data through a network | |
JP2000286957A (en) | Information processor and medium | |
JP2010020440A (en) | Automated teller machine, portable terminal, automated teller system, automated teller machine data input method, and program | |
KR100420771B1 (en) | Method for the wireless billing using Bluetooth |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |