APPARATUS AND METHOD FOR CRYPTOGRAPHIC OPERATIONS USING ENHANCED KNOWLEDGE FACTOR CREDENTIALS
20170063393 ยท 2017-03-02
Inventors
Cpc classification
G06F3/04886
PHYSICS
G06F21/46
PHYSICS
International classification
H04L9/06
ELECTRICITY
G06F3/023
PHYSICS
Abstract
Provided is a process that includes: obtaining a multi-byte character set specifying a plurality of characters; receiving a knowledge factor credential encoded with a plurality of characters of the multi-byte character set, wherein the knowledge factor credential has a longer effective length than an apparent length, and wherein the knowledge factor credential has at least one character outside of a block of characters designated for a locale of the computing device; and providing the knowledge factor credential to authenticate a user.
Claims
1. A method, comprising: receiving, with one or more processors, a first key code identifying a key on a keyboard selected by a user; accessing, with one or more processors, a data set that maps key codes to multi-byte characters, at least some of the key codes being uniquely mapped to multi-byte characters; determining, with one or more processors, the mapping between the first key code and a first multi-byte character in the data set; and adding, with one or more processors, the first multi-byte character to a sequence of bytes representing key presses on the keyboard by the user.
2. The method of claim 1, wherein the keyboard is a physical keyboard.
3. The method of claim 2, wherein the multi-byte characters are Unicode characters.
4. The method of claim 1, wherein the keyboard is a virtual keyboard.
5. The method of claim 4, wherein the multi-byte characters are Unicode characters.
6. The method of claim 5, comprising mapping keys of the keyboard to include members of at least three different Unicode code blocks in the course of obtaining the sequence of bytes.
7. The method of claim 1, wherein the first multi-byte character is a composed grapheme cluster having at least one base character and at least one diacritical mark.
8. A method, comprising: receiving, with one or more processors, a request for a user interface by which typographic characters are to be entered; causing, with one or more processors, the user interface to be displayed on a first display screen; receiving, with one or more processors, a first keypress event specifying a key on a keyboard pressed by a user; accessing, with one or more processors, a data set that maps typographic characters to codes, at least some of the characters being uniquely mapped to codes specifying a plurality of bytes; determining, with one or more processors, a mapping between the specified key and a given typographic character or given code in the data set, the given typographic character being mapped to the given code, and the given code specifying a given plurality of bytes in the data set; and appending or prepending, with one or more processors, the given plurality of bytes to a sequence of bytes specified by the user via keypresses on the keyboard input to the user interface.
9. The method of claim 8, wherein: the user interface is a log-in screen by which the user enters one or more credentials; the data set specifies more than 128 multi-byte typographic characters, at least some of the typographic characters corresponding to non-verbal graphical icons; the keyboard is non-virtual, physical keyboard having an array of keys having respective switches and biased by respective resilient members; the method comprises, until an input submission command is received, repeatedly receiving keypress events, determining mappings between pressed keys and typographic characters or corresponding codes, and appending multi-byte sequences mapped to the corresponding codes to the sequence of bytes; at least some selected typographic characters are composed characters having a base character and two or more diacritical marks; and after the input submission command is received, performing steps for transforming the sequence of bytes into an authentication token.
10. The method of claim 8, comprising: causing a second user interface to be displayed, the second user interface being displayed on a second display screen separate from the first display screen, the second user interface displaying the given typographic character and receiving a force applied by the user to press the key on the keyboard, the force being received adjacent or at a location on the second display screen where the given typographic character is displayed.
11. The method of claim 10, wherein the second display screen is a touchscreen connected to the first display with one degree of freedom, and wherein the second user interface comprises a virtual keyboard.
12. The method of claim 10, wherein the second display screen is positioned to display the given typographic character through a surface of a physical keyboard key upon which the user presses to select the given typographic character.
13. The method of claim 12, comprising: receiving the keypress even via one of a plurality of physical keys of the keyboard disposed such that one or more one display screens dynamically change typographic characters displayed through a surface of the physical keys that are pressed by a user to select the typographic characters.
14. The method of claim 8, comprising: after receiving the first keypress event, changing a mapping between at least some keys of the keyboard and typographic characters in the data set.
15. The method of claim 14, wherein changing the mapping comprises: automatically mapping one key of the keyboard to a next character of a user credential after the given typographic character in the user credential is received; and changing a mapping of a plurality of other keys of the keyboard to other typographic characters.
16. The method of claim 14 wherein changing the mapping comprises: mapping a combination of keys of the keyboard to a next character of a user credential after the given typographic character in the user credential.
17. The method of claim 14, wherein changing the mapping comprises: causing a second display screen to display the next character of a user credential after the given typographic character in the user credential is received.
18. The method of claim 8, comprising: dynamically changing mappings between at least some keys of the keyboard and different subsets of the typographic characters in the data set at least twice in a sequence of keypresses to enter a password of the user in the user interface.
19. The method of claim 18, wherein dynamically changing mappings comprises: changing the mappings to include different subsets of previously designated typographic characters selected by the user.
20. The method of claim 19, wherein he previously designated typographic characters include composed Unicode characters.
21. The method of claim 8, comprising: providing an application accessible on a computing device on which the user interface is displayed, wherein the method comprises determining that the user is authorized to access the application based on the sequence of bytes specified by the user via keypresses on the keyboard input to the user interface.
22. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising: receiving, with one or more processors, a first key code identifying a key on a keyboard selected by a user; accessing, with one or more processors, a data set that maps key codes to multi-byte characters, at least some of the key codes being uniquely mapped to multi-byte characters; determining, with one or more processors, the mapping between the first key code and a first multi-byte character in the data set; and adding, with one or more processors, the first multi-byte character to a sequence of bytes representing key presses on the keyboard by the user.
23. The medium of claim 22, wherein the keyboard is a physical keyboard.
24. The medium of claim 23, wherein the multi-byte characters are Unicode characters.
25. The medium of claim 22, wherein the keyboard is a virtual keyboard.
26. The medium of claim 25, wherein the multi-byte characters are Unicode characters.
27. The medium of claim 26, the operations comprising mapping keys of the keyboard to include members of at least three different Unicode code blocks in the course of obtaining the sequence of bytes.
28. The medium of claim 22, wherein the first multi-byte character is a composed grapheme cluster having at least one base character and at least one diacritical mark.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0032] The above-mentioned aspects and other aspects of the present techniques will be better understood when the present application is read in view of the following figures in which like numbers indicate similar or identical elements:
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053] While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. The drawings may not be to scale. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.
DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS
[0054] To mitigate the problems described herein, the inventor had to both invent solutions and, in some cases just as importantly, recognize problems overlooked (or not yet foreseen) by others in the fields of computer and network security. Indeed, the inventor wishes to emphasize the difficulty of recognizing those problems that are nascent and will become much more apparent in the future should trends in industry continue as the inventor expects. Further, because multiple problems are addressed, it should be understood that some embodiments are problem-specific, and not all embodiments address every problem with traditional systems described herein or provide every benefit described herein. That said, improvements that solve various permutations of these problems are described below.
[0055] The present invention solves one of the most challenging problems in computer security: how to strengthen credential-based security systems sufficiently to withstand the myriad attacks today, while simultaneously facilitating a user's ability to memorize a unique credential, or set of credentials, for every system requiring one or more credentials. It has proven to be an elusive goal until the advent of the invention disclosed herein. The Unicode character set is advantageously used as the source of characters and character sequences (e.g., grapheme clusters) for the enhanced security operations of the invention, but other multi-byte character sets can be used in place of Unicode. Unicode has several benefits over other known multi-byte character sets. For example, Unicode is the most universally and widely adopted character set worldwide, and is the native character encoding system for major operating system vendors Microsoft Corporation and Apple Inc. Unicode is also the default string encoding for the Java and C# programming languages, and is supported in every modern programming language. Moreover, Unicode evolves and expands with each release, while the code points from previous versions remain stable. Once a code point is added to the Unicode repertoire, it is permanent, though occasionally code points are deprecated. Another key advantage of Unicode is the formalized definitions of canonical equivalence and normalization forms, which guarantee that regardless of the platform, architecture, or operating system of devices compliant with the same version of the Unicode Standard will create the same Unicode string from the same sequence of encoded glyphs.
[0056] Enhanced credentials formed in accordance with the invention disclosed herein have two defining metrics: apparent length (in number of graphemes or user-perceived characters) and effective length, the length of the encoded token formed from the credential in bytes. The ideal knowledge factor credential has a low apparent length, for ease of memorization, and a high effective length, for strength and concomitant resistance to brute force, rainbow table, and other attacks. Whereas conventional credentials generally have the same apparent and effective lengths because they contain only 8-bit encoded characters, the enhanced credentials associated with the invention have an effective length much greater than their apparent length.
[0057]
[0058] The effective length of this one grapheme cluster 301 in any of these three CEFs greatly exceeds the length (in bytes) of virtually all conventional passwords in use today. Because of the shortcomings in the prior art, there is no distinction between the apparent and effective length of a conventional credential because they are generally identical. In contrast, there are effectively two credentials formed in accordance with the invention: the credential apparent to the user, and the encoded token created by the method of the invention, which is preferably input to one or more cryptographic functions.
[0059] The exemplary grapheme cluster in
[0060] A concomitant advantage of the use of grapheme clusters and composed character sequences in the invention is that each grapheme cluster is a sequence of highly correlated bytes with zero correlation to surrounding characters or grapheme clusters. This is advantageous because moving a grapheme cluster even one user-perceived position in the credential results in the movement of the entire sequence of bytes encoding the grapheme cluster. For example, if the single grapheme cluster illustrated in
[0061] These advantages, it should be noted, are not all offered by all embodiments. The various inventions described herein are independently useful. For instance, some use cases do not use emojis (e.g., by composing a grapheme cluster from characters from several blocks). In another example, some use cases do not use grapheme clusters, as uncomposed characters from a large set of characters can expand the search space for brute force password attacks sufficiently in some implementations.
[0062] In accordance with some embodiments, there are a variety of ways that a user can select Unicode characters, including individual code points, combining character sequences, and grapheme clusters. In one aspect of the invention, the user selects Unicode characters from a keyboard attached to, in wireless communication with, or integral to the user's device. For example, the user can select one or more Unicode characters from a display-based keyboard, sometimes called a soft or software-driven keyboard that is rendered on the device's display. In this embodiment, the user selects one or more Unicode characters from the displayed keyboard using a pointing device such as a mouse or trackpad, or the user's finger or a stylus in the case of a touch-sensitive display, each of which is referred to as a pointing device herein. In a variant of this embodiment, the device has two or more keyboards from which one or more Unicode characters can be selected, particularly from different Unicode blocks mapped to different locales. For example, a keyboard for the U.S. English locale will be mapped to the Basic Latin Unicode block (U+0000-007F), whereas a keyboard for the Ukrainian locale will be mapped to the Cyrillic Unicode block (U+0400-04FF).
[0063] In some embodiments, the invention provides the user with the ability to select one or more Unicode characters from a displayed set of Unicode characters, which can include individual code points, combining character sequences, and grapheme clusters from any block defined in the Unicode Standard. In these embodiments, depicted by way of an example in
[0064] As depicted in
[0065] In some cases, the user interface functionality described with reference graphical user interfaces may be provided by process executing on a computing device, for instance a mobile computing device, an embedded computing device, or a desktop computing device, like those described below with reference to
[0066] It should be appreciated by those skilled in the art that
[0067] In one of the embodiments of the invention, the user may optionally (which is not to imply that other features are not also optional) select a subset of Unicode characters and grapheme clusters from one or more Unicode blocks to thereby create a user-defined set of characters. The user can more efficiently select the characters in his or her enhanced credential by using the user-defined set, while still maintaining a high level of security. Even if an interloper gains access to the user-defined set, there are a sufficiently large number of characters and grapheme clusters contained in the set, e.g., at least 256, such that mounting a brute-force attack is still computationally infeasible.
[0068] In some embodiments consistent with a user interface depicted by
[0069] In some embodiments, the invention provides a user interface from which the user selects a base character from any Unicode block, such as (U+02A0, LATIN SMALL LETTER Q WITH HOOK), and then selects one or more Unicode combining marks, such as diacritical marks, to compose a new grapheme cluster. As long as the resulting grapheme cluster is a valid Unicode character sequence, it is of no consequence that the resulting glyph image is not actually used in any writing system, in some embodiments. Indeed, if the composed grapheme cluster is not used in any known script, it is far stronger from a security standpoint, because an attacker would be unlikely to include such a character sequence in a brute-force attack.
[0070] (U+02A0, LATIN SMALL LETTER Q WITH HOOK) is the base character joined with combining diacritical marks (U+030A, COMBINING RING ABOVE) and (U+031C, COMBINING LEFT HALF RING BELOW). The three code points in this exemplary grapheme cluster are shown graphically in row 602, each of which is a separate glyph that are rendered together as glyph 601. Importantly for this embodiment, the grapheme cluster in
[0071]
[0072] When the user has finished composing the grapheme cluster, the user presses Save button (key) 706, which saves the grapheme cluster to the user-defined character set, and appends the grapheme cluster to credential input field 403, thereby selecting the character. Nearly all of the 120,000+ graphic characters defined in Unicode are usable as base characters in grapheme clusters (including, numbers, symbols, pictographs and emojis), and there are more than 150 combining diacritical marks defined in Unicode, resulting in an extremely large number of permutations that can be created by the grapheme composer of the invention. It should be appreciated by those of skill in the art that there is a practical limit to the number and type of combining marks that can be combined with a base character in the grapheme composer; generally one combining mark above the base character and one below, in order for the grapheme cluster to be rendered as a glyph image correctly. In some embodiments, multiple instances of the same combining mark in a composed grapheme cluster are either superimposed or partially overlapping when rendered, which is advantageous because it obfuscates the exact makeup of the composed grapheme cluster. In one embodiment the grapheme composer permits the selection of only the maximum number of each type of combining mark that can be correctly rendered. Since the primary object of the grapheme composer is enhancing the security of the credential-based security system, however, in another embodiment the grapheme composer permits the user to select any number of unique combining marks to be joined with a base character. In yet another embodiment, the grapheme composer facilitates the selection of any number of combining marks, including multiple identical combining marks, which are permitted by the Unicode standard and enhance the strength of the enhanced credential. The number of supported characters may be selected based on tradeoffs between ease of user selection of characters and the desired strength of passwords, the ease of user selection tradeoffs being made less severe by some embodiments of the user interfaces described herein.
[0073] In certain embodiments, a composed grapheme cluster is rendered and displayed such that all combining marks are visible while it is being composed and after it is saved within the user-defined character set. In other embodiments, a composed grapheme cluster is rendered and displayed such that fewer than all constituent combining marks are visible in order to obfuscate the exact makeup of the composed grapheme cluster, to prevent an interloper from determining the constituent code points of the composed grapheme cluster. While it is important in some use cases to store a composed grapheme cluster precisely as it was composed, the only requirement in such embodiments from a display perspective is that the user be able to unambiguously identify a particular composed grapheme cluster among other characters in the user-defined character set. Thus, each composed grapheme cluster within the user-defined character set can be rendered with variations on different platforms and/or operating systems and remain within the scope of the invention, which is not to suggest that any other feature may not also be varied.
[0074] In some embodiments consistent with an example user interface of
[0075]
[0076] Another advantage of some embodiments of the invention is the ease of creating enhanced credentials incorporating homographs, i.e., characters in different blocks that have the same glyphs. For example, AB (U+0041, U+0042) in Latin and AB (U+0391, U+0392) in Greek are visually indistinguishable, but are encoded distinctly. Thus, an enhanced credential in accordance with the invention can advantageously use characters from different scripts with the same or nearly the same glyph image, as a safeguard against eavesdroppers and to increase the entropy of the enhanced credential. As another example, the Cyrillic characters M (U+041C) and H (U+041D) are indistinguishable from Latin characters M (U+004D) and H (U+0048). Ideally, an enhanced credential formed in accordance with the invention uses few characters from the Basic Latin block (U+0000-007F), which maps to the ASCII encodings. In one embodiment of the invention, a plurality of uppercase and lowercase homograph characters are displayed in credential input user interface 400 for the user to select in place of characters in the user's native script, e.g., the Latin characters in the Basic Latin block. In another embodiment, credential input user interface 400 indicates which grapheme clusters are optimally used for the enhanced credential based on the effective length of the grapheme cluster, the entropy of the grapheme cluster, or any other reason. For example, in this embodiment credential input user interface 400 can identify the family emoji 301 in
[0077] Yet another advantage of some embodiments of the invention is the user's ability to choose not only any arbitrary graphic character, but also to use any of the many spacing marks, some of which produce very subtle spacing between characters and grapheme clusters, each of which are Unicode code points. Of the 25 spacing marks in the Unicode character set, most produce horizontal spacing, and several produce vertical spacing. The horizontal spacing marks are preferably used in the enhanced credentials of the invention. For example, in addition to the common SPACE (U+0020), NO-BREAK SPACE (U+00A0), which is the same as SPACE except that it prevents a line break where used, EN SPACE (U+2002), and EM SPACE (U+2003) are usable in enhanced credentials. Several spacing marks are virtually invisible when used and are thus advantageously used, such as PUNCTUATION SPACE (U+2008), which is the width of a period, THIN SPACE (U+2009), and HAIR SPACE (U+200A). The invention also permits the user to select and include one or more non-spacing marks in the enhanced credential. Such non-spacing marks include ZERO WIDTH SPACE (U+200B), ZERO WIDTH NON JOINER (U+200C), ZERO WIDTH JOINER (U+200D) and WORD JOINER (U+2060). These non-spacing marks are advantageously used in the enhanced credential of the invention because they are not visible, and are thus visually undetectable by an eavesdropper. Although not depicted in
[0078] In another embodiment, the invention does not use a separate user interface, such as the exemplary user interfaces depicted in
[0079] In yet another embodiment, the invention displays one or more Unicode characters and/or composed grapheme clusters on the keys of a physical keyboard or virtual keyboard. For example, keyboards with electrophoretic ink (also known as e ink) keys are able to dynamically change the character(s) displayed on individual keys. Some embodiments may include other types of displays, like OLED displays on each key. Thus, an electrophoretic ink keyboard can display one or more characters from the user-defined character set, allowing the user to select multi-byte characters in accordance with the teachings of the invention. Moreover, such an electrophoretic keyboard could display any block of Unicode characters, permitting the user to use any arbitrary Unicode character or composed grapheme cluster in his or her enhanced credential, as taught herein. In some cases, the keys are mechanical keys, each having a resilient member, a switch, and a cap having a display upon which the user presses to bias the resilient member and close the switch to register a keystroke. In other cases, the keys are regions on a display, such as a display connected to a primary display via a hinge in a clamshell design of a dual-display notebook computer, or keys on a touchscreen of a single-display notebook computer or tablet computer. In the case of virtual or soft keyboards shown on the screen of a device, Unicode characters or composed grapheme clusters can be displayed on one or more keys to facilitate selection by the user in accordance with the teachings herein. In some cases, the displayed characters on keys in the keyboard may be changed responsive to the user requesting an interface to input credentials. In some cases, the displayed characters may be selected based on biometric recognition of the user (e.g., with face classification via a webcam or a finger print scan), and different users may be presented with different displayed characters on the keyboard.
[0080] Some embodiments change the displayed characters on the keyboard during entry of the credential. For instance, some embodiments may display a first set of characters (e.g., more than 5, or more than 26) before the user enters a first character of a credential, and one of the displayed characters may be the correct character of the credential. After the user enters the first character, in response, some embodiments may change the characters displayed on at least some of the keys, e.g., before the user presses a subsequent key. In some cases, this process may repeat after each keypress to lower the user's cognitive load when selecting among a relatively large universe of candidate characters.
[0081] Once the enhanced credential has been entered into credential input field 403, in some embodiments, the user submits the enhanced credential for transformation into an encoded token that is subsequently input to one or more cryptographic operations in the security system of the invention. There are several possible ways that the Unicode characters selected by the user for his or her enhanced credential can be represented within the data buffer associated with credential input field 403. In some cases, the representation of the characters in the enhanced credential depends upon the operating system of the user's device performing the security process. For example, the Microsoft Windows and Apple OS X operating systems natively use Unicode strings encoded with the UTF-16 CEF. Therefore, when the enhanced security method of the invention is practiced on those operating systems, the default Unicode character encoding form will likely be UTF-16. In certain embodiments, the enhanced security system of the invention determines the encoding scheme for the Unicode characters selected by the user for the enhanced credential, which can be UTF-8, UTF-16, UTF-32 or a proprietary scheme. UTF-8 was designed to encode code points from U+0000 to U+007F (ASCII characters) using only one code unit ranging from 0x00 to 7F, but at the expense of not using those values for other code point encodings. Thus, UTF-8 tends to skew the code unit values in a manner that makes its use in the invention use less preferred because Unicode strings encoded with UTF-8 tend to have less entropy than other CEFs. Although UTF-16 is the native CEF in several major operating systems, it not ideal for the transformation stage of the invention to the extent there are surrogate pairs in the enhanced credential, because the system must calculate the value of each code point represented by a surrogate pair. Of the three CEFs defined in Unicode, UTF-32 is preferred for the transformation stage because each code point is directly encoded in a single code unit, regardless of the code point's plane, which requires no decoding or calculation by the system to determine the code point value. In certain embodiments, the proprietary encoding scheme uses code units of 8, 16, 32, 64 or another number of bits, but with a different character encoding form than employed by UTF-8, UTF-16, or UTF-32. It should be appreciated by those skilled in the art that other character encoding forms are usable while remaining within the spirit and scope of the invention.
[0082] The primary objective of the present invention is to greatly increase the strength of the encoded tokens formed in accordance with the inventive concepts herein. This objective is met not only by the significant increase in the effective length of encoded tokens compared with conventional credentials, but also by maximizing the entropy of the encoded tokens by ensuring that the value of each byte in the token can be any of the 256 possible values (0x00-FF) or nearly so, such that the probability of any of those values occurring in a given byte is approximately equal. In one embodiment, the method of the invention furthers the objectives described above by potentially lengthening the Unicode string entered by the user by performing Unicode Normalization Form D (NFD) to each user-perceived character in the string, which can be a single code point, grapheme cluster, or combining character sequence. NFD performs a canonical decomposition of each user-perceived character in the Unicode string by expanding it into its decomposed character components, and placing any combining marks into a well-defined order. Thus, if a user selects (U+0005, LATIN CAPITAL LETTER A WITH A RING ABOVE or its equivalent, U+212B, ANGSTROM SIGN) as one of the characters in the enhanced credential, NFD will replace the single code point with a combining sequence of two code points: U+0041 (LATIN CAPITAL LETTER A) followed by U+030A (COMBINING RING ABOVE), a combining diacritical mark. There are two benefits to the invention of normalizing with NFD. First, NFD will create canonically-equivalent, well-ordered sequences of code points identically on any platform that is compliant with the Unicode Standard. Second, the code point sequences formed by NFD will be the maximal length canonically-equivalent sequence, furthering one of the central goals of the invention, to create an encoded token with the maximum effective length. In another embodiment, Normalization Form C (NFC), which results in the most composed and therefore compact canonically-equivalent sequence of code points, is used instead of NFD. Other embodiments of the invention use either Normalization Form KC (NFKC) or Normalization Form KD (NFKD). In yet another embodiment of the invention, no normalization is performed on the Unicode string entered by the user.
[0083] Following normalization, the normalized Unicode string is encoded using a character encoding scheme (CES). Any of the seven CES schemes defined in Unicode (UTF-8, UTF-16, UTF-16BE, UTF-16LE, UTF-32, UTF-32BE, and UTF-32LE) or a proprietary CES may be used in the invention. For example, in one embodiment a proprietary encoding scheme of some embodiments, called Uni-24 herein, uses 8-bit code units. In Uni-24, each Unicode code point is encoded using three code units, where the first code unit encodes the plane number (0-16), ranging from 0x01 (plane 0) to FF (plane 16), the second code unit contains the high order byte of the 16-bit value of the code point within the plane, and the third code unit contains the low-order byte of the 16-bit value. Thus, the values in the second and third code units range from 0x00 to FF, furthering one of the objectives of the invention. In this scheme any Unicode code point can be efficiently encoded in 24 bits. A benefit of Uni-24 is that it is unaffected by the endianness of the platform because it is not a multi-byte encoding, and therefore does not require a byte order mark (BOM) when serialized into a byte stream. In another embodiment, a proprietary encoding scheme defined in the invention, called Uni-32 herein, uses 16-bit code units, but unlike UTF-16, does not encode Unicode code points in the supplementary planes with surrogate pairs. Instead, the Uni-32 embodiment encodes the plane of the Unicode code point (0-16) in the first of two 16-bit code units, ranging from 0x01FE (plane 0) to FFFE (plane 16), and the lower-order 16 bits of the code point in the second 16-bit code unit. Because the lower-order byte in the first code unit is always 0xFE, Uni-32 does not require a byte-order mark to determine the endianness of the encoding scheme, because 0xFE never occurs in the higher-order byte of the first code unit of Uni-32. In this scheme, any Unicode code point is encoded in 32 bits, which increases the effective length of the encoded token, without the zero-value high-order bytes prevalent in UTF-32, UTF-32BE, and UTF-32LE encodings that decrease the entropy of the token. Table 1000 in
[0084]
[0085] Those skilled in the art should appreciate that if the exemplary enhanced credential 1101 in
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093] The computing steps divided above may be performed by a single computing device, or may be distributed among multiple such devices in some embodiments. For instance, steps 1200-1204 of
[0094]
[0095] Computing system 1900 may include one or more processors (e.g., processors 1910a-1910n) coupled to system memory 1920, an input/output I/O device interface 1930, and a network interface 1940 via an input/output (I/O) interface 1950. A processor may include a single processor or a plurality of processors (e.g., distributed processors). A processor may be any suitable processor capable of executing or otherwise performing instructions. A processor may include a central processing unit (CPU) that carries out program instructions to perform the arithmetical, logical, and input/output operations of computing system 1900. A processor may execute code (e.g., processor firmware, a protocol stack, a database management system, an operating system, or a combination thereof) that creates an execution environment for program instructions. A processor may include a programmable processor. A processor may include general or special purpose microprocessors. A processor may receive instructions and data from a memory (e.g., system memory 1920). Computing system 1900 may be a uni-processor system including one processor (e.g., processor 1910a), or a multi-processor system including any number of suitable processors (e.g., 1910a-1910n). Multiple processors may be employed to provide for parallel or sequential execution of one or more portions of the techniques described herein. Processes, such as logic flows, described herein may be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating corresponding output. Processes described herein may be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit). Computing system 1900 may include a plurality of computing devices (e.g., distributed computer systems) to implement various processing functions.
[0096] I/O device interface 1930 may provide an interface for connection of one or more I/O devices 1960 to computer system 1900. I/O devices may include devices that receive input (e.g., from a user) or output information (e.g., to a user). I/O devices 1960 may include, for example, graphical user interface presented on displays (e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor), pointing devices (e.g., a computer mouse or trackball), keyboards, keypads, touchpads, scanning devices, voice recognition devices, gesture recognition devices, printers, audio speakers, microphones, cameras, or the like. I/O devices 1960 may be connected to computer system 1900 through a wired or wireless connection. I/O devices 1960 may be connected to computer system 1900 from a remote location. I/O devices 1960 located on remote computer system, for example, may be connected to computer system 1900 via a network and network interface 1940.
[0097] Network interface 1940 may include a network adapter that provides for connection of computer system 1900 to a network. Network interface 1940 may facilitate data exchange between computer system 1900 and other devices connected to the network. Network interface 1940 may support wired and/or wireless communication. The network may include an electronic communication network, such as the Internet, a local area network (LAN), a personal area network (PAN), a near field communication network (NFC), a wide area network (WAN), a cellular communications network, or the like.
[0098] System memory 1920 may be configured to store program instructions 1920a or data 1920b. Program instructions 1920a may be executable by a processor (e.g., one or more of processors 1910a-1910n) to implement one or more embodiments of the present techniques. Instructions 1920a may include modules of computer program instructions for implementing one or more techniques described herein with regard to various processing modules. Program instructions may include a computer program (which in certain forms is known as a program, application, software, software application, applet, plug-in, script, or code). A computer program may be written in a programming language, including compiled or interpreted languages, or declarative or procedural languages. A computer program may include a unit suitable for use in a computing environment, including as a stand-alone program, a module, a component, or a subroutine. A computer program may or may not correspond to a file in a file system. A program may be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program may be deployed to be executed on one or more computer processors located locally at one site or distributed across multiple remote sites and interconnected by a communication network.
[0099] System memory 1920 may include a tangible program carrier having program instructions stored thereon. A tangible program carrier may include a non-transitory computer readable storage medium. A non-transitory computer readable storage medium may include a machine readable storage device, a machine readable storage substrate, a memory device, or any combination thereof. Non-transitory computer readable storage medium may include non-volatile memory (e.g., flash memory, ROM, PROM, EPROM, EEPROM memory), volatile memory (e.g., random access memory (RAM), static random access memory (SRAM), synchronous dynamic RAM (SDRAM)), bulk storage memory (e.g., CD-ROM and/or DVD-ROM, hard-drives), or the like. System memory 1920 may include a non-transitory computer readable storage medium that may have program instructions stored thereon that are executable by a computer processor (e.g., one or more of processors 1910a-1910n) to cause the subject matter and the functional operations described herein. A memory (e.g., system memory 1920) may include a single memory device and/or a plurality of memory devices (e.g., distributed memory devices).
[0100] I/O interface 1950 may be configured to coordinate I/O traffic between processors 1910a-1910n, system memory 1920, network interface 1940, I/O devices 1960, and/or other peripheral devices. I/O interface 1950 may perform protocol, timing, or other data transformations to convert data signals from one component (e.g., system memory 1920) into a format suitable for use by another component (e.g., processors 1910a-1910n). I/O interface 1950 may include support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard.
[0101] Embodiments of the techniques described herein may be implemented using a single instance of computer system 1900 or multiple computer systems 1900 configured to host different portions or instances of embodiments. Multiple computer systems 1900 may provide for parallel or sequential processing/execution of one or more portions of the techniques described herein.
[0102] Those skilled in the art will appreciate that computer system 1900 is merely illustrative and is not intended to limit the scope of the techniques described herein. Computer system 1900 may include any combination of devices or software that may perform or otherwise provide for the performance of the techniques described herein. For example, computer system 1900 may include or be a combination of a cloud-computing system, a data center, a server rack, a server, a virtual server, a desktop computer, a laptop computer, a tablet computer, a server device, a client device, a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a vehicle-mounted computer, or a Global Positioning System (GPS), or the like. Computer system 1900 may also be connected to other devices that are not illustrated, or may operate as a stand-alone system. In addition, the functionality provided by the illustrated components may in some embodiments be combined in fewer components or distributed in additional components. Similarly, in some embodiments, the functionality of some of the illustrated components may not be provided or other additional functionality may be available.
[0103]
[0104] Those skilled in the art will also appreciate that while various items are illustrated as being stored in memory or on storage while being used, these items or portions of them may be transferred between memory and other storage devices for purposes of memory management and data integrity. Alternatively, in other embodiments some or all of the software components may execute in memory on another device and communicate with the illustrated computer system via inter-computer communication. Some or all of the system components or data structures may also be stored (e.g., as instructions or structured data) on a computer-accessible medium or a portable article to be read by an appropriate drive, various examples of which are described above. In some embodiments, instructions stored on a computer-accessible medium separate from computer system 1900 may be transmitted to computer system 1900 via transmission media or signals such as electrical, electromagnetic, or digital signals, conveyed via a communication medium such as a network or a wireless link. Various embodiments may further include receiving, sending, or storing instructions or data implemented in accordance with the foregoing description upon a computer-accessible medium. Accordingly, the present invention may be practiced with other computer system configurations.
[0105] In block diagrams, illustrated components are depicted as discrete functional blocks, but embodiments are not limited to systems in which the functionality described herein is organized as illustrated. The functionality provided by each of the components may be provided by software or hardware modules that are differently organized than is presently depicted, for example such software or hardware may be intermingled, conjoined, replicated, broken up, distributed (e.g. within a data center or geographically), or otherwise differently organized. The functionality described herein may be provided by one or more processors of one or more computers executing code stored on a tangible, non-transitory, machine readable medium. In some cases, third party content delivery networks may host some or all of the information conveyed over networks, in which case, to the extent information (e.g., content) is said to be supplied or otherwise provided, the information may be provided by sending instructions to retrieve that information from a content delivery network.
[0106] The reader should appreciate that the present application describes several inventions. Rather than separating those inventions into multiple isolated patent applications, applicant has grouped these inventions into a single document because their related subject matter lends itself to economies in the application process. But the distinct advantages and aspects of such inventions should not be conflated. In some cases, embodiments address all of the deficiencies noted herein, but it should be understood that the inventions are independently useful, and some embodiments address only a subset of such problems or offer other, unmentioned benefits that will be apparent to those of skill in the art reviewing the present disclosure. Due to cost constraints, some inventions disclosed herein may not be presently claimed and may be claimed in later filings, such as continuation applications or by amending the present claims. Similarly, due to space constraints, neither the Abstract nor the Summary of the Invention sections of the present document should be taken as containing a comprehensive listing of all such inventions or all aspects of such inventions.
[0107] It should be understood that the description and the drawings are not intended to limit the invention to the particular form disclosed, but to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. Further modifications and alternative embodiments of various aspects of the invention will be apparent to those skilled in the art in view of this description. Accordingly, this description and the drawings are to be construed as illustrative only and are for the purpose of teaching those skilled in the art the general manner of carrying out the invention. It is to be understood that the forms of the invention shown and described herein are to be taken as examples of embodiments. Elements and materials may be substituted for those illustrated and described herein, parts and processes may be reversed or omitted, and certain features of the invention may be utilized independently, all as would be apparent to one skilled in the art after having the benefit of this description of the invention. Changes may be made in the elements described herein without departing from the spirit and scope of the invention as described in the following claims. Headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description.
[0108] As used throughout this application, the word may is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). The words include, including, and includes and the like mean including, but not limited to. As used throughout this application, the singular forms a, an, and the include plural referents unless the content explicitly indicates otherwise. Thus, for example, reference to an element or a element includes a combination of two or more elements, notwithstanding use of other terms and phrases for one or more elements, such as one or more. The term or is, unless indicated otherwise, non-exclusive, i.e., encompassing both and and or. Terms describing conditional relationships, e.g., in response to X, Y, upon X, Y,, if X, Y, when X, Y, and the like, encompass causal relationships in which the antecedent is a necessary causal condition, the antecedent is a sufficient causal condition, or the antecedent is a contributory causal condition of the consequent, e.g., state X occurs upon condition Y obtaining is generic to X occurs solely upon Y and X occurs upon Y and Z. Such conditional relationships are not limited to consequences that instantly follow the antecedent obtaining, as some consequences may be delayed, and in conditional statements, antecedents are connected to their consequents, e.g., the antecedent is relevant to the likelihood of the consequent occurring. Statements in which a plurality of attributes or functions are mapped to a plurality of objects (e.g., one or more processors performing steps A, B, C, and D) encompasses both all such attributes or functions being mapped to all such objects and subsets of the attributes or functions being mapped to subsets of the attributes or functions (e.g., both all processors each performing steps A-D, and a case in which processor 1 performs step A, processor 2 performs step B and part of step C, and processor 3 performs part of step C and step D), unless otherwise indicated. Further, unless otherwise indicated, statements that one value or action is based on another condition or value encompass both instances in which the condition or value is the sole factor and instances in which the condition or value is one factor among a plurality of factors. Unless otherwise indicated, statements that each instance of some collection have some property should not be read to exclude cases where some otherwise identical or similar members of a larger collection do not have the property, i.e., each does not necessarily mean each and every. Limitations as to sequence of recited steps should not be read into the claims unless explicitly specified, e.g., with explicit language like after performing X, performing Y, in contrast to statements that might be improperly argued to imply sequence limitations, like performing X on items, performing Y on the X'ed items, used for purposes of making claims more readable rather than specifying sequence. Unless specifically stated otherwise, as apparent from the discussion, it is appreciated that throughout this specification discussions utilizing terms such as processing, computing, calculating, determining or the like refer to actions or processes of a specific apparatus, such as a special purpose computer or a similar special purpose electronic processing/computing device.
[0109] The present techniques will be better understood with reference to the following enumerated embodiments:
1. A method, comprising: obtaining, with a computing device, a multi-byte character set specifying a plurality of characters; receiving, with the computing device, a knowledge factor credential encoded with a plurality of characters of the multi-byte character set, wherein the knowledge factor credential has a longer effective length than an apparent length, and wherein the knowledge factor credential has at least one character outside of a block of characters designated for a locale of the computing device; and providing, with the computing device, the knowledge factor credential to authenticate a user.
2. The method of embodiment 1, wherein: the multi-byte character set specifying a plurality of characters is a Unicode character set specifying more than 32,000 characters; receiving a knowledge factor credential comprises: displaying a user interface by which a user is presented more than 32,000 user-selectable characters of the Unicode character set; and receiving at least one character of the knowledge factor credential via the user interface, wherein at least one character of the knowledge factor credential combines a plurality of constituent characters into a single character with code points; providing the knowledge factor credential comprises: transforming the knowledge factor credential into an authentication token; and creating an authentication digest based on the authentication token and at least one other parameter; the method further comprises: comparing the authentication digest to a previously stored authentication digest to authenticate the user.
3. The method of any of embodiments 1-2, wherein receiving the knowledge factor credential comprises: presenting a user interface through which more than 256 characters are selectable; and receiving a user selection of at least one of the more than 256 characters.
4. The method of embodiment 3, wherein presenting a user interface through which more than 256 characters are selectable comprises: presenting a user interface through which more than 1,024 characters are selectable.
5. The method of embodiment 3, wherein presenting a user interface through which more than 256 characters are selectable comprises: presenting a user interface through which more than 4,096 characters are selectable.
6. The method of embodiment 3, wherein presenting a user interface through which more than 256 characters are selectable comprises: presenting a user interface through which more than 32,768 characters are selectable.
7. The method of any of embodiments 1-6, wherein receiving the knowledge factor credential comprises: presenting a user interface by which a single composite character is composed by selecting a plurality of constituent characters; receiving user selections of the constituent characters; and combining the constituent characters into a single character with a plurality of code points, wherein the single character is at least one composite character of the knowledge factor credential.
8. The method of any of embodiments 1-7, wherein receiving the knowledge factor credential comprises: retrieving from memory candidate characters based on a user previously designating the candidate characters; presenting a user interface by which the candidate characters are selectable; and receiving a user selection of at least one of the candidate characters.
9. The method of embodiment 8, wherein presenting a user interface by which the candidate characters are selectable comprises: interspersing the candidate characters among un-designated characters to obfuscate which characters were previously designated.
10. The method of any of embodiments 1-9, wherein providing the knowledge factor credential to authenticate a user comprises: normalizing the characters of the credential by changing a sequence of bits with which at least one of the characters in the credential is encoded.
11. The method of any of embodiments 1-10, wherein providing the knowledge factor credential to authenticate a user comprises: including a byte order mark to a sequence of bytes encoding the knowledge factor credential; and sequencing the bytes encoding knowledge factor credential consistent with the byte order mark.
12. The method of any of embodiments 1-11, wherein providing the knowledge factor credential to authenticate a user comprises: submitting the knowledge factor credential via an un-lock screen or a login screen of an operating system executed by the computing device.
13. The method of any of embodiments 1-12, wherein the multi-byte character set comprises more than 100,000 characters.
14. The method of any of embodiments 1-13, wherein the multi-byte character set comprises a Unicode character set.
15. The method of any of embodiments 1-14, wherein the knowledge factor credential comprises at least one emoji character.
16. The method of any of embodiments 1-15, wherein the knowledge factor credential comprises a user-composed character comprising multiple, user-selected constituent characters in a single apparent character.
17. A system, comprising: one or more processors; and memory storing instructions that when executed by at least some of the processors effectuate operations comprising: the steps of any of embodiments 1-16.
18. A tangible, machine-readable, non-transitory medium storing instructions that when executed by a data processing apparatus effectuate operations comprising: the steps of any of embodiments 1-16.