DIGITAL KEY DEVICE AND METHOD FOR ACTIVATING DIGITAL KEY SERVICE
20220337426 ยท 2022-10-20
Inventors
Cpc classification
International classification
H04L9/32
ELECTRICITY
Abstract
A digital key service device includes a casing, an input device, a data storage unit and a controlling unit. The input device is disposed near the casing or mounted on the casing, and configured to receive a user operation input. The data storage unit is disposed in the casing, and configured to store digital data and a digital key. The controlling unit is disposed in the casing, and configured to use the digital key to perform a digital key service or output the digital data to a host when authentication is complete. The authentication includes an operation verification procedure for verifying the user operation input. The authentication is complete when the controlling unit determines that the user operation input conforms to a preset timing-based input set.
Claims
1. A digital key device adapted to be in communication with a host, the digital key device comprising: a casing; an input device, disposed near the casing or mounted on the casing, receiving a first user operation input; a data storage unit, disposed in the casing, storing digital data and a digital key; and a controlling unit, disposed in the casing and in communication with the host, the input device and the data storage unit, using the digital key stored in the data storage unit to perform a digital key service or outputting the digital data stored in the data storage unit to the host when authentication is complete, wherein the authentication comprises a first operation verification procedure for verifying the first user operation input, and the authentication is complete when the controlling unit determines that the first user operation input conforms to a first preset timing-based input set.
2. The digital key device according to claim 1, wherein the first user operation input is a gesture operation input and the input device is a touch button, a physical button or a touch pad exposed from the casing, the input device receiving one or more user touch or pressing actions applied to the input device to generate one or more timing-based input events in response to the one or more user touch or pressing actions, or a vibration sensor disposed in the casing, the vibration sensor sensing vibration or touch made on the casing held by the user to generate the one or more timing-based input events in response to the vibration or touch made on the casing.
3. The digital key device according to claim 1, wherein the first user operation input is an audio operation input and the input device is a microphone disposed on the casing, the microphone sensing a sound made by the user to generate one or more timing-based input events in response to a rhythm of the sound.
4. The digital key device according to claim 1, wherein one or more timing-based input events are generated according to a specific rhythm of the first user operation input and conform to an encoding format.
5. The digital key device according to claim 1, further comprising a prompting device issuing a light signal or a sound signal to prompt the user for input timing of the first user operation input.
6. The digital key device according to claim 1, wherein the authentication further comprises a personal identification number verification procedure prior to the first operation verification procedure after the digital key device is electrically coupled to the host, wherein the digital key device receives a personal identification number from the host and verifies the received personal identification number.
7. The digital key device according to claim 6, wherein the authentication further comprises a second operation verification procedure posterior to the first operation verification procedure; the digital key device activates the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a data read command from the host; and the controlling unit outputs the digital data to the host in response to the data read command after the authentication is passed.
8. The digital key device according to claim 1, wherein the digital key service is using the digital key to encrypt first data received from the host to generate encrypted data with a digital signature, wherein the authentication further comprises a second operation verification procedure posterior to the first operation verification procedure; the digital key device activates the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a digital signing command from the host; and the controlling unit outputs the encrypted data with the digital signature to the host in response to the digital signing command after the authentication is passed.
9. The digital key device according to claim 1, wherein the digital key service is using the digital key to encrypt first data or decrypt second data received from the host to generate first encrypted data or second decrypted data; the authentication further comprises a second operation verification procedure posterior to the first operation verification procedure; the digital key device activates the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a data encrypt command or a data decrypt command from the host; and the controlling unit outputs the first encrypted data or the second decrypted data to the host or stores the first encrypted data or the second decrypted data in the data storage unit in response to the data encrypt command or the data decrypt command after the authentication is passed.
10. The digital key device according to claim 1, wherein the data storage unit includes a first data storage unit and a second data storage unit, wherein the digital key is stored in the first data storage unit disposed in a secure element, and the digital data are stored in the second data storage unit separate from the secure element.
11. A method for activating a digital key service used with a host and a digital key device, the digital key device storing therein digital data and a digital key, the method comprising steps of: providing a first user operation input to the digital key device; and the digital key device activating the digital key service using the digital key stored in the digital key device or outputting the digital data to the host automatically when authentication is complete, wherein the authentication comprises a first operation verification procedure for verifying the first user operation input, and the authentication is complete when the first user operation input conforms to a first preset timing-based input set.
12. The method according to claim 11, wherein the first user operation input is a gesture operation input including one or more touch actions, one or more sliding actions, one or more pressing actions, or one or more shaking actions applied to the digital key device and being corresponding to one or more timing-based input events.
13. The method according to claim 11, wherein the first user operation input is an audio operation input including one or more sound-making actions of the user, the one or more sound-making actions following a rhythm and being corresponding to one or more timing-based input events.
14. The method according to claim 11, wherein one or more timing-based input events are generated according to a specific rhythm of the first user operation input and conform to an encoding format.
15. The method according to claim 11, further comprising a step of issuing a light signal or a sound signal through a prompting device of the digital key device to prompt the user for input timing of the first user operation input.
16. The method according to claim 11, wherein the authentication comprises a step of performing a personal identification number verification procedure prior to the first operation verification procedure after the digital key device is electrically coupled to the host.
17. The method according to claim 11, wherein the authentication comprises a second operation verification procedure posterior to the first operation verification procedure, the method comprising steps of: activating the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a data read command from the host; and outputting the digital data stored in the digital key device to the host in response to the data read command after the authentication is passed.
18. The method according to claim 11, wherein the digital key service is using the digital key to encrypt first data received from the host to generate encrypted data with a digital signature, and the authentication further comprises a second operation verification procedure posterior to the first operation verification procedure, the method comprising steps of: activating the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a digital signing command from the host; and outputting the encrypted data with the digital signature to the host in response to the digital signing command after the authentication is passed.
19. The method according to claim 11, wherein the digital key service is using the digital key to encrypt first data or decrypt second data received from the host to generate first encrypted data or second decrypted data, and the authentication further comprises a second operation verification procedure posterior to the first operation verification procedure, the method comprising steps of: activating the second operation verification procedure to verify whether a second user operation input conforms to a second preset timing-based input set after completing the first operation verification procedure and receiving a data encrypt command or a data decrypt command from the host; and outputting the first encrypted data or the second decrypted data to the host or storing the first encrypted data or the second decrypted data in the data storage unit in response to the data encrypt command or the data decrypt command after the authentication is passed.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0016] The advantages of the present disclosure will become more readily apparent to those ordinarily skilled in the art after reviewing the following detailed description and accompanying drawings, in which:
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
[0023] The present disclosure will now be described more specifically with reference to the following embodiments. It is to be noted that the following descriptions of preferred embodiments of this invention are presented herein for purpose of illustration and description only. It is not intended to be exhaustive or to be limited to the precise form disclosed.
[0024] Please refer to
[0025] Please refer to
[0026] Thus, even though the host 11 is under remote hacking and controlled to send a correct personal identification number to the digital key device 10, the gesture operation applied on the input device 101 of the digital key device 10 provides further security mechanism. The first gesture operation verification procedure is passed only when the controlling unit 103 judges that the digital key device 10 receives the correct user gesture operation input. The user gesture operation, i.e. on-site operation, can not be made through remote hacking so that malicious access to the digital key device 10 is impeded.
[0027] The input device 101 could be a touch button, a touch pad or a physical button mounted on or exposed from the casing 100 of the digital key device 10 to receive a single or a series of touch actions, a single or a series of sliding actions or a single or a series of pressing actions constructing the user gesture operation input. The user gesture operation input is verified correct only when all input event(s) of the user gesture operation input substantially occur in a preset timing and sequence. We say that the user gesture operation input conforms to a preset timing-based input set in this condition. By way of illustration, the user gesture operation input and the timing-based input set includes a plurality of timing-based input events. In an embodiment, the timing-based input events may represent strokes or lines constituting a character, word or pattern, and the user should draw the strokes or lines on a touch pad which is provided for sensing the touch actions. In another embodiment, the timing-based input events may represent a sequence of taps having specific durations (e.g. Morse code or other code with a specific encoding format), and the user should tap on the touch button or click the button in a specific manner. Concretely speaking, for using the Morse code, the user taps the button for dot duration, taps and holds the button for dash duration, and releases the button for space duration. Alternatively, the user could directly draw dashes and dots on the touch pad which can sense the touch actions to provide the timing-based input events in the form of the Morse code. The timing and sequence of the input events in the timing-based input set, representing the pattern, the strokes, the codes or any other sensible physical/gesture operation input or their combination with a specific timing and sequence, could be preset and predefined by the user. In another embodiment, the timing and sequence of the input events in the timing-based input set could be preset by the manufacturer before the sale.
[0028] In another embodiment, the input device 101 is implemented by a vibration sensor, e.g. accelerometer or piezoelectric sensor disposed in the casing 100 without exposing from the casing 100. The user gesture operation input may include holding the casing 100 and vibrating it or touching a designated area of the casing 100 directly to provide the timing-based input events. This type of user gesture operation input is also useful to confirm whether the user stays with the digital key device 10 or not.
[0029] In a further embodiment, the user operation input is an audio operation input and the input device 101 is a sound receiving device, e.g. a microphone disposed on the casing 100. The user audio operation input may include sound-making actions made by the user with or without tools, e.g. singing, clapping, finger snapping, striking, beating with a stick, and these sound-making actions follow a specific rhythm. Each or several sounds are transformed into a timing-based input event, and theses timing-based input events reflect the rhythm. The user audio operation input is verified correct only when the controlling unit 103 determines that all input events of the user audio operation input substantially occur in a preset timing. In other words, the user audio operation input will be verified when it has the correct rhythm. We say that the user audio operation input conforms to a preset timing-based input set in this condition. The rhythm of the user audio operation input could be obtained by the technique of an automatic Karaoke evaluation system (e.g. Wei-Ho Tsai, Hsin-Chieh Lee, Automatic Evaluation of Karaoke Singing Based on Pitch, Volume, and Rhythm Features, IEEE Transactions on Audio Speech and Language Processing 20(4):1233-1243, May 2012) and the details about this evaluation system are not given herein. The user gesture operation input in Step 204 and the gesture operation verification procedure in Step 205 could be replaced with the user audio operation input and the corresponding audio operation verification procedure.
[0030] Please refer to
[0031] The method with reference to
[0032] Please refer to
[0033] Please also refer to
[0034] It is to be noted that the digital key service is not limited to the given illustrative embodiments such as data encryption and data decryption. The concepts of the present application can be applied to any digital service requiring a digital key. Such applications are also encompassed in the present application.
[0035] Please refer to
[0036] According to the present disclosure, access to specific data or all data in the digital key device 10 through the host 11 requires double verification procedure in a two-way manner, including the personal identification number verification procedure and the operation verification procedure. The user operation input provided through the input device 101 of the digital key device 10, not the input device of the host 11 can prevent from undesired and uninvited remote operation. By this authentication mechanism, stealing the data stored in the digital key device 10 through remote hacking (e.g. side-channel attack, brute-force attack, cryptanalysis and exploiting software bug) of the host 11 is avoided. Further, compared to the conventional password, the timing-based input set has higher strength and can not be easily cracked. Through the second operation verification procedure, the digital key service or the digital key provided by the digital key device 10 is kept secure from being stolen or appropriated. It is advantageous that the digital key device 10 with data protection or digital key service function of the present disclosure can be used with the existing hosts or information devices to enhance data storage security.
[0037] The relative positions between and the arrangements of the elements, components and/or devices in the above embodiments are not limited to those shown in the drawings, and could be modified or adjusted to meet respective requirements. The steps of respective methods described in the above embodiments teach basic principles, but details of each step are adjustable and modifiable without departing from the given principles. The digital key device of the present disclosure can be applied to various kinds of information devices to enhance the data security and protect the data from impermissible access, especially through remote hacking.
[0038] While the disclosure has been described in terms of what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention needs not be limited to the disclosed embodiment. On the contrary, it is intended to cover various modifications and similar arrangements included within the spirit and scope of the appended claims which are to be accorded with the broadest interpretation so as to encompass all such modifications and similar structures.