Securely roaming digital identities

ABSTRACT

A cryptographic session key is utilized to maintain security of a digital identity. The session key is valid only for a limited period of time. Additional security is provided via a bimodal credential allowing different levels of access to the digital identify. An identity token contains pertinent information associated with the digital identity. The identity token is encrypted utilizing public-key cryptography. An identifier utilized to verify the validity of the digital identity is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are provided to a service for example. The service decrypts the encrypted identity token utilizing public key cryptography, and decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.

TECHNICAL FIELD

The technical field relates generally to computers and computing systems, and more specifically relates to maintaining the security of a digital identity.

BACKGROUND

Security is paramount when transferring personal information via a network, such as the Internet for example. The specific information provided over a network depends upon the transaction. For example, information provided to a lender when applying for a loan differs from information provided to a car rental agency when reserving a rental car. The information being provided represents the digital identity associated with the respective person. The person providing a digital identity typically desires the information to be secure. The security of digital identities is a concern when conducting transactions from public facilities, such as kiosks and wireless zones. In a kiosk, for example, a person finishing a transaction could walk away from the kiosk, and a third party might be able to access the digital identity and use it without authorization. In a wireless zone, third parties can monitor transactions.

SUMMARY

A cryptographic session key is utilized to maintain security regardless of the computing system in which a digital identity is being used. Security also is maintained when roaming from one computing system to another. The cryptographic session key is valid only for a time period determinable by the user of the digital identity. Different cryptographic session keys can be used to communicate with different parties. Additional security is provided by allowing a user to determine the level of access to attributes of the digital identity. For example, lesser access can be provided allowing access to metadata, such as a description, associated with an attribute (e.g., access to the metadata description “social security number,” instead of the actual social security number). Or, a higher level of access can be provided allowing modification of an attribute (e.g., entering or changing a social security number). Access is granted in accordance with a bimodal credential, such as a pair of passwords for example. That is, a high level of access is granted when a first password is entered, or a lower level of access is granted when a second password is entered.

In an exemplary scenario, a user is requested to provide attributes associated with a digital identity (e.g., credit card number and date of birth). The requested attributes, a cryptographic session key, and a time stamp indicating the duration of the cryptographic session key are combined to form an identity token. The identity token is encrypted with a private key of a public-key cryptographic key pair. Also, an identifier or proof material, utilized to verify the validity of the digital identity, is encrypted with the cryptographic session key. The encrypted identity token and the encrypted identifier are sent to the requester. The requester decrypts the encrypted identity token with the respective public key of the public-key cryptographic key pair. The requester also decrypts, with the cryptographic session key obtained from the identity token, the encrypted identifier. If the identifier is determined to be valid, the transaction proceeds normally. If the identifier is determined to be invalid, the transaction is halted.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other objects, aspects and advantages will be better understood from the following detailed description with reference to the drawings, in which:

FIG. 1 is an illustration of an exemplary system for securely roaming a digital identity;

FIG. 2 is an illustration depicting an exemplary formation and encryption of an identity token and an identifier;

FIG. 3 is an illustration of an exemplary decryption of the encrypted identity token and the encrypted identifier;

FIG. 4 is a diagram of an exemplary computing device comprising the secure roaming device;

FIG. 5 is a sequential flow diagram of an exemplary sequence of events for securely roaming a digital identity;

FIG. 6 is a flow diagram of an exemplary process for creating an encrypted identity token and an encrypted identifier; and

FIG. 7 is a flow diagram of an exemplary process for determining the validity of the identity token.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

To facilitate an understanding of the methods and devices for securely roaming a digital identity described herein, an exemplary scenario is provided. In the exemplary scenario, a user will purchase a book online via the Internet. The user will purchase the book from a computer terminal located in a public library. The user will send a request to the publisher of the book requesting to purchase the book. The publisher will send the user a request for specific information in order to complete the transaction. The user wants the information provided to the publisher to remain secure, even though the user is sending the information from a public location. The user does not want any information that is left behind in the terminal to be used by unauthorized persons.

FIG. 1 is an illustration of an exemplary system for securely roaming a digital identity comprising a secure roaming device 12, a client processor 18, and a server processor 20. In accordance with the exemplary scenario above, the client processor 18 represent the terminal located in the library and the server processor 20 represents the publisher's server.

The secure roaming device 12 comprises a memory portion 14, a processor portion 15, and an input/output portion 16. The secure roaming device 12 can comprise any appropriate device comprising a memory portion 14 and an input/output portion 16 as described herein. For example, the secure roaming device 12 can comprise a flash memory device, a hard disk drive, a biometrically protected device, a portable memory device, a universal serial bus (USB) compatible device, a processor, a laptop computer, a personal digital assistant (PDA), a portable phone, or a combination thereof. The processor portion 15 is capable of performing cryptographic and programmatic computations. The processing portion 15 is capable of generating the cryptographic session key, the private key of a public-key pair, the timestamp. The processing portion 15 also is capable of performing cryptographic operations such as encryption and decryption, for example.

As described above, the secure roaming device 12 can be implemented in the form of a portable memory device, or the like. As such, functions performed by the processor 15, the memory portion 14, and the input/output portion 16 can be separate from functions performed by the client processor 18. Also, as described above, the secure roaming device 12 can comprise a laptop computer or the like. In such an embodiment, the laptop computer can be coupled to the client processor 18 or can be coupled to the server processor 20 via interface 24. Thus, it is envisioned that the secure roaming device 12 and the client processor 18 can be implemented in a single device, such as a laptop computer or the like. As such, the functions performed by the client processor 18, the processing portion 15, the input/output portion, and the memory portion 14 are distributed therein.

The memory portion 14 is capable of storing attributes associated with the digital identities. Attributes can include any appropriate information associated with a digital identity. Some examples of an attribute include a social security number, a credit card number, age, weight, medical information, financial information, personal information, a personal identification number (PIN), or a combination thereof. The memory portion 14 is capable of storing, among other things, attributes used to form various digital identities, the cryptographic session key, the time stamp, the private key of a public-key cryptographic key pair, and an identifier used to validate the identity token. The cryptographic session key can comprise any appropriate cryptographic key, for example a symmetric key, one of the keys of a public-key cryptographic key pair, or a combination thereof. The memory portion 14 also is capable of storing a time stamp indicative of the duration of the cryptographic session key. The time stamp can comprise any appropriate value for indicating the duration of the cryptographic session key. For example, the time stamp can comprise a clock time, after which the cryptographic session key expires. Alternatively, the time stamp can comprise a time representing the length of time for which the cryptographic session key is valid.

The memory portion 14 is capable of storing the identifier (e.g., proof material). The identifier can comprise any appropriate means for validating the digital identity. For example, the identifier can comprise a predetermined value and/or character. In another exemplary embodiment, the identifier can comprise a response to a challenge. And, as described in more detail below, the client processor 18 utilizes the cryptographic session key provided by the secure roaming device 12 to respond to the challenge. As is known in the art, prior to two entities communicating over a network, in accordance with various protocols, one entity can challenge another entity. The challenged entity provides a response that is determined in accordance with an algorithm that is known to both entities. For example, the response can comprise a random number generated from a seed determined in accordance with the commonly known algorithm. In an exemplary embodiment, the identifier can comprise this random number response to a challenge.

The memory portion 14 is capable of storing both modes of the bimodal credential. The bimodal credential can comprise any appropriate means for allowing one of two levels of access to information stored in the memory portion 14. For example, the bimodal credential can comprise two passwords. One password allows a lesser level of access to information stored in the memory portion 14, and the other password allows a higher level of access to information stored in the memory portion 14. In an exemplary embodiment, the lesser level of access allows read-only access (also referred to as safe access) to information stored in the memory portion 14, and the higher level of access allows management and modification of information stored in the memory portion 14. In an exemplary embodiment, when read-only access is allowed, the user does not have direct access to identity information stored in the memory portion 14 including the private key of the public-key cryptographic key pair. Rather, the user only can see metadata such as description of the identity attributes. For example, the user sees the description “social security number,” rather than the actual value. The user can receive the identity information stored in the memory portion 14 as identity tokens encrypted for recipients of that information as approved by the user. However, if a higher level of access is allowed, the user has greater access to the identity information and is permitted to manage information stored in the memory portion 14. For example, during a higher level of access the user can perform functions such as add information, delete information, and change information, such as cryptographic keys, or a combination thereof.

The memory portion 14 also is capable of storing a private key of a public-key cryptographic key pair. Public key cryptography is known in the art. Any appropriate public key cryptographic system can be used, such as the known RSA cryptographic cipher, for example. A description of the RSA cryptography cipher is found in U.S. Pat. No. 4,405,829, entitled “Cryptographic Communications System and Method,” which issued on Sep. 20, 1983, in the names of Rivest, Shamir, and Adleman. Public key cryptography uses a pair of keys. One key is used to encrypt and the other is used to decrypt. Knowledge of one key does not provide knowledge of the other key. Typically one key is kept secret, and thus called the private key. The other key typically is made public.

In accordance with the exemplary scenario, the secure roaming device 12 comprises a biometrically protected flash memory device. The user enters the library and connects the secure roaming device 12 to the client processor 18 via an interface 22. The interface 22 can comprise any appropriate interface. The interface 22 can comprise a wireless link, a hardwired interface, or a combination thereof. The user begins a transaction with the publisher by entering the publisher Web address into the client processor 18. The user is then connected to the publisher server (e.g., server processor 20) via an interface 24. The interface 24 can comprise any appropriate interface. The interface 24 can comprise a wireless link, a hardwired interface, or a combination thereof. The publisher sends a request for information to the user via the interface 24 and the client processor 18. The publisher's request contains a request for the user's credit card number, the user's date of birth, the user's mailing address, the user's residential zip code, the user's email address, and information pertaining to the specific book the user is ordering. In an exemplary embodiment, the client processor 18 receives a challenge from the server processor 20. In response to the received challenge, the client processor 18 generates a response in accordance with a predetermined algorithm.

The user then enters one mode of a bimodal credential via the client processor 18. For example, if the user knows that all the information requested by the publisher is in the memory portion 14, then the user can provide a first password (denoted as PW1 in FIG. 1) which will provide the requested information to the client processor 18 in the form of an encrypted identity token, but prohibits the user direct access to information in the memory portion 14, such as the private key of the public-key cryptographic key pair, and the attributes associated with the digital identity. Or, for example, if the user knows that the requested information is not in the memory portion 14, the user can enter a second password (denoted as PW2 in FIG. 1) to gain a higher level of access to the information in the memory portion 14 in order to make modifications.

If a higher level of access is selected, the user can download identity information such as the attributes, the private and public cryptographic key pair into the client processor 18 from the secure roaming device 12, modify the attributes as desired, and form the identity token. If a lesser level of access is selected, the needed identity attributes is fetched in the form of an encrypted identity token along with a cryptographic session key into the client processor 18 from the secure roaming device 12 without the user being able to modify any attributes.

The identity token and the identifier are encrypted. FIG. 2 is an illustration depicting an exemplary formation and encryption of an identity token 26 and an identifier 28 in preparation for transmission of the message 30 to the server processor 20. The identity token 26 comprises the cryptographic session key, the time stamp, and attributes of the digital identity. In accordance with the exemplary scenario, the attributes comprise the user's credit card number, the user's date of birth, the user's mailing address, the user's residential zip code, and the user's email address. The identity token 26 is encrypted utilizing the private key of a public-key cryptographic key pair as depicted in block 30. The identity token encrypted with the private key is denoted as E_(pk){IT} in FIG. 2. The identifier 28 is encrypted utilizing the cryptographic session key as depicted in block 32. Cryptographic session key used to communicate with different parties can be cryptographically unrelated. The use of cryptographically unrelated session keys helps maintain security. For example, if a cryptographic session key being used with one party is compromised, the cryptographic session keys being used with other parties are still secure. The identifier 28 can comprise a predetermined identifier of which the intended receiver is aware. In accordance with the exemplary scenario, that is the publisher knows the identifier, and thus can verify its validity upon receipt. Or, the identifier can comprise a response to a challenge as described above. The identifier encrypted with the session key is denoted as E_(sk){ID} in FIG. 2. The encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}, are formed into a message 34. In accordance with the exemplary scenario, the message 34 is transmitted to the publisher's server (e.g., server processor 20).

Referring again to FIG. 1, the user can conduct transactions with several services. Accordingly, the user can create several identity tokens. Each identity token and respective identifier are encrypted as described above. The ability to form multiple encrypted identity tokens and encrypted identifiers is depicted in block 18 of FIG. 1 showing messages 1 through k (i. e., E_(pk){IT₁}, E_(sk){ID₁} . . . E_(pk){IT_(k)}, E_(sk){ID_(k)}).

The message is provided to the server processor 20. In accordance with the exemplary scenario, the encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}, are provided to the publisher. The encrypted portions of the message are decrypted and processed. FIG. 3 is an illustration of an exemplary decryption of the encrypted identity token and the encrypted identifier. The message 34 is parsed into the encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}. The encrypted identity token, E_(pk){IT}, is decrypted with the respective public key of the public-key cryptographic key pair, as depicted in by block 36. A public key can be obtained in a variety of ways. For example, a public key can be furnished via a registration process. As another example, a public key can be obtained via a directory service. The cryptographic session key is obtained from the decrypted message and utilized to decrypt the encrypted identifier, E_(sk){ID}, as shown in block 38. The identifier is verified to determine the validity of the digital identity. Any appropriate verification means can be employed. The identifier can be verified, for example, by comparing it to an expected value of the identifier. If the identifiers match, the transaction proceeds normally. If the identifiers do not match, the transaction is halted.

FIG. 4 is a diagram of an exemplary computing device 40 comprising the secure roaming device. In an exemplary embodiment, the functionality of the secure roaming device is distributed throughout the computing device 40. In another exemplary embodiment, the secure roaming device (e.g., secure roaming device 12) is implemented in the form of removable storage 54.

The computing device 40 comprises a processing portion 42, a memory portion 44, and an input/output portion 46. The processing portion 42, memory portion 44, and input/output portion 46 are coupled together (coupling not shown in FIG. 4) to allow communications therebetween. The processing portion 42 is capable of receiving, via the input/output portion 46, the bimodal credential for allowing a level of access to attributes of a digital identity. The processing portion 42 processes the bimodal credential to determine the allowable level of access. The processing portion 42 also is capable of receiving, via the input/output portion 46, a request for attributes. The processor portion 42 processes the request for attributes and selects the requested attributes from the memory portion 44. The processing portion 42 further creates the identity token from the selected attributes, the cryptographic session key, and the time stamp. The memory portion 44 is capable of storing all parameters described above.

The computing device 40 can be implemented as a client processor and/or a server processor. In a basic configuration, the computing device 40 can include at least one processing portion 42 and memory 48. Depending upon the exact configuration and type of computing device, the memory 48 can be volatile (such as RAM) 50, non-volatile (such as ROM, flash memory, etc.) 52, or a combination thereof. Additionally, the computing device 40 also can have additional features/functionality. For example, the computing device 40 can include additional storage (removable 54 and/or non-removable 56) including, but not limited to, magnetic or optical disks, tape, flash, or a combination thereof. Computer storage media, such as memory 48, 50, 52, 54, and 56, include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computing device 40. Any such computer storage media can be part of the computing device 40.

The computing device 40 can also contain communications connection(s) 62 that allow the computing device 40 to communicate with other devices. Communications connection(s) 62 is an example of communication media. Communication media typically embody computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. The term computer readable media as used herein includes both storage media and communication media. The computing device 40 also can have input device(s) 60 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 58 such as a display, speakers, printer, etc. also can be included. All these devices are well known in the art and need not be discussed at length here.

FIG. 5 is a sequential flow diagram of an exemplary sequence of events for securely roaming a digital identity. The user initiates a transaction at step 64. In accordance with the exemplary scenario for example, the user sends a request to the publisher to order a book. The service returns a request for information (e.g., attributes) to the user at step 66. Optionally, as described above, the service can challenge the user at step 68. The user obtains the digital identity parameters from the secure roaming device at step 70. Optionally, the user can obtain the identifier, if it is not automatically created in response to a challenge (step 68). Depending upon the processing capability of the secure roaming device, the secure roaming device provides to the client, either the parameters needed to form the identity token and optionally the identifier, or the identity token itself and optionally the identifier at step 72. Further depending upon the processing capabilities of the secure roaming device, the identity token and optionally the identifier can be provided to the user at step 72 in encrypted format. If the identity token and identifier are not encrypted by the secure roaming device, they are encrypted by the user (e.g., by a client processor). Encryption of the identity token and the identifier is as described above. The encrypted identity token, E_(pk){IT} and the encrypted identifier, E_(sk){ID}, are provided to the service at step 74. The service determines, as described above, if the identity token and identifier are valid. The service sends a message to the user at step 76 that either the identity token is valid or invalid. If valid, the transaction proceeds, if invalid, the transaction is halted.

FIG. 6 is a flow diagram of an exemplary process for creating an encrypted identity token and an encrypted identifier. A request for at least one attribute is received at step 78. Parameters needed to respond to the request, including the requested attribute(s), the cryptographic session key, the time stamp, the private key of a public-key cryptographic key pair, and the identifier are obtained at step 80. At step 82, it is determined if a low or high level of access is granted in accordance with the bimodal credential as described above. If a higher level of access is granted, parameters are modified as appropriate at step 84. If a lower level of access is granted, the identity token is formed from the cryptographic session key, the time stamp, and the appropriate attributes at step 86. The identity token is encrypted utilizing the private key of a public-key cryptographic key pair at step 88. If multiple identity tokens are created, multiple public-key cryptographic key pairs can be utilized. The identifier is encrypted utilizing the cryptographic session key at step 90. If multiple identifiers are encrypted, multiple cryptographic session keys can be utilized. The encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}, are provided to the requester at step 92.

FIG. 7 is a flow diagram of an exemplary process for determining the validity of the identity token. The encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}, are received at step 94. The received encrypted identity token, E_(pk){IT}, and the encrypted identifier, E_(sk){ID}, are parsed into respective components at step 96. The encrypted identity token, E_(pk){IT}, is decrypted utilizing the respective public key at step 98. If multiple encrypted identity tokens are decrypted, multiple respective public keys can be utilized. The time stamp is analyzed to determine if the cryptographic session key has expired at step 100. If the cryptographic session key has expired, the transaction is halted at step 110. If the cryptographic session key has not expired, the encrypted identifier, E_(sk){ID}, is decrypted utilizing the cryptographic session key obtained from the decrypted identity token at step 102. If multiple identifiers are decrypted, multiple cryptographic session keys can be utilized. The decrypted identifier is compared with an expected identifier at step 104. The expected identifier can be a predetermined identifier. In an exemplary embodiment, the expected identifier is the challenge response calculated in accordance with a predetermined algorithm. If the decrypted identifier matches the expected identifier (step 106), the transaction proceeds at step 108. If the decrypted identifier does not match the expected identifier (step 106), the transaction is halted at step 110.

In accordance with the methods and apparatuses for securely roaming a digital identity as described herein, a portable device, such as a biometrically protected memory device, can be utilized with a target service. Alternatively, the functionality of the portable device can be incorporated into a processor, such a laptop, or the like. A user can have numerous digital identities. Each digital identity can be associated with a respective public-key cryptographic key pair, and respective session keys. The user's digital identities can be stored in the secure roaming device and carried around such that the user can employ those identities with target services from any client computer system, including systems such as public kiosks that are not fully trustworthy.

The secure roaming device can be operated in two modes in accordance with a bimodal credential. Each mode allows a different level of access to information in the secure roaming device. In the lower level of access mode, which can be considered a safe mode, a digital identity of the user residing on the secure roaming device is provided in the form of an encrypted identity token. No direct access to information such as the public-key cryptographic keys, the cryptographic session key, or certain identity attributes is allowed.

In the higher level of access mode, which can be considered an administrative mode, the digital identities on the secure roaming device can be managed, modified, and moved on or off the secure roaming device. In the higher level of access mode, information such as the public-key cryptographic keys, the cryptographic session key, or identity attributes can be directly accessed for management, and can be moved/copied on and off the secure roaming device. The two modes of the device are protected by different modes of a bimodal credential. For example, one password can unlock the safe mode and another password can unlock the administrative mode.

The various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatuses for securely roaming a digital identity or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for securely roaming a digital identity. In the case of program code execution on programmable computers, the computing device will generally include a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. The program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and combined with hardware implementations.

The methods and apparatuses for securely roaming a digital identity also can be practiced via communications embodied in the form of program code that is transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program code is received and loaded into and executed by a machine, such as an EPROM, a gate array, a programmable logic device (PLD), a client computer, or the like, the machine becomes an apparatus for performing a search utilizing a probabilistic index. When implemented on a general-purpose processor, the program code combines with the processor to provide a unique apparatus that operates to invoke the functionality for securely roaming a digital identity. Additionally, any storage techniques used in connection with securely roaming a digital identity can invariably be a combination of hardware and software.

While methods and apparatuses for securely roaming a digital identity have been described in connection with the illustrative embodiments of the various figures, it is to be understood that other similar embodiments may be used or modifications and additions may be made to the described embodiments for performing the same function for securely roaming a digital identity without deviating therefrom. Therefore, methods and apparatuses for securely roaming a digital identity should not be limited to any single embodiment, but rather should be construed in breadth and scope in accordance with the appended claims. 

1. A method for securely roaming a digital identity, said method comprising: creating an identity token comprising: a cryptographic session key; a time stamp indicative of a duration of said session key; and at least one attribute of said digital identity; encrypting said identity token, said identity token being encrypted utilizing a private key of a public-key cryptographic key pair; encrypting an identifier, said identifier being encrypted utilizing said cryptographic session key; and providing said encrypted identity token and said encrypted identifier.
 2. A method in accordance with claim 1, further comprising: decrypting said encrypted identity token utilizing a respective public key of said public-key cryptographic key pair; decrypting said encrypted identifier utilizing said session key obtained from said decrypted identity token; determining if said duration of said cryptographic session key has expired; determining a validity of said identifier; and determining a validity of said digital identity in accordance with said determination of expiration of said cryptographic session key and said determined validity of said identifier.
 3. A method in accordance with claim 1, further comprising the act of receiving a request for at least one attribute associated with said digital identity, wherein said identity token comprises said requested at least one attribute.
 4. A method in accordance with claim 1, wherein: said digital identity is determined to be valid if: said identifier is determined to be valid; and said cryptographic session key is determined to not have expired; and said digital identity is determined to be invalid if said identifier is determined to be invalid or said cryptographic session key is determined to have expired.
 5. A method in accordance with claim 1, wherein said identifier comprises a response to a challenge.
 6. A method in accordance with claim 1, further comprising the act of allowing access to information associated with said digital identity in accordance with a bimodal credential, wherein: a first mode of said bimodal credential allows modification of at least one of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity; and a second mode of said bimodal credential prohibits modification of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity.
 7. A method in accordance with claim 6, wherein said bimodal credential comprises a pair of predetermined passwords.
 8. A method in accordance with claim 6, wherein said second mode of said bimodal credential allows access to respective metadata associated with said digital identity.
 9. A secure roaming device comprising: an input/output portion for: receiving a bimodal credential indicative of an allowable level of access to information associated with said digital identity; receiving a request for at least on attribute associated with said digital identity; providing a response to said request, said response comprising an encrypted identity token and an encrypted identifier, said identity token comprising said requested at least one attribute, a cryptographic session key, and a time stamp indicative of a duration of said cryptographic session key, wherein: said identity token is encrypted with a private of a public-key cryptographic key pair; and said encrypted identifier is encrypted utilizing said cryptographic session key; receiving a reply to said response, said reply being indicative of said digital identity being one of valid and invalid; and a memory portion for storing attributes of said digital identity, said private key, said time stamp, said identity token, and all modes of said bimodal credential.
 10. A secure roaming device in accordance with claim 9, further comprising a processing portion for: processing said bimodal credential to determine said allowable level of access to information associated with said digital identity; processing said request for at least on attribute associated with said digital identity; and creating said response to said request.
 11. A secure roaming device in accordance with claim 10, wherein said memory portion comprises a removable memory.
 12. A secure roaming device in accordance with claim 9, wherein said secure roaming device comprises at least one of a portable secure roaming device and a biometric memory device.
 13. A computing device in accordance with claim 9, wherein: a first mode of said bimodal credential allows modification of at least one of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity; and a second mode of said bimodal credential prohibits modification of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity.
 14. A computer-readable medium having computer-executable instructions for performing the acts of: encrypting, utilizing a private key of a public-key cryptographic key pair, an identity token comprising a cryptographic session key, a time stamp indicative of a duration of said session key, and at least one attribute of said digital identity; encrypting an identifier, said identifier being encrypted utilizing said cryptographic session key; and providing said encrypted identity token and said encrypted identifier.
 15. A computer-readable medium in accordance with claim 14, said computer-readable medium having further computer-executable instructions for: decrypting said encrypted identity token utilizing a respective public key of said public-key cryptographic key pair; decrypting said encrypted identifier utilizing said session key obtained from said decrypted identity token; determining if said duration of said cryptographic session key has expired; and determining a validity of said identifier.
 16. A computer-readable medium in accordance with claim 14, said computer-readable medium having further computer-executable instructions for receiving a request for at least one attribute associated with said digital identity, wherein said identity token comprises said requested at least one attribute.
 17. A computer-readable medium in accordance with claim 14, wherein: said digital identity is determined to be valid if: said identifier is determined to be valid; and said cryptographic session key is determined to not have expired; and said digital identity is determined to be invalid if said identifier is determined to be invalid or said cryptographic session key is determined to have expired.
 18. A computer-readable medium in accordance with claim 14, wherein said identifier comprises a response to a challenge.
 19. A computer-readable medium in accordance with claim 14, said computer-readable medium having further computer-executable instructions for allowing access to information associated with said digital identity in accordance with a bimodal credential, wherein: a first mode of said bimodal credential allows modification of at least one of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity; and a second mode of said bimodal credential prohibits modification of said public-key cryptographic key pair, said time stamp, and attributes associated with said digital identity.
 20. A computer-readable medium in accordance with claim 17, wherein said second mode of said credential allows access to respective metadata associated with said digital identity. 