External accessibility for computing devices

ABSTRACT

Methods and apparati for permitting Computing Devices  200  to safely accept Payloads  220  from External Access Entity Devices  260 , and to safely access external Networks  710 . In an apparatus embodiment, a Computing Device  200  contains an Access Control Module  210  comprising an Access Verification Public Key  211  and a Device Signature Key  214 . The Access Control Module  210  is configured to verify authorization of an External Access Payload  220  by verifying a digital signature affixed to the Payload  220  using the Access Verification Public Key  211 . The authorized External Access Payload  220  is then permitted to execute on the Computing Device  200 . The Access Control Module  210  is also configured to receive from a Network Access Device  600  information associated with a Network  710  access request, and to create a plurality of digital signatures, using the Device Signature Key  214 , that link said information associated with the Network  710  access request with the Access Verification Public Key  211 . In some embodiments, an encryption/decryption key pair  291,292  is associated with External Access Entity Device  260  to further enhance security.

RELATED APPLICATIONS

This patent application is a continuation of commonly-owned U.S. patentapplication Ser. No. 16/460,508 entitled “External Accessibility forNetwork Devices” filed Jul. 2, 2019 (Attorney Docket BRIC 0473 CP),which is a continuation-in-part (CIP) of commonly-owned U.S. patentapplication Ser. No. 15/586,681 entitled “Assuring ExternalAccessibility for Devices on a Network” filed May 4, 2017, now U.S. Pat.No. 10,348,706 issued Jul. 9, 2019 (Attorney Docket BRIC 0447 US);furthermore, the subject matter of this application is related to thatof commonly-owned U.S. patent application Ser. No. 15/348,210 entitled“Balancing Public and Personal Security Needs” filed Nov. 10, 2016, nowU.S. Pat. No. 10,498,712 issued Dec. 3, 2019 (Attorney Docket BRIC 0441US), which patent has the same inventor as the present application; saidU.S. Pat. No. 10,498,712 is hereby incorporated by reference in itsentirety into the present patent application.

TECHNICAL FIELD

The present invention relates generally to computer security forindividuals and corporations, and the often competing requirements oflaw enforcement to sometimes request access to personal informationstored on computers.

BACKGROUND ART

There is prior art disclosing methods for a network access point tocheck whether a device requesting access to a network has authorizationcredentials to access the network. For example, the network access pointmay request a user name and password for a user of the device prior togranting access. In another example, a cell phone service provider maycheck to see if a cell phone has an account with Internet accessprivilege before providing Internet access to a cell phone.

U.S. patent application Ser. No. 15/348,210 filed Nov. 10, 2016discloses a method for a computing device to allow access to authorizedexternal access entities to user information on the computing device.

There is prior art (for example, Intel Manageability Engine, IntelSoftware Guard Extensions, Intel Trusted Execution Technology, IntelAuthenticated Code Modules, and ARM trust zone) disclosing methods forexecuting a module in a partition of a computing device, and protectingthat module from software executing outside that partition.

There is prior art disclosing the design and implementation of keyescrow systems, wherein a key escrow agent is provided withcryptographic keys that can be used at any time to decryptcommunications from a device.

Computing devices have been proposed that would allow for authorized lawenforcement entities special privileges in unlocking the device, fordecrypting messages communicated by the device, and/or for retrievinginformation stored or used on the device. A country or other politicalentity could require that all devices sold in that country conform tospecified policies for authorized law enforcement access. But allcountries may not have the same policies, and some countries may notcooperate with law enforcement entities of another country. The purposeof this invention is to present a method whereby a policy enforcingnetwork access point can set a policy requirement for law enforcementaccess for any devices that it allows on a network, and then robustlyverify whether a device meets this policy requirement before allowingthe device on the network. With this invention, a country could set alaw enforcement access policy requirement for devices that obtainInternet access within the country.

DISCLOSURE OF INVENTION

The present invention comprises methods and apparati for permittingComputing Devices 200 to safely accept Payloads 220 from External AccessEntity Devices 260, and to safely access external Networks 710. In anapparatus embodiment, a Computing Device 200 contains an Access ControlModule 210 comprising an Access Verification Public Key 211 and a DeviceSignature Key 214. The Access Control Module 210 is configured to verifyauthorization of an External Access Payload 220 by verifying a digitalsignature affixed to the Payload 220 using the Access VerificationPublic Key 211. The authorized External Access Payload 220 is thenpermitted to execute on the Computing Device 200. The Access ControlModule 210 is also configured to receive from a Network Access Device600 information associated with a Network 710 access request, and tocreate a plurality of digital signatures, using the Device Signature Key214, that link said information associated with the Network 710 accessrequest with the Access Verification Public Key 211.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other more detailed and specific objects and features of thepresent invention are more fully disclosed in the followingspecification, reference being had to the accompanying drawings, inwhich:

FIG. 1 is an illustration of a computing device 1 that can be used inconjunction with the present invention.

FIG. 2 is an illustration of an external entity accessible device 200which is a computing device 1 with the functionality of allowing anauthorized external entity to access the device 200.

FIG. 3 is an illustration of some of the functionality in an externalentity accessible device 200.

FIG. 4 is an illustration of more detail of the cryptographic module 240in an external entity accessible device 200.

FIG. 5 is an illustration of some of the functionality in cryptographicmodule 240.

FIG. 6 is an illustration of a policy enforcing network access point 600that checks the external accessibility of a device 200 before allowingthe device 200 access to a network.

FIG. 7 is an illustration of an external entity accessible device 200accessing a network 710 through a policy enforcing network access point600.

FIG. 8 is an illustration of the first steps of a protocol for anexternal entity accessible device 200 to obtain access to a network 710through a policy enforcing network access point 600.

FIG. 9 is an illustration of the continuation of the protocolillustrated in FIG. 8.

FIG. 10 is an illustration of a protocol for an external entityaccessible device 200 to update the access control module 210 while in acommunication session with policy enforcing network access point 600.

FIG. 11 is an illustration of the addition of the addition of a key pair291 and 292 to the external access entity device 260 introduced in FIG.2.

FIG. 12 is an illustration of a modification to the cryptographic module240 introduced in FIG. 4 showing the addition of a key storageencryption key 256, encrypted cryptographic key table 1242, andencrypted cryptographic seed table 1247.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

FIGS. 1 and 2 illustrate a computing device 1 according to someembodiments. Computing device 1 may be a hand held smart phone, atablet, a laptop, a desktop, or a server. The computing device 1 has oneor more microprocessors 110. Each microprocessor 110 may comprise a CPU120 to carry out the basic instructions of a computer program, cachememory 122 to store instructions and data inside the microprocessor 110,a memory controller 124 to access memory 130 that is external to themicroprocessor 110, and an I/O Controller 126 to access other resourceson the device 1, such as external non-volatile storage 132, one or moreinput devices 134, and one or more output devices 136. In someembodiments of the system, there are multiple microprocessors 110 in thedevice 1. In some embodiments of the system, some of the microprocessors110 serve specific purposes, such as a graphics microprocessor 110. Asshown in FIG. 2, computing device 1 comprises a multiplicity of modules,such as Access Control Module 210, Cryptographic Module 240, and AccessArchive Module 270, for performing specified tasks. In some embodiments,a module is a set of hardware logic gates. In some embodiments, a moduleis a software program that includes instructions for the microprocessor110 to perform, uses the memory 125, 122, 130 in the device 1 forstoring and retrieving information and for communicating with othermodules in the device 1, and uses the input and output capabilities 126,134, 136 in the device 1 for communicating with other devices and users.It is standard routine software engineering to take a functionaldescription of the desired features of a module, and to write a softwareprogram to execute on a computing device 1 and implement those features.

In some embodiments, computing device 1 includes a user authenticationmodule 140. In some embodiments, the user authentication module 140 isimplemented in software that executes on the microprocessor 110. Theuser authentication module 140 includes a user authentication table 142,which comprises a list of user ids, and for each user id, the userauthentication token used by the user having that user id toauthenticate the user when the user logs onto the system. Examples ofuser authentication tokens include passwords, movement patterns on aninput device, and biometrics. In some embodiments, some users may havethe privilege on the computing device 1 that allows the user to addadditional users to the user auth table 142. In some embodiments,computing device 1 has a lock module 150 that comprises a lock status152 which indicates whether the device 1 is locked or unlocked, and anunlock auth token 154, which is used to check whether a user is allowedto unlock the device 1 if the device is in a locked state. In someembodiments when a user is logged into the device 1, the user is able toset the unlock auth token 154. For a given user, the user may choose tomake the unlock auth token 154 the same as the user auth token, or theuser may choose a different auth token.

Throughout this specification, the term “user” refers to an entity thatcan successfully authenticate as one of the users listed in the userauth table 142, which may require unlocking the device 1 if device 1 isin the locked state. Two entities are considered the same user if theycan authenticate with the same user id. A user may choose to have a nulluser auth token and unlock auth token. If a user has a null user authtoken and unlock auth token, any entity with physical access to thedevice 1 can use the device 1 as that user, and therefore is consideredto be the same user. In some embodiments, a user is not a human person,but is some other entity, for example, some other device 1.

FIG. 2 illustrates an embodiment of an external entity accessible device200. An external entity accessible device 200 includes the properties ofa computing device 1.

In some embodiments, the device 200 includes a cryptographic module 240.A user of the device 200 uses keys in this cryptographic module 240 toencrypt information for storage on the device 200 or for communicationto other devices across some network.

The external entity accessible device 200 includes an access controlmodule 210 that is used to control the access of external entitiesaccording to the external access policy 213 of the device 200, and toprovide proof to a policy enforcing network access point or other entityof the external access capabilities and policy of the device 200.

FIG. 2 also illustrates an embodiment of an external access entitydevice 260 that is used by an external access entity 266 to digitallysign requests for access to an external entity accessible device 200. Anexternal access entity 266 is some entity other than the user of thedevice 200.

FIG. 3 illustrates how the device 200 in FIG. 2 is used in anembodiment. Block A 3.1 illustrates a step that takes place prior tomanufacturing of device 200. An external access entity device 260generates a private/public key pair for a digital signature system,specifically an external access entity signature private key 261 and anexternal access entity verification public key 262.

Block A 3.2 illustrates steps that take place during manufacturing ofdevice 200.

An access verification public key 211 is embedded in non volatile memoryin the access control module 210. In one embodiment, the accessverification public key is an external access entity verification publickey 262. In another embodiment, the access verification public key 211in the external entity accessible device 200 is a verification publickey of a certificate authority that issues certificates for a pluralityof external access entity verification public keys 262. In anotherembodiment, there are multiple access verification public keys 211 inthe access control module 210.

Also in step 3.2.1, a unique device identifier 212 is generated andplaced on the device 200. In some embodiments, device identifier 212 ischosen at random from a large enough set so that the probability of twodevices 200 receiving the same device identifier 212 is extremely low. Adigital signature key pair is generated for the device 200, specificallya private device signature key 214 and a public device verification key215. A digital certificate 216 is generated for the device verificationkey 215. The certificate 216 is signed by the device manufacturer, andcontains information about the device 200. In some embodiments, thecertificate 216 is placed on the device 200. In other embodiments, thecertificate 216 is placed in a directory that is not contained withindevice 200 but is accessible to device 200. In some embodiments, thedevice verification key 215 can also be used as a device identifier,instead of having a separate unique device identifier 212.

In step 3.2.2, the device manufacturer implements the functionality forthe access control module 210, the Access Archive Module 270, and thechange control module 280. This implementation may include hardware,firmware, and/or software by choice of the manufacturer. In step 3.2.3,the device manufacturer implements the functionality for executing anauthorized access payload 220 on the device 200, including thecapabilities needed in various components throughout the device 200needed to execute the payload 220, such as in a device unlocking module231, in a firmware and/or software launch module 232, in device memorycontroller 233, and/or in a plurality of cryptographic modules 240. Thisimplementation may include hardware, firmware, and/or software by choiceof the manufacturer.

In step 3.2.4, the device manufacturer stores in nonvolatile memory inthe device 200 a description of the external access policy 213 of device200. In some embodiments, the external access policy 213 is not storedon the device 200, but is stored elsewhere, and an identifier for theexternal access policy 213 is stored on the device 200. In someembodiments, this identifier for the external access policy 213 isidentified in the certificate 216 for the device verification key 215.The external access policy 213 describes the types of payloads 220 thatare allowed on the device 200. In one embodiment, the external accesspolicy 213 allows any payload 220 that can be executed on the device200. In some embodiments, the external access policy 213 describes whattypes of unlocking capabilities are available to an authorized externalaccess entity 266. In some embodiments, the external access policy 213describes the capabilities of the firmware or software that can belaunched by an authorized external access entity 266. In someembodiments, the external access policy 213 describes what cryptographickeys are allowed to be requested in payloads 220. The external accesspolicy 213 also describes the capabilities of the access archive module270, and the change control module 280.

In some embodiments, the device 200 has multiple partitions forexecuting software, and enforces different policies on the differentpartitions regarding what software can execute and what external accessis permitted. The description of these policies are included in theexternal access policy 213.

In some embodiments, no changes are allowed to the external accesspolicy 213 or to any functionality in the device 200 that wouldinvalidate any of the descriptions in the external access policy 213. Inthis case, a change control module 280 is not needed. In otherembodiments, changes are allowed to the external access policy 213 andto the corresponding functionality in the device 200 that is included inthe description of the external access policy 213. In this case, thechange control module 280 controls the authorization for such changes.In these embodiments, no change is allowed in the external access policy213 or to any functionality in the device 200 that is included in thedescription in the external access policy 213 unless that change isapproved by the change control module 280.

In some embodiments, the access control module 210 is executed in apartition that is protected from other software executing on device 200.In this way, changes can be made to the functionality of softwareexecuting outside of the partition with the access control module 210without needing approval from the change control module 280. In oneembodiment, the access control module 210 executes on a separatemicroprocessor having its own memory and a secured launch of the accesscontrol module 210 software. In other embodiments, the access controlmodule 210 executes in a trusted execution environment.

The next action in FIG. 3 is shown in block A 3.3. This action occursafter the external access entity 266 decides to access the device 200.In an anticipated use of this invention, the external access entity 266is obligated to obtain legal authorization before using the capabilityto access the device 200. In step 3.3.1, the external access entity 266prepares an access request 268 containing an access payload 263 and theunique device identifier 212 of the targeted device 200. In someembodiments, the external access entity device 260 generates an accessencryption key pair, specifically, a public access encryption key 264and a private access decryption key 265. The public access encryptionkey 264 is included in the access payload 263. The external accessentity device 260 digitally signs this request 268 with the externalaccess entity signature private key 261. In one embodiment, the signedaccess request 269 is provided directly to the device 200. In anotherembodiment, the signed access request 269 is provided to some otherentity which provides it to device 200, perhaps at some future time. Thefuture time may or may not be selected in advance.

In action A 3.4 in FIG. 3, the device 200 processes the received signedaccess request 269 in the access control module 210. In step 3.4.1, theaccess control module 210 checks the validity of the signed accessrequest 269. The access control module 210 checks that the digitalsignature on the request 269 is valid using the access verificationpublic key 211. This check may involve checking the digital signaturesof digital certificates in a certificate hierarchy when the accessverification public key 211 is the public key of a certificateauthority. If this digital signature is valid, the access control module210 also checks that the unique device identifier in the access request268 matches the unique device identifier 212 of the device 200. If thatcheck is valid, the access control module 210 also checks that theaccess payload 263 in the access request 268 is consistent with theexternal access policy 213 of the device 200. If the access request 268fails any of these checks, the access control module 210 informs thedevice 200 that the access request is invalid. In some embodiments, thatincludes stopping the thread of execution of the access control module210. If all of the checks pass, the access control module 210 proceedsto step 3.4.2, where the access control module 210 prepares anauthorized access payload 220 derived from the access payload 263.

In some embodiments, the access control module 210 includes an accessarchive module 270. In Step 3.4.3, information about the authorizedaccess payload 220 is stored in the access archive module 270. In someembodiments, this information is stored in access info 271, which is nonvolatile storage 125 available to the access archive module 270. In someembodiments, the access info 271 comprises the number of times that anauthorized access payload 220 has been produced by access control module210. In some embodiments, the access info 271 includes a hash chainderived from previous authorized access payloads 220. In someembodiments, any information from an authorized access payload 220 isnot included in real time in access info 271, but is stored temporarilyin pending access info 272, and added to access info 271 after thepassage of some specified time. In some embodiments, upon a request, theaccess archive module 270 outputs the Access Info 271. In someembodiments, the Access Archive Module 270 also provides a digitalsignature of the access info 271 using an access archive signature key274. In some embodiments, this signed message may also include theunique device identifier 212. In some embodiments, the user provides arandomly generated Nonce, and the access archive module 270 includes theNonce in the signed message. In some embodiments, the access archivemodule 270 requires a successful user authentication, including asuccess message from a user authentication module 273 before access info271 is released to any other module.

In Step 3.4.4, the authorized access payload 220 is sent from the accesscontrol module 210 to an appropriate recipient module on device 200. Instep 3.5.1, the module that receives the authorized access payload 220processes the authorized access payload 220, and performs theinstructions in the authorized access payload 220. The followingparagraphs describe several embodiments implemented by modules in thedevice 200 that receive an authorized access payload 220. For each oftheses modules, processing the instructions in the authorized accesspayload 220 sometimes results in information that needs to be sentsecurely back to the external access entity 266. In Step 3.5.2, thisinformation is encrypted using the public access encrypt key 264 andsent to the external access entity device 260.

In some embodiments, the authorized access payload 220 is sent to thedevice unlocking module 231, and the payload 220 contains instructionsto modify the functionality of the device unlocking module 231 to allowan external access entity 266 to feasibly unlock the device 200 withoutknowing the device unlocking password chosen by the user of the device200. In some embodiments, the authorized access payload 220 is sent to afirmware or software launch module 232, and payload 220 containsinstructions to the firmware or software launch module 232 to launchdifferent firmware or software than the module 232 normally wouldlaunch, or to modify the firmware or software that is launched on thedevice 200. In some embodiments, the authorized access payload 220 issent to a device memory controller module 233, and payload 220 containsinstructions to modify device 200 memory with respect to firmware orsoftware that has already been launched on the device 220, or toretrieve data stored in device 200 memory. In some embodiments, theauthorized access payload 220 places instructions in device 200 memorythat are executed to retrieve information from device 200 memory and toprovide that information to the external access entity 266.

In some embodiments, the authorized access payload 220 is sent to acryptographic module 240, and payload 220 contains instructions tomodify the functionality of the cryptographic module 240 on the device200, so that the external access entity 266 is able to decrypt messagesencrypted with a cryptographic key used in the cryptographic module 240.

FIG. 4 provides a more detailed view of the cryptographic module 240. Insome embodiments, the cryptographic module 240 has a plurality of keysstored in a cryptographic key table 242, each key having an index or keydescription. In some embodiments, the authorized access payload 220includes a key description, and the cryptographic module 240 respondswith the corresponding cryptographic key in table 242 if there is amatching key with that description.

In some embodiments, the cryptographic module 240 contains acryptographic pseudo random function 245, which takes as input a keyseed 244, and another PRF input value 243, and produces a key 246. Inone embodiment, the key seed 244 is kept constant for some period oftime, and the PRF input value 243 is derived from the key descriptionfor each key. In this embodiment, the cryptographic module 240 providesthe external access entity 266 with the key seed 244. By using the keyseed 244 and the PRF input value 243, the external access entity 266 cancompute any cryptographic key in the cryptographic key table 242 for theperiod of time when the same key seed 244 is in use for which theexternal access entity 266 knows the key description, and thus knows thePRF input value 243.

In some embodiments, the cryptographic module 240 has access to a clock248. In some embodiments, it is desirable for this to be a secure clock248, so that the clock 248 is synced with a trusted time sourceperiodically or whenever the clock 248 loses power.

FIG. 5 illustrates one embodiment of the use of cryptographic seeds 244for generating and storing keys used in the cryptographic module 240.The description in FIG. 5 uses a time period of a day, but other timeperiods are used in other embodiments. There is a maximum storage time(MST) 250 stored in the cryptographic module 240. There is acryptographic seed table 247 for storing the key seeds 244 for each day.

For each new day T, the cryptographic module 240 performs action A 5.1.In step 5.1.1, the cryptographic module 240 checks to see if it alreadyhas a crypto seed 244 for day T stored in the crypto seed table 247. Ifnot, it generates a seed 244 for the day T and adds it to the cryptoseed table 247 as Seed_for_day(T). In step 5.1.2, the cryptographicmodule 240 deletes the Seed_for_Day(T-MST). In this embodiment, theauthorized access payload 220 can include a request for the entries inthe crypto seed table 247 for seeds 244 for the day for numerous days,including the current day and days in the past. The cryptographic module240 can provide the seeds 244 for the requested days, but not any dayprior to the current day minus the maximum storage time 250.

In some embodiments, the cryptographic module 240 allows the externalaccess entity 266 to receive crypto seeds 244 that will be used in thefuture. The cryptographic module 240 has a limit, the maximum futureaccess 251, on how far in the future it will provide crypto seeds 244.This embodiment is described in action A 5.2. Suppose that thecryptographic module 240 has received an authorized access payload 220that requests crypto seeds 244 that will be used in the future. Thecryptographic module 240 generates the requested seeds 244 and storesthem in the crypto seed table 247. Let M be the maximum of the set {msuch that the seed for day T+m is requested in the authorized accesspayload 220}. Step 5.2.1 computes k as the maximum of M and max futureaccess 251. Step 5.2.2 generates the Seed_for_day (T+j) for each jstarting with 1, and up to k. These seeds 244 are generated using arandom number generator 253, and are stored in the crypto seed table247.

FIG. 5 also illustrates an alternate embodiment for the use ofcryptographic seeds 244 in generating and storing keys used in thecryptographic module 240. This is described in action A 5.3. In oneembodiment, for each new day T, in step 5.3.1, the cryptographic modulegenerates a new Seed_for_Day (T) 247 using the Pseudo_random_function245 by using the previous day's seed, Seed_for_Day(T−1) as the key seed244, and the name “seed for next day” as the Pseudo_random_functioninput value 243. In this embodiment, the cryptographic module 240 needsto store only the values of the seed_for_day(T) and Seed_for_Day(T−MST+1) in the table 247. This is because any of the missing seedsbetween T and T-MST+1 can be recomputed starting with theSeed_for_Day(T-MST+1), since the Pseudo Random Function 245 is known,and the PRF input value=“seed for next day” is known.

For the new day T, the cryptographic module 240 computes in step 5.3.2the new value of Seed_for_Day (T-MST+1) using the Pseudo_random_function245, by using the day T-MST seed, Seed_for_Day(T-MST) as the key seed244, and the name “seed for next day” as the Pseudo_random_functioninput value 243 In this embodiment, if the authorized access payload 220includes a request for the seed for day T-k for some value of k<MST, thecryptographic module 240 computes that seed 244, and provides it to theexternal access entity 266. The external access entity 266 can computethe key seed 244 for each day starting with day T-k. The external accessentity 266 can also compute key seeds 244 into the future.

In one embodiment, it is desirable to have a limit on the number of daysin the future for the external access entity 266 to have access. In thisembodiment, there is a value in the cryptographic module 240 called maxfuture access 251 for the maximum number of days in the future for whichkey seeds 244 can be provided. In the authorized access payload 220,there is an additional value, the future access request time 252. Aftera period of time has passed since the external access request wasvalidated, so that the current day T is larger than the minimum of{future access request value 252, max future access value 251}, thecryptographic module 240 generates the seed_for_day (T) using a randomnumber generator that is independent of the seeds 244 for any previousdays. In this manner, the external access entity 266 is not able toobtain access to the keys in the future beyond day T for thiscryptographic module 240 without making another access request.

In one embodiment, the cryptographic module 240 mixes in additionalrandomness into the seeds 244. In one embodiment, this is performedevery 100th day. Every 100th day, instead of performing the step 5.3.1,the cryptographic module 240 generates Seed_for_day(T) using a randomnumber generator. The Seed_for_day(T) generated using a random numbergenerator is stored in the cryptographic seed table 247 until it isdeleted in step 5.3.3 because MST additional days have passed. TheSeed_for_day(T) generated using a random number generator is notregenerated in step 5.3.2.

In some embodiments, the time period of a day is replaced by some othertime period.

In some embodiments, the device 200 encrypts information using thepublic access encrypt key 264 prior to sending that information to theexternal access entity 266.

In some embodiments, the access request 268 is encrypted.

In some embodiments, functionality in the cryptographic module 240 isprotected from modification from any software that can be installed ondevice 200. In some embodiments, the cryptographic module 240 isexecuted in a partition that is resistant to software modifications.

FIG. 6 shows an embodiment of a policy enforcing network access point600. As shown in FIG. 7, the policy enforcing network access point 600provides a service to connect a device 200 to some network 710, such asthe Internet. The policy enforcing network access point 600 includes anetwork access validation module 610 that makes a decision about whetherto allow a device 200 to connect to some network 710. In someembodiments, the network access validation module 610 contains a servicevalidation module 611 that checks whether a computing device 200 has avalid service agreement. For example, if the policy enforcing networkaccess point 600 were a wireless access point owned by a cellularwireless carrier, the service validation module 611 may check whetherthe device 200 requesting service had a valid service agreement with thecellular wireless carrier. In some embodiments, the network accessvalidation module 610 contains an authorization module 612, that checkswhether a computing device 200 has credentials that allow it to connectto some network 710. For example, a policy enforcing network accesspoint 600 in a home may have a WIFI password, and the policy enforcingnetwork access point 600 may check that a computing device 200 knowsthis WIFI password.

In an embodiment of the current invention, the network access validationmodule 610 contains an access policy validation module 620 that checkswhether a computing device 200 has a satisfactory capability forproviding an external entity to access the computing device 200. Theaccess policy validation module 620 contains a set of acceptableexternal access public keys 624. In some embodiments, this set 624contains public keys of certificate authorities and a description of thetypes of digital certificates issued by those certificate authoritiesthat are acceptable. In such an embodiment, a public key in acertificate that was issued by one of those certificate authorities andof an acceptable type is considered to be in the set of acceptableexternal access public keys 624. The access policy validation module 620also contains a set of acceptable access policies 622. Some acceptableexternal access public keys 624 are Any_Policy_AEAPK. Specifically, anyexternal access policy 213 on a device 200 where the access verificationpublic key 211 is one of the Any_Policy_AEAPK is an acceptable accesspolicy 622. Other acceptable external access public keys 624 areNot_Any_Policy_AEAPK. For an Not_Any_Policy_AEAPK, the acceptable accesspolicies 622 includes information to determine whether an externalaccess policy 213 on a device 200 where the access verification publickey 211 is one of the Not_Any_Policy_AEAPK is an acceptable accesspolicy 622.

FIG. 8 presents an embodiment of a protocol for how a policy enforcingnetwork access point 600 uses its capabilities to determine if acomputing device 200 is allowed access to a network 710 accessible bythe policy enforcing network access point 600.

In action A 8.1, a computing device 200 creates an Access_Request tostart the process of gaining access to the network 710 through thepolicy enforcing network access point 600. In some embodiments, theAccess_Request includes the device ID 212 of the device 200 and networkaccess credentials 235 of the device 200.

In message M 8.2, the device 200 sends the Access_Request to the policyenforcing network access point 600 to request access to the network 710.In some embodiments, the access request message M 8.2 and othercommunications between the device 200 and the policy enforcing networkaccess point 600 use network session keys 219 with common cryptographicprotocols for security. In some embodiments, a protocol such as TLS isused to provide for privacy of the communications, and to assure thatall of the communications are from the same device 200. In someembodiments, some of the session keys 219 used for secure communicationsare held securely in the access control module 210 of the device 200, sothat the communication session cannot be feasibly transferred to anotherdevice. The session keys 219 are also used as an indicator that thedevice 200 is in an active communication session with a policy enforcingnetwork access point 600. The session keys 219 are deleted when thedevice 200 terminates the communication session with the policyenforcing network access point 600.

The policy enforcing network access point 600 receives the AccessRequest, and in action A 8.3 evaluates the network access credentials235 to determine if credentials 235 are valid. In some embodiments, theaccess request and evaluation of network access credentials 235 mayinvolve multiple messages between the device 200 and the policyenforcing network access point 600. In some embodiments, the evaluationof the network access credentials 235 at action A 8.3 includes anevaluation by the service validation module 611 to determine if thedevice 200 has a valid service contract for accessing network 710. Insome embodiments, the evaluation of the network access credentials 235includes an evaluation by the authorization module 612 to see if device200 has authorization for accessing network 710. If the policy enforcingnetwork access point 600 determines that the network access credentials235 are not valid, the policy enforcing network access point 600proceeds to action A 8.4 to send a reject access message M 8.30 todevice 200, and to deny device 200 access to the network 710. If thepolicy enforcing network access point 600 determines that the networkaccess credentials 235 are valid, the policy enforcing network accesspoint 600 proceeds to action A 8.5.

In action A 8.5, policy enforcing network access point 600 creates aPolicy_Proof_Request. This is a request for the access control module210 of device 200 to provide a proof of the external access policy 213of device 200, so that the policy enforcing network access point 600 isable to determine in action A 8.11 whether the external access policy213 of the device 200 satisfies the acceptable access policies 622 ofthe policy enforcing network access point 600. In some embodiments, thePolicy_Proof_Request includes a NONCE (a random value generated by thepolicy enforcing network access point 600) and a description ofacceptable external access policies 622. In some embodiments, thePolicy_Proof_Request is digitally signed by the policy enforcing networkaccess point 600.

The Policy_Proof_Request is sent to device 200 in message M 8.6.

In action A 8.7, the device 200 evaluates the Policy_Proof_Request todetermine if the device 200 can create an acceptable proof. In someembodiments, action A 8.7 is performed in the access control module 210of device 200. In other embodiments, action A 8.7 is performed in othermodules of device 200. If the device 200 determines that it cannotcreate an acceptable proof of satisfying the external access policy, thedevice 200 proceeds to action A 8.31, and terminates the request foraccess. Otherwise the device 200 proceeds to action A 8.8 to create theExternal_Access_Policy_Statement.

In action A 8.8, the access control module 210 of device 200 creates anExternal_Access_Policy_Statement (EAPS). In one embodiment, theExternal_Access_Policy_Statement includes: the NONCE sent in thePolicy_Proof_Request; unique device identifier 212; a description oridentifier of parts of the external access policy 213 of the device 200;an access verification public key 211 in the access control module 210of device 200; and a public encryption key 217 corresponding to aprivate decryption key 218 controlled by the access control module 210.In some embodiments, the External_Access_Policy_Statement includes oneor more of the following items: the NONCE sent in thePolicy_Proof_Request; a cryptographic hash of the Policy_Proof_Request;the unique device identifier 212; a description or identifier of partsof the external access policy 213 of the device 200; an accessverification public key 211 in the access control module 210 of device200; an assertion that the external access policy 213 in device 200meets the description of acceptable external access policies 622 sent inthe Policy_Proof_Request; and a public Access Module encryption key 217corresponding to a private Access Module decryption key 218 controlledby the access control module 210. In some embodiments, the digitalcertificate 216 for the device verification key 215 references some ofthe items listed above: the unique device identifier 212; a descriptionor identifier of parts of the external access policy 213 of the device200; and an access verification public key 211 in the access controlmodule 210 of device 200. There is no requirement to duplicate items inthe certificate 216 and in the EAPS.

The access control module 210 of device 200 proceeds to action A 8.9. Inaction A 8.9, the access control module 210 of device 200 digitallysigns the External_Access_Policy_Statement with the device signature key214. In some embodiments, the access control module 210 stores the EAPSwhile the device 200 is in the communication session with the policyenforcing network access point 600.

In message M 8.10, the external entity accessible device 200 sends theExternal_Access_Policy_Statement, the digital signature of theExternal_Access_Policy_Statement, and the digital certificate 216 forthe device 200 verification key 215 to the policy enforcing networkaccess point 600. In some embodiments, the policy enforcing networkaccess point 600 obtains the certificate 216 through some other means,and therefore said certificate 216 doesn't need to be included inmessage M 8.10.

The combination of the EAPS, the digital signature on the EAPS by thedevice signature key 214, the digital certificate for the deviceverification key 216, and message M 8.10 link information associatedwith the Access_Request and the device verification public key 215.Information associated with the Access_Request includes the NONCE, thecryptographic hash of the Policy_Proof_Request, and the use of the TLSsession keys 219 for sending message M 8.10.

In Action A 8.11, the policy enforcing network access point 600 checksthe validity of the External_Access_Policy_Statement and the digitalsignature on the External_Access_Policy_Statement. In some embodiments,this checking includes: validating a digital certificate 216 for thedevice verification key 215; validating the digital signature on theExternal_Access_Policy_Statement using the device verification key 215;checking that the NONCE in the External_Access_Policy_Statement is thesame as the NONCE sent to the device 200 in the Policy_Proof_Request;having the access policy validation module 620 check whether the accessverification public key 211 is in the set of acceptable external accesspublic keys 624; and checking that the external access policy 213 is inthe set of acceptable access policies 622. If any of these checks fail,the policy enforcing network access point 600 proceeds to action A 8.4to send a reject access message M 8.30 to device 200, and to deny device200 access to the network 710. If all of the checks pass, this indicatesthat the device 200 has established satisfaction with the acceptableaccess policies 622, and the policy enforcing network access point 600proceeds to action A 8.12 (see FIG. 9).

In the Figures, action A 8.12 appears at the top of FIG. 9. In Action A8.12, the policy enforcing network access point 600 checks to see ifthere is a valid request for access for device 200. In some embodiments,checking that a request for access is valid includes checking that therequest includes the unique device identifier 212, and that the requesthas a digital signature that can be verified by the device embeddedverification public key 211. In some embodiments, checking that arequest for access is valid includes checking whether there is a timewindow for validity of the request, and whether the current time iswithin that time window. In some embodiments, the policy enforcingnetwork access point 600 uses the unique device identifier 212 to searchfor such a request. In some embodiments, the policy enforcing networkaccess point 600 searches a database where access requests are stored.In some embodiments, the policy enforcing network access point 600contacts another entity to find out if there are any access requests fordevice 200. If the policy enforcing network access point 600 finds anaccess request for device 200, and a digital signature on the accessrequest can verified by the access verification public key 211, thepolicy enforcing network access point 600 proceeds to action A 8.13 andsets the value of External_Access_Request to be that access request andthe digital signature on the access request. If the policy enforcingnetwork access point 600 does not find a properly signed access requestfor device 200, the policy enforcing network access point 600 proceedsto action A 8.14, and sets the value of External_Access_Request to beNull request. In some embodiments, the Null request is padded withsufficient random bits so that the length of the External_Access_Requestis the same whether or not it was computed in action A 8.13 or action A8.14.

The policy enforcing network access point 600 proceeds to action A 8.15,and computes the encryption of the External_Access_Request with thepublic AM encryption key 217. In some embodiments, a known cryptographicprotocol is used for this encryption, such as generating a symmetric keySYM_KEY, encrypting the External_Access_Request with SYM_KEY using asymmetric encryption algorithm such as AES, and encrypting SYM_KEY withthe public AM encryption key 217.

The policy enforcing network access point 600 sends theEncrypted_External_Access_Request to the device 200 in message M 8.16.

In action A 8.17, the access control module 210 of device 200 computesthe External_Access_Request (EAR) by decrypting theEncrypted_External_Access_Request using the private AM decryption key218.

The access control module 210 proceeds to action A 8.18, where module210 checks to see if the External_Access_Request is the Null request ornot.

If the External_Access_Request is the Null request, the access controlmodule 210 proceeds to action A 8.20.

If the External_Access_Request is not the Null request, the accesscontrol module 210 proceeds to action A 8.19 where it processes theExternal_Access_Request. Processing the External_Access_Request wasdescribed earlier in this specification in the description of FIGS. 2,3,4, and 5. After the access control module 210 has completed processingthe External_Access_Request, the access control module 210 proceeds toaction A 8.20.

In action A 8.20, the access control module 210 digitally signs theEncrypted_External_Access_Request with the device signature key 214. Insome embodiments, the message signed in action A 8.20 is a messagecomputed from some portion of the External_Access_Request.

In message M 8.21, the device 200 sends the digital signature of theEncrypted_External_Access_Request to the policy enforcing network accesspoint 600. In some embodiments, message M 8.21 also includes theEncrypted_External_Access_Request.

In action A 8.22, the policy enforcing network access point 600 checksvalidity of the message M 8.21. In some embodiments, this includesvalidating the digital signature on theEncrypted_External_Access_Request. In some embodiments, this checkingincludes: validating a digital certificate 216 for the deviceverification key 215; and validating the digital signature on theEncrypted_External_Access_Request using the device verification key 215.If the response message M 8.21 fails the validity checks, the policyenforcing network access point 600 proceeds to action A 8.4 (see FIG.8), sends a reject access message M 8.30 to the device 200, and deniesdevice 200 access to the network 710.

If the policy enforcing network access point 600 successfully validatesthe message M 8.21, the policy enforcing network access point 600proceeds to action A 8.23, and allows the device 200 access to thenetwork 710.

If the device 200 receives a reject access message as illustrated inmessage M 8.30, the device 200 terminates its request to access network710.

In some embodiments, the process described in FIG. 9 is repeatedperiodically while the device 200 is connected to the network 710. Insome embodiments, the process described in FIG. 9 is repeated if thepolicy enforcing network access point 600 receives a valid accessrequest while the device 200 is connected to the network 710. In someembodiments, the device 200 is allowed to remain connected to thenetwork 710 while the process described in FIG. 8 is performed, and ifthe check performed on message M 8.21 in action 8.22 of the validity ofthe response message fails, the device 200 access to the network 710 isterminated.

In some embodiments, there are no changes allowed to the access controlmodule 210 during a connectivity session with the network access device600, when such a change affects the validity of theExternal_Access_Policy_Statement signed and provided to the policyenforcing network access point 600 in message M 8.10 shown in FIG. 8.

In some embodiments, the change control module 280 does allow changes inthe access control module 210 during a connectivity session with thenetwork access device 600, even when such a change affects the validityof the External_Access_Policy_Statement signed and provided to thepolicy enforcing network access point 600 in message M 8.10 s. FIG. 10illustrates such an embodiment.

A Modify_Access_control_module_request (MACMR) is created in block 1050.In one embodiment, the MACMR is digitally signed by a policy changesignature key, which is the digital signature key portion of a digitalsignature key pair corresponding to a policy change verification key 282which is in the change control module 280. The MACMR and digitalsignature are sent to the change control module 280.

In action A 10.2, the change control module 280 checks whether the MACMRis acceptable. In one embodiment, this acceptability check includeschecking whether the digital signature on the MACMR is valid, using thepolicy change verification key 282. In one embodiment, the acceptabilitycheck is different if the device 200 is currently in a session with apolicy enforcing network access point 600. If the acceptability checksdo not pass, in action A 10.4 the access control module 210 does notmake any changes, and responds to the MACMR with a deny acceptanceresponse. If the acceptability checks do pass, the access control module210 continues to action A 10.6.

In action A 10.6, the change control module 280 checks to see if thedevice 200 is in a current session with a policy enforcing networkaccess point 600, and if so, examines the current EAPS that was signedin action A 8.9. If the changes requested in the MACMR do not invalidatethe EAPS, or if the device 200 is not currently is a session with apolicy enforcing network access point 600, the access control module 210proceeds to action A 10.16, and makes the changes requested in theMACMR, including any necessary changes to the external access policy213. If the changes requested in the MACMR do invalidate the currentEAPS, the access control module 210 proceeds to action A 10.8.

In action A 10.8, the access control module 210 creates a new EAPSconsistent with the MACMR. The access control module 210 digitally signsthe new EAPS with the device signature key 214.

In message M 10.9, the external entity accessible device 200 sends thenew EAPS and the digital signature of the new EAPS to the policyenforcing network access point 600. In some embodiments, the message M10.9 includes a digital certificate 216 for the device verification key215.

In action A 10.10, the policy enforcing network access point 600 checksthe validity of the EAPS and the digital signature on the EAPS. If thesevalidity checks do not pass, the policy enforcing network access point600 proceeds to action A 10.18 to send a message M 10.20 to the device200 indicating that the policy enforcing network access point 600 didnot accept the new EAPS. If these validity checks do pass, the policyenforcing network access point 600 proceeds to action A 10.12.

In action A 10.12, the policy enforcing network access point 600prepares an acknowledgement (Ack) of acceptance of the new EAPS. Inmessage M 10.13, this Ack is sent to the access control module 210.

In action A 10.14, the access control module 210 checks if the receivedAck is valid. If the received Ack is valid, the access control module210 proceeds to action A 10.16, and makes the changes requested in theMACMR, including any necessary changes to the external access policy213. If the received Ack is not valid, the access control moduleproceeds to action A 10.4.

In action A 10.4, the access control module 210 does not make anychanges, and responds to the MACMR with a deny acceptance response.

The storage of keys in a cryptographic key table 242, and accessprovided to external access entity 266 to enable external access entity266 to decrypt messages encrypted with keys in the cryptographic keytable 242, are described above in conjunction with FIG. 4. In someembodiments, the key description in cryptographic key table 242 includesthe date and time that the corresponding key in the key table 242 wasused. In some embodiments, the payload provides a range of dates andtimes for which external access entity 266 is allowed to decryptmessages. In some embodiments, cryptographic module 240 provides to theexternal access entity 266 only keys in cryptographic key table 242 thatare in the range of dates and times provided in the payload. In someembodiments, the payload states that external access entity 266 isallowed to receive keys of a certain type (for example, keys used inexternal communication) for a period of time in the future (for example,30 days). In this case, cryptographic module 240 provides the keys ofthat type used during that time period to external access entity 266. Insome embodiments, cryptographic module 240 deletes a key incryptographic key table 242 when a key has been stored for longer thanthe maximum storage time 250.

Functionality of the cryptographic module 240, and the creation and useof stored cryptographic keys and crypto seeds in a cryptographic keytable 242 and a cryptographic seed table 247, are also described abovein conjunction with FIG. 4. In some embodiments, it may be desirable tohave these tables stored encrypted, so that they cannot be discovered byan adversary attacking the computing device 1.

FIG. 11 shows an addition of an encryption/decryption key pair forexternal access entity 266: an external access entity decryption privatekey 291, and an external access entity encryption public key 292. Thiskey pair is generated on the external access entity device 260. In someembodiments, the key pair 291, 292 may be generated and/or used by someother device. In some embodiments, the key pair 291, 292 may begenerated and/or used by some entity other than external access entity266.

The EAE encryption public key 292 is provided to the manufacturer ofcomputing device 200. During manufacturing, the manufacturer embeds theEAE encryption public key 292 in the cryptographic module 240 as keystorage encryption key 256, as shown in FIG. 12.

In some embodiments, the manufacturer embeds a key storage CA(certificate authority) public verification key 255 into cryptographicmodule 240. In this embodiment, there is a certificate authority thathas a corresponding key storage CA private signature key that signs acertificate for key storage encryption key 256. In this embodiment,cryptographic module 240 receives key storage encryption key 256 in acertificate signed by the key storage CA private signature key.Cryptographic module 240 verifies the certificate using the key storageCA public verification key 255, as shown in FIG. 12. In someembodiments, the key storage encryption key 256 and/or the key storageCA public verification key 255 may be placed in access control module210.

Cryptographic key table 242 is described above in conjunction with FIG.4. In some embodiments, instead of having a cryptographic key table 242,there is an encrypted cryptographic key table 1242, as shown in FIG. 12.In some embodiments, a key used by cryptographic module 240 is firstencrypted using key storage encryption key 256 before it is placed inencrypted cryptographic key table 1242. In some embodiments, a knowncryptographic protocol is used for this encryption, such as generating asymmetric key SYM_KEY, encrypting one or more cryptographic keys withSYM_KEY using a symmetric encryption algorithm such as AES, andencrypting SYM_KEY with the public key storage encryption key 256. Insome embodiments, when the authorized access payload 220 includes a keydescription, the cryptographic module 240 responds with thecorresponding encrypted cryptographic key(s) matching that keydescription. In some embodiments, the key description stored in theencrypted cryptographic key table 1242 includes a date and time, and thekey description in the authorized access payload 220 also includes arange of dates and times. In some embodiments, the cryptographic module240 deletes a key in the encrypted cryptographic key table 1242 when akey has been stored for longer than the maximum storage time 250.

The functionality and use of the cryptographic seed table 247 aredescribed above in conjunction with FIG. 4. In some embodiments, insteadof having a cryptographic seed table 247, there is an encryptedcryptographic seed table 1247, as shown in FIG. 12. In some embodiments,a seed generated by the cryptographic module 240 is first encryptedusing the key storage encryption key 256 before the seed is placed inthe encrypted cryptographic seed table 1247. The term ESeed is used inFIG. 12 in encrypted cryptographic seed table 1247 to denote theencrypted seed. In some embodiments, a known cryptographic protocol isused for this encryption, such as generating a symmetric key SYM_KEY,encrypting one or more cryptographic seeds with SYM_KEY using asymmetric encryption algorithm such as AES, and encrypting SYM_KEY withthe public key storage encryption key 256. In some embodiments, when theauthorized access payload 220 includes a request for cryptographicseeds, the cryptographic module 240 responds with the correspondingencrypted cryptographic seed(s).

External access policy 213 is described above in conjunction with FIG.3. In some embodiments, the external access policy 213 includes anidentification of the access verification public key 211. In someembodiments, the external access policy 213 includes an identificationof the key storage encryption key 256 or the key storage CA publicverification key 255.

The above description is included to illustrate the operation ofpreferred embodiments, and is not meant to limit the scope of theinvention. The scope of the invention is to be limited only by thefollowing claims. From the above description, many variations will beapparent to one skilled in the art that would yet be encompassed by thespirit and scope of the present invention.

What is claimed is:
 1. A method for assuring that a computing devicemeets preselected requirements of external accessibility before allowingthe computing device to access an external network, said methodcomprising the steps of a policy enforcing network access point:receiving from the computing device a proof of establishing satisfactionof external accessibility requirements set by the policy enforcingnetwork access point, where the external accessibility requirementsinclude requiring execution of a validated payload, the validatedpayload comprises at least one of means to provide access to encryptedcommunications of the device and means to provide for simplifying theunlocking of the device without knowledge of any user password, andvalidation of the payload uses a value unique to said computing device;checking validity of the proof; and granting the computing device accessto the external network when the validity of the proof has beenconfirmed by the checking.
 2. The method of claim 1, whereinsatisfaction of the external accessibility requirements comprisessatisfaction of one of the following two rules: there is nosoftware-only method for modifying external accessibility capabilitiesof the computing device; there is a method to assure that when thecomputing device is coupled to the external network, the policyenforcing network access point is informed when external accessibilitycapabilities of the computing device are modified through software suchthat the computing device no longer satisfies the external accessibilityrequirements.
 3. A policy enforcing network access point comprising anaccess policy validation module configured to determine whether anexternal access policy is acceptably configured to: receive a requestfrom a computing device to access an external network; receive from thecomputing device a proof of satisfying external access policy, whereexternal accessibility requirements include requiring execution of avalidated payload, the validated payload comprises at least one of meansto provide access to encrypted communications of the device and means toprovide for simplifying the unlocking of the device without knowledge ofany user password, and validation of the payload uses a value unique tosaid computing device; validate the proof of satisfying external accesspolicy received from the computing device; and restrict access to theexternal network when the proof of satisfying external access policy isnot deemed acceptable.
 4. A computing device operated by a user of thecomputing device, said computing device comprising: a verificationpublic key; an access control module configured to authorize an externalaccess entity to access a cryptographic module located within thecomputing device, wherein: said authorization comprises verifying adigital signature affixed by the external access entity using theverification public key: the external access entity is not the user andis not a module executing on the computing device; the cryptographicmodule is configured to use one or more communication encryption keysfor encrypted communications with other devices; and the cryptographicmodule is configured to provide access to the one or more communicationencryption keys to an external access entity authorized by the accesscontrol module for a specified amount of time, and said cryptographicmodule is further configured to discontinue the access to any of saidcommunication encryption keys after the specified amount of timeexpires; said computer device further comprising an access archivemodule configured to record any authorized access of the cryptographicmodule by an external access entity, wherein a record stored in theaccess archive module cannot be modified or deleted by an authorizedexternal access entity; and the access archive module is furtherconfigured to output recorded information pertaining to authorizedaccess by an external access entity.
 5. The computing device of claim 4,where said access control module is further configured to: receive froma network access device information associated with a network accessrequest lodged by the computing device; and create a plurality ofdigital signatures, using a signature key of the computing device,linking said information associated with the network access request withthe verification public key, whereby granting the network access requestis facilitated.
 6. A method for providing authorized access tocommunication encryption keys used in a computing device, said methodcomprising the steps of the computing device: using communicationencryption keys in a cryptographic module located within the computingdevice; receiving a request from an external access entity to access atleast one of the communication encryption keys, wherein said requestcomprises a digital signature not created on the computing device;validating the digital signature of the external access entity requestusing a public verification key embedded in the computing device;providing the external access entity with access to the requested one ormore communication encryption keys when the digital signature has beenvalidated; discontinuing the external access entity access to any ofsaid communication encryption keys after a specified amount of timeexpires; and recording information contained in the validated externalaccess entity request in a record that cannot be deleted or modified bythe external access entity.