RELATED APPLICATIONThis application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, filed on Oct.21,2010.
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
2. Description of the Related Art
The distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom. The distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
One of the issues associated with distance learning is the verification of presence and identity of students. The teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam. The currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
Therefore, what is needed is a system and method for improving the problems with the prior art, and more particularly for a more efficient system and method for verifying the presence and identity of remote users of a computer system.
BRIEF SUMMARY OF THE INVENTIONEmbodiments of the present invention address deficiencies of the art in respect to distance learning and provide a novel and non-obvious system and method for remotely verifying presence and identity in a distance learning environment. In an embodiment of the invention, a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
In another embodiment of the invention, a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGSThe accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
FIG. 1 is a block diagram illustrating a network architecture of a remote presence and identity verification system, in accordance with one embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTIONThe present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner. The present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user. The present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
FIG. 1 is a block diagram illustrating a network architecture of a remote identity and presence verification system, in accordance with one embodiment of the present invention.FIG. 1 shows aserver102 and adatabase104 connected to thenetwork106, which may be the Internet. Thedatabase104 may house user information, such as contact information, user credentials, user records, and financial or payment information, for a plurality of users. Each user's record may also include a unique identifier for his digital key. For example,user130 may use hiscomputer132 to enter his credentials, contact information, unique identifier and payment information into thedatabase104. Thecomputer132 may be a desktop, laptop, tablet, netbook, smartphone or the like.
FIG. 1 also shows that theuser130 may use adigital key135, which may interface with thecomputer132. Thedigital key135 may be a security token (otherwise called a hardware token, authentication token, USB token, cryptographic token, or key fob), which is a physical device given to an authorized user of theserver102 to ease authentication. Security tokens are used to prove one's identity electronically. Some security tokens store cryptographic keys, such as passwords, a digital signature, or biometric data.
In one embodiment, thedigital key135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key. The Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.
The method of the present invention begins with auser130 using hiscomputer132 to log ontoserver102 over thenetwork106 using his credentials. Theuser130 may utilize a specialized secure web browser to log in and interact withserver102. An encrypted key may be read from thedigital key135 and transmitted to theserver102. In one embodiment, a password or key is automatically written into a browser text field when theuser130, upon being prompted, presses a button on thedigital key135. Encrypted data may be read from thedigital key135 and transmitted to theserver102 at random intervals.
Upon receiving an encrypted key, theserver102 decrypts the data and stores it. The specialized web browser may capture behavioral data of theuser130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers. The web browser may also send the behavioral and other data to theserver102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of theuser130 at thecomputer132.
In one embodiment of the present invention, when auser130 enters a portion of the web site that requires additional verification, such as a quiz or a test, theuser130 is presented with a popup window requesting a phone number and a pin number. When theuser130 calls the number theuser130 will be instructed to enter the pin number. After entering the pin number the popup window text will change displaying a random message to record via voice. After recording the voice message the popup window will show a textbox to enter an encrypted key from thedigital key135, such as the Yubico key. The information from the encrypted key and voice recording is stored indatabase104 for an administrator or instructor to view or analyze. The voice recording may also be analyzed with voice analyzing software.
Although specific embodiments of the invention have been disclosed, those having ordinary skill in the art will understand that changes can be made to the specific embodiments without departing from the spirit and scope of the invention. The scope of the invention is not to be restricted, therefore, to the specific embodiments. Furthermore, it is intended that the appended claims cover any and all such applications, modifications, and embodiments within the scope of the present invention.
RELATED U.S. PATENT DOCUMENTS | |
| Application Number | Filing Date |
| |
| 61/528,024 | Aug. 26, 2011 |
| 61/405,643 | Oct. 21, 2010 |
| |
PARENT CASE TEXTThis application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, entitled USB Device coupled to a Decision-making system. System, method, and computer program product for authenticating into a website with microcontroller, filed on Oct. 21, 2010.
REFERENCES CITEDSer. No. 11/105,962
APPARATUS AND METHOD FOR COMPUTER BASED EXAMINATIONS.
Ser. No. 11/734,149
SYSTEM FOR AND METHODS OF STORING AND COMPARING COMPUTER GENERATED CONTINUOUS VECTOR LINES THROUGH A NON-SECURE OR A SECURE COMMUNICATION CHANNEL.
Ser. No. 12/287,336
METHODS FOR PERFORMING SECURE ON-LINE TESTING WITHOUT PRE-INSTALLATION OF A SECURE BROWSER.
Ser. No. 12/674,142
DEVICE AND METHOD FOR GENERATING DYNAMIC CREDIT CARD DATA.