WO2024236561A1 - Cybersecurity system proving enhanced resource security - Google Patents
Cybersecurity system proving enhanced resource security Download PDFInfo
- Publication number
- WO2024236561A1 WO2024236561A1 PCT/IL2024/050461 IL2024050461W WO2024236561A1 WO 2024236561 A1 WO2024236561 A1 WO 2024236561A1 IL 2024050461 W IL2024050461 W IL 2024050461W WO 2024236561 A1 WO2024236561 A1 WO 2024236561A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- access
- mycompany
- mac
- cybersafe
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 49
- 238000004891 communication Methods 0.000 claims description 40
- 230000009471 action Effects 0.000 claims description 7
- 238000012360 testing method Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 15
- 238000012544 monitoring process Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 8
- 238000005253 cladding Methods 0.000 description 7
- 230000004044 response Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- UPLPHRJJTCUQAY-WIRWPRASSA-N 2,3-thioepoxy madol Chemical compound C([C@@H]1CC2)[C@@H]3S[C@@H]3C[C@]1(C)[C@@H]1[C@@H]2[C@@H]2CC[C@](C)(O)[C@@]2(C)CC1 UPLPHRJJTCUQAY-WIRWPRASSA-N 0.000 description 1
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 101150082208 DIABLO gene Proteins 0.000 description 1
- 102100033189 Diablo IAP-binding mitochondrial protein Human genes 0.000 description 1
- 235000013290 Sagittaria latifolia Nutrition 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 235000015246 common arrowhead Nutrition 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 238000002826 magnetic-activated cell sorting Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- Embodiments of the disclosure relate to providing cybersecure access channels and workspaces for communications networks and digital resources
- the various computer and communications technologies that provide modern communications networks and the internet encompass a large variety of virtual and bare metal network elements (NEs) that support operation of the communications networks and the stationary and/or mobile user equipment (UE) that provide access to the networks.
- the technologies have enabled the information technology (IT) and the operations technology (OT) that are the bedrocks of today’s society and provide a plethora of methods, devices, infrastructures, and protocols for controlling industrial equipment, supporting business operations, and generating and propagating data, voice, and video content via the internet.
- Information of all types is readily available through the internet to most of the global population, independent of physical location.
- BYOD Bring Your Own Device
- UEs - such as their personal smartphones, laptops, tablets, and home desktops.
- the networks have democratized the consumption of information and accelerated changes in societal infrastructure.
- a fingerprint of cyberattack surfaces characterizes each UE, whether it is a personal, spatially untethered BYOD or an enterprise, workplace user equipment (WPUE) and provides vulnerabilities for exploitation by malicious hackers to wreak havoc possibly on the UE and more often on entities and systems to which the UE connects.
- WPUE workplace user equipment
- vulnerability to cyberattack is amplified by a number of their remote contacts, the software configurations in the contacts’ respective BYODs, and the manifold of nonenterprise communications that the contacts engage in using the UEs.
- An aspect of an embodiment of the disclosure relates to providing a cyber secure communications system, hereinafter also referred to as “CyberSafe”, that provides enhanced visibility to communications traffic propagated by the system and operates to provide cyber protection for and secure access to a digital resource of a body of resources for an authorized user of a UE - a BOYD or a WPUE - associated with the body of resources.
- Cybersafe a cyber secure communications system
- the body of digital resources is owned by an enterprise, optionally referred to as “MyCompany”, that employs or engages in tasks with users authorized to use a UE associated with the body of resources to access a MyCompany resource.
- a UE associated with the body of resources is a UE that has been configured in accordance with an embodiment of the disclosure to enable an authorized user access a MyCompany resource.
- a UE associated with the body of resources may be referred to as a MyCompany UE and a user authorized to use a MyCompany UE to access a MyCompany resource may be referred to as a MyCompany user or simply a user.
- Digital resources include any information in digital format, at rest or in motion, and comprise by way of example electronic documents, images, files, data, databases, and/or software, which refers to executable code and/or data. Digital resources also include any software and/or hardware that may be used to operate on or generate a digital resource.
- a digital resource in motion is a digital resource that is being used, and/or operated on, and/or in transit between nodes of a communication system.
- a digital resource at rest is a digital resource that is in storage and not in motion.
- CyberSafe comprises an, optionally cloud based, data and processing security hub, also referred to as a CyberSafe Hub, and a web browser, also referred to as a CyberSafe secure web browser (SWB), resident in a CyberSafe isolated secure environment (CISE) of a MyCompany UE configured by, or in accordance with, CyberSafe.
- the CISE operates to isolate software (code and/or data) comprised in the SWB and in other applications that may reside in CISE from software in the UE, also referred to as UE ambient software, that may be used for tasks not associated with MyCompany resources, and from software external to the UE.
- ingress and egress of data respectively into and out from CISE and between applications in CISE is monitored and controlled by the SWB, which is configured by Cyber Safe to enforce CyberSafe and/or MyCompany security policies relevant to and access to data within CISE movement of data into and out from CISE.
- the isolation and control of movement of and access to data, and enforcement of policies operate to provide enhanced protection against cyber damage and security against leakage of data from and/or into MyCompany resources that may result from communication with and via a MyCompany UE.
- monitoring ingress and egress of data comprises monitoring communications supported by SWB, storing and processing data comprised in the monitored communications, and making the data available to the CyberSafe Hub and to MyCompany IT.
- monitoring is performed on communications outgoing from CISE and from SWB before the outgoing communications are encrypted by SWB and on communications incoming into CISE after the incoming communications are decrypted by SWB.
- user interactions with the SWB may be monitored locally or by CyberSafe security hub.
- communications between the UE and MyCompany and actions of a MyCompany user interfacing with the UE are substantially completely visible to CyberSafe and to MyCompany and may be processed by the SWB, the hub and/or other trusted components associated with MyCompany.
- the SWB is configured to request from the CyberSafe security hub upon launch from the MyCompany UE by a MyCompany user, permission to run from the UE and comprises software, optionally referred to as cladding, such as anti-injection and/or anti-exploitation software, that operates to protect the SWB from cyber damage.
- the CyberSafe Hub Upon receiving a request for permission, the CyberSafe Hub optionally checks the ID of the UE user and vets integrity of the web browser software and the security posture of the UE.
- the security hub may permit operation of the SWB from the UE and optionally issues the SWB a security token for presentation to access a MyCompany resource.
- the CyberSafe security hub, the CyberSafe SWB, and an Identity Provider (IDP) that operates to control access to MyCompany’ s digital resources are configured to cooperate in permitting an authorized user of a MyCompany UE access to a resource of MyCompany’ s digital resources.
- IDP Identity Provider
- using the Shield PW and Shield Key comprises hashing the PW and encrypting the hashed PW using the Shield Key to generate the S-MAC.
- the S-MAC comprises the Shield PW concatenated with the encrypted Shield PW.
- any procedure for generating an S-MAC using the Shield Key in accordance with an embodiment of the disclosure may be referred to as a PW-Shielding procedure.
- CyberSafe distributes the S-MAC to an access control system that gatekeeps access to the S&SRs and configures the access control system and S&SRs so that a web browser is permitted access to an S&SR only if the browser presents an S-MAC and optionally an associated Shield PW for authentication.
- CyberSafe configures the MyCompany SWB to access and use the Shield Key to process the Shield PW to generate and present for authentication the S-MAC whenever the user attempts to access an S&SR using the SWB.
- the Shield Key is stored in a secure memory, an SWB vault, of the SWB so while available for use by the SWB to generate an S-MAC, the Shield Key is unavailable to the user.
- the Shield Key may be stored in a CyberSafe Hub secure vault and the SWB allowed access to the Shield Key via the CyberSafe Hub. The user does not have access to or knowledge of the Shield Key, nor the S-MAC generated using the Shield Key, and the process of generating an S-MAC using the Shield Key is opaque to the user. The user therefore is not able to use a non-MyCompany web browser to access an S&SR.
- FIG. 1 schematically shows a MyCompany UE configured having a CyberSafe CISE and SWB to provide cyber security to an enterprise referred to as MyCompany, in accordance with an embodiment of the disclosure;
- Figs. 2A-2C show a flow diagram of a sign-in procedure by which the SWB shown in Fig.
- a CyberSafe Hub may engage in a handshake with a CyberSafe Hub to acquire a token for use in accessing a MyCompany resource, in accordance with an embodiment of the disclosure
- FIG. 3 shows a flow diagram of an onboarding procedure by which a MyCompany user may onboard a CyberSafe Shield, in accordance with an embodiment of the disclosure.
- FIGs. 4A and 4B show a flow diagram illustrating a scenario of a user operating a browser to access a MyCompany shielded resource, in accordance with an embodiment of the disclosure.
- adjectives such as “substantially” and “about” modifying a condition or relationship characteristic of a feature or features of an embodiment of the disclosure are understood to mean that the condition or characteristic is defined to within tolerances that are acceptable for operation of the embodiment for an application for which it is intended.
- a general term in the disclosure is illustrated by reference to an example instance or a list of example instances, the instance or instances referred to, are by way of nonlimiting example instances of the general term, and the general term is not intended to be limited to the specific example instance or instances referred to.
- FIG. 1 schematically shows a CyberSafe system 50 that operates to provide cyber secure communication for a communications network of an enterprise 20, also referred to as MyCompany 20 or simply MyCompany, and for MyCompany users 10 that use the communications network, in accordance with an embodiment of the disclosure.
- MyCompany may have cloud based digital resources 22, premises 24 housing on-premise servers (not shown) for storing and processing MyCompany on-premise digital resources 28, and WPUEs 30 for use by MyCompany users 10 when on-premise for accessing, using, and processing the cloud based and on-premise resources to conduct MyCompany business.
- MyCompany may permit users 10 when off-premise to access MyCompany resources from various locations using any of various types of BYODs 32.
- MyCompany users 10 may use their respective BYODs 32 for personal activities, and that MyCompany users when on-premise may, in accordance with permissions defined by MyCompany policy, be allowed to use WPUEs 30 for personal activities.
- Personal activities may include web browsing, social networking, uploading, and downloading material, via the cloud infrastructure of communication nodes 41 and websites 40.
- the MyCompany network may be required to support, as schematically indicated by double arrow-head dashed lines 43, communication between any of various combinations of MyCompany on-premise digital resources 28, cloud based digital resources 22, on-premise users 10 using WPUEs 30 installed in a MyCompany premisses 24, and off-premise users 10 using BYODs 32 at various off-premise locations.
- FIG. 1 schematically shows a CyberSafe software architecture 60 that configures a MyCompany UE 33, to protect MyCompany digital resources, at rest and/or in motion, and provide cyber secure access to the resources for a user 10 that may use MyCompany UE 33.
- MyCompany UE 33 may be a BYOD or a WPUE and be referred to as My -Workstation 33.
- Architecture 60 comprises a CyberSafe isolated environment, CISE 62, that is isolated from ambient software 35 resident in My-WorkStation 33 and comprises an SWB 64, resident in CISE 62.
- Ambient software 35 may typically include data and applications that are not intended for use in conducting MyCompany business.
- ambient software 35 may comprise a browser, an office suite of applications, a clipboard, an album of family images, a photo album and WhatsApp.
- CISE 62 may also include a set 65 of applications optionally imported from ambient software 35 and wrapped and optionally containerized by CyberSafe to associate cybersecurity features required by CyberSafe and/or MyCompany policy features with the applications.
- CISE comprises an ensemble of shared secure services 66 that may be accessed for use by SWB 64 and by applications in set 65 vian SWB 64.
- Shared secured service 66 optionally comprise a secure clipboard and a secure encrypted File System.
- CISE 62 provides an isolated security domain delimited by a substantially continuous security perimeter generated and supported by security applications, features, and functionalities of SWB 64, shared secure services 66, and wrapping of wrapped applications 65.
- CISE 62 may be configured to provide cyber security and isolation using methods of, and compliant with, such standards as PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act), and/or SOC2 (American Institute of CPAs’ Service Organization Control).
- PCI DSS Payment Card Industry Data Security Standard
- HIPAA Health Insurance Portability and Accountability Act
- SOC2 American Institute of CPAs’ Service Organization Control
- CISE 62 is isolated from the ambient software on the network level.
- SWB 64 is configured to monitor and control ingress and egress of data respectively into and out from CISE 62 and between applications in Cyber Safe wrapped applications, shared secure services 66 and/or SWB 64.
- SWB 64 is advantageosuly configured by CyberSafe to enforce CyberSafe and/or MyCompany security policies relevant to and access to and movement of data within and into and out from CISE.
- the isolation and control of movement of and access to data, and enforcement of policies operate to provide enhanced protection against cyber damage and security against leakage of data from and/or into MyCompany resources that may result from communication using a MyCompany UE.
- monitoring ingress and egress of data comprises monitoring communications supported by SWB 64, storing and processing data comprised in the monitored communications and making the data available to the CyberSafe Hub and to MyCompany IT.
- monitoring is performed on communications outgoing from CyberSafe isolated environment CISE 62 (Fig. 1) before the outgoing communications are encrypted by SWB 64 and on communications incoming into CISE after the incoming communications are decrypted by SWB 64.
- Stochastic monitoring comprises monitoring communications for monitoring periods of limited duration that begin at onset times that are randomly determined, optionally in accordance with a predetermined probability function or responsive to occurrence of a particular type of event.
- Periodic monitoring comprises continuous monitoring of communications during monitoring periods at periodic onset times.
- Monitored communications may be mirrored by SWB 64 to a destination in CyberSafe Hub and/or MyCompany for storage and/or processing or may be filtered for data of interest before being transmitted to a destination in CyberSafe Hub and/or MyCompany for storage and/or processing.
- Features and constraints that configure how monitored communications are handled by SWB 64 may be determined based on CyberSafe and/or MyCompany policy. Such policy may specify how processing of data is shared between the local SWB and the CyberSafe Hub.
- the features and/or functionalities may comprise, at least one or any combination of more than one of functionalities that enable SWB 60 to: cooperate with a MyCompany IDP to verify and authorize a user 10 to access CISE 62 and MyCompany resources; acquire data characterizing websites visited by MyCompany users that may be used to classify cyber risks associated with the websites; acquire data characterizing browser extensions that may compromise SWB 64 security features; acquire data that may be processed to determine normal behavior and use of MyCompany resources by MyCompany users as a group and/or as individuals; monitor engagement of a MyCompany user with a MyCompany resource and control the engagement to enforce CyberSafe and/or MyCompany security constraints.
- enforcing CyberSafe and/or MyCompany security constraints comprises requiring that all communications between UE 33 and a MyCompany resource be propagated via an SWB 64 and CyberSafe tunnels that connect the SWB to the resource and enforcing CyberSafe and/or MyCompany permissions to the resources.
- enforcing security constraints comprises identifying anomalies in communications between UE 33 and a company resource and operating to eliminate or ameliorate damage from an identified anomaly and generate an alert to its occurrence.
- FIGs. 2A-2C show a flow diagram 100 of a sign-in procedure by which a given user U n using user equipment UE e contacts the CyberSafe security hub to request authorization to access and use CISE in UE e and have a resident SWB in CISE issued a security token for access to MyCompany resources.
- UE-ID e may include any suitable identifier such as a MAC (media access) address, a UUID (Universal Unique Identifier), or an IMSI (international mobile subscriber identity), and/or information that associates UE e with user U n , SWB , and/or MyCompany.
- the B-ID may include a browser user agent string, any suitable identifier that CyberSafe assigns SWB , and/or information that associates SWB with UE e , U n , and/or MyCompany.
- a given user U n may be associated with more than one UE e and/or more than one SWB , and the user ID U-ID n may comprise data that identifies the associations.
- a given user UE e may be associated with more than one U n and/or more than one SWB
- a given SWB with more than one U n and/or more than one UE e
- the respective IDs, UE- ID e and B-ID may comprise data that maps the associations.
- Any combination of one or more of U n , UE e , and/or SWB may comprise a Time of Day (ToD) for each of at least one previous sign in to CyberSafe.
- ToD Time of Day
- the CyberSafe Security Hub authenticates the Extended ID.
- Authenticating the Extended ID may comprise engaging in a three factor authentication of user U n and determining consistency of the associations and/or ToDs in at least one of U-ID n , UE-ID e , or B-ID and another at least one of the IDs.
- a decision block 106 if the Extended ID is not OK, the hub proceeds to a block 142, denies the requested token, and optionally sends an alert of the refusal to the CyberSafe Hub.
- the hub optionally proceeds to a decision block 108 to decide whether or not to run an integrity test on the SWB software.
- the decision to run or not to run an integrity test may depend on a MyCompany and/or CyberSafe testing policy.
- the policy may depend on when the CyberSafe Hub ran a last integrity test on the SWB , and/or UE e , a user profile characterizing user U n browsing behavior and internet use pattern, and/or a feature of a cyberattack landscape.
- An exemplary SIT may comprise at least one, or any combination of more than one of:
- the CyberSafe Hub determines a weight vector WIT comprising a weight wit i for each sit i that provides an estimate for how appropriate the test sit i is for determining integrity of the SWBj, software.
- a wit i for a given sit i is a function of:
- CyberSafe Hub runs a selection of tests sit i on SWB software responsive to their respective weights wit i , for example where a greater weight wit i indicates greater relevance, by selecting integrity tests sit i for which their respective weights are greater than a median weight wit i .
- CyberSafe Hub determines a value for a measure of a Qol(e,b) (quality of integrity) for SWB software in UE e responsive to a measure of integrity returned by each of the selected tests sit i .
- Qol(e,b) is an average of the measures of integrity provided by the sit i weighted by their respective weights wit i .
- CyberSafe Hub determines if the Qol value is satisfactory or not. If the Qol is not satisfactory the hub proceeds to block 142 and denies issuing the token and optionally sends an alert. On the other hand if the Qol is satisfactory the hub proceeds to a decision block 120 to determine whether or not to run ambient software environment tests on UE e
- Software environment tests are tests to determine to what extent, if at all, ambient software in UE e has been compromised by cyber damage or is insufficiently protected against cyber damage.
- the decision whether or not to perform the environment test on UE e may be based on many of the same considerations that are weighed when making the decision as to whether or not perform to integrity tests. For example, the decision may depend on MyCompany and/or CyberSafe policy and such factors as UE e hardware, for example whether the UE e is a mobile phone or laptop, when a last environment test was run on UE e , a browsing behavior pattern of user U n , and/or a feature of a cyberattack landscape.
- Static vulnerability features are features that are code and/or data elements comprised in the ambient software of UE e that are considered to render the ambient software and/or digital resources that are not comprised in the ambient software, such as CyberSafe and/or MyCompany resources, vulnerable to cyberattack.
- Dynamic vulnerability features are temporary vulnerability features, such as whether the UE e is connected to a public WiFi or to a cyber dangerous website, that characterize a current use of UE e .
- determining a risk estimate for a given public Wi-Fi may be dependent on a physical location of the Wi-Fi, current traffic carried by the Wi-Fi at a time for which the estimate is made, and recent history of cyberattacks attempted via the Wi-Fi.
- Risks associated with patching may be a function of types of types of patching required or installed.
- 1 k ⁇ K ⁇ ) ⁇ . And in a block 128 CyberSafe may retrieve from a CyberSafe database a user profile that characterizes a cyber risk profile of the user optionally comprising a set UCR(n) of risk components ucr n r (1 ⁇ r R ⁇ ), where UCR(n) ⁇ ucr n r ll ⁇ r R) ⁇ , that may be used to characterize behavioral features of user U n that expose CyberSafe and/or MyCompany to cyberattack.
- CyberSafe processes HVR(e), HCC(e), UCR(n), and/or a set CPA(b) of cyber cladding software attributes of SWB that respectively indicate measures of cyber security that the attributes provide to SWB to determine if CPA(b) provides SWB with advantageous protection against cyberattacks. For example, for a user with high privilege access to MyCompany resources may be required by CPA(b) to run additional security checks and install additional security controls, such as EDR, in order to allow user access a MyCompany resource. Additionally, some capabilities that have impact on the system’s vulnerability to cyberattacks may be constrained or disabled by CPA(b) if the user is accessing an unknown website or a websites with low security reputation (and therefore high risk). In an embodiment processing is performed by a neural network configured to operate on an input feature vector comprising component features based on components of HVR(e), HCC(e), UCR(n), and/or CPA(b).
- the hub proceeds to block 140 and issues the requested token. If on the other hand the cladding protection is not advantageous, the hub may proceed to a block 134 to determine whether or not to amend the cladding protection to improve protection. If the hub decides not to amend, the hub may proceed to block 142 and deny the token and raise an alert. On the other hand if the decision is to amend the cladding, the hub proceeds to a block 136, amends the cladding and optionally proceeds to a decision block 138 to determine if the amendment has resulted in sufficient improvement in cyber protection or not. If the improvement is not sufficient CyberSafe Hub proceeds to block 142 and denies the token.
- CyberSafe may require each MyCompany user to access an S&SR only from a MyCompany SWB having onboarded to CyberSafe Shield, optionally from the CyberSafe Hub.
- CyberSafe Shield provides the SWB with a Shield Key, associated with a user Shield PW. Shield configures the SWB to use the Shield Key to encrypt, optionally the SWB Shield PW, to generate an S-MAC comprising the encrypted Shield PW, and optionally the Shield PW, for presentation to an S&SR whenever requesting access to the S&SR.
- CyberSafe operates to provide an access control system that gatekeeps access to S&SRs with the S-MACs of SWBs that have onboarded to Shield and configures the access control system and S&SRs to allow access to the S&SRs only to SWBs that present the S&SRs with an S-MAC.
- the Shield Key provided to an SWB by Shield is stored in a safe memory of the SWB and is unknown to and inaccessible by the user, and generation of an S-MAC using the Shield Key is opaque to the user so that the user never has access to an S-MAC generated using the Shield Key.
- MyCompany users are unable to port a Shield Key or an S-MAC to a browser that is not a MyCompany SWB and are constrained to use only MyCompany SWBs to access the MyCompany S&SRs.
- FIG. 3 shows a schematic flow diagram 200 of a procedure, also referred to by the label 200, by which CyberSafe and MyCompany may be configured to orchestrate and establish cooperation to use CyberSafe in accordance with an embodiment of the disclosure.
- Actions and/or tasks disclosed in flow diagram 200 that are recited as being undertaken by a particular entity such as CyberSafe, MyCompany, Shield and/or components of thereof, are not limited to being undertaken by the recited entity and may be undertaken by a suitable entity other than the recited entity.
- a particular task undertaken by Shield may be undertaken by MyCompany, optionally in cooperation with CyberSafe.
- Provisioning the CyberSafe Hub with Shield comprises providing the hub with an inventory of Shield Keys, a PW shielding function for generating S-MACs, a hub secure vault in which Shield Keys are securely stored, and a hub Shield Database that records deployment of Shield Keys.
- the hub database may comprise data records that identify Shield Keys that are assigned to given MyCompany SWBs and associate the assigned Shield Keys with user passwords and S-MACs that are presented by the given SWBs to access MyCompany resources.
- the CyberSafe Hub may also be provided with a Shield Manager that performs management tasks for Shield, such as by way of example managing interfacing with MyCompany SWBs to assign Shield Keys to the SWBs, updating the hub Shield Key Database, and distributing S-MACs associated with MyCompany SWBs to a MyCompany access control system and/or S&SRs.
- the Shield Manager may be provided with an email address to facilitate communications between the Shield Manager and MyCompany users.
- MyCompany determines a set of S&SRs that are to be protected by Shield to prevent the S&SRs from being accessed by browsers that are not MyCompany SWBs and in a block 206 MyCompany provides the CyberSafe hub with a list of the S&SRs in the set.
- Shield optionally provisions MyCompany SWBs for cooperating with
- CyberSafe Shield provides each of a plurality of the SWBs with the Shield Manager e-mail address, a Shield Key optionally exclusive to the SWB, a Shield PW, optionally provided in a password reset procedure described below, associated with the Shield Key and SWB, and an SWB secure vault for concealed storage of the Shield Key.
- Shield provides the SWB with the PW- Shielding function for accessing and encrypting the Shield PW using the Shield Key to generate an S-MAC, and software supporting presentation of the S-MAC to an S&SR for authentication when requesting access to the S&SR.
- the S-MAC comprises an encryption generated using the Shield Key.
- the encryption comprises an encryption of the Shield PW as optionally reset by user and/or a function of the Shield PW.
- the function of the Shield PW may include a hash of the Shield PW.
- the S-MAC comprises a concatenation of the Shield PW and the encryption.
- CyberSafe shield distributes S-MACS generated by SWBs using Shield Keys to an access control system or systems that gatekeep/s access to S&SRs, and in a block 212 configures the access control system/s and the S&SRs to allow access to the S&SRs only to SWBs that present an S-MAC to satisfy “Shield Authentication”.
- Shield configures SWBs provided with a Shield Key and a Shield PW to use the PW-Shielding Function and generate an S-MAC for presentation to an S&SR whenever requesting access to the S&SR.
- FIGs. 4A and 4B show a flow diagram 300 illustrating operation of Shield engaging with a MyCompany user in a possible scenario by which the MyCompany user attempts to access a MyCompany S&SR in accordance with an embodiment of the disclosure.
- a MyCompany user using a web browser attempts to access a given S&SR using a user password (PW).
- PW user password
- SWB MyCompany Secure Web Browser
- the scenario optionally progresses to a block 308 in which the SWB determines if an identity for the S&SR and an associated Shield Key are present in an SWB Secure Vault (Fig. 3 block 208).
- a decision block 310 if the S&SR and Shield Key are found, optionally in a block 312 the SWB invokes the PW-Shielding Function to generate an S-MAC responsive to the user PW accompanying the access request and in a block 314 presents the S-MAC to the S&SR.
- the S-MAC is authenticated by a MyCompany S&SR access control system, and the SWB is granted access to the S&SR.
- the SWB cannot and does not submit the request for access together with an S-MAC, and optionally in a block 318 access to the S&SR is denied and the user is prompted to reset the user PW.
- the prompt notification comprises a limited reset link provided via email or SMS from a MyCompany email server and in a block 320 the user attempts to reset by clicking on the link and entering a reset PW.
- MyCompany email server routes the reset to the CyberSafe hub Shield manager for processing.
- the Shield Manager checks the hub Shield Database to determine, optionally in accordance with a sign-in procedure similar to sign-in procedure 100, if the reset request is from a MyCompany SWB.
- a branching block 326 if the request is not from a MyCompany SWB the scenario proceeds to a block 340.
- Shield Manager denies resetting the PW and notifies the user to use a MyCompany SWB.
- the request is assumed to be from an SWB and the scenario proceeds to a block 328.
- Shield accepts the reset PW as a Shield PW, extracts a Shield Key from the hub Secure Vault and in a block 330 uses a PW-Shielding Function to generate an S-MAC responsive to the reset PW.
- Shield Manager provides the SWB with the Shield Key, which the SWB sequesters in the SWB Secure Vault, makes the S- MAC available to the MyCompany CyberSafe Shield access control system and notifies the user that the reset is successful.
- a block 334 the user attempts access to the S&SR via the SWB using the reset user PW.
- the SWB invokes the PW-Shielding Function to produce an S-MAC using the Shield Key received from Shield Manager and submits the reset PW and SMAC with a request for access to the given S&SR. Responsive to the submission of the S-MAC and reset PW, the SWB is granted access to the given S&SR.
- the scenario may then proceed to block 320 where the user submits a reset request and the user’s WB progresses through to block 326 where the user’s browser is again denied access and shunted from block 326 to block 340 where the user is advised to use a MyCompany SWB.
- each MyCompany user and particular MyCompany SWB that the user uses are, as described above issued an exclusive Shield Key in response to a request to access an S&SR
- the shared S-MAC comprises an encryption that is common to all S-MACs generated by SWBs having the same shared Shield Key.
- the same ghost PW is common to all the users of the group, the SWBs via which the users request to reset their respective PWs, and the different reset PWs they respectively request to have accepted by Shield.
- the S-MAC also comprises, or is otherwise associated with, the ghost PW and/or user reset PW associated with the ghost PW, whenever the S-MAC is presented to an S&SR for permission to access the S&SR.
- a shared Shield Key may be shared by a plurality of different MyCompany SWBs that are used by a same, optionally one, MyCompany user.
- an S-MAC may be tagged to invoke a particular CyberSafe, MyCompany, and/or Shield action or procedure when presented for a user access to an S&SR.
- the S-MAC may be tagged to invoke a particular security policy or monitoring format, such as by way of example a high-resolution, continuous monitoring format of user activity when interacting with the S&SR, or allowing access to the S&SR for a particular period of time, or time of day (TOD).
- a method of constraining a user having a user password (PW) for accessing a given digital resource to use a web browser (WB) from a set of one or more selected WBs to access the digital resource comprising: providing the WB with an encryption key associated with the user PW and unknown and inaccessible to the user; configuring the WB to use the encryption key to generate a Shielded Message Authentication Code (S-MAC) and present the the S-MAC whenever requesting access to the given digital resource; and configuring an access control system that gatekeeps access to the given digital resource to refuse a request for access that does not include the S-MAC.
- PW user password
- WB web browser
- the method comprises configuring the access control system to refuse access if the access request does not include the user PW.
- the S-MAC may comprise an encryption of the user PW encrypted using the encryption key.
- the encryption of the user PW comprises an encryption of a hash of the user PW.
- the S-MAC may comprise a concatenation of the user PW and the encrypted user PW.
- the encryption key is exclusive to the user. In an embodiment the encryption key is exclusive to the WB. In an embodiment the encryption key is exclusive to the user equipment (UE) hosting the WB.
- UE user equipment
- the method comprises providing the WB with a ghost password associated with the user password.
- the ghost password is unknown and inaccessible to the user.
- the S-MAC may comprise an encryption of the ghost password.
- the ghost password and encryption key are shared with a plurality of users.
- the ghost password and encryption key are shared with a plurality of WBs.
- the method comprises tagging the S-MAC to invoke a particular action or procedure responsive to presentation of the S-MAC.
- the method comprises, notifying the user to reset the user password and that access is refused if the user requests access to the resource from a WB that does not present an S-MAC.
- the method comprises denying reset of the user password if the user attempts to reset from a WB that is not a member of the set of one or more selected WBs.
- the method comprises accepting the reset and providing the the encryption key in association with the reset PW if the user attempts to reset from a WB belonging to the set of one or more selected WBs.
- each of the verbs, “comprise” “include” and “have”, and conjugates thereof, are used to indicate that the object or objects of the verb are not necessarily a complete listing of components, elements or parts of the subject or subjects of the verb.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
A method of constraining a user having a user password (PW) for accessing a given digital resource to use a particular web browser (WB) to access the digital resource, the method comprising: providing the particular WB with an encryption key associated with the user PW and unknown and inaccessible to the user; configuring the WB to use the encryption key to generate a Shielded Message Authentication Code (S-MAC) and present the given digital resource with the S-MAC whenever requesting access to the given digital resource; and configuring an access control system that gatekeeps access to the given digital resource to refuse a request for access that does not include the S-MAC.
Description
CYBERSECURITY SYSTEM PROVING ENHANCED RESOURCE SECURITY
RELATED APPLICATIONS
[0001] The present application claims the benefit under 35 U.S.C. 119(e) of U.S. Provisional Application 63/466,287 filed on May 14, 2023, the disclosure of which is incorporated herein in its entirety by reference.
FIELD
[0002] Embodiments of the disclosure relate to providing cybersecure access channels and workspaces for communications networks and digital resources
BACKGROUND
[0003] The various computer and communications technologies that provide modern communications networks and the internet, encompass a large variety of virtual and bare metal network elements (NEs) that support operation of the communications networks and the stationary and/or mobile user equipment (UE) that provide access to the networks. The technologies have enabled the information technology (IT) and the operations technology (OT) that are the bedrocks of today’s society and provide a plethora of methods, devices, infrastructures, and protocols for controlling industrial equipment, supporting business operations, and generating and propagating data, voice, and video content via the internet. Information of all types is readily available through the internet to most of the global population, independent of physical location. And today large segments of the global community regularly work remotely from their homes, coffee shops, and vacation venues via connectivity to their employers and work groups using their personal, Bring Your Own Device (BYOD), UEs - such as their personal smartphones, laptops, tablets, and home desktops. The networks have democratized the consumption of information and accelerated changes in societal infrastructure.
[0004] However, the benefits provided by the computer and communications technologies are not without their costs. The same technologies and benefits have substantially increased the difficulty in providing and maintaining legitimate personal and collective rights to confidentiality, and in protecting the integrity and safety of the selfsame industrial and business operations that the technologies have enabled against violation and damage from cyberattacks.
[0005] For example, a fingerprint of cyberattack surfaces characterizes each UE, whether it is a personal, spatially untethered BYOD or an enterprise, workplace user equipment (WPUE) and provides vulnerabilities for exploitation by malicious hackers to wreak havoc possibly on the UE and more often on entities and systems to which the UE connects. Each UE, and in particular a BYOD, in addition to functioning as a person’s communications node, is a potential cyberattack node for any communications network to which the UE connects. For enterprises that must be in contact with clients, workers, and/or associates that have segued at least in part to remote work using their personal BYODs, vulnerability to cyberattack is amplified by a number of their remote contacts, the software configurations in the contacts’ respective BYODs, and the manifold of nonenterprise communications that the contacts engage in using the UEs. The gravitation of enterprise data and storage resources to the cloud and the proliferation of technologies such as Infrastructure as a Service (laaS), Platform as a Service (PaaS), and Software as a Service (SaaS) that remote contacts access and use further compounds the complexity of providing for appropriate cyber protection.
SUMMARY
[0006] An aspect of an embodiment of the disclosure relates to providing a cyber secure communications system, hereinafter also referred to as “CyberSafe”, that provides enhanced visibility to communications traffic propagated by the system and operates to provide cyber protection for and secure access to a digital resource of a body of resources for an authorized user of a UE - a BOYD or a WPUE - associated with the body of resources.
[0007] For convenience of presentation it is assumed that the body of digital resources is owned by an enterprise, optionally referred to as “MyCompany”, that employs or engages in tasks with users authorized to use a UE associated with the body of resources to access a MyCompany resource. A UE associated with the body of resources is a UE that has been configured in accordance with an embodiment of the disclosure to enable an authorized user access a MyCompany resource. A UE associated with the body of resources may be referred to as a MyCompany UE and a user authorized to use a MyCompany UE to access a MyCompany resource may be referred to as a MyCompany user or simply a user.
[0008] Digital resources include any information in digital format, at rest or in motion, and comprise by way of example electronic documents, images, files, data, databases, and/or software,
which refers to executable code and/or data. Digital resources also include any software and/or hardware that may be used to operate on or generate a digital resource. A digital resource in motion is a digital resource that is being used, and/or operated on, and/or in transit between nodes of a communication system. A digital resource at rest is a digital resource that is in storage and not in motion.
[0009] In an embodiment CyberSafe comprises an, optionally cloud based, data and processing security hub, also referred to as a CyberSafe Hub, and a web browser, also referred to as a CyberSafe secure web browser (SWB), resident in a CyberSafe isolated secure environment (CISE) of a MyCompany UE configured by, or in accordance with, CyberSafe. In an embodiment, the CISE operates to isolate software (code and/or data) comprised in the SWB and in other applications that may reside in CISE from software in the UE, also referred to as UE ambient software, that may be used for tasks not associated with MyCompany resources, and from software external to the UE. In an embodiment ingress and egress of data respectively into and out from CISE and between applications in CISE is monitored and controlled by the SWB, which is configured by Cyber Safe to enforce CyberSafe and/or MyCompany security policies relevant to and access to data within CISE movement of data into and out from CISE. The isolation and control of movement of and access to data, and enforcement of policies operate to provide enhanced protection against cyber damage and security against leakage of data from and/or into MyCompany resources that may result from communication with and via a MyCompany UE.
[00010] In an embodiment monitoring ingress and egress of data comprises monitoring communications supported by SWB, storing and processing data comprised in the monitored communications, and making the data available to the CyberSafe Hub and to MyCompany IT. In an embodiment, monitoring is performed on communications outgoing from CISE and from SWB before the outgoing communications are encrypted by SWB and on communications incoming into CISE after the incoming communications are decrypted by SWB. In addition, user interactions with the SWB may be monitored locally or by CyberSafe security hub. As a result, communications between the UE and MyCompany and actions of a MyCompany user interfacing with the UE are substantially completely visible to CyberSafe and to MyCompany and may be processed by the SWB, the hub and/or other trusted components associated with MyCompany.
[00011] In accordance with an embodiment of the disclosure, the SWB is configured to request from the CyberSafe security hub upon launch from the MyCompany UE by a MyCompany user,
permission to run from the UE and comprises software, optionally referred to as cladding, such as anti-injection and/or anti-exploitation software, that operates to protect the SWB from cyber damage. Upon receiving a request for permission, the CyberSafe Hub optionally checks the ID of the UE user and vets integrity of the web browser software and the security posture of the UE. If the user ID is acceptable, the software integrity, and/or cladding, are found to be intact, and/or the security posture of the UE environment satisfactory, the security hub may permit operation of the SWB from the UE and optionally issues the SWB a security token for presentation to access a MyCompany resource.
[00012] In an embodiment the CyberSafe security hub, the CyberSafe SWB, and an Identity Provider (IDP) that operates to control access to MyCompany’ s digital resources are configured to cooperate in permitting an authorized user of a MyCompany UE access to a resource of MyCompany’ s digital resources.
[00013] An aspect of an embodiment of the disclosure relates to providing a method by which CyberSafe may operate to constrain MyCompany users to use a CyberSafe SWB to access a selection of MyCompany resources.
[00014] In an embodiment to constrain the user to use only a MyCompany SWB to access the selection of resources, CyberSafe requires the user to onboard an SWB that the user uses to access the selected resources to an enhanced cyber protection procedure which operates to shield the selected resources from access by non-MyCompany browsers. The enhanced cyber protection procedure may be referred to as a “CyberSafe Shield” or simply “Shield”, and the selected resources, “selected and shielded resources” (S&SRs).
[00015] To onboard Shield the user may be instructed to access, optionally CyberSafe Hub, via the user SWB to reset a user password (PW) associated with the user and the SWB. In response, CyberSafe Hub associates an encryption key, referred to as a Shield Key, with the reset password, optionally referred to as a Shield password (PW). The CyberSafe Hub uses the Shield Key and optionally the Shield PW to generate a secure access token, optionally referred to as a Shield Message Authentication Code (S-MAC), for presentation to an S&SR for access to the S&SR. Optionally, using the Shield password and Shield Key to generate an S-MAC comprises encrypting the Shield PW using the Shield Key. Optionally, using the Shield PW and Shield Key comprises hashing the PW and encrypting the hashed PW using the Shield Key to generate the S-MAC. Optionally, the S-MAC comprises the Shield PW concatenated with the encrypted Shield PW. For
convenience of presentation any procedure for generating an S-MAC using the Shield Key in accordance with an embodiment of the disclosure may be referred to as a PW-Shielding procedure. CyberSafe distributes the S-MAC to an access control system that gatekeeps access to the S&SRs and configures the access control system and S&SRs so that a web browser is permitted access to an S&SR only if the browser presents an S-MAC and optionally an associated Shield PW for authentication.
[00016] CyberSafe configures the MyCompany SWB to access and use the Shield Key to process the Shield PW to generate and present for authentication the S-MAC whenever the user attempts to access an S&SR using the SWB. In an embodiment the Shield Key is stored in a secure memory, an SWB vault, of the SWB so while available for use by the SWB to generate an S-MAC, the Shield Key is unavailable to the user. In an embodiment the Shield Key may be stored in a CyberSafe Hub secure vault and the SWB allowed access to the Shield Key via the CyberSafe Hub. The user does not have access to or knowledge of the Shield Key, nor the S-MAC generated using the Shield Key, and the process of generating an S-MAC using the Shield Key is opaque to the user. The user therefore is not able to use a non-MyCompany web browser to access an S&SR.
[00017] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
BRIEF DESCRIPTION OF FIGURES
[00018] Non-limiting examples of embodiments of the invention are described below with reference to figures attached hereto that are listed following this paragraph. Identical features that appear in more than one figure are generally labeled with a same label in all the figures in which they appear. A label labeling an icon representing a given feature of an embodiment of the invention in a figure may be used to reference the given feature. Dimensions of features shown in the figures are chosen for convenience and clarity of presentation and are not necessarily shown to scale.
[00019] Fig. 1 schematically shows a MyCompany UE configured having a CyberSafe CISE and SWB to provide cyber security to an enterprise referred to as MyCompany, in accordance with an embodiment of the disclosure;
[00020] Figs. 2A-2C show a flow diagram of a sign-in procedure by which the SWB shown in Fig.
1 may engage in a handshake with a CyberSafe Hub to acquire a token for use in accessing a MyCompany resource, in accordance with an embodiment of the disclosure;
[00021] Fig. 3 shows a flow diagram of an onboarding procedure by which a MyCompany user may onboard a CyberSafe Shield, in accordance with an embodiment of the disclosure; and
[00022] Figs. 4A and 4B show a flow diagram illustrating a scenario of a user operating a browser to access a MyCompany shielded resource, in accordance with an embodiment of the disclosure.
DETAILED DESCRIPTION
[00023] In the discussion, unless otherwise stated, adjectives such as “substantially” and “about” modifying a condition or relationship characteristic of a feature or features of an embodiment of the disclosure, are understood to mean that the condition or characteristic is defined to within tolerances that are acceptable for operation of the embodiment for an application for which it is intended. Wherever a general term in the disclosure is illustrated by reference to an example instance or a list of example instances, the instance or instances referred to, are by way of nonlimiting example instances of the general term, and the general term is not intended to be limited to the specific example instance or instances referred to. The phrase “in an embodiment”, whether or not associated with a permissive, such as “may”, “optionally”, or “by way of example”, is used to introduce for consideration an example, but not necessarily a required configuration of possible embodiments of the disclosure. Unless otherwise indicated, the word “or” in the description and claims is considered to be the inclusive “or” rather than the exclusive or, and indicates at least one of, or any combination of more than one of items it conjoins. Whereas features and actions of flow diagrams shown in the figures and discussed in the specification are presented and discussed substantially in an ordered sequence of flow diagram blocks the features and actions in a given flow diagram may be undertaken in an order other than that presented in the flow diagram.
[00024] Fig. 1 schematically shows a CyberSafe system 50 that operates to provide cyber secure communication for a communications network of an enterprise 20, also referred to as MyCompany 20 or simply MyCompany, and for MyCompany users 10 that use the communications network, in accordance with an embodiment of the disclosure. MyCompany may have cloud based digital resources 22, premises 24 housing on-premise servers (not shown) for storing and processing
MyCompany on-premise digital resources 28, and WPUEs 30 for use by MyCompany users 10 when on-premise for accessing, using, and processing the cloud based and on-premise resources to conduct MyCompany business. MyCompany may permit users 10 when off-premise to access MyCompany resources from various locations using any of various types of BYODs 32. It is assumed that MyCompany users 10 may use their respective BYODs 32 for personal activities, and that MyCompany users when on-premise may, in accordance with permissions defined by MyCompany policy, be allowed to use WPUEs 30 for personal activities. Personal activities may include web browsing, social networking, uploading, and downloading material, via the cloud infrastructure of communication nodes 41 and websites 40. The MyCompany network, may be required to support, as schematically indicated by double arrow-head dashed lines 43, communication between any of various combinations of MyCompany on-premise digital resources 28, cloud based digital resources 22, on-premise users 10 using WPUEs 30 installed in a MyCompany premisses 24, and off-premise users 10 using BYODs 32 at various off-premise locations.
[00025] In accordance with an embodiment of the disclosure CyberSafe 50 comprises an optionally cloud based CyberSafe processing and data hub 52 and a software architecture 60 that operates to cyber protect MyCompany communications and digital resources in each of a plurality of MyCompany UEs, BYODs 32 and/or WPUEs 30, used by MyCompany users 10 to access and use MyCompany resources. CyberSafe Hub 52 comprises and/or has access to cloud based and/or bare metal processing and memory resources required to enable and support functionalities that the hub provides to CyberSafe 50 and components of CyberSafe.
[00026] By way of example, Fig. 1 schematically shows a CyberSafe software architecture 60 that configures a MyCompany UE 33, to protect MyCompany digital resources, at rest and/or in motion, and provide cyber secure access to the resources for a user 10 that may use MyCompany UE 33. MyCompany UE 33 may be a BYOD or a WPUE and be referred to as My -Workstation 33.
[00027] Architecture 60 comprises a CyberSafe isolated environment, CISE 62, that is isolated from ambient software 35 resident in My-WorkStation 33 and comprises an SWB 64, resident in CISE 62. Ambient software 35 may typically include data and applications that are not intended for use in conducting MyCompany business. By way of example, ambient software 35 may comprise a browser, an office suite of applications, a clipboard, an album of family images, a photo
album and WhatsApp. CISE 62 may also include a set 65 of applications optionally imported from ambient software 35 and wrapped and optionally containerized by CyberSafe to associate cybersecurity features required by CyberSafe and/or MyCompany policy features with the applications. In an embodiment CISE comprises an ensemble of shared secure services 66 that may be accessed for use by SWB 64 and by applications in set 65 vian SWB 64. Shared secured service 66 optionally comprise a secure clipboard and a secure encrypted File System.
[00028] CISE 62 provides an isolated security domain delimited by a substantially continuous security perimeter generated and supported by security applications, features, and functionalities of SWB 64, shared secure services 66, and wrapping of wrapped applications 65. In accordance with an embodiment, CISE 62 may be configured to provide cyber security and isolation using methods of, and compliant with, such standards as PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act), and/or SOC2 (American Institute of CPAs’ Service Organization Control). Optionally CISE 62 is isolated from the ambient software on the network level.
[00029] In an embodiment to provide isolation and security SWB 64 is configured to monitor and control ingress and egress of data respectively into and out from CISE 62 and between applications in Cyber Safe wrapped applications, shared secure services 66 and/or SWB 64. SWB 64 is advantageosuly configured by CyberSafe to enforce CyberSafe and/or MyCompany security policies relevant to and access to and movement of data within and into and out from CISE. The isolation and control of movement of and access to data, and enforcement of policies operate to provide enhanced protection against cyber damage and security against leakage of data from and/or into MyCompany resources that may result from communication using a MyCompany UE.
[00030] In an embodiment monitoring ingress and egress of data comprises monitoring communications supported by SWB 64, storing and processing data comprised in the monitored communications and making the data available to the CyberSafe Hub and to MyCompany IT. In an embodiment, monitoring is performed on communications outgoing from CyberSafe isolated environment CISE 62 (Fig. 1) before the outgoing communications are encrypted by SWB 64 and on communications incoming into CISE after the incoming communications are decrypted by SWB 64. As a result user browsing is substantially completely visible to CyberSafe and to MyCompany and can be processed locally or remotely. Monitoring may be substantially continuous, stochastic, or periodic. Stochastic monitoring comprises monitoring communications
for monitoring periods of limited duration that begin at onset times that are randomly determined, optionally in accordance with a predetermined probability function or responsive to occurrence of a particular type of event. Periodic monitoring comprises continuous monitoring of communications during monitoring periods at periodic onset times. Monitored communications may be mirrored by SWB 64 to a destination in CyberSafe Hub and/or MyCompany for storage and/or processing or may be filtered for data of interest before being transmitted to a destination in CyberSafe Hub and/or MyCompany for storage and/or processing. Features and constraints that configure how monitored communications are handled by SWB 64 may be determined based on CyberSafe and/or MyCompany policy. Such policy may specify how processing of data is shared between the local SWB and the CyberSafe Hub.
[00031] In an embodiment, SWB 64 may be an independent application comprising CyberSafe features and/or functionalities, or an existing web browser, such as Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, Opera, or Brave, modified and provided with additional CyberSafe features and/or functionalities by changes and/or additions to browser code and/or by integrating with CyberSafe extensions. The features and functionalities may be incorporated into the existing browser and the browser converted to a CyberSafe SWB by: interfacing with the input and output of the existing browser using operating system hooks; patching the original binary of the browser; building a dedicated extension on top of the browser’s API and/or SDK; and/or dynamically modifying memory of the browser when the browser is in operation.
[00032] By way of example, the features and/or functionalities, hereinafter generically referred to as functionalities, may comprise, at least one or any combination of more than one of functionalities that enable SWB 60 to: cooperate with a MyCompany IDP to verify and authorize a user 10 to access CISE 62 and MyCompany resources; acquire data characterizing websites visited by MyCompany users that may be used to classify cyber risks associated with the websites; acquire data characterizing browser extensions that may compromise SWB 64 security features; acquire data that may be processed to determine normal behavior and use of MyCompany resources by MyCompany users as a group and/or as individuals; monitor engagement of a MyCompany user with a MyCompany resource and control the engagement to enforce CyberSafe and/or MyCompany security constraints.
[00033] In an embodiment enforcing CyberSafe and/or MyCompany security constraints comprises requiring that all communications between UE 33 and a MyCompany resource be propagated via
an SWB 64 and CyberSafe tunnels that connect the SWB to the resource and enforcing CyberSafe and/or MyCompany permissions to the resources. Optionally, enforcing security constraints comprises identifying anomalies in communications between UE 33 and a company resource and operating to eliminate or ameliorate damage from an identified anomaly and generate an alert to its occurrence.
[00034] Flow diagrams presented in Figs. 2A-4B show elements of procedures performed by a CyberSafe System and an SWB, such as CyberSafe system 50 and SWB 64, that exhibit and illustrate functionalities of the CyberSafe system and of the SWB, in accordance with an embodiment. The discussion assumes that the CyberSafe system provides cyber security services to a given MyCompany enterprise having a plurality of users Un (1 ≤ n ≤ N) identified by respective user IDs, U-IDn (1 ≤ n ≤N). The users are assumed to have access to and use user equipment identified by user equipment IDs, UE-IDe ( 1 ≤ e ≤ E) and that CyberSafe has configured the UEs with CISEs and CyberSafe browsers, SWBs, referenced by an index b respectively identified by SWB browser IDs, B-IDb.
[00035] Figs. 2A-2C show a flow diagram 100 of a sign-in procedure by which a given user Un using user equipment UEe contacts the CyberSafe security hub to request authorization to access and use CISE in UEe and have a resident SWB in CISE issued a security token for access to MyCompany resources.
[00036] In a block 102 user Un operates UEe to sign in to the CyberSafe security hub and submit a request for the security token, the request comprising an Extended ID that includes the user ID, U-IDn; the user equipment ID, UE-IDe; and an SWB ID, B-ID that identifies the SWB installed in UEe. U-IDn may include the username, a password, and/or such data that associates the user with UEe, SWB , and/or MyCompany, such as a date at which the user was first registered as a MyCompany user. UE-IDe may include any suitable identifier such as a MAC (media access) address, a UUID (Universal Unique Identifier), or an IMSI (international mobile subscriber identity), and/or information that associates UEe with user Un, SWB , and/or MyCompany. The B-ID may include a browser user agent string, any suitable identifier that CyberSafe assigns SWB , and/or information that associates SWB with UEe, Un, and/or MyCompany.
[00037] It is noted that a given user Un may be associated with more than one UEe and/or more than one SWB , and the user ID U-IDn may comprise data that identifies the associations. Similarly, a given user UEe may be associated with more than one Un and/or more than one SWB , and a given SWB with more than one Un and/or more than one UEe, and the respective IDs, UE- IDe and B-ID may comprise data that maps the associations. Any combination of one or more of Un, UEe, and/or SWB may comprise a Time of Day (ToD) for each of at least one previous sign in to CyberSafe.
[00038] Optionally, in a block 104 the CyberSafe Security Hub authenticates the Extended ID. Authenticating the Extended ID may comprise engaging in a three factor authentication of user Un and determining consistency of the associations and/or ToDs in at least one of U-IDn, UE-IDe, or B-ID and another at least one of the IDs.
[00039] In a decision block 106 if the Extended ID is not OK, the hub proceeds to a block 142, denies the requested token, and optionally sends an alert of the refusal to the CyberSafe Hub. On the other hand if the Extended ID is OK the hub optionally proceeds to a decision block 108 to decide whether or not to run an integrity test on the SWB software. The decision to run or not to run an integrity test may depend on a MyCompany and/or CyberSafe testing policy. The policy may depend on when the CyberSafe Hub ran a last integrity test on the SWB , and/or UEe, a user profile characterizing user Un browsing behavior and internet use pattern, and/or a feature of a cyberattack landscape. For example, MyCompany may have a policy that a delay between integrity tests be no less than or greater than certain lower and upper bound delays. A decision may depend on whether user Un browses to cyber dangerous websites listed in a list of dangerous websites at a frequency greater than a predetermined frequency or whether the user tends to be lax in updating passwords or patching applications. A cyberattack landscape may comprise frequency and/or severity of cyberattacks that have recently been experienced by MyCompany or other enterprises and/or what types of cyberattacks have been encountered. Optionally, if the decision in decision block 108 is to skip an integrity test, the hub proceeds to a block 140 and issues the desired token. If the decision is to undertake an integrity test, the hub may proceed to a block 110 and retrieve from a database the hub comprises or to which the hub has access, a set, “SIT”, of at least one
software integrity test, “siti”, where SIT = {sitill ≤ i ≤ 1} that may be used to determine integrity of the SWB[-> software. An exemplary SIT may comprise at least one, or any combination of more than one of:
[00040] In a block 112 the CyberSafe Hub determines a weight vector WIT comprising a weight witi for each siti that provides an estimate for how appropriate the test siti is for determining integrity of the SWBj, software. In an embodiment a witi for a given siti is a function of:
UEe hardware type, for example if the UEe is a mobile device, a tablet, or desktop which may limit what types of the given siti, may be performed on the UEe; sensitivity, the true positive rate of the given siti specificity, the true negative rate of the given siti nuisance rating, which provides a measure of inconvenience performance of the test causes user UEe; past performance of the test; and/or a current cyberattack context, which, identifies current prevalence and severity of cyberattack types.
[00041] In a block 114 CyberSafe Hub runs a selection of tests siti on SWB software responsive to their respective weights witi, for example where a greater weight witi indicates greater relevance, by selecting integrity tests siti for which their respective weights are greater than a median weight witi.
[00042] In a block 116 CyberSafe Hub determines a value for a measure of a Qol(e,b) (quality of integrity) for SWB software in UEe responsive to a measure of integrity returned by each of the
selected tests siti. In an embodiment Qol(e,b) is an average of the measures of integrity provided by the siti weighted by their respective weights witi. Optionally in a decision block 118 CyberSafe Hub determines if the Qol value is satisfactory or not. If the Qol is not satisfactory the hub proceeds to block 142 and denies issuing the token and optionally sends an alert. On the other hand if the Qol is satisfactory the hub proceeds to a decision block 120 to determine whether or not to run ambient software environment tests on UEe
[00043] Software environment tests are tests to determine to what extent, if at all, ambient software in UEe has been compromised by cyber damage or is insufficiently protected against cyber damage. The decision whether or not to perform the environment test on UEe may be based on many of the same considerations that are weighed when making the decision as to whether or not perform to integrity tests. For example, the decision may depend on MyCompany and/or CyberSafe policy and such factors as UEe hardware, for example whether the UEe is a mobile phone or laptop, when a last environment test was run on UEe, a browsing behavior pattern of user Un, and/or a feature of a cyberattack landscape.
[00044] Optionally, if the decision in decision block 120 is to skip the software environment test, the CyberSafe Hub may proceed to block 140 and issue the desired token. If on the other hand the decision is to undertake an environment test, the hub may optionally proceed to a block 110 and retrieve from a database a set “HVF(e)” of at least one cyberattack vulnerability feature hvfe,j to be determined as present or absent, where HVF(e) = {hvfe,jl 1 j ≤ J ≤}. HVF(e) may comprise static and/or dynamic vulnerability features. Static vulnerability features are features that are code and/or data elements comprised in the ambient software of UEe that are considered to render the ambient software and/or digital resources that are not comprised in the ambient software, such as CyberSafe and/or MyCompany resources, vulnerable to cyberattack. Dynamic vulnerability features are temporary vulnerability features, such as whether the UEe is connected to a public WiFi or to a cyber dangerous website, that characterize a current use of UEe. An exemplary HVF(e) may comprise at least one, or any combination of more than one of vulnerability features whose presence or absence may be determined by response to, optionally, the following queries: hvfe, 1 = V (anti-virus)/ EDR (Endpoint Detection & Response) installed?;
[00045] Optionally, in a block 124 CyberSafe Hub scans the UEe ambient software environment to detect presence of each hvfe,j and determine a risk vector HVR(e) comprising a cyberattack risk estimate hvre,j for each hvfe,j, where HVR(e) = { hvfe,jI 11 ≤ j J) ≤}. Determining a risk estimate for a given vulnerability hvfe,j is generally dependent on the type of vulnerability and a cyberattack landscape. For example, determining a risk estimate for a given public Wi-Fi may be dependent on a physical location of the Wi-Fi, current traffic carried by the Wi-Fi at a time for which the estimate is made, and recent history of cyberattacks attempted via the Wi-Fi. Risks associated with patching may be a function of types of types of patching required or installed.
[00046] In a block 126 CyberSafe may scan UEe ambient software to determine a set HCC(e) of compromised components hcc^ in the ambient software, where HCC(e) = {hcce | 1 k ≤ K ≤)}. And in a block 128 CyberSafe may retrieve from a CyberSafe database a user profile that characterizes a cyber risk profile of the user optionally comprising a set UCR(n) of risk components ucrn r (1 ≤ r R ≤), where UCR(n) = {ucrn rll ≤ r R) ≤}, that may be used to characterize behavioral features of user Un that expose CyberSafe and/or MyCompany to cyberattack.
[00047] In a block 130 CyberSafe processes HVR(e), HCC(e), UCR(n), and/or a set CPA(b) of cyber cladding software attributes of SWB that respectively indicate measures of cyber security that the attributes provide to SWB to determine if CPA(b) provides SWB with advantageous protection against cyberattacks. For example, for a user with high privilege access to MyCompany
resources may be required by CPA(b) to run additional security checks and install additional security controls, such as EDR, in order to allow user access a MyCompany resource. Additionally, some capabilities that have impact on the system’s vulnerability to cyberattacks may be constrained or disabled by CPA(b) if the user is accessing an unknown website or a websites with low security reputation (and therefore high risk). In an embodiment processing is performed by a neural network configured to operate on an input feature vector comprising component features based on components of HVR(e), HCC(e), UCR(n), and/or CPA(b).
[00048] Optionally, in a block 132 if the CyberSafe Hub determines that the cladding protection is advantageous, the hub proceeds to block 140 and issues the requested token. If on the other hand the cladding protection is not advantageous, the hub may proceed to a block 134 to determine whether or not to amend the cladding protection to improve protection. If the hub decides not to amend, the hub may proceed to block 142 and deny the token and raise an alert. On the other hand if the decision is to amend the cladding, the hub proceeds to a block 136, amends the cladding and optionally proceeds to a decision block 138 to determine if the amendment has resulted in sufficient improvement in cyber protection or not. If the improvement is not sufficient CyberSafe Hub proceeds to block 142 and denies the token.
[00049] In an embodiment to operate to ensure that a MyCompany user uses only a MyCompany SWB to access a selection of MyCompany digital resources, (S&SRs), CyberSafe may require each MyCompany user to access an S&SR only from a MyCompany SWB having onboarded to CyberSafe Shield, optionally from the CyberSafe Hub. CyberSafe Shield provides the SWB with a Shield Key, associated with a user Shield PW. Shield configures the SWB to use the Shield Key to encrypt, optionally the SWB Shield PW, to generate an S-MAC comprising the encrypted Shield PW, and optionally the Shield PW, for presentation to an S&SR whenever requesting access to the S&SR. CyberSafe operates to provide an access control system that gatekeeps access to S&SRs with the S-MACs of SWBs that have onboarded to Shield and configures the access control system and S&SRs to allow access to the S&SRs only to SWBs that present the S&SRs with an S-MAC. The Shield Key provided to an SWB by Shield is stored in a safe memory of the SWB and is unknown to and inaccessible by the user, and generation of an S-MAC using the Shield Key is opaque to the user so that the user never has access to an S-MAC generated using the Shield Key. As a result, MyCompany users are unable to port a Shield Key or an S-MAC to a browser that is
not a MyCompany SWB and are constrained to use only MyCompany SWBs to access the MyCompany S&SRs.
[00050] Fig. 3 shows a schematic flow diagram 200 of a procedure, also referred to by the label 200, by which CyberSafe and MyCompany may be configured to orchestrate and establish cooperation to use CyberSafe in accordance with an embodiment of the disclosure. Actions and/or tasks disclosed in flow diagram 200 that are recited as being undertaken by a particular entity such as CyberSafe, MyCompany, Shield and/or components of thereof, are not limited to being undertaken by the recited entity and may be undertaken by a suitable entity other than the recited entity. For example, a particular task undertaken by Shield may be undertaken by MyCompany, optionally in cooperation with CyberSafe.
[00051] In a block 202 of procedure 200 a Cyber Safe Hub of a CyberSafe system such as CyberSafe
Hub 22 of CyberSafe System 50 (Fig. 1) that operates to provide security functionalities to MyCompany 20, for example functionalities illustrated by flow diagram 100 (Figs. 2A-2C), is provisioned with Shield, in accordance with an embodiment. Provisioning the CyberSafe Hub with Shield comprises providing the hub with an inventory of Shield Keys, a PW shielding function for generating S-MACs, a hub secure vault in which Shield Keys are securely stored, and a hub Shield Database that records deployment of Shield Keys. The hub database may comprise data records that identify Shield Keys that are assigned to given MyCompany SWBs and associate the assigned Shield Keys with user passwords and S-MACs that are presented by the given SWBs to access MyCompany resources. The CyberSafe Hub may also be provided with a Shield Manager that performs management tasks for Shield, such as by way of example managing interfacing with MyCompany SWBs to assign Shield Keys to the SWBs, updating the hub Shield Key Database, and distributing S-MACs associated with MyCompany SWBs to a MyCompany access control system and/or S&SRs. The Shield Manager may be provided with an email address to facilitate communications between the Shield Manager and MyCompany users.
[00052] Optionally in a block 204 MyCompany determines a set of S&SRs that are to be protected by Shield to prevent the S&SRs from being accessed by browsers that are not MyCompany SWBs and in a block 206 MyCompany provides the CyberSafe hub with a list of the S&SRs in the set.
[00053] In a block 208 Shield optionally provisions MyCompany SWBs for cooperating with
CyberSafe Shield and provides each of a plurality of the SWBs with the Shield Manager e-mail address, a Shield Key optionally exclusive to the SWB, a Shield PW, optionally provided in a
password reset procedure described below, associated with the Shield Key and SWB, and an SWB secure vault for concealed storage of the Shield Key. Shield provides the SWB with the PW- Shielding function for accessing and encrypting the Shield PW using the Shield Key to generate an S-MAC, and software supporting presentation of the S-MAC to an S&SR for authentication when requesting access to the S&SR. In an embodiment the S-MAC comprises an encryption generated using the Shield Key. Optionally, the encryption comprises an encryption of the Shield PW as optionally reset by user and/or a function of the Shield PW. The function of the Shield PW may include a hash of the Shield PW. Optionally the S-MAC comprises a concatenation of the Shield PW and the encryption.
[00054] In a block 210, CyberSafe shield distributes S-MACS generated by SWBs using Shield Keys to an access control system or systems that gatekeep/s access to S&SRs, and in a block 212 configures the access control system/s and the S&SRs to allow access to the S&SRs only to SWBs that present an S-MAC to satisfy “Shield Authentication”.
In a block 214 Shield configures SWBs provided with a Shield Key and a Shield PW to use the PW-Shielding Function and generate an S-MAC for presentation to an S&SR whenever requesting access to the S&SR.
[00055] Figs. 4A and 4B show a flow diagram 300 illustrating operation of Shield engaging with a MyCompany user in a possible scenario by which the MyCompany user attempts to access a MyCompany S&SR in accordance with an embodiment of the disclosure.
[00056] In a block 304 a MyCompany user using a web browser (WB) attempts to access a given S&SR using a user password (PW). In a branching block 306 if the WB is a MyCompany Secure Web Browser (SWB) the scenario optionally progresses to a block 308 in which the SWB determines if an identity for the S&SR and an associated Shield Key are present in an SWB Secure Vault (Fig. 3 block 208). In a decision block 310 if the S&SR and Shield Key are found, optionally in a block 312 the SWB invokes the PW-Shielding Function to generate an S-MAC responsive to the user PW accompanying the access request and in a block 314 presents the S-MAC to the S&SR. In a block 316, the S-MAC is authenticated by a MyCompany S&SR access control system, and the SWB is granted access to the S&SR.
[00057] On the other hand, if in decision block 310 the Shield Key and S&SR are not found, the SWB cannot and does not submit the request for access together with an S-MAC, and optionally in a block 318 access to the S&SR is denied and the user is prompted to reset the user PW.
Optionally the prompt notification comprises a limited reset link provided via email or SMS from a MyCompany email server and in a block 320 the user attempts to reset by clicking on the link and entering a reset PW. In a block 322 MyCompany email server routes the reset to the CyberSafe hub Shield manager for processing. In a block 324 the Shield Manager checks the hub Shield Database to determine, optionally in accordance with a sign-in procedure similar to sign-in procedure 100, if the reset request is from a MyCompany SWB. In a branching block 326 if the request is not from a MyCompany SWB the scenario proceeds to a block 340. In block 340 Shield Manager denies resetting the PW and notifies the user to use a MyCompany SWB.
[00058] However, in the current scenario thread of flow diagram 300, as described above with reference to decision block 306, the request is assumed to be from an SWB and the scenario proceeds to a block 328. In block 328 Shield accepts the reset PW as a Shield PW, extracts a Shield Key from the hub Secure Vault and in a block 330 uses a PW-Shielding Function to generate an S-MAC responsive to the reset PW. Optionally in a block 332 Shield Manager provides the SWB with the Shield Key, which the SWB sequesters in the SWB Secure Vault, makes the S- MAC available to the MyCompany CyberSafe Shield access control system and notifies the user that the reset is successful. Subsequently, in a block 334 the user attempts access to the S&SR via the SWB using the reset user PW. In a block 336, responsive to the reset PW the SWB invokes the PW-Shielding Function to produce an S-MAC using the Shield Key received from Shield Manager and submits the reset PW and SMAC with a request for access to the given S&SR. Responsive to the submission of the S-MAC and reset PW, the SWB is granted access to the given S&SR.
[00059] If on the other hand in branching block 306, the user is using a WB that is not a MyCompany SWB, the WB the user is using cannot generate and provide an S-MAC with the access request, because the WB does not have and cannot acquire a Shield Key required by CyberSafe Shield to generate an appropriate S-MAC. As a result, the scenario optionally proceeds from block 306 to block 318 where the user’s WB is denied access to the given S&SR and the user is prompted to reset a PW. The scenario may then proceed to block 320 where the user submits a reset request and the user’s WB progresses through to block 326 where the user’s browser is again denied access and shunted from block 326 to block 340 where the user is advised to use a MyCompany SWB.
[00060] Whereas in the above discussion each MyCompany user and particular MyCompany SWB that the user uses are, as described above issued an exclusive Shield Key in response to a request
to access an S&SR, in some circumstances it may be advantageous to provide a group of users and SWBs that they use with a common shared Shield Key so that each user in the group is enabled to access an S&SR with a shared S-MAC. The shared S-MAC comprises an encryption that is common to all S-MACs generated by SWBs having the same shared Shield Key.
[00061] In an embodiment to provide the users with a shared Shield Key, when a user of the group of users using a MyCompany SWB requests to reset her or his PW, for example as described in flow diagram 300, the user’s SWB is issued in response to the request and acceptance of the user’s reset PW not only a Shield Key but a common “Ghost password (PW)”. The Ghost PW, as the Shield Key, is stored in the SWB secure vault and is not disclosed or accessible to the user. The Ghost PW is associated with the reset user PW and user SWB, and the SWB is configured to generate an S-MAC that comprises an encryption of the Ghost PW. The same Ghost PW is common to all the users of the group, the SWBs via which the users request to reset their respective PWs, and the different reset PWs they respectively request to have accepted by Shield. Optionally the S-MAC also comprises, or is otherwise associated with, the Ghost PW and/or user reset PW associated with the Ghost PW, whenever the S-MAC is presented to an S&SR for permission to access the S&SR.
[00062] In an embodiment a shared Shield Key may be shared by a plurality of different MyCompany SWBs that are used by a same, optionally one, MyCompany user.
[00063] In an embodiment of the disclosure an S-MAC may be tagged to invoke a particular CyberSafe, MyCompany, and/or Shield action or procedure when presented for a user access to an S&SR. For example, the S-MAC may be tagged to invoke a particular security policy or monitoring format, such as by way of example a high-resolution, continuous monitoring format of user activity when interacting with the S&SR, or allowing access to the S&SR for a particular period of time, or time of day (TOD).
[00064] There is therefore provided in accordance with an embodiment of the disclosure a method of constraining a user having a user password (PW) for accessing a given digital resource to use a web browser (WB) from a set of one or more selected WBs to access the digital resource, the method comprising: providing the WB with an encryption key associated with the user PW and unknown and inaccessible to the user; configuring the WB to use the encryption key to generate a Shielded Message Authentication Code (S-MAC) and present the the S-MAC whenever requesting access to the given digital resource; and configuring an access control system that gatekeeps access
to the given digital resource to refuse a request for access that does not include the S-MAC. Optionally the method comprises configuring the access control system to refuse access if the access request does not include the user PW. Additionally, or alternatively the S-MAC may comprise an encryption of the user PW encrypted using the encryption key. Optionally, the encryption of the user PW comprises an encryption of a hash of the user PW. Additionally, or alternatively the S-MAC may comprise a concatenation of the user PW and the encrypted user PW.
[00065] In an embodiment the encryption key is exclusive to the user. In an embodiment the encryption key is exclusive to the WB. In an embodiment the encryption key is exclusive to the user equipment (UE) hosting the WB.
[00066] In an embodiment the method comprises providing the WB with a ghost password associated with the user password. Optionally the ghost password is unknown and inaccessible to the user. Additionally, or alternatively, the S-MAC may comprise an encryption of the ghost password. In an embodiment the ghost password and encryption key are shared with a plurality of users. In an embodiment the ghost password and encryption key are shared with a plurality of WBs.
[00067] In an embodiment the method comprises tagging the S-MAC to invoke a particular action or procedure responsive to presentation of the S-MAC.
[00068] In an embodiment the method comprises, notifying the user to reset the user password and that access is refused if the user requests access to the resource from a WB that does not present an S-MAC. Optionally the method comprises denying reset of the user password if the user attempts to reset from a WB that is not a member of the set of one or more selected WBs. Optionally the method comprises accepting the reset and providing the the encryption key in association with the reset PW if the user attempts to reset from a WB belonging to the set of one or more selected WBs.
[00069] In the description and claims of the present application, each of the verbs, “comprise” “include” and “have”, and conjugates thereof, are used to indicate that the object or objects of the verb are not necessarily a complete listing of components, elements or parts of the subject or subjects of the verb.
[00070] Descriptions of embodiments of the invention in the present application are provided by way of example and are not intended to limit the scope of the invention. The described
embodiments comprise different features, not all of which are required in all embodiments of the invention. Some embodiments utilize only some of the features or possible combinations of the features. Variations of embodiments of the invention that are described, and embodiments of the invention comprising different combinations of features noted in the described embodiments, will occur to persons of the art. The scope of the invention is limited only by the claims.
Claims
1. A method of constraining a user having a user password (PW) for accessing a given digital resource to use a web browser (WB) from a set of one or more selected WBs to access the digital resource, the method comprising: providing the WB with an encryption key associated with the user PW and unknown and inaccessible to the user; configuring the WB to use the encryption key to generate a Shielded Message Authentication Code (S-MAC) and present the the S-MAC whenever requesting access to the given digital resource; and configuring an access control system that gatekeeps access to the given digital resource to refuse a request for access that does not include the S-MAC.
2. The method according to claim 1 and comprising configuring the access control system to refuse access if the access request does not include the user PW.
3. The method according to claim 1 wherein the S-MAC comprises an encryption of the user PW encrypted using the encryption key.
4. A communications system according to claim 3 wherein the encryption of the user PW comprises an encryption of a hash of the user PW.
5. The method according to claim 3 wherein the S-MAC comprises a concatenation of the user PW and the encrypted user PW.
6. The method according to claim 1 wherein the encryption key is exclusive to the user.
7. The method according to claim 1 wherein the encryption key is exclusive to the WB.
8. The method according to claim 1 wherein the encryption key is exclusive to the user equipment (UE) hosting the WB.
9. The method according to claim 1 and comprising providing the WB with a ghost password associated with the user password.
10. The method according to claim 9 wherein the ghost password is unknown and inaccessible to the user.
11. The method according to claim 9 wherein the S-MAC comprises an encryption of the ghost password.
12. The method according to claim 9 wherein the ghost password and encryption key are shared with a plurality of users.
13. The method according to claim 9 wherein the ghost password and encryption key are shared with a plurality of WBs.
14. The method according to claim 1 and comprising tagging the S-MAC to invoke a particular action or procedure responsive to presentation of the S-MAC.
15. The method according to claim 1 and comprising if the user requests access to the resource from a WB that does not present an S-MAC, notifying the user to reset the user password and that access is refused.
16. The method according to claim 15 comprising denying reset of the user password if the user attempts to reset from a WB that is not a member of the set of one or more selected WBs.
17. The method according to claim 15 and comprising, if the user attempts to reset from a WB belonging to the set of one or more selected WBs, providing the encryption key in association with the reset PW.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202363466287P | 2023-05-14 | 2023-05-14 | |
US63/466,287 | 2023-05-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024236561A1 true WO2024236561A1 (en) | 2024-11-21 |
Family
ID=93518772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IL2024/050461 WO2024236561A1 (en) | 2023-05-14 | 2024-05-13 | Cybersecurity system proving enhanced resource security |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024236561A1 (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US20080288781A1 (en) * | 2007-05-18 | 2008-11-20 | Richard Lee Lawson | Systems and methods for secure password change |
US7650505B1 (en) * | 2005-06-17 | 2010-01-19 | Sun Microsystems, Inc. | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US9197599B1 (en) * | 1997-09-26 | 2015-11-24 | Verizon Patent And Licensing Inc. | Integrated business system for web based telecommunications management |
US20170318008A1 (en) * | 2013-04-08 | 2017-11-02 | Titanium Crypt, Inc. | Artificial intelligence encryption model (aiem) with device authorization and attack detection (daaad) |
US20190305964A1 (en) * | 2018-03-27 | 2019-10-03 | Workday, Inc. | Digital credentials for user device authentication |
US10497037B2 (en) * | 2014-03-31 | 2019-12-03 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request API |
US20210314352A1 (en) * | 2020-04-03 | 2021-10-07 | Paypal, Inc. | Detection of User Interface Imitation |
US20210367961A1 (en) * | 2020-05-21 | 2021-11-25 | Tenable, Inc. | Mapping a vulnerability to a stage of an attack chain taxonomy |
US20220368689A1 (en) * | 2021-04-22 | 2022-11-17 | Talon Cyber Security Ltd. | Integrated identity provider |
-
2024
- 2024-05-13 WO PCT/IL2024/050461 patent/WO2024236561A1/en unknown
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9197599B1 (en) * | 1997-09-26 | 2015-11-24 | Verizon Patent And Licensing Inc. | Integrated business system for web based telecommunications management |
US20040187027A1 (en) * | 2003-03-18 | 2004-09-23 | Man Chan | Remote access authorization of local content |
US7650505B1 (en) * | 2005-06-17 | 2010-01-19 | Sun Microsystems, Inc. | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies |
US20080288781A1 (en) * | 2007-05-18 | 2008-11-20 | Richard Lee Lawson | Systems and methods for secure password change |
US20140282978A1 (en) * | 2013-03-15 | 2014-09-18 | Sergio Demian LERNER | Method and apparatus for secure interaction with a computer service provider |
US20170318008A1 (en) * | 2013-04-08 | 2017-11-02 | Titanium Crypt, Inc. | Artificial intelligence encryption model (aiem) with device authorization and attack detection (daaad) |
US10497037B2 (en) * | 2014-03-31 | 2019-12-03 | Monticello Enterprises LLC | System and method for managing cryptocurrency payments via the payment request API |
US20190305964A1 (en) * | 2018-03-27 | 2019-10-03 | Workday, Inc. | Digital credentials for user device authentication |
US20210314352A1 (en) * | 2020-04-03 | 2021-10-07 | Paypal, Inc. | Detection of User Interface Imitation |
US20210367961A1 (en) * | 2020-05-21 | 2021-11-25 | Tenable, Inc. | Mapping a vulnerability to a stage of an attack chain taxonomy |
US20220368689A1 (en) * | 2021-04-22 | 2022-11-17 | Talon Cyber Security Ltd. | Integrated identity provider |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230308451A1 (en) | Data security | |
US9948652B2 (en) | System for resource-centric threat modeling and identifying controls for securing technology resources | |
US9516062B2 (en) | System and method for determining and using local reputations of users and hosts to protect information in a network environment | |
KR102217916B1 (en) | System and method for biometric protocol standards | |
Ali et al. | Analysis of BYOD security frameworks | |
CN111382422A (en) | System and method for changing password of account record under threat of illegal access to user data | |
Nguyen et al. | Cybersecurity in radiology: Cautionary tales, proactive prevention, and what to do when you get hacked | |
Butt et al. | Cloud and its security impacts on managing a workforce remotely: A reflection to cover remote working challenges | |
Kadhim et al. | Security approach for instant messaging applications: viber as a case study | |
Singh | Security in amazon web services | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
WO2024236561A1 (en) | Cybersecurity system proving enhanced resource security | |
KR102202109B1 (en) | Questionnaire security system and method by multi-authorization | |
Lincy et al. | The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures | |
WO2025037318A2 (en) | Cyber security systems and methods | |
US20240039918A1 (en) | Data dependent restrictions | |
Harshanath | Detection and protection related to data sharing technologies | |
Lillie | Cybersecurity-Hacking | |
Al-Harrasi | Context-Aware Data Leakage Prevention Theoretical Approach For Mobile-Cloud Computing | |
Hutchings et al. | Criminals in the Cloud: Crime | |
WO2022101934A1 (en) | A system to protect data exfilteration through detection and validation and method thereof | |
Boiselle | Zero Trust | |
Keyes | Social Networking: Legal, Privacy, and Security Issues | |
Prakash | OTK: Key Distribution Center at Cloud Providers towards Secure the Services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24806778 Country of ref document: EP Kind code of ref document: A1 |