Gold key

Last updated
Use of a gold ingot as a "gold key" has been used as a plot device. (Serial numbers obscured in altered photo.) Goldkey logo removed.jpg
Use of a gold ingot as a "gold key" has been used as a plot device. (Serial numbers obscured in altered photo.)

In fiction, a gold key is a special token granting access to and control of a mythical or ultra-private or secret bank account or vault, such as a Swiss bank account. In reality, the key is often a code word and accounts are not completely anonymous. [1] A real "gold key" need not be made of or colored gold, or even a key. If it is a key it may not fit any lock; the keys are important as authentication tokens, not always as literal keys. In the case of the GoldKey Security Token, a USB device developed by a team of developers, the token acts as a physical "key" to electronic data. [2]

While Swiss law formerly granted nearly complete financial privacy, fully anonymous accounts are no longer available. Swiss banks are now required by law to obtain identifying information from any prospective clients. International pressure related to efforts to trace and identify terrorists and drug traffickers has eliminated the anonymous "Swiss bank account" that has appeared in numerous books and films and conspiracy theories. Other countries still offer offshore bank accounts with varying degrees of anonymity in transactions.

The arrival of a "gold key client" typically results in an extra flurry of attention. A number of plot devices detail the method of authentication of the account-holder, adding to the mystery and drama of the client's arrival. It is a common literary device that banks do not admit publicly that "gold key" accounts actually exist, and characters are therefore invested into a sort of secret society when they are offered such an account.

Literary references

In the best-selling novel The Da Vinci Code , the heroine Sophie Neveu is given a gold key by her grandfather. The gold key bears the logo of the Priory of Sion, a secret society, which leads Neveu and co-hero Robert Langdon to guess the code associated with the key.

In Lewis Perdue's Daughter of God there is a gold key which is hidden in a painting ("The Home of the Lady of Our Redeemer"). [3] This gold key (accompanied by a gold ingot with the account number) allows access to a safe deposit box in a Zurich bank. The key does not actually open a lock as such.

In the Harry Potter novels by J.K. Rowling, the wizarding bank Gringotts uses gold keys, among other devices, to protect the security of its vaults which contain wizards' gold hoards.

Related Research Articles

Authentication Act of proving an assertion, often the identity of a computer system user

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises in 1991 as an access server authentication and accounting protocol. It was later brought into IEEE 802 and IETF standards.

RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource.

Banking in Switzerland

Banking in Switzerland dates to the early eighteenth century through Switzerland's merchant trade and has, over the centuries, grown into a complex, regulated, and international industry. Banking is seen as emblematic of Switzerland, along with the Swiss Alps, Swiss chocolate, watchmaking and mountaineering. Switzerland has a long, kindred history of banking secrecy and client confidentiality reaching back to the early 1700s. Starting as a way to protect wealthy European banking interests, Swiss banking secrecy was codified in 1934 with the passage of the landmark federal law, the Federal Act on Banks and Savings Banks. These laws, which were used to protect assets of persons being persecuted by Nazi authorities, have also been used by people and institutions seeking to illegally evade taxes, hide assets, or generally commit financial crime.

Personal identification number PIN code

A personal identification number (PIN), or sometimes redundantly a PIN number or PIN code, is a numeric passcode used in the process of authenticating a user accessing a system.

A replay attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a spoofing attack by IP packet substitution. This is one of the lower-tier versions of a man-in-the-middle attack. Replay attacks are usually passive in nature.

One-time password

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

Security token Device used to access electronically restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples include a wireless keycard opening a locked door, or in the case of a customer trying to access their bank account online, the use of a bank-provided token can prove that the customer is who they claim to be.

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and is updated by RFC 5247. EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.

Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network or a workstation. It is a subset of computer security.

Wireless security

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

A software token is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated.

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.

OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This mechanism is used by companies such as Amazon, Google, Facebook, Microsoft and Twitter to permit the users to share information about their accounts with third-party applications or websites.

In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's privileges, and, in some cases, a particular application. In some instances, one may be asked to enter an access token rather than the usual password.

Multi-factor authentication Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. MFA protects user data—which may include personal identification or financial assets—from being accessed by an unauthorised third party that may have been able to discover, for example, a single password.

Wireless lock is a protection concept for authenticated LAN or WLAN network clients offered from various vendors in various functional shapes and physical designs. In contrast to wireless keys, wireless lock puts emphasis on automatic locking instead of just locking by time-out or unlocking.

Computer access control

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.

Web API security

Web API security entails authenticating programs or users who are invoking a web API.

References

  1. "How Swiss Bank Accounts Work". HowStuffWorks, Inc. Retrieved 2008-09-25.
  2. "GoldKey Security Token". GoldKey Security Corporation . Retrieved 2008-09-25.
  3. Mccormack, Kathy (2003-06-11). "Whodunit first? Books' similarities a mystery". Seattle PI . Retrieved 2011-02-28.