Method for authenticating the user of a data station connected t

Communications: electrical – Continuously variable indicating – With meter reading

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

364DIG1, 3642225, 3642865, 3642604, 364261, 3649187, 395575, 395725, G06F 1214, G06F 758, H04K 102

Patent

active

053231465

DESCRIPTION:

BRIEF SUMMARY
FIELD OF THE INVENTION

The invention concerns a method for authenticating the user of a data station connected to a computer system.


BACKGROUND OF THE INVENTION

The inventive method is concerned very generally with the problem of authentication in computer systems which are connected with a plurality of data stations. The data stations can be computers with programs, personal computers or dedicated data stations. As soon as a user or subscriber wants to make connection with a computer through his data station he will be required by the computer to authenticate himself by a password. He transmits the password to the data station which passes it as information to the computer. The involved problem is that an unauthorized user can so modify his data station that he receives a copy of the information sent from the first data station to the computer and withdraws it from the data station. Thereafter the unauthorized user can be authenticated in place of the authorized user because he knows the password. A further problem of this type of authentication resides in that a privileged user who has unlimited access to the data in the computer can acquire the password of a user by reading it from the memory.
In a first known authentication method, in the password announcement the unencoded password is transmitted from the data station of the user to the computer system. There the password is encoded by means of a one-way function and stored in a data file. In usage of the password, that is in the authentication, the password sent in clear text from the data station to the computer system is likewise encoded in the computer system by a one-way function. By "one-way function" is meant a function which is easy to calculate but for which no method exists for calculating its reverse function at reasonable expense.
The resulting value is subsequently compared with the encoded password stored in the data file. Upon identity the user is taken as authenticated. In this method it is not possible to gain knowledge of the password by reading out the password data file. However, the password transmitted in clear text to the computer system can be tapped and subsequently improperly used.
An improvement can be achieved if the authentication takes place in a dialog between the data station and the computer system. In connection with this it has already been proposed to provide a symmetrical ciphering process. In it in the announcement of the password 20 the password is stored in a protected data file in clear text. For authentication a random number is created in the computer system by a random number generator, which random number is encoded by an encoding unit and sent to the data station. This information is decoded in a decoder with the password submitted by the user, is modified by an addition, encoded with the password by the encoder, and returned to the computer system. In the computer system the information is decoded by a decoder and compared with the random number likewise modified by the addition, which must result in equality using a comparator. A disadvantage of this solution is likewise that the password is obtainable by a privileged user, such as a system manager or equipment technician, who can read out the corresponding data file. Therefore in this case the password can also be stolen
Finally, a method has also been developed that requires the storage of at least two values from the user. These keys are created by a keying central unit according to a given method and are not freely selectable by the user, so that the user cannot choose a mnemonic password as in customary password systems. Since the user for security reasons is not permitted to write down the password, this method is practical only in connection with chip cards.
The invention has as its object the provision of a method of the previously mentioned type which offers higher security with simple handling.


SUMMARY OF THE INVENTION

This object is solved with a method wherein the password is never sent in clear text over the connecting lines between t

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4549075 (1985-10-01), Saada
patent: 4596898 (1986-06-01), Pemmaraju
patent: 4630201 (1986-12-01), White
patent: 4797920 (1989-01-01), Stein
patent: 4995081 (1991-02-01), Leighton et al.
patent: 5120939 (1992-06-01), Claus et al.
patent: 5148007 (1992-09-01), Kruse
patent: 5208447 (1993-05-01), Kruse
Diffie, W., & Hellmann, M. E., New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976 pp., 135-145.
Mark, T.; Lomas, A.; & Gong L., Reducing Risks from Poorly Chosen Keys, ACM SIGOPS Review, Dec. 89, vol. 23, pp. 14 to 18.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for authenticating the user of a data station connected t does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for authenticating the user of a data station connected t, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for authenticating the user of a data station connected t will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2223406

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.