Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2006-05-02
2006-05-02
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C713S181000, C726S003000, C705S072000, C705S075000
Reexamination Certificate
active
07039809
ABSTRACT:
Secure protection and distribution of a personal identification number (PIN) is achieved by using a first encryption process only for PIN data and a second encryption process for non-PIN data. The first encryption process uses asymmetric encryption, where a public key is used for encryption of PIN data and a private key, held only by an authorizing agent, is used to decrypt the PIN data. The second encryption process uses a key which is available to an authentication requestor, such as merchants. A party seeking authentication of PIN data must forward the encrypted PIN data to an authorizing agent along with account data necessary to validate the PIN data. The authentication requestor is provided with a signal which is indicative of the verification status of the PIN data without being privy to the contents of the PIN data.
REFERENCES:
patent: 4997288 (1991-03-01), Rosenow
patent: 5022076 (1991-06-01), Rosenow et al.
patent: 5175766 (1992-12-01), Hamilton
patent: 5319710 (1994-06-01), Atalla et al.
patent: 5371797 (1994-12-01), Bocinsky, Jr.
patent: 5448638 (1995-09-01), Johnson et al.
patent: 5724424 (1998-03-01), Gifford
patent: 5915023 (1999-06-01), Bernstein
patent: 5999624 (1999-12-01), Hopkins
patent: 6012144 (2000-01-01), Pickett
patent: 6014745 (2000-01-01), Ashe
patent: 6092202 (2000-07-01), Veil et al.
patent: 6571337 (2003-05-01), Xiao
McKinsey, “Protection of Intellectual Property, Law or Technology?” 1997, pleasurepoint.com/˜jay/papers/tech—law.html, p. 1-7.
Stockel, “Securing Data and Financial Transactions” 1995, IEEE, p. 397-401.
“Programming a Distributed Application The Tuxedo System Approach” 1996, Novell, p. 1-17.
Warwick Ford, et al., “Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption,” © 1997 Prentice Hall PTR, pp. 93-142, 413-15.
D.W. Davies et al., “Security for Computer Networks”, 1984 A Wiley-Interscience Publication, pp. 119-144 and 290-344.
Baker & Botts LLP
Mastercard International Incorporated
Revak Christopher
Tejwani Manu J.
LandOfFree
Asymmetric encrypted pin does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Asymmetric encrypted pin, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Asymmetric encrypted pin will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3568324