Asymmetric encrypted pin

Electrical computers and digital processing systems: support – System access control based on user identification by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S181000, C726S003000, C705S072000, C705S075000

Reexamination Certificate

active

07039809

ABSTRACT:
Secure protection and distribution of a personal identification number (PIN) is achieved by using a first encryption process only for PIN data and a second encryption process for non-PIN data. The first encryption process uses asymmetric encryption, where a public key is used for encryption of PIN data and a private key, held only by an authorizing agent, is used to decrypt the PIN data. The second encryption process uses a key which is available to an authentication requestor, such as merchants. A party seeking authentication of PIN data must forward the encrypted PIN data to an authorizing agent along with account data necessary to validate the PIN data. The authentication requestor is provided with a signal which is indicative of the verification status of the PIN data without being privy to the contents of the PIN data.

REFERENCES:
patent: 4997288 (1991-03-01), Rosenow
patent: 5022076 (1991-06-01), Rosenow et al.
patent: 5175766 (1992-12-01), Hamilton
patent: 5319710 (1994-06-01), Atalla et al.
patent: 5371797 (1994-12-01), Bocinsky, Jr.
patent: 5448638 (1995-09-01), Johnson et al.
patent: 5724424 (1998-03-01), Gifford
patent: 5915023 (1999-06-01), Bernstein
patent: 5999624 (1999-12-01), Hopkins
patent: 6012144 (2000-01-01), Pickett
patent: 6014745 (2000-01-01), Ashe
patent: 6092202 (2000-07-01), Veil et al.
patent: 6571337 (2003-05-01), Xiao
McKinsey, “Protection of Intellectual Property, Law or Technology?” 1997, pleasurepoint.com/˜jay/papers/tech—law.html, p. 1-7.
Stockel, “Securing Data and Financial Transactions” 1995, IEEE, p. 397-401.
“Programming a Distributed Application The Tuxedo System Approach” 1996, Novell, p. 1-17.
Warwick Ford, et al., “Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption,” © 1997 Prentice Hall PTR, pp. 93-142, 413-15.
D.W. Davies et al., “Security for Computer Networks”, 1984 A Wiley-Interscience Publication, pp. 119-144 and 290-344.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Asymmetric encrypted pin does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Asymmetric encrypted pin, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Asymmetric encrypted pin will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3568324

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.