Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1994-11-08
1997-08-05
Tarcza, Thomas H.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 24, H04L 932
Patent
active
056550200
DESCRIPTION:
BRIEF SUMMARY
FIELD OF THE INVENTION
1. Field of the Invention
The present invention relates to authenticating the identity of an authorised person in connection, for example, with the use of identification articles such as credit cards and the like, and identification information such as computer passwords and the like.
2. Description of the Prior Art
Currently identification articles such as credit cards and the like are offered for use carrying the signature of a permitted user. When a transaction is to be accomplished the user offers the card and signs a transaction voucher. The salesperson or clerk compares the signature on the transaction voucher with the signature on the card and the transaction is authenticated on that basis. However, signatures are reasonably easy to forge and it is common practice for a thief to steal a person's credit card and to familiarise themselves with the signature so that when they are called upon to use the card they can forge the signature. Furthermore, credit cards are often used to purchase goods by telephone where there is no requirement for authorisation other than the billing address for the card. Credit card fraud of this nature costs the industry a substantial amount of money each year and is a severe problem. Measures which are currently implemented to inhibit credit card fraud have not had any real impact on the cost to the industry, which continues to rise.
Another type of identification article which is used is a card which has data stored on a magnetic stripe carried by the card which data can be read by a machine. These cards are used to obtain money from cash dispensing machines by inserting the card into the machine so that the data on the magnetic stripe is read by the machine and then inputting a personal identification number (PIN) using a keyboard of the machine. If the personal identification number corresponds to that which has been stored in association with the particular data read from the card, the transaction is authenticated and money is produced. This type of card can also be used in other sales transactions in addition to cash dispensing machines.
With such cards, a thief can watch a person using the card to determine the personal identification number and he can then steal the card and use that personal identification number to gain access to the card owner's funds. This facility has also inhibited more extensive use of personal identification numbers, for example to authenticate the use of ordinary credit cards at a point of sale. A thief could easily hear the personal identification number being given and then steal the credit card and use the number on a subsequent occasion. It is also possible for a thief to obtain from a cash dispensing machine a list of personal identification numbers which have been used in the machine.
An example of identification information is a password for gaining access to data in a computer. Such passwords are vunerable to interception and fraudulent use.
SUMMARY OF THE INVENTION
The present invention seeks to provide a solution to the severe difficulties associated with card and other fraud.
According to the present invention there is provided a computer system for authenticating the identity of an authorised person, the computer system comprising:
compare means operable to receive a first code comprising a plurality of characters in sequential positions identifying the authorised person and a second code comprising a plurality of characters in sequential positions obtained from an actual user and to compare the character of the first code with the characters of the second code to determine whether the second code is a corrupted version of the first code according to a predetermined corruption algorithm; and
output means for producing an authentication signal if the first and second codes differ according to the predetermined corruption algorithm.
A method of authenticating an authorised person is also provided.
In one embodiment, the compare means compares each character of the second code with the character in the co
REFERENCES:
patent: 3657521 (1972-04-01), Constable
patent: 4208575 (1980-06-01), Haltof
patent: 4219151 (1980-08-01), Haruki
patent: 4679236 (1987-07-01), Davies
patent: 4742351 (1988-05-01), Suzuki
patent: 4903299 (1990-02-01), Lee et al.
patent: 4926481 (1990-05-01), Collins
patent: 5222135 (1993-06-01), Hardy et al.
patent: 5261000 (1993-11-01), Hamamoto
International Search Report for PCT/GB93/00944, dated 20 Aug. 1993, citing the above-listed references.
Laufer Pinchus M.
Tarcza Thomas H.
Wesco Software Limited
LandOfFree
Authenticating the identity of an authorized person does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authenticating the identity of an authorized person, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticating the identity of an authorized person will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1080548