Databaseless security system

Registers – Systems controlled by data bearing records – Credit or identification card systems

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

235380, 235492, 2353825, 902 26, G06F 1530, G06K 19073

Patent

active

051209390

ABSTRACT:
An improved security system, including a protable smart card and a host computer, eliminates the need for the computer to store individual personal identification (ID) numbers for each user seeking access to the computer. Instead, the computer stores a first encryption algorithm E.sub.1 used in converting a particular identification number (ID).sub.n into a secret code S.sub.n for that particular user. S.sub.n also exists within the memory of the smart card having been loaded into its memory at the time of issue. A challenge number C is generated by the computer and transmitted to the smart card. Within the smart card and the computer, microprocessors respond to the challenge number C, the secret code S.sub.n, and a second encryption algorithm E.sub.2 in order to generate response numbers R.sub.n and R.sub.n ' respectively. Thereafter, R.sub.n is transmitted to the computer where it is compared with R.sub.n '. A favorable comparison is necessary for gaining access to the computer.

REFERENCES:
patent: 3403380 (1968-09-01), Welch
patent: 3794813 (1974-02-01), Spetz
patent: 3859634 (1975-01-01), Perron et al.
patent: 4268715 (1981-05-01), Atalla
patent: 4283710 (1981-08-01), Genest et al.
patent: 4288659 (1981-09-01), Atalla
patent: 4453074 (1984-06-01), Weinstein
patent: 4471216 (1984-09-01), Herve
patent: 4549075 (1985-10-01), Saaba et al.
patent: 4558211 (1985-12-01), Berstein
patent: 4746788 (1988-05-01), Kawana
patent: 4779224 (1988-10-01), Moseley et al.
patent: 4798322 (1989-01-01), Bernstein et al.
patent: 4804825 (1989-02-01), Bitoh
patent: 4890323 (1989-12-01), Beker et al.
patent: 4935962 (1990-06-01), Austin
The quest for intruder-proof computer systems, K. Fitzgerald, IEEE Spectrum, Aug. 1989, pp. 22-26.
Federal Information Processing Standards Publication 46, Jan. 15, 1977, Specifications for the Data Encryption Standard.
Intel Article Reprint, AR-381, Feb. 18, 1985, Locking up System Security.
A Computer Dial Access Sytstem Based on Public-Key Techniques, J. K. Omura, (Cylink) IEEE--1987, pp. 73-79.
Hellman, M. "The Mathematics of Public Key Cryptography," Scientific American, Aug. 1979.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Databaseless security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Databaseless security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Databaseless security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1806122

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.