Registers – Systems controlled by data bearing records – Credit or identification card systems
Patent
1989-11-09
1992-06-09
Weihhardt, Robert
Registers
Systems controlled by data bearing records
Credit or identification card systems
235380, 235492, 2353825, 902 26, G06F 1530, G06K 19073
Patent
active
051209390
ABSTRACT:
An improved security system, including a protable smart card and a host computer, eliminates the need for the computer to store individual personal identification (ID) numbers for each user seeking access to the computer. Instead, the computer stores a first encryption algorithm E.sub.1 used in converting a particular identification number (ID).sub.n into a secret code S.sub.n for that particular user. S.sub.n also exists within the memory of the smart card having been loaded into its memory at the time of issue. A challenge number C is generated by the computer and transmitted to the smart card. Within the smart card and the computer, microprocessors respond to the challenge number C, the secret code S.sub.n, and a second encryption algorithm E.sub.2 in order to generate response numbers R.sub.n and R.sub.n ' respectively. Thereafter, R.sub.n is transmitted to the computer where it is compared with R.sub.n '. A favorable comparison is necessary for gaining access to the computer.
REFERENCES:
patent: 3403380 (1968-09-01), Welch
patent: 3794813 (1974-02-01), Spetz
patent: 3859634 (1975-01-01), Perron et al.
patent: 4268715 (1981-05-01), Atalla
patent: 4283710 (1981-08-01), Genest et al.
patent: 4288659 (1981-09-01), Atalla
patent: 4453074 (1984-06-01), Weinstein
patent: 4471216 (1984-09-01), Herve
patent: 4549075 (1985-10-01), Saaba et al.
patent: 4558211 (1985-12-01), Berstein
patent: 4746788 (1988-05-01), Kawana
patent: 4779224 (1988-10-01), Moseley et al.
patent: 4798322 (1989-01-01), Bernstein et al.
patent: 4804825 (1989-02-01), Bitoh
patent: 4890323 (1989-12-01), Beker et al.
patent: 4935962 (1990-06-01), Austin
The quest for intruder-proof computer systems, K. Fitzgerald, IEEE Spectrum, Aug. 1989, pp. 22-26.
Federal Information Processing Standards Publication 46, Jan. 15, 1977, Specifications for the Data Encryption Standard.
Intel Article Reprint, AR-381, Feb. 18, 1985, Locking up System Security.
A Computer Dial Access Sytstem Based on Public-Key Techniques, J. K. Omura, (Cylink) IEEE--1987, pp. 73-79.
Hellman, M. "The Mathematics of Public Key Cryptography," Scientific American, Aug. 1979.
Claus David M.
Coutinho Roy S.
Murphy Kevin D.
Snavley James D.
Zempol Kenneth R.
AT&T Bell Laboratories
Morra Michael A.
Weihhardt Robert
LandOfFree
Databaseless security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Databaseless security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Databaseless security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1806122