Hierarchical multiple password acceptance system

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, 380 4, 379 88, G06F 1100, H04L 900, H04M 164

Patent

active

055817009

ABSTRACT:
A computer has user IDs stored in a ROM, and user passwords associated with each stored user ID. A command from the CPU directs a coprocessor in the computer to read a password for a first ID. The coprocessor compares the password entered by the user with the password for the first ID. If the entered password matches the password for the first ID, the coprocessor reports that the password for the first ID was entered correctly. If the entered password does not match the password for the first ID, the coprocessor compares the entered password with a password for a second ID. If the entered password matches the password for the second ID, and if the second ID dominates the first ID, the coprocessor reports that the password for the first ID was entered correctly If the entered password does not match the password for the second ID, the coprocessor compares the entered password with a password for a third ID. If the entered password matches the password for the third ID, and if the third ID dominates the first ID, the coprocessor reports that the password for the first ID was entered correctly. This process continues until a match is found or there are no user IDs remaining.

REFERENCES:
patent: 4135240 (1979-01-01), Ritchie
patent: 4328542 (1982-05-01), Anastas et al.
patent: 4959860 (1990-09-01), Watters et al.
patent: 5075884 (1991-12-01), Sherman et al.
patent: 5097506 (1992-03-01), Kaiser, Jr. et al.
patent: 5146575 (1992-09-01), Nolan, Jr.
patent: 5222135 (1993-06-01), Hardy et al.
patent: 5226172 (1993-07-01), Seymour et al.
patent: 5265221 (1993-11-01), Miller
patent: 5319780 (1994-06-01), Catino et al.
patent: 5339403 (1994-08-01), Parker
patent: 5428795 (1995-06-01), Johnson et al.
patent: 5432934 (1995-07-01), Levin et al.
Lunt, Access Control Policies for Database Systems, Proceedings of the Second IFIP WG11.3 Workshop on Databse Security, Oct. 1989.
A Guide to Understanding Discretionary Access Control in Trusted Systems, National Computer Security Center (Fort Mead), Sep. 30, 1987.
Millen, Security Kernel Validation in Practice, Communications of the ACM, May 1976, at 243.
White, Fisch & Pooch, Computer System and Network Security, CRC Press 1995, at chapters 4 and 6, and pp. 132-133 and 136.
Kernighan & Pike, The UNIX Programming Environment, Prentice-Hall 1984, at 52-55 (su command).
Bell & LaPadula, Secure Computer Systems: A Mathematial Model--vol. II, Mitre Corporation Technical Report AD-771-543, Nov. 1973.
Graham & Denning, Protection--Principles and Practice, 1972 Joint Computer Conference, at 417.
Computer Dictionary, Microsoft Press 1994, at 141-42, 149-50, 419.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hierarchical multiple password acceptance system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hierarchical multiple password acceptance system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hierarchical multiple password acceptance system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-793730

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.