Cryptography – Key management – Having particular key generator
Patent
1991-12-10
1994-05-17
Kulik, Paul V.
Cryptography
Key management
Having particular key generator
380 4, 380 28, 34082531, 364DIG2, 364940, 3649423, 3649424, 3649187, 36494971, G06F 1300
Patent
active
053136373
ABSTRACT:
Access authorization is validated for an information processing system wherein a "slave device" such as a terminal desires access to information contained in or controlled by a "master device" such as a computer. Apparatus associated with the slave device receives validation data from the master device, modifies it according to a pre-determined algorithm implemented through logical circuitry in the apparatus, and returns the resulting "convoluted" data to the master device. The same validation data is convoluted in the master device through mathematical implementation of the algorithm. If the two sets of convoluted data match, it is presumed that the slave device is authorized to access information through the master device.
REFERENCES:
patent: 4450535 (1984-05-01), de Pommery et al.
patent: 4467139 (1984-08-01), Mollier
patent: 4601011 (1986-07-01), Grynberg
patent: 4652698 (1987-03-01), Hale et al.
patent: 4713753 (1987-12-01), Boebert et al.
Horgan, John, "Thwarting the information thieves," IEEE Spectrum, Jul. 1985, pp. 30-41.
LandOfFree
Method and apparatus for validating authorization to access info does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for validating authorization to access info, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for validating authorization to access info will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-885111