Method for verifying the configuration the computer system

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, 380 9, 380 23, 380 30, 380 49, 380 50, H04L 900, H04L 930

Patent

active

059828994

DESCRIPTION:

BRIEF SUMMARY
METHOD FOR VERIFYING THE CONFIGURATION COMPUTER SYSTEM

The invention relates to a method for verifying configuration of a computer system, to a method for encryption of data being expressive of the configuration of a computer system and to a computer system for carrying out such a method.
It is well known from the prior art to use passwords for security and verification purposes. There have been for many years password generators for a Person Identification Number (PIN). PINs have been used to gain access to automated tellers and security areas when unattended operation and/or verification of authorization is desired. They have been used for granting access to computers, as illustrated by U.S. Pat. No. 4,799,258 to Davies et al granted Jan. 17, 1989. PINS may be generated automatically, and may be generated by random number generators or pseudo-random number sequences stored in the memory of a computer. U.S. Pat. No. 4,800,590 to James C. Vaughan illustrates a password generating device for generating passwords, and a computer access system based upon the generated secure number based on time such that the algorithm is valid only over a 3 minute window. However, the lock or unlock of a computer system e.g. the host computer of Vaughan does not satisfy needs which are now possible to achieve. In particular doesn't deal with repetitive modification of machine function and permits a range of numbers that can be matches instead of one unique number.
Many methods exist for granting or revoking a user's access to selected facilities or files within a data processing system. These techniques often utilize a secret "key" or "password" entered by a user and recognized within the data processing system as an indication of the user's ability to read, write, delete, copy or append a selected record. One example of such a system is disclosed in U.S. Pat. No. 4,799,258. Further, several known techniques exist for storing such "keys," "passwords" or other secure data within secure storage devices within a data processing system. For example, U.S. Pat. No. 4,949,927 discloses a method for providing a security module for physically protecting such sensitive data. Similarly, U.S. Pat. No. 4,759,062 discloses a method for protecting sensitive data, such as private security codes.
Each of the methods described above permits the storage and utilization of sensitive or private data; however, none of these publications teaches a technique whereby the functional characteristics of a data processing system may be selectively altered. Systems do exist for enabling or disabling electronic equipment utilizing "keys" or other similar devices. Primarily such systems are directed to enabling or disabling reception of television or CATV signals within a television receiver. For example, see U.S. Pat. Nos. 4,577,224 and 4,471,379.
From U.S. Pat. No. 5,200,999 a public key cryptosystem key management based on control vectors is known. This serves for encrypting the public and private keys of a cryptographic asymmetric key (public key) algorithm, when these keys are stored outside the secure boundary of the cryptographic facility (i. e., cryptographic hardware) and for decrypting these keys when they are processed or used within the secure boundary of the cryptographic facility. The encrypted keys may be kept in a cryptographic key data set belonging to the cryptographic system software or they may be managed by the cryptographic application programs that use the keys. The public and private keys are encrypted by a system master key stored in clear form within the secure boundary of the cryptographic facility.
U.S. Pat. No. 4,908,861 discloses a data authentication method using modification detection codes based on a public one way encryption function. According to this method a message of arbitrary length is transformed into a block of fixed length defined modification detection code (MDC). Although there are a large number of messages which result in the same MDC, because the MDC is a many-to-one function of the input, it is required tha

REFERENCES:
patent: 4796220 (1989-01-01), Wolfe
patent: 5077660 (1991-12-01), Haines et al.
patent: 5182770 (1993-01-01), Medveczky et al.
patent: 5365587 (1994-11-01), Campbell et al.
patent: 5388157 (1995-02-01), Austin
patent: 5499295 (1996-03-01), Cooper
patent: 5553144 (1996-09-01), Almquist et al.
patent: 5671281 (1997-09-01), Campbell et al.
patent: 5757907 (1998-05-01), Cooper et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for verifying the configuration the computer system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for verifying the configuration the computer system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for verifying the configuration the computer system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1466749

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.