Method for being capable of carrying out, with the same data car

Registers – Systems controlled by data bearing records – Credit or identification card systems

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

235382, 34882534, 380 25, G06K 500, G06F 704, H04K 400

Patent

active

057538980

ABSTRACT:
Known methods for being capable of carrying out, with the same data carrier, various authentication processes are based on non-standardized data carriers (smart cards) on which there are stored two different access codes. Per first authentication process, a first user generates a first user code which is compared to a version, transformed by way of a transformation, of a first access code stored on the data carrier. Per second authentication process, a second user generates a second user code which is compared to a version, transformed by way of the transformation, of a second access code stored on the data carrier. By now having the transformation in this case take place, per other authentication process, by way of another transformation, there may be used, for different authentication processes, the same worldwide standardized data carrier on which there is stored only one access code. The first/second user then once again generates the first/second user code, which is compared to a version transformed by way of a first/second transformation of the only access code stored on the data carrier.

REFERENCES:
patent: 4186871 (1980-02-01), Anderson et al.
patent: 4214230 (1980-07-01), Fak
patent: 4281215 (1981-07-01), Atalla
patent: 4453074 (1984-06-01), Weinstein
patent: 4608486 (1986-08-01), Berstein et al.
patent: 4700055 (1987-10-01), Kashkashian, Jr.
patent: 4707592 (1987-11-01), Ware
patent: 4837422 (1989-06-01), Dethloff et al.
patent: 4906828 (1990-03-01), Halpern
patent: 5017766 (1991-05-01), Tamada et al.
patent: 5120939 (1992-06-01), Claus et al.
patent: 5276311 (1994-01-01), Hennige
patent: 5285055 (1994-02-01), Oonakahara et al.
patent: 5336870 (1994-08-01), Hughes et al.
patent: 5390331 (1995-02-01), Yui
patent: 5635012 (1997-06-01), Belluci et al.
Chapter Two, "Block Ciphers and Stream Ciphers" (pp. 13-113), Chapter Four, Communication Security and File Security using Cryptography (pp. 192-270), Chapter Ten, Applying Cryptography to Pin-Based Electronic Funds Transfer Systems (pp. 429-473), Chapter Eleven, Applying Cryptography to Electronic Funds Transfer Systems--Personal Indentification Numbers and Personal Keys (pp. 474-606), all taken from Contemporary Cryptology--The Science of Information Integrity, edited by Gustavis J. Simmons, (copyright 1992, IEEE Press).
Chapter 2, "Stream Ciphers" (pp. 65-1340, Chapter 4, Public Key Cryptography (pp. 177-288), Chapter 12, The Smart Card: A Standardized Security Device Dedicated to Public Cryptology (pp. 559, 561-6130, all taken from C. Meyer et al, Cryptography A New Dimension in Computer Data Security--A guide for the Design and Implementation of Secure Systems (copyright 1982, John Wiley & Sons, 1982).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for being capable of carrying out, with the same data car does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for being capable of carrying out, with the same data car, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for being capable of carrying out, with the same data car will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1855044

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.