Patent
1996-12-31
1999-03-23
Palys, Joseph E.
39518312, 39575006, G06F 1100
Patent
active
058871314
ABSTRACT:
A method for permitting access to secured computer resources based upon a two-piece user verification process. In the disclosed embodiment, the user verification process is carried out during a secure power-up procedure. At some point during the secure power-up procedure, the computer user is required to provide an external token or smart card to the computer system. The token or smart card is used to store an authentication value(s) required to enable secured resources. The computer user is then required to enter a plain text user password. Separate passwords can be used to enable various portions of the computer system. Once entered, a one-way hash function is performed on the user password. The resulting hash value is compared to an authentication value (token value) downloaded from the token. If the two values match, the power-on sequence is completed and access to the computer system and/or secured computer resources is permitted. If the two values do not match, power to the entire computer system and/or secured computer resources are disabled. The two-piece nature of the authorization process requires the presence of both the user password and the external token in order to access protected computer resources.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4604708 (1986-08-01), Lewis
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4799258 (1989-01-01), Davies
patent: 4890323 (1989-12-01), Beker et al.
patent: 5204966 (1993-04-01), Wittenberg et al.
patent: 5210795 (1993-05-01), Lipner et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5448045 (1995-09-01), Clark
patent: 5511122 (1996-04-01), Atkinson
patent: 5537540 (1996-07-01), Miller et al.
patent: 5555373 (1996-09-01), Dayan et al.
patent: 5590199 (1996-12-01), Krajewski et al.
patent: 5619066 (1997-04-01), Curry et al.
patent: 5623637 (1997-04-01), Jones et al.
patent: 5649118 (1997-07-01), Carlisle et al.
patent: 5655124 (1997-08-01), Lin
patent: 5666415 (1997-09-01), Kaufman
patent: 5694471 (1997-12-01), Chen et al.
patent: 5699514 (1997-12-01), Durinovic-Johri et al.
patent: 5704040 (1997-12-01), Gunji
patent: B14604708 (1997-10-01), Lewis
Applied Cryptography, Second Edition, pp. 29-31; 429-459, 1996.
Electronic Design, Products Newsletter, p. 167, Nov. 1996.
Dallas Semiconductor, 64Kbit Touch Memory, DS1996, 1995.
Dallas Semiconductor, Touch Memory Starter Kit, DS9092K, 1995.
Dallas Semiconductor, Touch COM Port Adapter, DS9097/DS9097E, 1995.
Dallas Semiconductor, Touch MultiKey, DS1991, 1995.
Compaq Computer Corporation
Palys Joseph E.
LandOfFree
Method for controlling access to a computer system by utilizing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for controlling access to a computer system by utilizing , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling access to a computer system by utilizing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2134798