Method for controlling access to a computer system by utilizing

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518312, 39575006, G06F 1100

Patent

active

058871314

ABSTRACT:
A method for permitting access to secured computer resources based upon a two-piece user verification process. In the disclosed embodiment, the user verification process is carried out during a secure power-up procedure. At some point during the secure power-up procedure, the computer user is required to provide an external token or smart card to the computer system. The token or smart card is used to store an authentication value(s) required to enable secured resources. The computer user is then required to enter a plain text user password. Separate passwords can be used to enable various portions of the computer system. Once entered, a one-way hash function is performed on the user password. The resulting hash value is compared to an authentication value (token value) downloaded from the token. If the two values match, the power-on sequence is completed and access to the computer system and/or secured computer resources is permitted. If the two values do not match, power to the entire computer system and/or secured computer resources are disabled. The two-piece nature of the authorization process requires the presence of both the user password and the external token in order to access protected computer resources.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4604708 (1986-08-01), Lewis
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4799258 (1989-01-01), Davies
patent: 4890323 (1989-12-01), Beker et al.
patent: 5204966 (1993-04-01), Wittenberg et al.
patent: 5210795 (1993-05-01), Lipner et al.
patent: 5276737 (1994-01-01), Micali
patent: 5315658 (1994-05-01), Micali
patent: 5375243 (1994-12-01), Parzych et al.
patent: 5448045 (1995-09-01), Clark
patent: 5511122 (1996-04-01), Atkinson
patent: 5537540 (1996-07-01), Miller et al.
patent: 5555373 (1996-09-01), Dayan et al.
patent: 5590199 (1996-12-01), Krajewski et al.
patent: 5619066 (1997-04-01), Curry et al.
patent: 5623637 (1997-04-01), Jones et al.
patent: 5649118 (1997-07-01), Carlisle et al.
patent: 5655124 (1997-08-01), Lin
patent: 5666415 (1997-09-01), Kaufman
patent: 5694471 (1997-12-01), Chen et al.
patent: 5699514 (1997-12-01), Durinovic-Johri et al.
patent: 5704040 (1997-12-01), Gunji
patent: B14604708 (1997-10-01), Lewis
Applied Cryptography, Second Edition, pp. 29-31; 429-459, 1996.
Electronic Design, Products Newsletter, p. 167, Nov. 1996.
Dallas Semiconductor, 64Kbit Touch Memory, DS1996, 1995.
Dallas Semiconductor, Touch Memory Starter Kit, DS9092K, 1995.
Dallas Semiconductor, Touch COM Port Adapter, DS9097/DS9097E, 1995.
Dallas Semiconductor, Touch MultiKey, DS1991, 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for controlling access to a computer system by utilizing does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for controlling access to a computer system by utilizing , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling access to a computer system by utilizing will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2134798

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.