Work Files Saved Searches
   My Account                                                  Search:   Quick/Number   Boolean   Advanced       Help   


 The Delphion Integrated View

  Buy Now:   Buy PDF- 5pp  PDF  |   File History  |   Other choices   
  Tools:  Citation Link  |  Add to Work File:    
  View:  Expand Details   |  INPADOC   |  Jump to: 
 
 Email this to a friend  Email this to a friend 
       
Title: US4590470: User authentication system employing encryption functions
[ Derwent Title ]


Country: US United States of America

View Images High
Resolution

 Low
 Resolution

 
5 pages

 
Inventor: Koenig, Andrew R.; Elizabeth, NJ

Assignee: AT&T Bell Laboratories, Murray Hill, NJ
other patents from AT&T CORP. (706518) (approx. 16,328)
 News, Profiles, Stocks and More about this company

Published / Filed: 1986-05-20 / 1983-07-11

Application Number: US1983000512887

IPC Code: Advanced: G06F 21/00; G06F 21/20; G07F 7/10; H04L 9/32;
IPC-7: G06K 5/00; H04L 9/00; H04Q 9/00;

ECLA Code: G06F21/34; G06F21/30A; G06F21/33A; G06F21/77; G06Q20/3674; G07F7/10E; S06F221/2103; S06F221/2107;

U.S. Class: Current: 340/005.74; 235/379; 380/030; 705/067;
Original: 340/825.31; 178/022.08; 235/379;

Field of Search: 340/825.3,825.31,825.34 178/22.08 375/2.1 235/379,380

Priority Number:
1983-07-11  US1983000512887

Abstract:     A system which employs a pair of encryption functions f and g in the "log on" protocol of a computer dial-up arrangement. The functions are inverses of each other and, hence, a random sequence when encrypted with f and then with g results in the original sequence. When a user wishes to "log on", the computer selects a random sequence and forms a challenge sequence. The user encrypts the challenge sequence with the function g and thus forms a response sequence. Encryption with the function f by the computer permits verification of the response sequence. The secrecy of the user's function is maintained by providing the user with an authenticating device having only two ports: a power port and an I/O port. The I/O port is connected to a microprocessor which accesses a memory that contains the secret encryption function g.

Attorney, Agent or Firm: Brendzel, Henry T. ;

Primary / Asst. Examiners: Yusko, Donald J.;

INPADOC Legal Status: Show legal status actions          Buy Now: Family Legal Status Report

Designated Country: CH DE FR GB IT LI NL 

Family: Show 9 known family members

First Claim:
Show all 5 claims
What is claimed is:     1. A communication system employing a two-way communication link (111 and 112), first means (10 and 20) connected to said link for initiating an authentication protocol and second means (30) connected to said link for responding to initiated authentication protocol, characterized in that:
  • said communication system employs a public key encryption approach characterized by a pair of encryption functions, one being a public key and the other being a private key; and
  • said first means comprises: a generator (10) for initiating a protocol by developing an essentially random authentication message, third means for sending a challenge signal over said link to said second means, and fourth means for comparing said authentication message with a response signal sent by said second means.


Background / Summary: Show background / summary

Drawing Descriptions: Show drawing descriptions

Description: Show description

Forward References: Show 93 U.S. patent(s) that reference this one

       
U.S. References: Go to Result Set: All U.S. references   |  Forward references (93)   |   Backward references (7)   |   Citation Link

Buy
PDF
Patent  Pub.Date  Inventor Assignee   Title
Get PDF - 19pp US3806874  1974-04 Ehrat  Gretag Aktiengesellschaft IDENTIFICATION SYSTEM FOR INDIVIDUALS
Get PDF - 12pp US4105156  1978-08 Dethloff   Identification system safeguarded against misuse
Get PDF - 13pp US4281215  1981-07 Atalla  Atalla Technovations Method and apparatus for securing data transmissions
Get PDF - 17pp US4297569  1981-10 Flies  Datakey, Inc. Microelectronic memory key with receptacle and systems therefor
Get PDF - 12pp US4349695  1982-09 Morgan et al.  Datotek, Inc. Recipient and message authentication method and system
Get PDF - 14pp US4438824  1984-03 Mueller-Schloer  Siemens Corporation Apparatus and method for cryptographic identity verification
Get PDF - 12pp US4467139  1984-08 Mollier  Compagnie Internationale pour l'Informatique Cii Honeywell Bull Process and system for transmission of signed messages
       
Foreign References: None

Other References:
  • "Data-Encryption `Box` Secures Comm Systems Easily", K. Cohen et al., Electronics Design, Apr. 16, 1981, vol. 29, No. 8, pp. 159-163.
  • Conference Record of Eascon, 1982 "Personal Authentication System for Access Control to the Defense Data Network," S. T. Kent, et al., pp. 89-93.
  • Communications of the ACM, vol. 24, No. 11, Nov., 1981 "Password Authentication with Insecure Communication," L. Lamport, pp. 770-772. (3 pages) Cited by 13 patents


  • Inquire Regarding Licensing

    Powered by Verity


    Plaques from Patent Awards      Gallery of Obscure PatentsNominate this for the Gallery...

    Thomson Reuters Copyright © 1997-2014 Thomson Reuters 
    Subscriptions  |  Web Seminars  |  Privacy  |  Terms & Conditions  |  Site Map  |  Contact Us  |  Help