GB2204971A - Transportable security system - Google Patents
Transportable security system Download PDFInfo
- Publication number
- GB2204971A GB2204971A GB08711741A GB8711741A GB2204971A GB 2204971 A GB2204971 A GB 2204971A GB 08711741 A GB08711741 A GB 08711741A GB 8711741 A GB8711741 A GB 8711741A GB 2204971 A GB2204971 A GB 2204971A
- Authority
- GB
- United Kingdom
- Prior art keywords
- computer
- token
- card
- program
- security system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
In order to overcome the problem of security of data held within a program, an electronic token (3) of the type including on-board processing and memory is provided with either authentication and password software or a partially complete program, and arranged for interaction with a host computer (1) via a read/write unit (2) so that the computer will not function in a chosen manner without the presence of the token. When the token contains a partially complete program the remainder of the program is held within the computer so that both elements must be present before the program will run. <IMAGE>
Description
Transportable Security System
This invention relates to a transportable security system, particularly to a transportable system for the security of computer programs or for restricting access to a computer.
It should be noted that by the term 'computer in the following specification is meant any system which includes a degree of processing or intelligence within it.
Current methods to improve the security of data or programs contained within a computer system often involve the provision of passwords or codes which must be typed in by a user before he is allowed to view or use the data.
Such systems are however suspect since a person with sufficient knowledge and determination can generally 'break in' to the program within the computer to ascertain the codes or passwords required.
According to the present invention in a first aspect there is provided a security system comprising a computer; an electronic token comprising processing means, memory means and input/ output means; and means for inductively coupling the token with the computer, wherein the token and computer are each provided with a partial program which cooperate in use to provide a unitary program essential to the operation of the computer.
A plurality of tokens may be provided, each token being assigned to a particular user or class of users and including a partial program allowing its user access only to information he is authorised to access.
In use, the system may be arranged such that a computer will not function in a particular way unless one unique token is placed within operative coupling range of the computer. The token may then identify itself to the computer and a program will be allowed to run. The token could be provided with authentification and/or verification programs such that when a user enters his unique passwords or code numbers these will only be verified if the token is operatively present. The invention thus provides a far more secure system than was previously available.
Advantageously, the electronic token and its associated inductively coupled read/write unit will be of a type disclosed in the applicants published United
Kingdom patent application no. GB2173623A, which is incorporated herein by reference.
Embodiments of the invention will now be described by way of example only with reference to the accompanying drawing, which shows in block form elements of the electronic token and coupler which may be used in embodiments of the present invention.
Referring to the Figure' 1 a host computer 1 is inductively coupled by means of coupler 2 to an electronic token, shown here as Card 3. Coupling between the card and coupler is achieved inductively by means of modulated fields, as is described in the aforementioned British patent application no. GB2173623A. The Card 3 comprises a micro-processor 4 of any convenient type, a Receive/
Transmit circuit 5 and power supply means 6 which may either be an onboard battery or, more preferably, means for tapping off power which is inductively coupled from the coupler 2. The card also includes a memory region which is divided into three areas; an operating system area 7, applications program area 8 and data storage area 9.
The coupler 2 comprises a demodulator 10 and modulator 11 for processing modulated signals received or transmitted after amplification by an amplifier 12.
Unmodulated signals, either after demodulation or before modulation are fed by a suitable connection to chosen address lines of the host computer 1.
In use, the card is placed with its inductive coupling coils in contact with or in a position where it will operatively couple with the coils of the coupler 2 so that, in effect, the card forms part of the computer system and signals may be transferred at will between the card and computer. By providing suitable programs in the application program area 8 of the card, by well known programming methods, the card may be used as a security measure in any of the following ways, which are merely shown as non-limiting examples.
Firstly the card will identify itself uniquely to the system and any card not bearing the correct code within it will not be accepted and will not allow a program to run on the computer. The card can then be used to verify the identity of the user of the computer by comparing an entered PIN (Personal Identification Number) or password with a value stored in the card. Alternatively or additionally, characteristics unique to the user can be compared by means of the characteristics of a digitised signature in the card, characteristics of a voice in the card, or any other biometric characteristics such as finger prints, retina patterns, hand geometry, vein patterns etc. The card holder may be allowed to change
PIN or passwords to a new value once his identity has been verified.
Apparatus of the present invention may be used to authenticate, validate, encrypt or decrypt any messages or files recieved, sent from or stored within the associated computer.
Secret keys or lists of keys to be used in authentication, encryption and decryption algorithms may be held within the token or card, and software may be included such that if one key is felt compromised then a new key can be called into play from the cards internal memory, i.e. the processing capability of the token can be used to look for a key search which may be going on when a non-authorised person is trying to use the computer, having obtained the card. Since the card itself can hold any number of keys, within its memory capacity, then a new key does not have to be transmited to the card and new keys could be brought into play automatically dependent upon factors such as date, site of computer, time and history of use, etc.Additionally if the card detects that a person is attempting to break or illegally access the verification codes the card may be programed to erase the data or programs stored within it. This 'self destruct' feature may be initiated as a result of a number of successive threats, or perhaps be dependent upon the frequency of threats.
A multi-tier system of authorisation can be embedded within the card such that the user has to go through a number of procedures before he is allowed full access.
These may be in a prescribed series or perhaps a few of them may be randomly selected by the card.
Programs may be incuded such that the card can cumulatively store details of its use, each time it has been used.
One particularly advantageous use of the card is for the card to have stored within it a portion of a program, the remaining portion of which is stored within the computers memory. A user will then not be able to use the full program unless the card is present and operating.
Furthermore, if the structure of the program is organised such that those parts carried on the card are executed entirely within the card then there is no need for the computer ever to have the complete program loaded into it and the security is greatly increased. Alternatively however that partial program could be down loaded into the computer upon start up.
It is seen that if the card or token is provided in a conventional portable form, perhaps as a credit card size token made generally from plastics material, then each user of a computer system can be provided with his own unique card which allows him to view or use only those parts of the data or program code within the computer for which he is authorised. It is also a convenient way to store and transport data for use at different terminals or different computers in different environments.
Tokens and couplers of the type described in patent application no. 2173623 may be implemented in association with small personal computers to provide a convenient security procedure and system.
Claims (3)
1. A security system comprising a computer; an electronic token comprising processing means, memory means and input/output means; and means for inductively coupling the token with the computer, wherein the token and computer are each provided with a partial program which cooperate in use to provide a unitary program essential to the operation of the computer.
2. A security system as claimed in claim 1 and including a plurality of tokens, each token being assigned to a particular user or class of users and including a partial program allowing its user access only to information he is authorised to access.
3. A security system substantially as hereinbefore described with reference to, and as illustrated by, the accompanying drawings.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB08711741A GB2204971A (en) | 1987-05-19 | 1987-05-19 | Transportable security system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB08711741A GB2204971A (en) | 1987-05-19 | 1987-05-19 | Transportable security system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB8711741D0 GB8711741D0 (en) | 1987-06-24 |
| GB2204971A true GB2204971A (en) | 1988-11-23 |
Family
ID=10617546
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB08711741A Withdrawn GB2204971A (en) | 1987-05-19 | 1987-05-19 | Transportable security system |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2204971A (en) |
Cited By (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0421409A3 (en) * | 1989-10-06 | 1991-05-29 | International Business Machines Corporation | Transaction system security method and apparatus |
| FR2663442A1 (en) * | 1990-05-29 | 1991-12-20 | Toshiba Kk | Electronic apparatus including separate units |
| EP0416482A3 (en) * | 1989-09-04 | 1993-03-24 | Hitachi, Ltd. | Automatic trading method and apparatus |
| WO1998013791A1 (en) * | 1996-09-27 | 1998-04-02 | Westinghouse Electric Corporation | Apparatus and method for personal identification |
| WO1999027500A1 (en) * | 1997-11-19 | 1999-06-03 | Orga Consult Gmbh | Method and device for processing biometric data |
| WO1999035553A1 (en) * | 1998-01-10 | 1999-07-15 | Ncipher Corporation Limited | Cryptographic token |
| EP0935221A3 (en) * | 1998-02-05 | 2000-02-02 | Mitsubishi Denki Kabushiki Kaisha | Remote authentication system |
| RU2146834C1 (en) * | 1998-06-15 | 2000-03-20 | Бардаев Эдуард Аркадьевич | Device for authentication of software units |
| WO2001061640A1 (en) * | 2000-02-16 | 2001-08-23 | Ong Yong Kin Michael | Electronic credit card - ecc |
| GB2377525A (en) * | 2002-03-22 | 2003-01-15 | Trek 2000 Int Ltd | A portable device having biometrics based authentication capabilities |
| US6880054B2 (en) | 2000-02-21 | 2005-04-12 | Trek Technology (Singapore) Pte. Ltd. | Portable data storage device having a secure mode of operation |
| GB2395323B (en) * | 2001-08-02 | 2006-01-11 | Sandisk Corp | Removable computer with mass storage |
| US7082483B2 (en) | 2002-05-13 | 2006-07-25 | Trek Technology (Singapore) Pte. Ltd. | System and apparatus for compressing and decompressing data stored to a portable data storage device |
| US7353399B2 (en) | 2002-07-31 | 2008-04-01 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks |
| US20090150671A1 (en) * | 2007-12-06 | 2009-06-11 | Hiroshi Abe | Communication system and communication terminal device |
| US7549161B2 (en) | 2001-06-28 | 2009-06-16 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
| US7650470B2 (en) | 2001-06-28 | 2010-01-19 | Trek 2000 International, Ltd. | Method and devices for data transfer |
| WO2010120205A1 (en) * | 2009-04-16 | 2010-10-21 | Palchenko Nikolay Ivanovich | Computer architecture with self-contained modules |
| EP2296103A1 (en) * | 2000-09-06 | 2011-03-16 | Hitachi, Ltd. | Personal identification device and method |
| GB2478702A (en) * | 2010-03-15 | 2011-09-21 | Mohammed Ayub Ullah | Secure biometric card device |
| US8322606B2 (en) | 2000-02-16 | 2012-12-04 | Ong Yong Kin Michael | Electronic credit card—ECC |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2148075A (en) * | 1983-10-08 | 1985-05-22 | Dainippon Printing Co Ltd | Transmitter-transponder systems |
| GB2154344A (en) * | 1984-02-13 | 1985-09-04 | Nat Res Dev | Apparatus and methods for granting access to computers |
| GB2167586A (en) * | 1984-11-12 | 1986-05-29 | Halpern John Wolfgang | Card reader |
| EP0191162A2 (en) * | 1984-12-18 | 1986-08-20 | International Business Machines Corporation | Method of software protection |
| GB2173623A (en) * | 1985-04-10 | 1986-10-15 | The General Electric Co Plc | Transaction system |
| GB2177528A (en) * | 1985-07-03 | 1987-01-21 | Nippon Lsi Card Kk | Data read/write method |
-
1987
- 1987-05-19 GB GB08711741A patent/GB2204971A/en not_active Withdrawn
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2148075A (en) * | 1983-10-08 | 1985-05-22 | Dainippon Printing Co Ltd | Transmitter-transponder systems |
| GB2154344A (en) * | 1984-02-13 | 1985-09-04 | Nat Res Dev | Apparatus and methods for granting access to computers |
| GB2167586A (en) * | 1984-11-12 | 1986-05-29 | Halpern John Wolfgang | Card reader |
| EP0191162A2 (en) * | 1984-12-18 | 1986-08-20 | International Business Machines Corporation | Method of software protection |
| GB2173623A (en) * | 1985-04-10 | 1986-10-15 | The General Electric Co Plc | Transaction system |
| GB2177528A (en) * | 1985-07-03 | 1987-01-21 | Nippon Lsi Card Kk | Data read/write method |
Non-Patent Citations (2)
| Title |
|---|
| WO A 85/02696 * |
| WO A 85/03785 * |
Cited By (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0416482A3 (en) * | 1989-09-04 | 1993-03-24 | Hitachi, Ltd. | Automatic trading method and apparatus |
| US5315634A (en) * | 1989-09-04 | 1994-05-24 | Hitachi, Ltd. | Automatic trading method and apparatus |
| EP0421409A3 (en) * | 1989-10-06 | 1991-05-29 | International Business Machines Corporation | Transaction system security method and apparatus |
| FR2663442A1 (en) * | 1990-05-29 | 1991-12-20 | Toshiba Kk | Electronic apparatus including separate units |
| WO1998013791A1 (en) * | 1996-09-27 | 1998-04-02 | Westinghouse Electric Corporation | Apparatus and method for personal identification |
| US6345761B1 (en) | 1997-11-19 | 2002-02-12 | Orga Kartensysteme Gmbh | Method and device for processing biometric data |
| WO1999027500A1 (en) * | 1997-11-19 | 1999-06-03 | Orga Consult Gmbh | Method and device for processing biometric data |
| WO1999035553A1 (en) * | 1998-01-10 | 1999-07-15 | Ncipher Corporation Limited | Cryptographic token |
| EP0935221A3 (en) * | 1998-02-05 | 2000-02-02 | Mitsubishi Denki Kabushiki Kaisha | Remote authentication system |
| RU2146834C1 (en) * | 1998-06-15 | 2000-03-20 | Бардаев Эдуард Аркадьевич | Device for authentication of software units |
| US7533828B2 (en) | 2000-02-16 | 2009-05-19 | Ong Yong Kin Michael | Electronic credit card—ECC |
| US7278581B2 (en) | 2000-02-16 | 2007-10-09 | Yong Kin Ong | Electronic credit card-ecc |
| US8322606B2 (en) | 2000-02-16 | 2012-12-04 | Ong Yong Kin Michael | Electronic credit card—ECC |
| WO2001061640A1 (en) * | 2000-02-16 | 2001-08-23 | Ong Yong Kin Michael | Electronic credit card - ecc |
| US6880054B2 (en) | 2000-02-21 | 2005-04-12 | Trek Technology (Singapore) Pte. Ltd. | Portable data storage device having a secure mode of operation |
| US8209462B2 (en) | 2000-02-21 | 2012-06-26 | Trek 2000 International Ltd. | Portable data storage device |
| EP2296103A1 (en) * | 2000-09-06 | 2011-03-16 | Hitachi, Ltd. | Personal identification device and method |
| US7549161B2 (en) | 2001-06-28 | 2009-06-16 | Trek 2000 International Ltd. | Portable device having biometrics-based authentication capabilities |
| US7650470B2 (en) | 2001-06-28 | 2010-01-19 | Trek 2000 International, Ltd. | Method and devices for data transfer |
| GB2395323B (en) * | 2001-08-02 | 2006-01-11 | Sandisk Corp | Removable computer with mass storage |
| US7418344B2 (en) | 2001-08-02 | 2008-08-26 | Sandisk Corporation | Removable computer with mass storage |
| US8176335B2 (en) | 2001-08-02 | 2012-05-08 | Sandisk Technologies Inc. | Removable computer with mass storage |
| GB2377525A (en) * | 2002-03-22 | 2003-01-15 | Trek 2000 Int Ltd | A portable device having biometrics based authentication capabilities |
| US7082483B2 (en) | 2002-05-13 | 2006-07-25 | Trek Technology (Singapore) Pte. Ltd. | System and apparatus for compressing and decompressing data stored to a portable data storage device |
| US7631121B2 (en) | 2002-05-13 | 2009-12-08 | Trek 2000 International Ltd. | System and apparatus for compressing and decompressing data stored to a portable data storage device |
| US7353399B2 (en) | 2002-07-31 | 2008-04-01 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks |
| US8429416B2 (en) | 2002-07-31 | 2013-04-23 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks |
| US20090150671A1 (en) * | 2007-12-06 | 2009-06-11 | Hiroshi Abe | Communication system and communication terminal device |
| RU2413290C2 (en) * | 2009-04-16 | 2011-02-27 | Николай Иванович Пальченко | Computer architecture with self-contained modules |
| WO2010120205A1 (en) * | 2009-04-16 | 2010-10-21 | Palchenko Nikolay Ivanovich | Computer architecture with self-contained modules |
| GB2478702A (en) * | 2010-03-15 | 2011-09-21 | Mohammed Ayub Ullah | Secure biometric card device |
Also Published As
| Publication number | Publication date |
|---|---|
| GB8711741D0 (en) | 1987-06-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2204971A (en) | Transportable security system | |
| US12050674B2 (en) | Biometric identification device and methods of use | |
| US6957338B1 (en) | Individual authentication system performing authentication in multiple steps | |
| US6367017B1 (en) | Apparatus and method for providing and authentication system | |
| KR100768754B1 (en) | Portable Electronic Billing and Authentication Device and Method Therefor | |
| CA2417901C (en) | Entity authentication in electronic communications by providing verification status of device | |
| EP0379333B1 (en) | Secure data interchange system | |
| US5267315A (en) | Secret identification number checking system | |
| US20050055557A1 (en) | Personal authentication system and portable unit and storage medium used therefor | |
| US20080005566A1 (en) | Portable terminal, settlement method, and program | |
| WO2009095263A1 (en) | Method of secure pin entry and operation mode setting in a personal portable device | |
| JPH11306088A (en) | IC card and IC card system | |
| US20030228886A1 (en) | Electronic value data communication method, communication system, IC card, portable terminal, and communication | |
| JPH11143833A (en) | User confirmation system using biometric data, IC card, and recording medium | |
| JP2009151528A (en) | IC card storing biometric information and access control method thereof | |
| US7461252B2 (en) | Authentication method, program for implementing the method, and storage medium storing the program | |
| US7287272B1 (en) | Method, data carrier and system for authentication of a user and a terminal | |
| EP0624267B1 (en) | Method and device for preventing unauthorised access to a computer system | |
| JPH11282983A (en) | Individual identification method by fingerprint data | |
| JP2001195551A (en) | IC card reader and IC card system | |
| JP4113112B2 (en) | User confirmation system using biometric data and IC card | |
| JP4760124B2 (en) | Authentication device, registration device, registration method, and authentication method | |
| JP2004185255A (en) | Floppy (registered trademark) disk type biometric information authentication device that has both personal information management and biometric authentication | |
| JP2001331375A (en) | Program startup method, method and device for preventing unauthorized access, encoding/decoding system and card | |
| JP4729187B2 (en) | How to use card management system, card holder, card, card management system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |