[go: up one dir, main page]

GB2300288A - A computer security system - Google Patents

A computer security system

Info

Publication number
GB2300288A
GB2300288A GB9614521A GB9614521A GB2300288A GB 2300288 A GB2300288 A GB 2300288A GB 9614521 A GB9614521 A GB 9614521A GB 9614521 A GB9614521 A GB 9614521A GB 2300288 A GB2300288 A GB 2300288A
Authority
GB
United Kingdom
Prior art keywords
code
user
input
terminal
receiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9614521A
Other versions
GB9614521D0 (en
Inventor
Michael Jeremy Kew
James Simon Love
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB9400602A external-priority patent/GB9400602D0/en
Priority claimed from GB9415779A external-priority patent/GB9415779D0/en
Application filed by Individual filed Critical Individual
Priority to GB9614521A priority Critical patent/GB2300288A/en
Priority claimed from PCT/GB1995/000059 external-priority patent/WO1995019593A1/en
Publication of GB9614521D0 publication Critical patent/GB9614521D0/en
Publication of GB2300288A publication Critical patent/GB2300288A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method of preventing unauthorised access to a host computer system (1) by a user at a remote terminal (2) is provided using paging system technology. In the method, a user inputs his user identification code input into the terminal (2) which transmits same to the host computer system (1). The system then generates a random code (Code A) and subjects Code A to a transformation characteristic of a transformation algorithm identified by the input user identification code so as to generate a transformed code (Code B). Code A is transmitted via a paging system (7), to a receiver (6) held by the user. The receiver (6) comprises transformation means adapted to transform the received Code A to a second transformed code (Code C), and means (9) for displaying Code C to the user. The user then inputs the displayed Code C to the terminal (2) which trasmits it to the host system (1). The input Code C is then compared with Code B and access is only permitted if Code C matches Code B.
GB9614521A 1994-01-14 1995-01-12 A computer security system Withdrawn GB2300288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9614521A GB2300288A (en) 1994-01-14 1995-01-12 A computer security system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB9400602A GB9400602D0 (en) 1994-01-14 1994-01-14 Computer security system
GB9415779A GB9415779D0 (en) 1994-08-04 1994-08-04 Computer security system
PCT/GB1995/000059 WO1995019593A1 (en) 1994-01-14 1995-01-12 A computer security system
GB9614521A GB2300288A (en) 1994-01-14 1995-01-12 A computer security system

Publications (2)

Publication Number Publication Date
GB9614521D0 GB9614521D0 (en) 1996-09-04
GB2300288A true GB2300288A (en) 1996-10-30

Family

ID=27267014

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9614521A Withdrawn GB2300288A (en) 1994-01-14 1995-01-12 A computer security system

Country Status (1)

Country Link
GB (1) GB2300288A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2337908A (en) * 1998-03-13 1999-12-01 Nec Corp Accessing a network host computer from outside the network with improved security
GB2344670A (en) * 1998-12-12 2000-06-14 Ibm Controlling access
GB2371665A (en) * 2001-01-25 2002-07-31 Lets Guard It Europ Ab Call-back function provides a user with an authorisation code for accessing a service
US8935762B2 (en) 2007-06-26 2015-01-13 G3-Vision Limited Authentication system and method
US9053316B2 (en) 1996-10-28 2015-06-09 C.H.I. Development Mgmt. Ltd. Iii, Llc Secure access computer system
EP3683703A1 (en) 2019-01-18 2020-07-22 Stratec SE System for authentification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
WO1990013213A1 (en) * 1989-04-14 1990-11-01 Blick Communications Limited Radio pagers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
WO1990013213A1 (en) * 1989-04-14 1990-11-01 Blick Communications Limited Radio pagers

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9053316B2 (en) 1996-10-28 2015-06-09 C.H.I. Development Mgmt. Ltd. Iii, Llc Secure access computer system
GB2337908A (en) * 1998-03-13 1999-12-01 Nec Corp Accessing a network host computer from outside the network with improved security
GB2337908B (en) * 1998-03-13 2000-10-25 Nec Corp Login permission method and system
US6490687B1 (en) 1998-03-13 2002-12-03 Nec Corporation Login permission with improved security
GB2344670A (en) * 1998-12-12 2000-06-14 Ibm Controlling access
US6581161B1 (en) 1998-12-12 2003-06-17 International Business Machines Corporation System, apparatus and method for controlling access
GB2344670B (en) * 1998-12-12 2003-09-03 Ibm System, apparatus and method for controlling access
GB2371665A (en) * 2001-01-25 2002-07-31 Lets Guard It Europ Ab Call-back function provides a user with an authorisation code for accessing a service
US8935762B2 (en) 2007-06-26 2015-01-13 G3-Vision Limited Authentication system and method
EP3683703A1 (en) 2019-01-18 2020-07-22 Stratec SE System for authentification
GB2580635A (en) * 2019-01-18 2020-07-29 Stratec Se System for authentification
US11303451B2 (en) 2019-01-18 2022-04-12 Stratec Se System for authentication

Also Published As

Publication number Publication date
GB9614521D0 (en) 1996-09-04

Similar Documents

Publication Publication Date Title
TW328993B (en) Conditional access device and process
DE69926082D1 (en) SAFE SYSTEM USING A CONTINUOUSLY CHANGED CHARACTERISTIC OF A BODY PART AS A KEY
ATE254824T1 (en) METHOD FOR THE SAFE USE OF A TERMINAL DEVICE OF A CELLULAR RADIO TRANSMISSION SYSTEM AND ASSOCIATED TERMINAL DEVICE
WO1996000485A3 (en) User authentication method and apparatus
MX9606515A (en) User authentication method and apparatus.
WO2003046761A3 (en) System and method for retrieving information related to targeted subjects
AU4781590A (en) Secure data interchange system
WO2003050718A3 (en) System and method for retrieving information related to persons in video programs
AU6057994A (en) Key protection for smart cards
HK53394A (en) X window security system
CA2133057A1 (en) Electronic combination lock utilizing a one-time use combination
EP1441465B8 (en) Encrypted communication apparatus
CA2282016A1 (en) Security check provision
EP0805607A3 (en) Method for accessing at least a part of the data of a microprocessor card
GB2300288A (en) A computer security system
AU7981691A (en) Method and apparatus for personal identification
GB2281649A (en) Authenticating the identity of an authorised person
WO2001038952A3 (en) System and method for extracting index key data fields
WO1997040600A3 (en) System for identifying the user of postal equipment
WO2000042540A3 (en) Method and apparatus for client side automatic electronic form completion
AU6437800A (en) Method, data carrier and system for authentication of a user and a terminal
CA2193819A1 (en) User authentication method and apparatus
ES2191507A1 (en) Authentication and authorization system using smart card
HU9602255D0 (en) Method and system for carrying out, with the same data carrier, various authentication processes
KR980004151A (en) Fingerprint Input Method for Remote Start Control of Vehicle

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)