GB2300288A - A computer security system - Google Patents
A computer security systemInfo
- Publication number
- GB2300288A GB2300288A GB9614521A GB9614521A GB2300288A GB 2300288 A GB2300288 A GB 2300288A GB 9614521 A GB9614521 A GB 9614521A GB 9614521 A GB9614521 A GB 9614521A GB 2300288 A GB2300288 A GB 2300288A
- Authority
- GB
- United Kingdom
- Prior art keywords
- code
- user
- input
- terminal
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method of preventing unauthorised access to a host computer system (1) by a user at a remote terminal (2) is provided using paging system technology. In the method, a user inputs his user identification code input into the terminal (2) which transmits same to the host computer system (1). The system then generates a random code (Code A) and subjects Code A to a transformation characteristic of a transformation algorithm identified by the input user identification code so as to generate a transformed code (Code B). Code A is transmitted via a paging system (7), to a receiver (6) held by the user. The receiver (6) comprises transformation means adapted to transform the received Code A to a second transformed code (Code C), and means (9) for displaying Code C to the user. The user then inputs the displayed Code C to the terminal (2) which trasmits it to the host system (1). The input Code C is then compared with Code B and access is only permitted if Code C matches Code B.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9614521A GB2300288A (en) | 1994-01-14 | 1995-01-12 | A computer security system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9400602A GB9400602D0 (en) | 1994-01-14 | 1994-01-14 | Computer security system |
GB9415779A GB9415779D0 (en) | 1994-08-04 | 1994-08-04 | Computer security system |
PCT/GB1995/000059 WO1995019593A1 (en) | 1994-01-14 | 1995-01-12 | A computer security system |
GB9614521A GB2300288A (en) | 1994-01-14 | 1995-01-12 | A computer security system |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9614521D0 GB9614521D0 (en) | 1996-09-04 |
GB2300288A true GB2300288A (en) | 1996-10-30 |
Family
ID=27267014
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9614521A Withdrawn GB2300288A (en) | 1994-01-14 | 1995-01-12 | A computer security system |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2300288A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2337908A (en) * | 1998-03-13 | 1999-12-01 | Nec Corp | Accessing a network host computer from outside the network with improved security |
GB2344670A (en) * | 1998-12-12 | 2000-06-14 | Ibm | Controlling access |
GB2371665A (en) * | 2001-01-25 | 2002-07-31 | Lets Guard It Europ Ab | Call-back function provides a user with an authorisation code for accessing a service |
US8935762B2 (en) | 2007-06-26 | 2015-01-13 | G3-Vision Limited | Authentication system and method |
US9053316B2 (en) | 1996-10-28 | 2015-06-09 | C.H.I. Development Mgmt. Ltd. Iii, Llc | Secure access computer system |
EP3683703A1 (en) | 2019-01-18 | 2020-07-22 | Stratec SE | System for authentification |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4679236A (en) * | 1984-12-21 | 1987-07-07 | Davies Richard E | Identification verification method and system |
WO1990013213A1 (en) * | 1989-04-14 | 1990-11-01 | Blick Communications Limited | Radio pagers |
-
1995
- 1995-01-12 GB GB9614521A patent/GB2300288A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4679236A (en) * | 1984-12-21 | 1987-07-07 | Davies Richard E | Identification verification method and system |
WO1990013213A1 (en) * | 1989-04-14 | 1990-11-01 | Blick Communications Limited | Radio pagers |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9053316B2 (en) | 1996-10-28 | 2015-06-09 | C.H.I. Development Mgmt. Ltd. Iii, Llc | Secure access computer system |
GB2337908A (en) * | 1998-03-13 | 1999-12-01 | Nec Corp | Accessing a network host computer from outside the network with improved security |
GB2337908B (en) * | 1998-03-13 | 2000-10-25 | Nec Corp | Login permission method and system |
US6490687B1 (en) | 1998-03-13 | 2002-12-03 | Nec Corporation | Login permission with improved security |
GB2344670A (en) * | 1998-12-12 | 2000-06-14 | Ibm | Controlling access |
US6581161B1 (en) | 1998-12-12 | 2003-06-17 | International Business Machines Corporation | System, apparatus and method for controlling access |
GB2344670B (en) * | 1998-12-12 | 2003-09-03 | Ibm | System, apparatus and method for controlling access |
GB2371665A (en) * | 2001-01-25 | 2002-07-31 | Lets Guard It Europ Ab | Call-back function provides a user with an authorisation code for accessing a service |
US8935762B2 (en) | 2007-06-26 | 2015-01-13 | G3-Vision Limited | Authentication system and method |
EP3683703A1 (en) | 2019-01-18 | 2020-07-22 | Stratec SE | System for authentification |
GB2580635A (en) * | 2019-01-18 | 2020-07-29 | Stratec Se | System for authentification |
US11303451B2 (en) | 2019-01-18 | 2022-04-12 | Stratec Se | System for authentication |
Also Published As
Publication number | Publication date |
---|---|
GB9614521D0 (en) | 1996-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TW328993B (en) | Conditional access device and process | |
DE69926082D1 (en) | SAFE SYSTEM USING A CONTINUOUSLY CHANGED CHARACTERISTIC OF A BODY PART AS A KEY | |
ATE254824T1 (en) | METHOD FOR THE SAFE USE OF A TERMINAL DEVICE OF A CELLULAR RADIO TRANSMISSION SYSTEM AND ASSOCIATED TERMINAL DEVICE | |
WO1996000485A3 (en) | User authentication method and apparatus | |
MX9606515A (en) | User authentication method and apparatus. | |
WO2003046761A3 (en) | System and method for retrieving information related to targeted subjects | |
AU4781590A (en) | Secure data interchange system | |
WO2003050718A3 (en) | System and method for retrieving information related to persons in video programs | |
AU6057994A (en) | Key protection for smart cards | |
HK53394A (en) | X window security system | |
CA2133057A1 (en) | Electronic combination lock utilizing a one-time use combination | |
EP1441465B8 (en) | Encrypted communication apparatus | |
CA2282016A1 (en) | Security check provision | |
EP0805607A3 (en) | Method for accessing at least a part of the data of a microprocessor card | |
GB2300288A (en) | A computer security system | |
AU7981691A (en) | Method and apparatus for personal identification | |
GB2281649A (en) | Authenticating the identity of an authorised person | |
WO2001038952A3 (en) | System and method for extracting index key data fields | |
WO1997040600A3 (en) | System for identifying the user of postal equipment | |
WO2000042540A3 (en) | Method and apparatus for client side automatic electronic form completion | |
AU6437800A (en) | Method, data carrier and system for authentication of a user and a terminal | |
CA2193819A1 (en) | User authentication method and apparatus | |
ES2191507A1 (en) | Authentication and authorization system using smart card | |
HU9602255D0 (en) | Method and system for carrying out, with the same data carrier, various authentication processes | |
KR980004151A (en) | Fingerprint Input Method for Remote Start Control of Vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |