Authorisation method for a user of a limited access system having an authorisation centre
First Claim
1. Authorisation method for an enrolled user of a limited access system presenting himself at a remote location to obtain access to said system, wherein the system having an authorisation centre and said remote location being provided with a remote terminal connected to the system, characterised by the steps of:
- at the time of enrolling said user to said system assigning an identification code to said user and storing the assigned identification code at the authorisation centre;
assigning a symbol set selection algorithm to said user and storing the assigned symbol set selection algorithm at the authorisation centre in association with the identification code of the user, wherein the symbol set selection algorithm being a list of instructions how a predetermined number of graphic symbols can be generated from a table of graphic symbols, wherein each graphic symbol is characterised by a predetermined number of dominant features and each dominant feature can take a number of values; and
at the time when said user presenting himself at the remote location for obtaining access displaying for said user on said remote terminal a table of a predetermined number of randomly chosen different graphic symbols so that the user can apply the assigned symbol set algorithm for generating a predetermined number of generated symbols;
forwarding said generated symbols to said authorisation centre;
forwarding said user identification code from the remote terminal to the authorisation centre;
at the authorisation centre using the received identification code and reproducing said generated symbols by using the symbol selection algorithm associated with the identified user and comparing the locally reproduced response symbols with the ones received from the remote terminal, and providing access to said user only if the received and generated symbols being identical.
0 Assignments
0 Petitions
Accused Products
Abstract
The method enables the authorisation centre of a limited access system to determine whether a user desiring to gain access to the system via a remote terminal having local processing capacity is authorised to gain access or not, to authenticate the sender and verify the content of any information claimed to be sent by a user via a remote terminal and to ensure that any information sent by the authorisation centre to a user via a remote terminal may be accessed only by the user and may not be accessed by any unauthorised third person. The method is built upon the creation of one-time cryptographic keys and unique cryptographic algorithms in parallel at the authorisation centre and at the remote terminal using a common graphical symbol set generating algorithm known to the authentication centre and to the user plus a common cryptographic key generation algorithm and a common cryptographic algorithm generation process known to the authorisation centre and to the remote terminal.
-
Citations
11 Claims
-
1. Authorisation method for an enrolled user of a limited access system presenting himself at a remote location to obtain access to said system, wherein the system having an authorisation centre and said remote location being provided with a remote terminal connected to the system, characterised by the steps of:
-
at the time of enrolling said user to said system assigning an identification code to said user and storing the assigned identification code at the authorisation centre;
assigning a symbol set selection algorithm to said user and storing the assigned symbol set selection algorithm at the authorisation centre in association with the identification code of the user, wherein the symbol set selection algorithm being a list of instructions how a predetermined number of graphic symbols can be generated from a table of graphic symbols, wherein each graphic symbol is characterised by a predetermined number of dominant features and each dominant feature can take a number of values; and
at the time when said user presenting himself at the remote location for obtaining access displaying for said user on said remote terminal a table of a predetermined number of randomly chosen different graphic symbols so that the user can apply the assigned symbol set algorithm for generating a predetermined number of generated symbols;
forwarding said generated symbols to said authorisation centre;
forwarding said user identification code from the remote terminal to the authorisation centre;
at the authorisation centre using the received identification code and reproducing said generated symbols by using the symbol selection algorithm associated with the identified user and comparing the locally reproduced response symbols with the ones received from the remote terminal, and providing access to said user only if the received and generated symbols being identical. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification