×

Method and apparatus for transaction and identity verification

  • US 4,264,782 A
  • Filed: 06/29/1979
  • Issued: 04/28/1981
  • Est. Priority Date: 06/29/1979
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for effecting a high security transaction verification operation in a computer based communications system comprising a central Host CPU which includes a high security Verify Unit (VAULT) therein said system including at least two remotely located terminals selectively connectable to said Host CPU and wherein said Verify Unit and each of said terminals includes substantially identical key-controlled block cipher cryptographic devices with block chaining included therein said method comprising:

  • User A (originator) at a first terminal sending User B (receiver) at a second terminal a message M having a data portion (X) and a signature portion (Y) said signature portion being a block cipher function of A'"'"'s key KA and the data portion (X), such that M=(X,Y);

    User B on receipt of the message (X,Y) reencrypting same under his own key KB to form a message U, sending said message U to the Host CPU together with the identities of User A and User B (originator, receiver), and requesting a verification operation from said Host CPU,the Host CPU, after receiving said message, obtaining the keys KA and KB from a secure storage means and decrypting U under key KB to obtain message U which presumptively comprises a message portion U1 and a signature portion U2 ;

    the Host CPU then forming a signature utilizing U1 as the data input and KA as the key input to the cryptographic device and comparing this signature with the signature value U2 received from User B, andthe Host CPU returning an accept/reject signal to User B depending upon whether or not the two signatures are identical.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×