Method and means for securing the distribution of encoding keys
First Claim
Patent Images
1. Data-handling apparatus for securing the transmission of data under control of an authorized individual from one location having an identification number to data processing means having memory means with the identification number stored therein at a remote location, the apparatus comprising:
- encrypting means at the one location and remote location, each for producing first and second encoded outputs as a logical combination of a pair of signals applied thereto;
input means at the one location coupled to the encrypting means for applying a pair of signals thereto which are representative of the identification number for the one location and of a code signal associated with the authorized individual;
at the one location, storage means for storing the first encoded output produced by the encrypting means;
at the remote location, data processing means having memory and storing the identification number for the one location and storing the code signal associated with the authorized individual;
said encrypting means at the remote location being coupled to receive the identification number and the code signal from the memory of the data processing means to produce first and second encoded outputs as said logical combination of signals applied thereto;
storage means at the remote location for storing the first encoded output from the encrypting means thereat;
comparator means responsive to the second encoded outputs received from each of said encrypting means for producing an enabling output in response to favorable comparison of said second encoded outputs;
means responsive to said enabling output for producing a key code;
means for transmitting to the one location an encrypted key code as the second logical combination of said key code and the first encoded output from the storage means at said remote location;
means at said one location for decrypting the encrypted key code received thereat with respect to the first encoded output stored thereat and the second logical combination to produce the key code; and
means at said one location and said remote location for encoding and decoding data thereat with respect to the same logical manipulation of an applied signal and said encoding key.
0 Assignments
0 Petitions
Accused Products
Abstract
An improved secured data transmission system relies on the favorable comparison of coded signals derived from information about authorized individuals and particular data terminals that is both prestored and subsequently supplied under manual command in order to generate an operating key which is then used to encode and decode data that is entered after the initialization procedure.
-
Citations
6 Claims
-
1. Data-handling apparatus for securing the transmission of data under control of an authorized individual from one location having an identification number to data processing means having memory means with the identification number stored therein at a remote location, the apparatus comprising:
-
encrypting means at the one location and remote location, each for producing first and second encoded outputs as a logical combination of a pair of signals applied thereto; input means at the one location coupled to the encrypting means for applying a pair of signals thereto which are representative of the identification number for the one location and of a code signal associated with the authorized individual; at the one location, storage means for storing the first encoded output produced by the encrypting means; at the remote location, data processing means having memory and storing the identification number for the one location and storing the code signal associated with the authorized individual; said encrypting means at the remote location being coupled to receive the identification number and the code signal from the memory of the data processing means to produce first and second encoded outputs as said logical combination of signals applied thereto; storage means at the remote location for storing the first encoded output from the encrypting means thereat; comparator means responsive to the second encoded outputs received from each of said encrypting means for producing an enabling output in response to favorable comparison of said second encoded outputs; means responsive to said enabling output for producing a key code; means for transmitting to the one location an encrypted key code as the second logical combination of said key code and the first encoded output from the storage means at said remote location; means at said one location for decrypting the encrypted key code received thereat with respect to the first encoded output stored thereat and the second logical combination to produce the key code; and means at said one location and said remote location for encoding and decoding data thereat with respect to the same logical manipulation of an applied signal and said encoding key. - View Dependent Claims (2, 3)
-
-
4. The method of securing the transmission of data under control of an authorized individual from one location having an identification number to a remote location at which the identification number is stored, the method comprising the steps of:
-
encrypting at the one location a pair of signals which are representative of at least a code signal from the authorized individual and the identification number for the one location to produce first and second encoded outputs as a logical combination of the pair of signals; storing the first encoded output at the one location; storing the code signal from the authorized individual at the remote location; encrypting at the remote location a pair of signals representative of at least the stored code signal from the authorized individual and the stored identification number for the one location to produce first and second encoded outputs as said logical combination of the pair of signals; comparing second encoded signals produced by the encryption of a pair of signals at the first location, and by the encryption of a pair of signals at the remote location to enable the formation of a key code upon favorable comparison of the second encoded outputs; producing an encrypted key code as a logical manipulation of the key code and the first encoded output produced at the remote location; producing the key code from the encrypted key code received at the one location by decoding the encrypted key code with respect to said logical manipulation and the first encoded output stored at the one location; and encoding and decoding data at said one and remote locations with respect to the key code produced at said locations. - View Dependent Claims (5, 6)
-
Specification