×

Method and system for providing system security in a remote terminal environment

  • US 4,652,698 A
  • Filed: 08/13/1984
  • Issued: 03/24/1987
  • Est. Priority Date: 08/13/1984
  • Status: Expired due to Term
First Claim
Patent Images

1. In a communication network comprised of a central processor, a plurality of remote terminals, and communication means for operationally coupling said central processor and said plurality of remote terminals, a security system for verifying both that a user of an assigned one of said remote terminals is the correct user of said assigned remote terminal and that said assigned remote terminal requesting access to a particular data file in the central processor is the correct terminal to access that data file, wherein each said remote terminal includes:

  • (a) means for enabling an assigned user to enter an associated PIN number;

    (b) first memory means for storing a file number for a said data file associated with the assigned user of said remote terminal, a terminal number assigned to said remote terminal, an assigned algorithm and a first residue previously derived from said algorithm, said terminal number of said remote terminal, and the PIN number presented by the assigned user; and

    (c) first processor means responsive to the algorithm and terminal number stored in said first memory means and to a PIN number entered by a user for generating a second residue and also for comparing said second residue with said stored first residue and upon correspondence therebetween causing a file number for a requested data file to be outputted; and

    wherein said central processor includes;

    (a) second memory means for storing the file numbers respectively associated with said remote terminals and the specific algorithm and terminal number associated with each said file number, said second memory means being responsive to a file number from one of said remote terminals for outputting both the specific algorithm and terminal number associated with said file number; and

    (b) second processor means responsive to said file number for causing a random number to be generated, and being further responsive to said specific algorithm, said remote terminal number from said second memory means, and said random number for generating a third residue;

    said first processor means being responsive to said random number received from said central processor and to said algorithm and terminal number stored in said first memory means for generating a fourth residue;

    said second processor means also including comparing means for comparing said fourth residue received from said first processor means of said remote terminal with said third residue from said second processor means and upon a correspondence therebetween, said second processor means enabling said remote terminal from which said file number was outputted to said central processor to gain access to the particular said data file associated with said file number; and

    said terminal number being inaccessible to said assigned user, and said terminal number never appearing on said communication means.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×