×

Encrypting transponder

  • US 4,783,798 A
  • Filed: 03/14/1985
  • Issued: 11/08/1988
  • Est. Priority Date: 03/14/1985
  • Status: Expired due to Fees
First Claim
Patent Images

1. A passive encrypting transponder for ensuring that only authorized users are given access for transmissions with a remote digital system, including a host computer, from a given computer terminal connected to said system across a telecommunications link, said transponder comprising:

  • (a) an input line, including first switching means, for coupling said given terminal to said transponder;

    (b) an output line, including second switching means, for coupling said transponder to said link;

    (c) third switching means for selectively coupling said input line to said output line;

    (d) a user identification means including;

    (i) a first memory portion for storing a first key which uniquely identifies said given terminal from other terminals connectable to said system, each of said authorized users being provided with a personal identification number which uniquely identifies that user from other authorized users;

    (ii) a second memory portion for prestoring an interrogator identification number which uniquely identifies said system from other possible systems;

    (iii) a third memory portion; and

    (iv) a fourth memory portion;

    (e) an enciphering means, selectively responsive to said first key stored in said first memory portion, for encrypting, under said first key, said personal identification number received across said input line upon coupling thereto of said transponder by said first switching means, said encrypted personal identification number being transmitted across said link;

    (f) a deciphering means, selectively responsive to said first key in said first memory portion, for decrypting an interrogator identification number and a first random number, both of which have been encrypted under said first key at said remote system and transmitted to said transponder across said link, said decrypted first random number being stored in said third memory portion; and

    (g) control means for generating said first key upon receipt of said personal identification number through said first switching means, for comparing said decrypted interrogator identification number with said prestored interrogator identification number, for generating a working key when said decrypted interrogator identification number and said prestored interrogator identification number match, otherwise aborting the transaction, said working key being a function of said personal identification number, of said interrogator identification number and of said first random number, said working key being stored in said fourth memory portion, said enciphering and said deciphering means being thereafter responsive to said working key and not to said first key, and for transmitting said interrogator identification number and said first random number to said host computer, both being encrypted under said working key, for verification of said working key by said host computer, said host computer transmitting an indication of said verification across said link to said transponder;

    (h) wherein, upon reciept of said indication by said transponder, said control means activates said third switching means to couple said input line to said output line.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×