Computer access security code system
First Claim
1. In a security access control system wherein a user at a remote station requires approval from a controlling computer to gain access, the improvement comprising:
- (a) a pair of matching first matrices of passwords located at the controlling computer and the remote station, respectively, each said first matrix of passwords comprising a plurality of individually unique symbols arranged in rows and columns to define a first virtual plane; and
,(b) access logic means located at the controlling computer and operably connected to read from and write to its associated said first matrix of passwords,(b1) for transmitting a first pair of said passwords from its said first matrix to the remote station when the remote station attempts to gain access, said first pair of said passwords being chosen from different said columns and rows whereby they define diagonally opposite corners of a rectangle in said first virtual plane,(b2) for receiving a first pair of said passwords transmitted from the remote station as obtained from the remote station'"'"'s said first matrix,(b3) for comparing said first pair of passwords transmitted from the remote station to the said passwords located in the controlling computer'"'"'s said first matrix at corners of said rectangle other than those defined by said transmitted first pair of said passwords,(b4) for granting access if said compared passwords are a match, and(b5) for denying access if said compared passwords are not a match.
2 Assignments
0 Petitions
Accused Products
Abstract
A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric charcters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.
-
Citations
20 Claims
-
1. In a security access control system wherein a user at a remote station requires approval from a controlling computer to gain access, the improvement comprising:
-
(a) a pair of matching first matrices of passwords located at the controlling computer and the remote station, respectively, each said first matrix of passwords comprising a plurality of individually unique symbols arranged in rows and columns to define a first virtual plane; and
,(b) access logic means located at the controlling computer and operably connected to read from and write to its associated said first matrix of passwords, (b1) for transmitting a first pair of said passwords from its said first matrix to the remote station when the remote station attempts to gain access, said first pair of said passwords being chosen from different said columns and rows whereby they define diagonally opposite corners of a rectangle in said first virtual plane, (b2) for receiving a first pair of said passwords transmitted from the remote station as obtained from the remote station'"'"'s said first matrix, (b3) for comparing said first pair of passwords transmitted from the remote station to the said passwords located in the controlling computer'"'"'s said first matrix at corners of said rectangle other than those defined by said transmitted first pair of said passwords, (b4) for granting access if said compared passwords are a match, and (b5) for denying access if said compared passwords are not a match. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security access control system comprising:
-
(a) controlling computer means for controlling access to an object; (b) remote station means operably connected to said controlling computer means for inputting access information to said controlling computer means; (c) a pair of matching first matrices of passwords located at said controlling computer means and the remote station means respectively, each said first matrix of passwords comprising a plurality of individually unique symbols arranged in rows and columns to define a first virtual plane; and
,(d) access logic means located at said controlling computer means and operably connected to read from and write to its associated said first matrix of passwords, (d1) for transmitting a first pair of said passwords from its said first matrix to said remote station means when said remote station means attempts to gain access, said first pair of said passwords being chosen from different said columns and rows whereby they define diagonally opposite corners of a rectangle in said first virtual plane, (d2) for receiving a first pair of said passwords transmitted from said remote station means as obtained from said remote station means'"'"' said first matrix, (d3) for comparing said first pair of passwords transmitted from said remote station means to the said passwords located in said controlling computer means'"'"' said first matrix at corners of said rectangle other than those defined by said transmitted first pair of said passwords, (d4) for granting access if said compared passwords are a match, and (d5) for denying access if said compared passwords are not a match. - View Dependent Claims (7, 8, 9, 10)
-
-
11. In a security access control system wherein a user at a remote station requires approval from a controlling computer to gain access, the method of operation to improve the system'"'"'s ability to defeat unauthorized access by eavesdroppers and the like comprising the steps of:
-
(a) providing a pair of matching first matrices of passwords at the controlling computer and the remote station, respectively, each first matrix of passwords comprising a plurality of individually unique symbols arranged in rows and columns to define a first virtual plane; (b) providing access logic means at the controlling computer and operably connected to read from and write to its associated first matrix of passwords; (c) transmitting a first pair of passwords from the controlling computer'"'"'s first matrix to the remote station when the remote station attempts to gain access wherein the first pair of the passwords is chosen from different columns and rows whereby they define diagonally opposite corners of a rectangle in the first virtual plane, (d) receiving a first pair of the passwords transmitted from the remote station as obtained from the remote station'"'"'s first matrix, (e) comparing the first pair of passwords transmitted from the remote station to the passwords located in the controlling computer'"'"'s first matrix at corners of the rectangle other than those defined by the transmitted first pair of passwords; (f) granting access if the compared passwords are a match; and
,(g) denying access if the compared passwords are not a match. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A security access control system comprising:
-
(a) controlling computer means for controlling access to an object; (b) remote station means operably connected to said controlling computer means for inputting access information to said controlling computer means; (c) a pair of matching first matrices of passwords located at said controlling computer means and the remote station means, respectively, each said first matrix of passwords comprising a plurality of individually unique symbols arranged in rows and columns to define a first virtual plane; and
,(d) access logic means located at said controlling computer means and operably connected to read from and write to its associated said first matrix of passwords for transmitting portions of rectangularly oriented data in its said first matrix of passwords to said remote station means, for comparing non-transmitted portions of said rectangularly oriented data in its said first matrix of passwords to data transmitted to said controlling computer means by said remote station means from its associated said first matrix means and for granting access when said data from said remote station means properly matches said non-transmitted portions, said access logic means including logic for performing the steps of, (d1) transmitting a first pair of said passwords from said controlling computer means'"'"'s said first matrix to said remote station means when said remote station means attempts to gain access, said first pair of said passwords being chosen from different said columns and rows whereby they define diagonally opposite corners of a rectangle in said first virtual plane, (d2) receiving a first pair of said passwords transmitted from said remote station means as obtained from said remote station means'"'"' said first matrix, (d3) comparing said first pair of passwords transmitted from said remote station means to the said passwords located in said controlling computer means'"'"' said first matrix at corners of said rectangle other than those defined by said transmitted first pair of said passwords, (d4) granting access if said compared passwords are a match, and (d5) denying access if said compared passwords are not a match. - View Dependent Claims (17, 18, 19, 20)
-
Specification