×

Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations

  • US 4,941,175 A
  • Filed: 02/24/1989
  • Issued: 07/10/1990
  • Est. Priority Date: 02/24/1989
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for authorizing access to application software resident in a CPU host from among N <

  • M workstations or users communicatively attaching said CPU host, said CPU manifesting indicia of identity, comprising the steps of;

    (a) forming a list of authorized users and encrypting thereon a depth parameter N, said encryption using a function of the CPU identity and an offset as a key;

    (b) responsive to each application software access request from among the workstations or users, accessing the list and decrypting the depth parameter N with the key; and

    (c) scanning the list within the depth N and returning an access authorization to the requester only upon an identity

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×