Pocket-sized computer access security device
First Claim
1. A method of determining the identity of a user of a computer system, comprising the steps of:
- providing a user with a secret ID having a number of characters;
generating in a hand-carried device a token consisting of a number of digits or characters, and displaying a matrix of values derived by an algorithm using said token;
entering into a user terminal of said computer system a sequence of values selected by a user from said matrix based on characters of said ID, to produce a first sequence;
generating in said computer system said sequence of values using said algorithm, to produce a second sequence;
comparing said first and second sequences to thereby establish the identity of said user.
3 Assignments
0 Petitions
Accused Products
Abstract
A credit-card-sized code-generating device is employed by a user in a computer-access security arrangement. The device has a multi-digit display producing a time-related set of digits, in an X-Y array. The user selects from this X-Y array of digits a multi-digit code based upon a secret code (PIN) memorized by the user. The device may display an array of rows and columns of digits, and the user selects a digit from each row based upon the digits of his secret code, where the column selected corresponds to the value of each digit of the secret code. The array of digits produced on the display is generated within the device by first generating a multi-digit token by some algorithm unique to this user, and using this token to index into a table of sets of display digits, then modifying the digits from the selected set, also based upon digits of the token. In this manner, the code read from the display, i.e., selected from rows and columns of digits based upon the personal password, is encrypted, and will be worthless to an unauthorized user even if the device is stolen.
83 Citations
19 Claims
-
1. A method of determining the identity of a user of a computer system, comprising the steps of:
-
providing a user with a secret ID having a number of characters; generating in a hand-carried device a token consisting of a number of digits or characters, and displaying a matrix of values derived by an algorithm using said token; entering into a user terminal of said computer system a sequence of values selected by a user from said matrix based on characters of said ID, to produce a first sequence; generating in said computer system said sequence of values using said algorithm, to produce a second sequence; comparing said first and second sequences to thereby establish the identity of said user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A hand-held computer access security device comprising:
-
a display producing an array of rows and columns of characters; a character generator producing a set of characters for said display, said set changing at selected time intervals; wherein a user of said hand-held device selects from said array a code for entering into a computer system, said selection being based upon character positions corresponding to a secret number known to the user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of generating a code for secured computer access comprising the steps of:
-
displaying in a hand-held device an array of rows and columns of characters; generating in said hand-held device a set of characters for said display, and changing said set at selected time intervals; wherein a user of said hand-held device selects from said array a code for entering into a computer system, said selection being based upon character positions corresponding to a secret number known to the user. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification