Consumer oriented smart card system and authentication techniques
First Claim
1. A method of authenticating a person'"'"'s identity who claims authority to use a device as a part of a closed system comprising the steps of:
- A. Having said person enter an identification code on a plurality of electric switches andB. Measuring the amount of time each individual switch is activated andC. Measuring the amount of time between deactivation of each switch and activation of the following switchD. Measuring the cadence of code entry and,E. Comparing said measurements to counterpart measurements taken on previous code entries made by the known authorized person to determine if a predetermined positive correlation exists to authenticate the claiming person.
1 Assignment
0 Petitions
Accused Products
Abstract
A consumer oriented secure smart card with various accounts which are accessible only through proper use of security measures. Security measures consist of encryption with described automatic key generation and management technique and a technique to authenticate the individual presenting the card.
The encryption key generation and management technique involves having a secret constant or several secret constants programmed into the card and reader, having a secret mathematical function (algorithm) programmed into the card and reader and having both units generate a group of random characters or bits which are used locally and transmitted to the counterpart unit to generate a set of session encryption keys. The random bits and the constants undergo the algorithm in order to produce a unique transmit and receive key for each session.
The method of authenticating an individual as authorized to present the card involves the individual'"'"'s entering a password or personal identification number and having the equipment measure the time of each key depression, the time from release of one key to depression of the next, comparing these measurements and other derivative measurements to previously stored counterparts in order to determine if sufficient positive correlation exists to authenticate the presentor.
264 Citations
8 Claims
-
1. A method of authenticating a person'"'"'s identity who claims authority to use a device as a part of a closed system comprising the steps of:
-
A. Having said person enter an identification code on a plurality of electric switches and B. Measuring the amount of time each individual switch is activated and C. Measuring the amount of time between deactivation of each switch and activation of the following switch D. Measuring the cadence of code entry and, E. Comparing said measurements to counterpart measurements taken on previous code entries made by the known authorized person to determine if a predetermined positive correlation exists to authenticate the claiming person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification