Computer security system
First Claim
1. A security device for a computer system, comprising:
- A. a key having means for storing security codes therein in at least first and second locations;
B. means for communicating with a host computer lock for initiating the transmission to said key of a session address and a lock password;
C. means associated with said key for comparing said session address and said lock password with a lock password stored in said key and the location given by said session address;
D. means in said key responsive to matching said session address and said lock password for retrieving a key password and transmitting it to said host lock;
E. means at said host lock for comparing said second password and the location at which it is stored in said key with corresponding information in said lock and granting or denying access to the host based on the presence or absence of a match.
0 Assignments
0 Petitions
Accused Products
Abstract
An improved computer security system including a portable, electronic Key, an Access Device with Touch Pad, a Lock, a Lock Server and Server Device, and a Master Device. The Access Device provides a means to validate the user to the Key. The Lock is physically located with, and connected to the host computer. Improved security is achieved through the use of "throw-away" passwords, which are generated in a random fashion by the Lock Server, and then loaded directly into volatile memory of Keys, but transferred to a Master Device for loading into volatile memory of Locks. These throw-away passwords are used in a process of cross validation between the Lock and Key, a requirement before access to the host computer is granted. A user specific "touch-print" provides a more secure and more user friendly way of preventing the use of Keys by unauthorized persons. Sensors, e.g., photosensors, within the Key, Lock and Master Device guard against physical attacks.
Additional security is obtained by locating the Lock external to the host computer, thereby preventing an unauthorized user from defeating the host computer operating system security.
-
Citations
2 Claims
-
1. A security device for a computer system, comprising:
-
A. a key having means for storing security codes therein in at least first and second locations; B. means for communicating with a host computer lock for initiating the transmission to said key of a session address and a lock password; C. means associated with said key for comparing said session address and said lock password with a lock password stored in said key and the location given by said session address; D. means in said key responsive to matching said session address and said lock password for retrieving a key password and transmitting it to said host lock; E. means at said host lock for comparing said second password and the location at which it is stored in said key with corresponding information in said lock and granting or denying access to the host based on the presence or absence of a match.
-
-
2. Apparatus for providing security in a computer system, comprising:
-
A. means for generating random identification numbers for providing access identification to a user; B. means for generating random addresses in which said identification numbers are to be stored; C. host computer protection means having an addressable memory for storing said identification numbers at said addresses; D. security key means having an addressable memory for storing said identification numbers at said addresses; E. means for transmitting between said protection means and said key means an identification number and an address associated with the number in connection with a request for access to the host computer; and F. means for comparing said identification number and said address and denying access when the two are not the same.
-
Specification