Method and apparatus for utilizing a token for resource access
First Claim
1. A system for providing secure access by an authorized user to a selected resource comprising:
- a token in the possession of the user which stores a secret user code for the system, said code being stored in a machine readable form;
a token processor having a reader for said token, a time-varying value element, a code input device, means for receiving the secret user code read from the token and the time-varying value and for generating a one-time nonpredictable code in response thereto, and a transmitter for transmitting the generated nonpredictable code; and
a host processor having a receiver for the transmitted nonpredictable code, and means responsive to a received nonpredictable code for authorizing access to said selected resource.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for utilizing a token which is preferably a "dumb token" to provide secure access by authorized users to a selected resource. The token stores a secret user code in machine readable form, which code is read by a token processor. The token processor also receives a time-varying value and an algorithm, both of which may be stored or generated at either the token or the token processor and preferably a secret personal identification code which may be inputted at the token, but is preferably inputted at the token processor. The secret user code, time-varying value and secret personal identification code are then algorithmically combined by the algorithm, preferably in the token processor, to generate a one-time nonpredictable code which is transmitted to a host processor. The host processor utilizes the received one-time nonpredictable code to determine if the user is authorized access to the resource and grants access to the resource if the user is determined to be authorized. The system may be modified to operate in query/response mode. The token processor may be any of a variety of available portable remote processors or may be a device such as a telephone which is equipped with card or other token reader and with processing capability.
637 Citations
19 Claims
-
1. A system for providing secure access by an authorized user to a selected resource comprising:
-
a token in the possession of the user which stores a secret user code for the system, said code being stored in a machine readable form; a token processor having a reader for said token, a time-varying value element, a code input device, means for receiving the secret user code read from the token and the time-varying value and for generating a one-time nonpredictable code in response thereto, and a transmitter for transmitting the generated nonpredictable code; and a host processor having a receiver for the transmitted nonpredictable code, and means responsive to a received nonpredictable code for authorizing access to said selected resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for providing secure access by an authorized user to a selected resource comprising:
-
a token in the possession of the user which stores a secret user code for the system, said code being stored in a machine readable form; and a token processor having a reader for said token, a time-varying value element, a code input device, means for receiving the secret user code read from the token, a secret personal identification code inputted on the input device by the user and the time-varying value and for generating a one-time nonpredictable code in response thereto, and means responsive to the generated one-time nonpredictable code for causing the acceptability of the code to be determined and for authorizing access to said selected resource in response to a determination that the nonpredictable code is acceptable.
-
-
18. A method for providing secure access by an authorized user to a selected resource comprising the steps of:
-
a) reading a secret user code from a token into a token processor; b) obtaining a time-varying value and an algorithm at the token processor; c) the token processor receiving a user inputted secret personal identification code; d) the token processor utilizing the secret user code, time-varying value and secret personal identification code in the algorithm to obtain a one-time nonpredictable code; e) the token processor transmitting the generated one-time nonpredictable code to a host processor; f) the host processor utilizing the received nonpredictable code to determine if the user is authorized for access to the resource; and g) the host processor granting the user access to the resource in response to a determination that the user is authorized. - View Dependent Claims (19)
-
Specification