Personal access management system
First Claim
1. A communications system, comprising:
- a sending device having a device file name and a set of identification information stored therein, said sending device generating a message and encrypting said message using a first key code to derive an encrypted message, said sending device further encrypting said identification information using at least a portion of a second key code to derive a set of encrypted identification information, said sending device sending said device file name, said encrypted identification information, and said encrypted message onto a first communications link;
a provider device having a user file stored therein which contains recognition parameters corresponding to said sending device including a set of reference information, said provider device receiving said device file name, said encrypted identification information, and said encrypted message via said first communications link, said provider device accessing said user file using said device file name as an index and deriving at least a portion of said second key code from said recognition parameters, said provider device decrypting said encrypted identification information using the portion of said second key code derived from said recognition parameters to derive a set of decrypted identification information, said provider device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said provider device sending said encrypted message onto a second communications link; and
a receiving device for receiving said encrypted message via said second communications link and storing said encrypted message, said receiving device further decrypting said encrypted message using said first key code to derive a decrypted message.
2 Assignments
0 Petitions
Accused Products
Abstract
A multi-component system for linking a user to a product or service provider includes a user processing device, a storage device, and a provider device. The storage device stores provider-specific application software, user-specific data, and a file management program. The storage device and the processing device are coupled to each other to form a user device which communicates with the provider device. Under direction of the file management program, the processing device carries out a recognition methodology which determines whether the processing device and the storage device are authorized to operate with each other. This aspect of the system makes it possible to render the storage device operable only with a specific user processing device, referred to as the principal processing device. This, in turn, reduces the possibility of fraud since the storage device cannot be used without the principal processing device. Once it is determined that the processing and storage devices are authorized to interact with each other, the processing device executes the provider-specific application software to exchange information with the provider device. Together, the user and provider devices implement unique recognition and comprehension methodologies to ensure that the parties are authorized to communicate with each other and to ensure that the information exchanged cannot be understood by third parties. Overall, the system provides a highly secure mechanism for transferring information from one party to another.
141 Citations
35 Claims
-
1. A communications system, comprising:
-
a sending device having a device file name and a set of identification information stored therein, said sending device generating a message and encrypting said message using a first key code to derive an encrypted message, said sending device further encrypting said identification information using at least a portion of a second key code to derive a set of encrypted identification information, said sending device sending said device file name, said encrypted identification information, and said encrypted message onto a first communications link; a provider device having a user file stored therein which contains recognition parameters corresponding to said sending device including a set of reference information, said provider device receiving said device file name, said encrypted identification information, and said encrypted message via said first communications link, said provider device accessing said user file using said device file name as an index and deriving at least a portion of said second key code from said recognition parameters, said provider device decrypting said encrypted identification information using the portion of said second key code derived from said recognition parameters to derive a set of decrypted identification information, said provider device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said provider device sending said encrypted message onto a second communications link; and a receiving device for receiving said encrypted message via said second communications link and storing said encrypted message, said receiving device further decrypting said encrypted message using said first key code to derive a decrypted message. - View Dependent Claims (2, 3, 4)
-
-
5. A communications system, comprising:
-
a sending device having a device file name and a set of identification information stored therein, said sending device generating a message and encrypting said message using a first key code to derive a single-encrypted message, said sending device further encrypting said identification information and said single-encrypted message using at least a portion of a second key code to derive a set of encrypted identification information and a double-encrypted message, said sending device sending said device file name, said encrypted identification information, and said double-encrypted message onto a first communications link; a provider device having a user file stored therein which contains recognition parameters corresponding to said sending device including a set of reference information, said provider device receiving said device file name, said encrypted identification information, and said double-encrypted message via said first communications link, said provider device accessing said user file using said device file name as an index and deriving at least a portion of said second key code from said recognition parameters, said provider device decrypting said encrypted identification information using the portion of said second key code derived from said recognition parameters to derive a set of decrypted identification information, said provider device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said provider device decrypting said double-encrypted message using the portion of said second key code derived from said recognition parameters to re-derive said single-encrypted message, said provider device thereafter sending said single-encrypted message onto a second communications link; and a receiving device for receiving said single-encrypted message via said second communications link and storing said single-encrypted message, said receiving device further decrypting said single-encrypted message using said first key code to derive a decrypted message. - View Dependent Claims (6, 7, 8)
-
-
9. A system for voting, comprising:
-
a voter device having a voter file name and a set of identification information stored therein, said voter device generating a message representing at least one voting selection, said voter device encrypting said identification information and said message using at least a portion of a key code to derive a set of encrypted identification information and an encrypted message, said voter device sending said voter file name, said encrypted identification information, and said encrypted message onto a communications link; and a voter management device having a voter file stored therein which contains recognition parameters corresponding to said voter device including a set of reference information, said voter management device receiving said voter file name, said encrypted identification information, and said encrypted message via said communications link, said voter management device accessing said voter file using said voter file name as an index and deriving at least a portion of said key code from said recognition parameters, said voter management device decrypting said encrypted identification information using the portion of said key code derived from said recognition parameters to derive a set of decrypted identification information, said voter management device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said voter management device decrypting said message using the portion of said key code derived from said recognition parameters to derive a decrypted message, said voter management device thereafter extracting at least one voting selection from said decrypted message and processing said one voting selection. - View Dependent Claims (10, 11)
-
-
12. A transactional system, comprising:
-
a user device having a user file name and a set of identification information stored therein, said user device generating a message and encrypting said identification information and said message using at least a portion of a key code to derive a set of encrypted identification information and an encrypted message, said user device sending said user file name, said encrypted identification information, and said encrypted message onto a communications link; and a provider device having a user file stored therein which contains recognition parameters corresponding to said user device including a set of reference information, said provider device receiving said user file name, said encrypted identification information, and said encrypted message via said communications link, said provider device accessing said user file using said user file name as an index and deriving at least a portion of said key code from said recognition parameters, said provider device decrypting said encrypted identification information using the portion of said key code derived from said recognition parameters to derive a set of decrypted identification information, said provider device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said provider device decrypting said encrypted message using the portion of said key code derived from said recognition parameters to derive a decrypted message, said provider device thereafter processing said decrypted message to carry out a transaction. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. An authorizational system, comprising:
-
a user device having a user file name and a set of identification information stored therein, said user device generating a message and encrypting said identification information and said message using at least a portion of a key code to derive a set of encrypted identification information and an encrypted message, said user device sending said user file name, said encrypted identification information, and said encrypted message onto a communications link; and a provider device having a user file stored therein which contains recognition parameters corresponding to said user device including a set of reference information, said provider device receiving said user file name, said encrypted identification information, and said encrypted message via said communications link, said provider device accessing said user file using said user file name as an index and deriving at least a portion of said key code from said recognition parameters, said provider device decrypting said encrypted identification information using the portion of said key code derived from said recognition parameters to derive a set of decrypted identification information, said provider device comparing said decrypted identification information with said reference information and, in response to a determination that said decrypted identification information is consistent with said reference information, said provider device decrypting said encrypted message using the portion of said key code derived from said recognition parameters to derive a decrypted message, said provider device processing said decrypted message to derive a set of authorization codes, said provider device sending said authorization codes to said user device via said communications link to be stored within said user device. - View Dependent Claims (34, 35)
-
Specification