User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer
First Claim
Patent Images
1. A method of providing user identification and authentication using ultra long identification key codes and/or ultra large databases of identification key codes in a manner providing secure access from a remote computer terminal to a database or server transaction program stored on a host computer, comprising the steps of:
- (a) utilizing key generation algorithms to generate individual, class specific, or both user key codes which may optionally contain individual encryption keys;
(b) creating a database or otherwise updating an existing database comprising a compilation of each of the access key codes which have been generated for predetermined authorized users of the server transaction program;
(c) recording, on separate individual portable storage media directly compatible with and readily insertable and removable from said remote computer terminal, each of said individualized and class specified user access key codes along with the optional individual encryption keys;
(d) loading or providing the server serving as the host computer with a complete registry or compilation of each individualized and class specified access key code and any optional individual encryption keys which have been generated by the key generation algorithms;
(e) providing each authorized user with said portable storage medium containing the authorized user'"'"'s individual or class specified access key code;
(f) providing the server with computer programming including steps for comparing individual and class specified access key codes transmitted over telephone networks or communication networks from a user'"'"'s remote computer terminal against the stored compilation of authorized access key codes and permitting correct matches to have access to said server transaction program while denying access to unauthorized access key codes;
(g) providing users'"'"' remote computer terminals with programming to permit connection to said server through a communication network or telephone network and to transmit individual and class specific access key codes through said remote computer terminal utilizing readers for the portable storage medium to said server for the purposes of gaining access to said server transaction database; and
(h) conducting a communications session between the user'"'"'s remote computer terminal and said server transaction program through said telephone or communication network.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of providing user identification and authentication using ultra long identification key codes and/or ultra large databases of identification key codes in a manner providing secure access to a remote computer terminal to a database or server transaction program stored on a host computer.
-
Citations
4 Claims
-
1. A method of providing user identification and authentication using ultra long identification key codes and/or ultra large databases of identification key codes in a manner providing secure access from a remote computer terminal to a database or server transaction program stored on a host computer, comprising the steps of:
-
(a) utilizing key generation algorithms to generate individual, class specific, or both user key codes which may optionally contain individual encryption keys; (b) creating a database or otherwise updating an existing database comprising a compilation of each of the access key codes which have been generated for predetermined authorized users of the server transaction program; (c) recording, on separate individual portable storage media directly compatible with and readily insertable and removable from said remote computer terminal, each of said individualized and class specified user access key codes along with the optional individual encryption keys; (d) loading or providing the server serving as the host computer with a complete registry or compilation of each individualized and class specified access key code and any optional individual encryption keys which have been generated by the key generation algorithms; (e) providing each authorized user with said portable storage medium containing the authorized user'"'"'s individual or class specified access key code; (f) providing the server with computer programming including steps for comparing individual and class specified access key codes transmitted over telephone networks or communication networks from a user'"'"'s remote computer terminal against the stored compilation of authorized access key codes and permitting correct matches to have access to said server transaction program while denying access to unauthorized access key codes; (g) providing users'"'"' remote computer terminals with programming to permit connection to said server through a communication network or telephone network and to transmit individual and class specific access key codes through said remote computer terminal utilizing readers for the portable storage medium to said server for the purposes of gaining access to said server transaction database; and (h) conducting a communications session between the user'"'"'s remote computer terminal and said server transaction program through said telephone or communication network. - View Dependent Claims (3, 4)
-
-
2. A user identification authentication system using ultra long identification keys and/or ultra large databases of identification keys for secure remote computer terminal access to a host computer comprising:
-
(a) a host computer having a compiled database of pre-authorized user access key codes of ultra long length; (b) a series of individual portable storage media directly compatible with and readily insertable and removable from said remote computer terminal, each containing a unique or class unique access key code distributed among authorized users of a server transaction program; (c) a server with programming to compare received access key codes with stored authorized access key codes and to deny access to the server transaction program to any user transmitting an unauthorized key code but to permit access to any user transmitting an authorized access key code; (d) each of said access key codes being ultra long and comprising at least 25 characters or 25 bytes.
-
Specification