×

User identification and authentication system using ultra long identification keys and ultra large databases of identification keys for secure remote terminal access to a host computer

  • US 5,771,291 A
  • Filed: 12/11/1995
  • Issued: 06/23/1998
  • Est. Priority Date: 12/11/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of providing user identification and authentication using ultra long identification key codes and/or ultra large databases of identification key codes in a manner providing secure access from a remote computer terminal to a database or server transaction program stored on a host computer, comprising the steps of:

  • (a) utilizing key generation algorithms to generate individual, class specific, or both user key codes which may optionally contain individual encryption keys;

    (b) creating a database or otherwise updating an existing database comprising a compilation of each of the access key codes which have been generated for predetermined authorized users of the server transaction program;

    (c) recording, on separate individual portable storage media directly compatible with and readily insertable and removable from said remote computer terminal, each of said individualized and class specified user access key codes along with the optional individual encryption keys;

    (d) loading or providing the server serving as the host computer with a complete registry or compilation of each individualized and class specified access key code and any optional individual encryption keys which have been generated by the key generation algorithms;

    (e) providing each authorized user with said portable storage medium containing the authorized user'"'"'s individual or class specified access key code;

    (f) providing the server with computer programming including steps for comparing individual and class specified access key codes transmitted over telephone networks or communication networks from a user'"'"'s remote computer terminal against the stored compilation of authorized access key codes and permitting correct matches to have access to said server transaction program while denying access to unauthorized access key codes;

    (g) providing users'"'"' remote computer terminals with programming to permit connection to said server through a communication network or telephone network and to transmit individual and class specific access key codes through said remote computer terminal utilizing readers for the portable storage medium to said server for the purposes of gaining access to said server transaction database; and

    (h) conducting a communications session between the user'"'"'s remote computer terminal and said server transaction program through said telephone or communication network.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×