Personal access management system
First Claim
1. In a processing device having a reference code, a device-specific code, and a set of processed parameters stored therein, a method for coordinating access to the processing device, comprising the steps of:
- receiving an identification code from a user;
generating, using said identification code, a first non-reversible code having a property that said first non-reversible code cannot be reverse-engineered to derive said identification code;
comparing said first non-reversible code with said reference code stored in the processing device;
denying the user access to the processing device in response to a determination that said first non-reversible code is inconsistent with said reference code;
in response to a determination that said first non-reversible code is consistent with said reference code, processing said identification code with said device-specific code to derive a modified identification code;
generating, using said modified identification code, a second non-reversible code having a property that said second non-reversible code cannot be reverse-engineered to derive said modified identification code;
generating a key code using said second non-reversible code; and
processing said processed parameters, using said key code, to derive a set of de-processed parameters.
2 Assignments
0 Petitions
Accused Products
Abstract
A multi-component system for linking a user to a product or service provider includes a user processing device, a storage device, and a provider device. The storage device stores provider-specific application software, user-specific data, and a file management program. The storage device and the processing device are coupled to each other to form a user device which communicates with the provider device. Under direction of the file management program, the processing device carries out a recognition methodology which determines whether the processing device and the storage device are authorized to operate with each other. This aspect of the system makes it possible to render the storage device operable only with a specific user processing device, referred to as the principal processing device. This, in turn, reduces the possibility of fraud since the storage device cannot be used without the principal processing device. Once it is determined that the processing and storage devices are authorized to interact with each other, the processing device executes the provider-specific application software to exchange information with the provider device. Together, the user and provider devices implement unique recognition and comprehension methodologies to ensure that the parties are authorized to communicate with each other and to ensure that the information exchanged cannot be understood by third parties. Overall, the system provides a highly secure mechanism for transferring information from one party to another.
-
Citations
11 Claims
-
1. In a processing device having a reference code, a device-specific code, and a set of processed parameters stored therein, a method for coordinating access to the processing device, comprising the steps of:
-
receiving an identification code from a user; generating, using said identification code, a first non-reversible code having a property that said first non-reversible code cannot be reverse-engineered to derive said identification code; comparing said first non-reversible code with said reference code stored in the processing device; denying the user access to the processing device in response to a determination that said first non-reversible code is inconsistent with said reference code; in response to a determination that said first non-reversible code is consistent with said reference code, processing said identification code with said device-specific code to derive a modified identification code; generating, using said modified identification code, a second non-reversible code having a property that said second non-reversible code cannot be reverse-engineered to derive said modified identification code; generating a key code using said second non-reversible code; and processing said processed parameters, using said key code, to derive a set of de-processed parameters. - View Dependent Claims (2, 3, 4, 7)
-
-
8. A processing device, comprising:
-
a storage for storing a reference code, a device-specific code, and a set of processed parameters; means for receiving an identification code from a user; means for generating, using said identification code, a first non-reversible code having a property that said first non-reversible code cannot be reverse-engineered to derive said identification code; means for comparing said first non-reversible code with said reference code stored in said storage; means for denying access to said processing device in response to a determination that said first non-reversible code is inconsistent with said reference code; means for processing said identification code with said device-specific code to derive a modified identification code; means for generating, using said modified identification code, a second non-reversible code having a property that said second non-reversible code cannot be reverse-engineered to derive said modified identification code; means for generating a key code using said second non-reversible code; and means for processing said processed parameters, using said key code, to derive a set of de-processed parameters. - View Dependent Claims (5, 6, 9, 10, 11)
-
Specification