Apparatus and method for providing an authentication system
First Claim
1. A security verification apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data located on a card, comprising:
- a verification device, external to and operable independently of the computer, having a port that provides a direct communication path to the keyboard and the computer, said verification device controlling communication between the keyboard and the computer via said port, said verification device communicating with the keyboard and the computer via said port, said verification device reads the data from the card and compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the at least one program on the computer is accessible via said keyboard when the data from the keyboard matches the data from the card; and
a connector, external to the computer, that couples the keyboard to said port of said verification device and that couples the port of said verification device to the computer, said connector providing a first data path between the keyboard and the computer, a second data path between the keyboard and the verification device, and a third data path between the computer and the verification device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data stored on a token such as a card, while isolating the entered data from the computer. The apparatus includes a verification device, external to the computer, which receives the card and a connector. When activated, the verification device isolates itself from the computer, and then receives the entered data and compared it with data stored on the card. The verification unit then generates a status signal indicative of the result of the comparison. The verification device is operable in a first mode wherein data provided to the verification unit via the keyboard is not provided to the computer. The verification device is also operable in a second mode, wherein at least one program on the computer is accessible via the keyboard when the data from the keyboard matches the data from the card. When operating in a third mode, communications is restricted to that between the verification device and the computer. The verification device operates in one of the three modes in accordance with commands from the computer.
103 Citations
20 Claims
-
1. A security verification apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data located on a card, comprising:
-
a verification device, external to and operable independently of the computer, having a port that provides a direct communication path to the keyboard and the computer, said verification device controlling communication between the keyboard and the computer via said port, said verification device communicating with the keyboard and the computer via said port, said verification device reads the data from the card and compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the at least one program on the computer is accessible via said keyboard when the data from the keyboard matches the data from the card; and a connector, external to the computer, that couples the keyboard to said port of said verification device and that couples the port of said verification device to the computer, said connector providing a first data path between the keyboard and the computer, a second data path between the keyboard and the verification device, and a third data path between the computer and the verification device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for assembling a system that controls access to at least one program running on a computer, comprising the steps of:
-
(a) providing a verification device external to and operable independently of the computer; (b) providing a connector, external to the computer, having a first port, a second port and a third port; and (c) connecting the first port to the computer, the second port to a keyboard and the third port to the verification device, so that the keyboard and the computer are coupled to the verification device; (d) providing a first data path between the keyboard and the computer via said first port and said second port, a second data path between the keyboard and the verification device via said second port and said third port, and a third data path between the computer and the verification device via said first port and said third port. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for verifying access authorization to at least one program on a computer, comprising:
-
a keyboard through which data is entered; a card that contains verification data; a verification device, external to and operable independently of the computer, having a port that provides a direct communication path to the keyboard and the computer, said verification device controlling communication between the keyboard and the computer via said port, said verification device communicating with the keyboard and the computer via said port, said verification device reads the data from the card and compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to at least one program on the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the computer is accessible via said keyboard when the data from the keyboard matches the data from the card; and a connector, external to the computer, that couples the keyboard to said port of said verification device and that couples the port of said verification device to the computer, said connector providing a first data path between the keyboard and the computer, a second data path between the keyboard and the verification device, and a third data path between the computer and the verification device. - View Dependent Claims (17, 18, 19, 20)
-
Specification