×

Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password

  • US 5,887,131 A
  • Filed: 12/31/1996
  • Issued: 03/23/1999
  • Est. Priority Date: 12/31/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for permitting access to secured resources in a computer system incorporating circuitry for communicating with an external token that includes an authentication value, the computer system further incorporating a secure power-up procedure or other secure operating mode, the method comprising the steps of:

  • providing a plain text user password to the computer system while the computer system is in a secure period of operation, the secure period of operation being independent of the external token;

    performing a one-way hash function on the plain text user password to produce a hash value;

    communicatively coupling the external token to the computer system;

    comparing the hash value with the authentication value stored in the external token, the comparison occurring in the computer system; and

    enabling access to a secured internal computer resource in response to the result of said step of comparing the hash value with the authentication value stored in the external token.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×