×

Remote generated, device identifier key for use with a dual-key reflexive encryption security system

  • US 6,044,154 A
  • Filed: 09/24/1997
  • Issued: 03/28/2000
  • Est. Priority Date: 10/31/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A security system for granting access to a host computer in response to a demand from a remote computer, each said computer having a central processing unit (CPU), an operating system, and device data for identifying an associated portion thereof, said security system comprising:

  • a data encryption standard (DES) program within said remote computer, said DES program, in turn, comprising;

    a first encryption key with an associated identifier in encrypted form in said remote computer;

    key initiator means for generating a device-data-derived (D3) key, said key initiator means within said remote computer providing retrieval of said device data, usage thereof to generate said D 3 key, said D3 key for decrypting said first encryption key, and transfer of said D3 key to the DES program;

    a second encryption key in said host computer providing encrypting/decrypting corresponding to that of said first encryption key, said second encryption key being selected by utilizing said associated identifier of said first key;

    a transitory encryption key generated by said host computer , said transitory encryption key for decrypting encrypted identifying data transmitted from said remote computer and for encrypting challenge data for transmission to said remote computer;

    comparator means in said host computer for authenticating access demands in response to encryptions of said identifying data and said challenge data transmitted from said remote computer;

    whereby access is granted by the host computer to the remote computer upon said unencrypted identifier provided by the remote computer enabling the selection of said selectable encryption key, the encryption therewith of a transitory encryption key and the transmission thereof to said remote computer, and the successful comparison at the host computer of encrypted identifying data encrypted with the transitory key at the remote computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×