Apparatus and method for providing an authentication system
First Claim
1. A security verification apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data located on a card, comprising:
- a verification device, external to and operable independently of the computer, having a port that provides a direct communication path to the keyboard and the computer, said verification device controlling communication between the keyboard and the computer via said port, said verification device communicating with the keyboard and the computer via said port, said verification device provides the data entered through the keyboard to the card, which compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the at least one program on the computer is accessible via said keyboard when the data entered through the keyboard matches the data from the card;
said verification device providing a first data path between the keyboard and the computer, a second data path between the keyboard and the verification device, and a third data path between the computer and the verification device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data stored on a token such as a card, while isolating the entered data from the computer. The apparatus includes a verification device, external to the computer, which receives the card. When activated, the verification device isolates itself from the computer, and then receives the entered data and forwards the entered data to the card. The card compares the entered data with data stored on the card. The result of the comparison is forwarded to the verification unit which generates a status signal indicative of the result of the comparison. The verification device is operable in a first mode wherein data provided to the verification unit via the keyboard is not provided to the computer. The verification device is also operable in a second mode, wherein at least one program on the computer is accessible via the keyboard when the data entered through the keyboard matches the data from the card. When operating in a third mode, communications is restricted to that between the verification device and the computer. The verification device operates in one of the three modes in accordance with commands from the computer.
-
Citations
21 Claims
-
1. A security verification apparatus for controlling access to at least one program on a computer by verifying data entered through a keyboard with data located on a card, comprising:
-
a verification device, external to and operable independently of the computer, having a port that provides a direct communication path to the keyboard and the computer, said verification device controlling communication between the keyboard and the computer via said port, said verification device communicating with the keyboard and the computer via said port, said verification device provides the data entered through the keyboard to the card, which compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the at least one program on the computer is accessible via said keyboard when the data entered through the keyboard matches the data from the card; said verification device providing a first data path between the keyboard and the computer, a second data path between the keyboard and the verification device, and a third data path between the computer and the verification device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for assembling a system that controls access to at least one program running on a computer, comprising:
-
(a) providing a verification device external to and operable independently of the computer; (b) connecting a keyboard to the computer to provide a first data path between the keyboard and the computer; (c) providing a second data path between the keyboard and the verification device; and (d) connecting the computer to the verification device to provide a third data path between the computer and the verification device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for verifying access authorization to at least one program on a computer, comprising:
-
a keyboard through which data is entered; a card that contains verification data; and a verification device, external to and operable independently of the computer, that receives said card, said verification device providing a first data path between the keyboard and said computer, a second data path between the keyboard and the verification device and a third data path between the computer and the verification device; said verification device provides the data entered from the keyboard to the card, said card compares the data from the keyboard with the data from the card, said verification device being operable in a first mode wherein access to at least one program on the computer via the keyboard is inhibited, said verification device being operable in a second mode, wherein the keyboard is coupled to the computer so that the computer is accessible via said keyboard when the data from the keyboard matches the data from the card. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for controlling access to at least one program running on a computer, comprising:
-
(a) providing a verification device external to and operable independently of the computer; (b) providing a first data path between a keyboard and the computer, a second data path between the keyboard and the verification device, a third data path between the computer and the verification device; (c) receiving, by the verification device, a card having stored data; (d) entering data through the keyboard; (e) comparing the entered data with data stored on the card; and (f) granting access to the at least one program on the computer via the keyboard if the entered data matches the data stored on the card;
otherwise, denying access to the at least one program on the computer via the keyboard.
-
Specification