Dismiss
InnovationQ/InnovationQ Plus content will be updated on Sunday, June 25, 10am ET, with new patent and non-patent literature collections. Click here to learn more.
Browse Prior Art Database

SYNCHRONOUS DYNAMIC CODE GENERATION FOR SECURE REMOTE ACCESS TO A COMPUTER SYSTEM

IP.com Disclosure Number: IPCOM000009583D
Original Publication Date: 1999-Sep-01
Included in the Prior Art Database: 2002-Sep-04
Document File: 2 page(s) / 110K

Publishing Venue

Motorola

Related People

Ram Satagopan: AUTHOR

Abstract

This paper presents a method to provide secure remote access to a computer system. Codes are synchronously and dynamically generated in real time at both the computer system and on a portable or mobile communication device.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

Developments Technical 0 M MOTOROLA

    SYNCHRONOUS DYNAMIC CODE GENERATION FOR SECURE REMOTE ACCESS TO A COMPUTER SYSTEM

by Ram Satagopan

ABSTRACT that provides uniqueness to the access code that is generated;

  This paper presents a method to provide secure remote access to a computer system. Codes are syn- chronously and dynamically generated in real time at both the computer system and on a portable or mobile communication device.

  2. the unique user ID (can be made optional) embedded in the personal communication device's EEPROM or equivalent; and

  3. a key (e.g. a 6-digit code) programmed into the EEPROM by a system administrator.

  Encryption can be done, if desired, by logically manipulating translated bytes of the above three inputs to a bit-stream by means of unary and logical operations. The algorithm will be able to come up with a unique scrambled code (say a ten-digit numeric code) for every instance of the real-time clock. This code is stored in a designated RAM area which can then be retrieved by the personal communication device and displayed when queried by the user. The user can enter this code as a pass- word code whenever access to the computer system is desired.

  Synchronization of the real-time clock between the computer system and the personal communica- tion device is important. To ensure this synchro- nization, a communication protocol can be set up between the computer system and the personal com- munication device to synchronize periodically.

  This is one of the advantages of having a ran- dom access code generator integrated to a personal communication device. Some of the other advan- tages are:

  An algorithm on both the computer system and the portable or mobile communication device gener- ates a code with respect to an accurate real-time clock source. A user who holds such a device and who remotely accesses the computer system will enter this code as a special password. The computer system will validate this code against its own and, upon a match, enables access.

DESCRIPTION

A synchronous code generation unit (synchro-

codegen) as shown in Figure 1 has two blocks: a functional personal communication device and a synchrocodegen module. The personal communi- cation device is...