Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

User Identification Technique for Computer System

IP.com Disclosure Number: IPCOM000037450D
Original Publication Date: 1989-Jan-01
Included in the Prior Art Database: 2005-Jan-29
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Hailpern, B: AUTHOR [+2]

Abstract

Improved security of user identity is obtained with a computing system by using a small calculator as an intermediary between the user and computing system to prevent disclosure of all identifying data.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

User Identification Technique for Computer System

Improved security of user identity is obtained with a computing system by using a small calculator as an intermediary between the user and computing system to prevent disclosure of all identifying data.

For providing identification, the user carries a device that is a small credit card type of calculator having a microprocessor, keypad, read-only memory (ROM) and external interface. When identification is required to a computing system, here designated an agent, the following sequence occurs: 1. User connects the device interface to the agent;

2. Agent identifies itself to the device via the interface;

3. The device confirms its connection and asks user for a password.

4. User enters the password to the device which compares it with a stored password in ROM; 5. If correct, the device searches ROM for an appropriate identification code representing user to agent; 6. The device transmits the code to agent where it is accepted or rejected and terminates the session.

With this process, the user interacts only with the device and does not present all identification to the agent, which may be unreliable. The identification for one agent need not be valid for another. The device can be programmed to accept a single or different passwords for several agents.

Disclosed anonymously.

1