Browse Prior Art Database

Enciphering Adapter

IP.com Disclosure Number: IPCOM000041326D
Original Publication Date: 1984-Jan-01
Included in the Prior Art Database: 2005-Feb-02
Document File: 2 page(s) / 13K

Publishing Venue

IBM

Related People

Landrock, JB: AUTHOR [+2]

Abstract

In lieu of keywords for securing data or enciphering messages, a plug-compatible adapter is proposed. This adapter comprises a complete enciphering/deciphering unit in pocket computer format, and only those possessing the adapter have access to the data it secures. The adapter consists of an enclosed housing, at least one standardized interface (e.g., V.24, IEEE) for data transfer, as well as of enciphering/deciphering means realized by microelectronics. Such an adapter can be inserted, similar to a key, into any computer system, with one of the standardized I/O interfaces acting as a "keyhole". Similar to known pocket computers, the adapter can be easily produced in miniaturized form, using modern microelectronics.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 53% of the total text.

Page 1 of 2

Enciphering Adapter

In lieu of keywords for securing data or enciphering messages, a plug-compatible adapter is proposed. This adapter comprises a complete enciphering/deciphering unit in pocket computer format, and only those possessing the adapter have access to the data it secures. The adapter consists of an enclosed housing, at least one standardized interface (e.g., V.24, IEEE) for data transfer, as well as of enciphering/deciphering means realized by microelectronics. Such an adapter can be inserted, similar to a key, into any computer system, with one of the standardized I/O interfaces acting as a "keyhole". Similar to known pocket computers, the adapter can be easily produced in miniaturized form, using modern microelectronics. In accordance with this principle, the complete enciphering/deciphering function is realized by special microelectronics. For this purpose, use may be made of one of the known enciphering techniques or - as no keyword is needed - an enciphering method specially adapted to this problem. Such an adapter cannot be copied, since determining its function is at least as difficult as breaking the keywords in conventional systems. For extra security, the adapter may be provided with the following facilities: - An additional keyword (in this case it is not sufficient to have have the adapter; one must

also know the right keyword). - A time lock (the adapter comprises a timer and operates only at predetermined times). Special applications are: - Data transmission. For this purpose, the adapter, provided with with two I/O interfaces...