Browse Prior Art Database

PIN Verification With Multiple Personal Authentication Codes

IP.com Disclosure Number: IPCOM000062039D
Original Publication Date: 1986-Oct-01
Included in the Prior Art Database: 2005-Mar-09
Document File: 2 page(s) / 42K

Publishing Venue

IBM

Related People

Lennon, RE: AUTHOR [+4]

Abstract

This article describes a compartmentalized transaction security facility which is an improvement or refinement on the method described in [*]. The improvement provides a defense against a "substituted ID" attack by calculating the user's personal authentication code (PAC) as a function of the user's identifier (ID) and authentication parameter (AP) rather than AP alone. Fig. 1 illustrates the calculation of PAC2, where ID, PIN, KPAC and KA2 are the same as defined in [*]. Fig. 2 illustrates the calculation of PAC1, where ID, PIN, KPAC and KA1 are the same as defined in [*] and PAC2 is the same as defined in Fig. 1 of this article. Similar modifications could be made to the calculations of PAC4, PAC5 and PAC6 in [*], although this is not shown. Fig.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 2

PIN Verification With Multiple Personal Authentication Codes

This article describes a compartmentalized transaction security facility which is an improvement or refinement on the method described in [*]. The improvement provides a defense against a "substituted ID" attack by calculating the user's personal authentication code (PAC) as a function of the user's identifier (ID) and authentication parameter (AP) rather than AP alone. Fig. 1 illustrates the calculation of PAC2, where ID, PIN, KPAC and KA2 are the same as defined in
[*]. Fig. 2 illustrates the calculation of PAC1, where ID, PIN, KPAC and KA1 are the same as defined in [*] and PAC2 is the same as defined in Fig. 1 of this article. Similar modifications could be made to the calculations of PAC4, PAC5 and PAC6 in [*], although this is not shown. Fig. 3 illustrates a procedure for user authentication at a remote on-line ATM (Automated Teller Machine). Fig. 4 illustrates a procedure for user authentication at a local on-line ATM. Reference
[*] "PIN Verification With Multiple Personal Identification Codes," IBM Technical Disclosure Bulletin 29, 1017-1022 (August 1986).

(Image Omitted)

1

Page 2 of 2

2

[This page contains 3 pictures or other non-text objects]