Browse Prior Art Database

Holographic Security Key

IP.com Disclosure Number: IPCOM000076977D
Original Publication Date: 1972-May-01
Included in the Prior Art Database: 2005-Feb-24
Document File: 2 page(s) / 36K

Publishing Venue

IBM

Related People

Krewson, NN: AUTHOR [+2]

Abstract

A holographic security key 1, low in cost and not easily counterfeited, provides its user with access to a data-processing system. When the key is inserted in the system receptacle, a collimated beam passes through a window 2 in the key and is reflected from a 90 degrees mirror surface 3. The reflected light impinges upon a hologram 4, which is reflective phase oriented and the holographic readout passes through 2 onto a photosensitive array 5. The array passes the coded information to suitable detection apparatus for a security check with respect to information such as account number, name and the like. Additional coded information can provide for automatic logging and billing, and the type of system access and control the user can achieve.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 2

Holographic Security Key

A holographic security key 1, low in cost and not easily counterfeited, provides its user with access to a data-processing system. When the key is inserted in the system receptacle, a collimated beam passes through a window 2 in the key and is reflected from a 90 degrees mirror surface 3. The reflected light impinges upon a hologram 4, which is reflective phase oriented and the holographic readout passes through 2 onto a photosensitive array 5. The array passes the coded information to suitable detection apparatus for a security check with respect to information such as account number, name and the like. Additional coded information can provide for automatic logging and billing, and the type of system access and control the user can achieve.

The same key can be used by a person as he changes jobs within the organization; his access and control being altered by suitable internal programming of the system.

1

Page 2 of 2

2

[This page contains 3 pictures or other non-text objects]