Browse Prior Art Database

Remote Security System

IP.com Disclosure Number: IPCOM000080515D
Original Publication Date: 1973-Dec-01
Included in the Prior Art Database: 2005-Feb-27
Document File: 2 page(s) / 30K

Publishing Venue

IBM

Related People

Kath, R: AUTHOR [+2]

Abstract

Security of transmissions between central station 10 and remote station 11 is enhanced, by use of read-only memory (ROM) devices programmed to provide data validation.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 64% of the total text.

Page 1 of 2

Remote Security System

Security of transmissions between central station 10 and remote station 11 is enhanced, by use of read-only memory (ROM) devices programmed to provide data validation.

A random-number generator in central processing unit (CPU) 15 selects a random address and applies this address to the input of its transmitter 16, and also to address read-only memory 17. This address is transmitted by 16 over communication media 18 which could be telephone lines, radio communication links or the like. The address is decoded by remote site receiver 20 and used to address ROM 21. ROM 17 and ROM 21 contain exactly the same data at each address, it being noted that ROM 17 could be a table in storage for CPU 15.

The data read from ROM 21 at the address location is correlated with information from data source 24 and transmitted from transmitter 25 to central station receiver 28. Note that the address information sent to receiver 20 as well as the read-out information from 21 can be correlated as header, trailer or interleaved data in any desired sequence, as long as appropriate decoding logic is incorporated in receivers 20 and 28.

In CPU 15, the validation data read from ROM 17 is compared to the validation data received from ROM 21 via 25. If a match is found, the associated data is assumed to be correct. Failure to compare can either terminate and further communications or be followed by a second validation attempt. For instance, failure of validation data com...