Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Terminal User Identification

IP.com Disclosure Number: IPCOM000092031D
Original Publication Date: 1968-Aug-01
Included in the Prior Art Database: 2005-Mar-05
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Reich, HA: AUTHOR

Abstract

A characteristic of computer terminals is that they are indistinguishable by the computer. This arrangement effectively causes each terminal and terminal user to have an identification which the computer can interrogate and read out at will. The identification is not known to the terminal's user and is part of the terminal hardware.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Terminal User Identification

A characteristic of computer terminals is that they are indistinguishable by the computer. This arrangement effectively causes each terminal and terminal user to have an identification which the computer can interrogate and read out at will. The identification is not known to the terminal's user and is part of the terminal hardware.

The arrangement comprises a key in the form of magnetic cores together with their drive and sense wires or a magnetic card. The key contains the terminal identification in a magnetic pattern which is scanned or otherwise interrogated. After the pattern is scanned, the pattern is reset by the computer to a new pattern of which the computer keeps a record, the new pattern being randomly related to the old pattern. In this manner, successive uses of the key, although permitting one unauthorized use, removes the original key from the recognition table of the computer. Thus, through periodic checks and audits of the patterns on the keys, misuse, improper duplication, or other attempts to alter or duplicate the pattern become known.

The cores, drive and sense wires, or contacts can be embedded in a small plastic block for physical protection. If key receiving electrical contacts in the terminal are undesirable, C-shaped cores can be employed to complete a magnetic circuit upon the insertion of the key.

1