http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CA-1111563-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e757fd4fedc4fe825bb81b1b466a0947
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2107
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3829
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-347
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-4012
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-31
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-1075
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-1016
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-40
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-38
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-34
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-20
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G07F7-10
filingDate 1979-03-23-04:00^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 1981-10-27-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ffd2dba97bd0e43a8c3cfc465067138f
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4cae5740b5a5db3896850b87c901d967
publicationDate 1981-10-27-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber CA-1111563-A
titleOfInvention Method for authenticating the identity of a user of an information system
abstract ABSTRACT Secure hardware is provided for cryptographically generating a verification pattern which is a function of a potential computer user's identity number, the potential computer user's separately entered pass-word, and a stored test pattern. The test pattern for each authorised computer user is generated at a time when the physical security of the central computer and its data can be assured, such as in a physically guarded environment with no teleprocessing facilities operating. Secure hardware for generating verifica-tion patterns during authentication processing and for generating test patterns during the secure run is disclosed which uses a variation of the host computer master key to reduce risk of compromise of total system security. The use of a variant of the host master key prevents system programmers and/or computer operators from compromising the integrity of the authentication data base by, for example, interchanging entries and/or inserting new entries.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8375427-B2
priorityDate 1978-05-05-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID3517
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID64148
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID33572
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID64148
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419502508
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID154498
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID154498
http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID3517

Total number of triples: 36.