Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_e757fd4fedc4fe825bb81b1b466a0947 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2107 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3829 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-10 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-347 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-4012 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-31 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-1075 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F7-1016 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-40 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-38 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-34 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-20 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G07F7-10 |
filingDate |
1979-03-23-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
1981-10-27-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ffd2dba97bd0e43a8c3cfc465067138f http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4cae5740b5a5db3896850b87c901d967 |
publicationDate |
1981-10-27-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
CA-1111563-A |
titleOfInvention |
Method for authenticating the identity of a user of an information system |
abstract |
ABSTRACT Secure hardware is provided for cryptographically generating a verification pattern which is a function of a potential computer user's identity number, the potential computer user's separately entered pass-word, and a stored test pattern. The test pattern for each authorised computer user is generated at a time when the physical security of the central computer and its data can be assured, such as in a physically guarded environment with no teleprocessing facilities operating. Secure hardware for generating verifica-tion patterns during authentication processing and for generating test patterns during the secure run is disclosed which uses a variation of the host computer master key to reduce risk of compromise of total system security. The use of a variant of the host master key prevents system programmers and/or computer operators from compromising the integrity of the authentication data base by, for example, interchanging entries and/or inserting new entries. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-8375427-B2 |
priorityDate |
1978-05-05-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |