CA2270694A1 - Method and apparatus for securing data transmissions - Google Patents
Method and apparatus for securing data transmissions Download PDFInfo
- Publication number
- CA2270694A1 CA2270694A1 CA 2270694 CA2270694A CA2270694A1 CA 2270694 A1 CA2270694 A1 CA 2270694A1 CA 2270694 CA2270694 CA 2270694 CA 2270694 A CA2270694 A CA 2270694A CA 2270694 A1 CA2270694 A1 CA 2270694A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- output
- treatment means
- random
- data output
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Abstract
A security device and method suitable for authorizing an electronic transaction, the device comprising a random digit generator which then transmits the random input to a first processing unit to mathematically process the random data to produce a first data output, a remote second processing unit to mathematically process the random data to produce a second data output, the first processing unit and first processing unit each being designed to produce an identical data output upon receiving identical random input, a comparator unit for comparing the first output data and the second output data and an authorization unit to authorization the transaction when the first data output and second data output are identical. The device may also be used for encrypting data to be electronically forwarded.
Description
METHOD AND APPARATUS FOR
SECURING DATA TRANSMISSIONS
BACKGROUND OF THE INVENTION
The present invention relates to a security device and more particularly, relates to a security device for securing data transmission and a method of so doing.
The emergence of modern communication and the globalization thereof has presented many advantages to our industrial society. Instantaneous communication means fewer delays in conducting transactions and thus the achievement of greater efficiencies. The use of computer networks such as the Internet as well as other telephone technology, both cellular and otherwise, has led to a tremendous increase in the type and number of data transmissions.
Included among such transmissions are banking and other commercial transactions. However, the field is open to fraudulent activity and accordingly it has become necessary to ensure that only the proper person or persons authorized to receive the date do so. Also, the sending of data electronically frequently requires that the data be encrypted to maintain secrecy and/or confidentiality.
There have been a number of systems developed in the prior art for transmitting messages between a transmitter and receiver in a secure fashion.
Well known are the use of pre-determined encoding/decoding keys to respectively encode and decode data. The security of the data depends upon the number of keys used. While such methods and systems have received wide usage, there is always the danger of the key either becoming known to an unauthorized user who could then decipher the information.
SLmrIMARY OF THE INVENTION
It is an object of the present invention to provide a security device to permit authorization in a transaction and which device is simple and functions in a secure manner.
It is a further object of the present invention to provide a method and system to authorize a transaction and which device will allow for identification of the user and secure transmission of data.
According to one aspect of the present invention a security device suitable for authorizing a transaction, the device comprising means to generate random data, first treatment means to mathematically treat the random data to produce a first data output, second treatment means remote from the first treatment means to mathematically treat the random data to produce a second data output, the first treatment means and the second treatment means each producing an identical data output upon receiving identical random data, comparator means for comparing the first output data and the second output data, and authorization
SECURING DATA TRANSMISSIONS
BACKGROUND OF THE INVENTION
The present invention relates to a security device and more particularly, relates to a security device for securing data transmission and a method of so doing.
The emergence of modern communication and the globalization thereof has presented many advantages to our industrial society. Instantaneous communication means fewer delays in conducting transactions and thus the achievement of greater efficiencies. The use of computer networks such as the Internet as well as other telephone technology, both cellular and otherwise, has led to a tremendous increase in the type and number of data transmissions.
Included among such transmissions are banking and other commercial transactions. However, the field is open to fraudulent activity and accordingly it has become necessary to ensure that only the proper person or persons authorized to receive the date do so. Also, the sending of data electronically frequently requires that the data be encrypted to maintain secrecy and/or confidentiality.
There have been a number of systems developed in the prior art for transmitting messages between a transmitter and receiver in a secure fashion.
Well known are the use of pre-determined encoding/decoding keys to respectively encode and decode data. The security of the data depends upon the number of keys used. While such methods and systems have received wide usage, there is always the danger of the key either becoming known to an unauthorized user who could then decipher the information.
SLmrIMARY OF THE INVENTION
It is an object of the present invention to provide a security device to permit authorization in a transaction and which device is simple and functions in a secure manner.
It is a further object of the present invention to provide a method and system to authorize a transaction and which device will allow for identification of the user and secure transmission of data.
According to one aspect of the present invention a security device suitable for authorizing a transaction, the device comprising means to generate random data, first treatment means to mathematically treat the random data to produce a first data output, second treatment means remote from the first treatment means to mathematically treat the random data to produce a second data output, the first treatment means and the second treatment means each producing an identical data output upon receiving identical random data, comparator means for comparing the first output data and the second output data, and authorization
-2-means to authorize the transaction when the first data output and the second data output are identical.
In a further aspect of the present invention there is provided a method for authorizing a transaction, the method comprising the steps of generating random data, transmitting the random data to a first treatment means, mathematically treating the random data in the first treatment means to generate a first data output, transmitting the random data to a second treatment means remote from the first treatment means, mathematically treating the random data in the second treatment means to thereby generate a second data output, the first treatment means and the second treatment means each providing an identical data output upon receiving identical random data, comparing the first data output and the second data output, and authorizing the transaction when the first data output and the second data output are identical.
The device of the present invention may be used in many different applications, exemplary of which are the authorization of any transaction or the sending of any data. In particular, the security device of the present invention may be utilized in authorization procedures and such as for bank transaction operations wherein one it requires not only secure transmission of the data, but also an accurate identification of the user.
In a further aspect of the present invention there is provided a method for authorizing a transaction, the method comprising the steps of generating random data, transmitting the random data to a first treatment means, mathematically treating the random data in the first treatment means to generate a first data output, transmitting the random data to a second treatment means remote from the first treatment means, mathematically treating the random data in the second treatment means to thereby generate a second data output, the first treatment means and the second treatment means each providing an identical data output upon receiving identical random data, comparing the first data output and the second data output, and authorizing the transaction when the first data output and the second data output are identical.
The device of the present invention may be used in many different applications, exemplary of which are the authorization of any transaction or the sending of any data. In particular, the security device of the present invention may be utilized in authorization procedures and such as for bank transaction operations wherein one it requires not only secure transmission of the data, but also an accurate identification of the user.
-3-The device of the present invention has many features including the fact that one does not need to utilize random access memory for operation of the device.
BRIEF DESCRIPTION OF THE DRAWINGS
Having thus generally described the invention, reference will be made to the accompanying drawings illustrating embodiments thereof, in which:
Figure 1 is a schematic diagram illustrating a basic authorization procedure;
Figure 2 is a schematic diagram similar to Figure 1, but also including the step of date encryption; and Figure 3 is a schematic diagram illustrating a typical exchange unit for treating the data from a random data generating system.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring to the drawings in greater detail and by reference characters thereto, there is shown in Figure 1 a schematic of a security device permitting authentication or authorization and which device is generally designated by reference numeral 10.
Security device 10 includes a first unit having a random data generator generally designated by reference numeral 12 and having associated therewith a transmitter 14. Random data generator 12 may be any suitable generator well
BRIEF DESCRIPTION OF THE DRAWINGS
Having thus generally described the invention, reference will be made to the accompanying drawings illustrating embodiments thereof, in which:
Figure 1 is a schematic diagram illustrating a basic authorization procedure;
Figure 2 is a schematic diagram similar to Figure 1, but also including the step of date encryption; and Figure 3 is a schematic diagram illustrating a typical exchange unit for treating the data from a random data generating system.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring to the drawings in greater detail and by reference characters thereto, there is shown in Figure 1 a schematic of a security device permitting authentication or authorization and which device is generally designated by reference numeral 10.
Security device 10 includes a first unit having a random data generator generally designated by reference numeral 12 and having associated therewith a transmitter 14. Random data generator 12 may be any suitable generator well
-4-known in the art and in the illustrated embodiment, would generate random digits.
From random data generator 12, the random data is transmitted to a first treatment means generally designated by reference numeral 16.
First treatment means 16, as may be seen in Figure 1, includes a binary to decimal conversion unit 18. Certain output from binary to decimal module 18 then goes into exchange units 20. From exchange units 20 the data is then transmitted to an algorithm module 22 wherein it undergoes a mathematical treatment.
It will be understood that the first treatment means 16 may comprise any suitable software, programmable circuit, etc. including any suitable device adapted to perform a predetermined mathematical operation on the data in a predetermined sequence.
The output data 24 from the first treatment means 16 is then passed to a comparator 26.
At the same time (preferably), the transmitter 14 then transmits the data from random data generator 12 to a receiver 28 and then to a second treatment means generally designated by reference numeral 16'. Second treatment means 16' is illustrated as being identical to first treatment means 16 although it is not required as long as an identical output is achieved for any given input.
From random data generator 12, the random data is transmitted to a first treatment means generally designated by reference numeral 16.
First treatment means 16, as may be seen in Figure 1, includes a binary to decimal conversion unit 18. Certain output from binary to decimal module 18 then goes into exchange units 20. From exchange units 20 the data is then transmitted to an algorithm module 22 wherein it undergoes a mathematical treatment.
It will be understood that the first treatment means 16 may comprise any suitable software, programmable circuit, etc. including any suitable device adapted to perform a predetermined mathematical operation on the data in a predetermined sequence.
The output data 24 from the first treatment means 16 is then passed to a comparator 26.
At the same time (preferably), the transmitter 14 then transmits the data from random data generator 12 to a receiver 28 and then to a second treatment means generally designated by reference numeral 16'. Second treatment means 16' is illustrated as being identical to first treatment means 16 although it is not required as long as an identical output is achieved for any given input.
-5-As was the case with first treatment means 16, second treatment means 16' includes a binary to decimal module 18', exchange units 20', and an algorithm module 22' to thereby provide output data 24'. Output data 24' then goes to comparator 26. If output data 24 and 24' a.re identical, then comparator 26 permits authorization of the transaction.
As shown in Figure 3, exchange units 20 may conduct a numeral exchange or conversion. Only certain of the digits may undergo exchange while others do not.
A further embodiment of the present invention is illustrated in Figure 2 and reference will now be made thereto. It will be understood that similar reference numerals are used for similar components.
In the embodiment of Figure 2, a random data generator 12 generates random numerals. Transmitter unit 14 transmits the random numerals to a first treatment means 16 and a second treatment means 16'.
As was the case in the embodiment of Figure 1, first treatment means 16 includes a binary to decimal conversion module 18, a plurality of exchange units 20, and an algorithm module 22 to thereby generate output data 24.
Similarly, second treatment means 16' includes a binary to decimal module 18', exchange units 20' and algorithm module 22'. There is thus generated an output data 24'.
As shown in Figure 3, exchange units 20 may conduct a numeral exchange or conversion. Only certain of the digits may undergo exchange while others do not.
A further embodiment of the present invention is illustrated in Figure 2 and reference will now be made thereto. It will be understood that similar reference numerals are used for similar components.
In the embodiment of Figure 2, a random data generator 12 generates random numerals. Transmitter unit 14 transmits the random numerals to a first treatment means 16 and a second treatment means 16'.
As was the case in the embodiment of Figure 1, first treatment means 16 includes a binary to decimal conversion module 18, a plurality of exchange units 20, and an algorithm module 22 to thereby generate output data 24.
Similarly, second treatment means 16' includes a binary to decimal module 18', exchange units 20' and algorithm module 22'. There is thus generated an output data 24'.
-6-In this embodiment, the output data 24 from first treatment means 16 has data 30 representing the information to be transmitted added thereto. The thus encrypted data 32 is transmitted as indicated by reference numeral 34 to the output from second treatment means 16'. The output data 24' is then utilized to decrypt the encrypted data 32 to thereby provide the original information or data 30.
It will be understood that the above described embodiments are for purposes of illustration only and that changes and modifications may be made thereto without departing from the spirit and scope of the invention.
It will be understood that the above described embodiments are for purposes of illustration only and that changes and modifications may be made thereto without departing from the spirit and scope of the invention.
Claims (3)
1. A security device suitable for authorizing a transaction, said device comprising:
means to generate random data;
first treatment means to mathematically treat said random data to produce a first data output, second treatment means remote from said first treatment means to mathematically treat said random data to produce a second data output, said first treatment means and said second treatment means each producing an identical data output upon receiving identical random data;
comparator means for comparing said first output data and said second output data, and authorization means to authorize said transaction when said first data output and said second data output are identical.
means to generate random data;
first treatment means to mathematically treat said random data to produce a first data output, second treatment means remote from said first treatment means to mathematically treat said random data to produce a second data output, said first treatment means and said second treatment means each producing an identical data output upon receiving identical random data;
comparator means for comparing said first output data and said second output data, and authorization means to authorize said transaction when said first data output and said second data output are identical.
2. The security device of Claim 1 further including means for encrypting data to be transmitted using said first data output to thereby create encrypted data, and means for decrypting said encrypted data using said second data output at a location remote from said first location.
3. A method for authorizing a transaction, said method comprising the steps of:
generating random data;
transmitting said random data to a first treatment means;
mathematically treating said random data in said first treatment means to generate a first data output, transmitting said random data to a second treatment means remote from said first treatment means, mathematically treating said random data in said second treatment means to thereby generate a second data output, said first treatment means and said second treatment means each providing an identical data output upon receiving identical random data, comparing said first data output and said second data output, and authorizing said transaction when said first data output and said second data output are identical.
generating random data;
transmitting said random data to a first treatment means;
mathematically treating said random data in said first treatment means to generate a first data output, transmitting said random data to a second treatment means remote from said first treatment means, mathematically treating said random data in said second treatment means to thereby generate a second data output, said first treatment means and said second treatment means each providing an identical data output upon receiving identical random data, comparing said first data output and said second data output, and authorizing said transaction when said first data output and said second data output are identical.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9809049.1A GB9809049D0 (en) | 1998-04-29 | 1998-04-29 | Method and apparatus for securing data transmissons |
GB9809049.1 | 1998-04-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2270694A1 true CA2270694A1 (en) | 1999-10-29 |
Family
ID=10831113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2270694 Abandoned CA2270694A1 (en) | 1998-04-29 | 1999-04-29 | Method and apparatus for securing data transmissions |
Country Status (2)
Country | Link |
---|---|
CA (1) | CA2270694A1 (en) |
GB (1) | GB9809049D0 (en) |
-
1998
- 1998-04-29 GB GBGB9809049.1A patent/GB9809049D0/en not_active Ceased
-
1999
- 1999-04-29 CA CA 2270694 patent/CA2270694A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
GB9809049D0 (en) | 1998-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2023872C (en) | Databaseless security system | |
KR100500976B1 (en) | Authentication method, communication method and information processing device | |
EP0403656B1 (en) | Communication equipment | |
CN102317904B (en) | System and methods for encryption with authentication integrity | |
US5241597A (en) | Method for recovering from encryption key variable loss | |
CN1068486C (en) | A method for point-to-point communications within secure communication systems | |
US20030112972A1 (en) | Data carrier for the secure transmission of information and method thereof | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
CN101529791A (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
WO1997045979A9 (en) | Method and apparatus for initialization of cryptographic terminal | |
JPS63310239A (en) | Coding key utilization control | |
CN101819614A (en) | System and method for enhancing network transaction safety by utilizing voice verification USBKey | |
CN101867471A (en) | Irrational number based DES authentication encryption algorithm | |
US20060129812A1 (en) | Authentication for admitting parties into a network | |
CN1980127A (en) | Command identifying method and command identifying method | |
US5007083A (en) | Secure computer | |
JPH0244389A (en) | Ic card apparatus | |
JPH04247737A (en) | Enciphering device | |
JPH0231290A (en) | Ic card device | |
KR100889400B1 (en) | A data transfer apparatus and a file apparatus | |
CA2270694A1 (en) | Method and apparatus for securing data transmissions | |
EP0140388B1 (en) | Pocket terminal, method and system for secured banking transactions | |
CA2029189C (en) | Ciphertext to plaintext communications system and method | |
JPH0491531A (en) | Confidential data transferring method using ic card | |
JPH0199158A (en) | Terminal authorizing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Dead |