GB2099195A - Method and apparatus for securing data transmissions - Google Patents

Method and apparatus for securing data transmissions Download PDF

Info

Publication number
GB2099195A
GB2099195A GB8213326A GB8213326A GB2099195A GB 2099195 A GB2099195 A GB 2099195A GB 8213326 A GB8213326 A GB 8213326A GB 8213326 A GB8213326 A GB 8213326A GB 2099195 A GB2099195 A GB 2099195A
Authority
GB
United Kingdom
Prior art keywords
key
data
individual
selected number
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB8213326A
Other versions
GB2099195B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Atalla Technovations Corp
Original Assignee
Atalla Technovations Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US05/902,444 external-priority patent/US4281215A/en
Priority claimed from US06/003,898 external-priority patent/US4268715A/en
Priority claimed from US06/009,532 external-priority patent/US4283599A/en
Application filed by Atalla Technovations Corp filed Critical Atalla Technovations Corp
Publication of GB2099195A publication Critical patent/GB2099195A/en
Application granted granted Critical
Publication of GB2099195B publication Critical patent/GB2099195B/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention obviates the need for transmitting user-identification information (PIN) from the station utilized by the user to enter his PIN and initiate a transaction, to the station that processes the transaction, as shown in Figure 1A. In another embodiment, the key and RN (rather than PIN) are pre-stored at station 55, the key and RN for the next transaction being encrypted together with the data at station 53 to update the store at station 55 after decrypting in accordance with the key pre-stored from the message sent in the previous transaction. <IMAGE>

Description

1 GB 2 099195 A 1 SPECIFICATfON Improved method and apparatus for securing
data transmissions This invention is concerned with improvements in or relating to a method of and apparatus for securing data transmissions, and is related to the inventions disclosed in our co-pending United Kingdom patent application nos. 7913559 and 8015757.
Numerous methods and apparatus have been developed for transmitting messages in a secure manner between stations. Many of the methods and apparatus provide for coding of the message priorto transmission and for decoding of the message at its destination subsequent to transmission. Two such methods and apparatus are described, for example, in U.S. Patent No. 3,711,645 issued January 16,1973, to Kurt Ehrat, entitled Method and Apparatus for Coding Messages, and in U.S. Patent No. 3,956,615 issued May 11, 1976, to Thomas G. Anderson, William A. Boothroyd and Richard C. Frey, entitled Transaction Execution System with Secure Data Storage and Communications. A third method and apparatus is described, for example, in U.S. Patent No. 3,938,091 issued February 10, 1976, to Martin M. Atalla, entitled Personal Verification System.
A common feature of such apparatus is the use of fixed, predetermined encoding-decoding keys to encode and decode data, or the use of variable encoding keys transmitted with the encoded message to a destination station for processing (the variable encoding keys being supplied by the user, or generated by the apparatus from user-supplied information). At the destination station, the transmit- 100 ted variable-key is utilized by a decoder of the apparatus to decode the encoded message.
Whereas the use of variable rather than fixed encoding-decoding keys would seem to provide a greater measure of security in message transmis sion than do fixed keys (especially variable keys supplied by a user or generated by the apparatus from user-supplied information), the practice of transmitting a variable key so that it can be used in the decoding process reduces the security of the operation because unauthorized users could con ceivably gain access to the key during the transmis sion of the key. It would be desirable, therefore, in improving the security of such data transmission operations (especially bank transaction operations orthe like which require not only secure transmis sion of data but also accurate identification of users) to use a technique which provides for secure trans mission of data without requiring transmission of matching encoding-decoding keys or of user- 120 identification information.
The present invention provides a method of simul taneously securing transmitted data and the identifi cation of an individual in data transmission between stations utilizing identification information aboutthe individual which is pre-stored and identification information supplied bythe individual, the method comprising the steps of generating a selected numberthat is different for each data transmission, producing a first encryption key in response to the generated selected number and to identification information supplied by an individual at a first station, encoding data in accordance with the first encryption key, transmitting the generated selected number and the encoded data to a second station, producing a second encryption key utilizing the prestored identification information and the transmitted selected number, and decoding the encoded data in accordance with the second encryption key.
The present invention further provides a method of simultaneously securing transmitted data and the identification of an individual in data transmission between stations utilizing identification information supplied by the individual, the method comprising the steps of generating and storing a first selected numberthat is different for each data transmission, producing and storing a first key in response to the first selected number and to a first identfication information supplied by an individual at a first sta- tion, producing a second key in response to the stored f irst selected number and to a second identification information supplied by an individual, generating a second selected number that is different for each data transmission, producing a third key in response to the second selected number and to the second identification information supplied by the individual, encoding in accordance with the second key selected information including data and the second selected number and the third key, transmitting the encoded information to a second station, decoding the encoded information in accordance with the stored first key, and storing the second selected number and third key of the decoded information for subsequent use.
The present invention further provides apparatus for simultaneously securing transmitted data and the identification of an individual when transmitting the data between stations utilizing identification information about the individual which is pre-stored and identification information supplied by the individual, the apparatus comprising means for generating a selected numberthat is different for each data transmission, means coupled to receive the generated selected number and to receive identification information supplied by an individual at a first station for producing a first encryption key, means coupled to receive data and the first encryption key for encoding the data in accordance with the first encryption key, means responsive to the pre-stored identification information and coupled to receive the generated selected number for producing a second encryption key, and means disposed at a second station to receive the encoded data and the second encryption key for decoding the encoded data in accordance with the second encryption key.
The present invention further provides apparatus for simultaneously securing transmitted data and the identification of an individual when transmitting the data between stations utilizing identification information supplied by the individual, the apparatus comprising means for generating a first and a second selected number, each of which is different from each data transmission, means coupled to the generating means for storing the first selected number, means coupled to receive the first selected GB 2 099 195 A 2 numberandto receive a first identification information supplied by an individual at a first station for producing a first key, for producing a second key in response to the stored first selected number and to a second identification information supplied by an individual, and for producing a third key in response to the second selected number and to the second identification information supplied by the individual, the means for storing being disposed for receiving and storing the first key, means coupled to receive data, the second selected number, and the second and third keys for encoding in accordance with the second key selected information including the data and the second selected number and the third key, and means coupled to the means for storing and disposed at a second station to receive the encoded information for decoding the encoded information in accordance with the stored first key, the means for storing also being disposed for storing the second selected number and the third key of the decoded information for subsequent use.
In accordance with the illustrated preferred embodiment of the present invention, a method and apparatus are provided for improving security of data transmission between stations by making it unnecessary to transmit user-identification information between the stations. Also, to further improve security, an alternative method provides for encoding and decoding the data during each transaction, using encoding and decoding keys produced from different PINs (Personal /dentification Number entered into the apparatus by a user to initiate a transaction such as a bank deposit or withdrawal transaction). The apparatus includes at least one irreversible algorithm module, a random number generatorr and at least one data file. One embodiment of the apparatus also includes a comparator; another embodiment of the invention also includes an encoding algorithm module and a matching decoding algorithm module.
There now follows a detailed description, which is to be read with reference to the accompanying drawings, of two methods and apparatus according to the present invention; it is to be clearly understood that the methods and apparatus have been selected for description to illustrate the invention by way of example and not by way of limitation.
In the accompanying drawings:- Figures 1A and 1 B are block diagrams showing, respectively, apparatus and method according to a first embodiment of the present invention; and Figures 2A and 2B are block diagrams showing, respectively, apparatus and method according to a second embodiment of the present invention.
Referring nowto the embodiment of the present invention, as illustrated in Figures 1A and 1 B, a PIN in storage 47 is used with a random number RN to produce a KEY code by which data may be encrypted (encoded). However, the KEY code used to encrypt data is not transmitted. In response to a PIN entered by a user and a random number (RN) generated by a random number generator4l, irreversible algorithm module 43 of the type previously described produces an encryption key (KEY) which is applied to encoding algorithm module 45 (e.g., an encoder such as The Bureau of Standards Chip incorporating the National Bureau of Standards' encryptiondecryption algorithm which is the Federal Information Processing Standard approved by the U.S.
Department of Commerce). In response to applied data, encoding module 45 encodesthe data in accordance with the encryption key (KEY). The encoded data, together with the associated random number (RN) is then transmitted from user station 53 to processing station 55. The random number (RN) thus received by station 55 and the pre-stored authentic PIN which is accessed from file 47 are applied to algorithm module 49 which produces an encryption key (KEY') that should be identical to the KEY, and this KEY'is applied to decoding module 51. Decoding module 51 operates in accordance with the same National Bureau of Standards encoding scheme as module 45 and producesthe desired decrypted (decoding) data. It should be noted that as long as the entered PIN matches the pre-stored PIN, KEY will match KEY', and the decrypted data will match the entered data. This embodiment of the present invention thus obviates the need to transmit the generated KEY between stations and eliminates risk of disclosure of the KEY during such transmission. Also, it should be noted that in this embodiment, the KEY is determined and the PIN is verified simultaneously underthe control of the user. That is, the encryption and clecryption of data is solely under the control of the user by virtue of his own entered PIN. Also, the user who entered the PIN is verified in response to the encrypted data being received and decrypted at the receiver station 55 using the corresponding PIN that is retained in file 47. Further, the information which is transmitted between stations includes a random numberwhich changes after each transaction and the encrypted data which also changes form after each transaction, even for the same data entered at station 53.
In the embodiment of the present invention shown in Figures 2A and 2B, there is no need to transmit the PIN from user station 73 to processing station 75, and no need to store PIN information in a file. As shown in Figures 2A and 213, the system is first initialized in preparation for user transactions. The PIN is entered by the user during initialization and random number generator 61 generates a random number (RN,) and applies the RN, to irreversible algorithm module 63 of the type previously described. Module 63 combinesthe PIN and RN, information and produces therefrom a first encryption key (KEY,) to be used in later encryption of data. The RN, and KEY, are then stored for later retrieval in a storage file 65 at the processing station 75 (and optionally the random number may also be stored in a local file 72).
In commencing a transaction, the user first enters his PIN into the algorithm module 63. In reponse to the entered PIN, and in response to RN, which is accessed from file 65 (or optionally from local file 72), the module 63 reproduces the encryption key (KEY,) which is applied to the control input of the encryption module 67 (say, of the National Bureau of Standards type previously described). With the encryption module 67 set to encode in accordance i 3 with KEY,, another random number (RN2) is generated by random number generator 61, and is applied to modules 63 and 67. The module 63 is able to produce an encryption key (KEY2) from the applied RN2 and from the PIN that is available during the present user transaction. KEY2 and RN2 which was associated with KEY, are included with the applied data (which data may include a fixed alphanumeric reference) for encoding by module 67 underthe control of KEY, to produce the encrypted message "DATA+RN,+KEY,". This encrypted message is then transmitted from user station 73 to processing station 75 where clecryption module 69 (matching encoding module 67) decrypts or decodes the encrypted message in accordance with KEY, which is accessed from the file 65 where it was originally entered during the initialization operation previously described. The DATA is thus retrieved in clear text and the RN2and the KEY2are also separately avail- able for updating file 65 (and optionally local file 72) with RN2and KEY2in place of RN, and KEY,, respectively.
In a subsequent transaction, the user again enters his PIN into the algorithm module 63. In response to the entered PIN, and in response to the updated RN2 accessed from file 65 (or from local file 72), the module 63 reproduces the encryption key (KEY2). With the encryption module 67 set to encode applied data in accordance with KEY2, the random number generator 61 produces another random number RN3 which is applied to the algorithm module 63 along with the PIN that is available during the present transaction to produce another encryption key (KEY3). KEY3and RN3are included with the DATA that is applied to the encoding module 67 which produces the encrypted message "DATA+RN3+KEY3" when encrypted under the control of KEY2. This encrypted message is then transmitted from user station 73 to processing station 75, where decoding module 69 decrypts the encrypted message in accordance with the KEY2which is accessed as the updated entry from file 65. The DATA is thus retrieved in clear text and the RN3and KEY3are again available to update the file 65 (and local file 72) for use in subsequent transactions.
The reference data previously referred to as being included with the input DATA may simply be a standard code word which must be extracted atthe output of module 69 as an indication that the user inserted the proper PIN. In this way, the encrypted message transmitted to and received by the processing station 75 can be promptly decrypted to verify the PIN before the file 65 (or local file 72) is updated with keys and random numbers which would not relate to the authorized PIN.
Thus, it can be seen from Figures 2A and 2B that not only is PIN information not stored ortransmitted from user station 73 to user station 75 but, for added security, the key used to encrypt data in response to a given usertransaction is notthe same key that is used to decrypt the encrypted data during such transactions. Also, it should be noted that the stored code words are updated in each transaction and that these code words are under the control of the user.
It should be understood that in each of the embod- GB 2 099 195 A 3 iments of the present invention described above sequential numbers may be used in place of the random numbers used in the identification or encoding schemes. This permits the systems to exclude the

Claims (4)

repeating of the same data or information in subsequent transactions by enabling a check for parity of sequential numbers at the receiving stations. CLAIMS
1. A method of simultaneously securing trans- mitted data and the identification of an individual in data transmission between stations utilizing identification information about the individual which is pre-stored and identification information supplied by the individual, the method comprising the steps of:
generating a selected numberthat is differentfor each data transmission; producing a first encryption key in response to the generated selected number and to identification information supplied by an individual at a first station; encoding data in accordance with the first encryption key; transmitting the generated selected number and the encoded data to a second station; producing a second encryption key utilizing the pre-stored identification information and the transmitted selected number; and decoding the encoded data in accordance with the second encryption key.
2. A method of simultaneously securing transmitted data and the identification of an individual in data transmission between stations utilizing identification information supplied by the individual, the method comprising the steps of:
generating and storing a first selected numberthat is different for each data transmission; producing and storing a first key in response to the first selected number and to a first identification information supplied by an individual at a first station; producing a second key in response to the stored first selected number and to a second identification information supplied by an individual; generating a second selected number that is different for each data transmission; producing a third key in response to the second selected number and to the second identification information supplied by the individual; encoding in accordance with the second key selected information including data and the second selected number and the third key; transmitting the encoded information to a second station; decoding the encoded information in accordance with the stored first key; and storing the second selected number and third key of the decoded information for subsequent use.
3. Apparatus for simultaneously securing trans- miffed data and the identification of an individual when transmitting the data between stations utilizing identification information about the individual which is pre-stored and identification information supplied by the individual, the apparatus compris- ing:
4 GB 2 099 195 A 4 means for generating a selected numbertilatis different for each data transmission; means coupled to receive the generated selected number and to receive identification information supplied by an individual at a first station for produc- 70 ing a first encryption key; means coupled to receive data and the first encryption key for encoding the data in accordance with the first encryption key; means responsive to the pre-stored identification information and coupled to receive the generated selected number for producing a second encryption key; and means disposed at a second station to receive the encoded data and the second encryption key for decoding the encoded data in accordance with the second encryption key.
4. Apparatus for simultaneously securing trans- GB 2 099 195 A 5 mitted data and the identification of an individual when transmitting the data between stations usilizing identification information supplied by the individual, the apparatus comprising: 5 means for generating a first and a second selected number, each of which is different for each data transmission; means coupled to the generating means for storing the first selected number; 10 means coupled to receive the first selected number and to receive a first identification information supplied by an individual at a first station for producing a first key, for producing a second key in response to the stored first selected number and to a second identification information supplied by an individual, and for producing a third key in response to the second selected number and to the second identification information supplied bythe individual, the means for storing being disposed for receiving and storing the first key; means coupled to receive data, the second selected number, and the second and third keys for encoding in accordance with the second key selected information including the data and the second selected number and the third key; and means coupled to the means for storing and disposed at a second station to receive the encoded information for decoding the encoded information in accordance with the stored first key, the means for storing also being disposed for storing the second selected number and the third key of the decoded information for subsequent use.
Printed for Her Majesty's Stationery Office by The Tweeddale Press Ltd., Berwick-upon-Tweed, 1982. Published atthe Patent Office, 25 Southampton Buildings, London, WC2A lAY, from which copies may be obtained.
4. Apparatus for simultaneously securing trans mitted data and the identification of an individual when transmitting the data between stations utiliz ing identification information supplied by the indi vidual, the apparatus comprising:
means for generating a first and a second selected number, each of which is different from each data transmission; means coupled to the generating means for stor ing the first selected number; means coupled to receive the first selected number and to receive a first identification informa tion supplied by an individual at a first station for producing a first key, for producing a second key in response to the stored first selected number and to a second identification information supplied by an individual, and for producing a third key in response to the second selected number and to the second identification information supplied by the individual, the means for storing being disposed for receiving and storing the first key; means coupled to receive data, the second selected number, and the second and third keys for 105 encoding in accordance with the second key selected information including the data and the second selected number and the third key; and means coupled to the means for storing and dis posed at a second station to receive the encoded information for decoding the encoded information in accordance with the stored first key, the means for storing also being disposed for storing the second selected number and the third key of the decoded information for subsequent use.
New claims or amendments to claims filed on 12.7.82. Superseded claims 14.
1. A method of simultaneously securing transmitted data and the identification of an individual in data transmission between stations utilizing identification information about the individual which is pre-stored and identification information supplied by the individual, the method comprising the steps of: generating a selected number that is different for each data transmission; producing a first encryption key in response to the 130 generated selected number and to identification information supplied by an individual at a first station; encoding data in accordance with the first encryption key; transmitting the generated selected number and the encoded data to a second station; producing a second encryption key utilizing the pre-stored identification information and the trans- mitted selected number; and decoding the encoded data in accordance with the second encryption key.
2. A method of simultaneously securing transmitted data and the identification of art individual in data transmission between stations utilizing identification information supplied by the individual, the method comprising the steps of:
generating and storing a first selected number that is different for each data transmission; producing and storing a first key in response to the first selected number and to a first identification information supplied by an individual at a first station; producing a second key in response to the stored first selected number and to a second identification information supplied by an individual; generating a second selected numberthat is different for each data transmission; producing a third key in response to the second selected number and to the second identification information supplied by the individual; encoding in accordance with the second key selected information including data and the second selected number and the third key; transmitting the encoded information to a second station; decoding the encoded information in accordance with the stored first key; and storing the second selected number and third key of the decoded information for subsequent use.
3. Apparatus for simultaneously securing transmitted data and the identification of an indpvidual when transmitting the data between stations utilizing identification information about the individual which is pre-stored and identification information supplied by the individual, the apparatus comprising:
means for generating a selected numberthat is different for each data transmission; means coupled to receive the generated selected number and to receive identification information supplied by an individual at a first station for producing a first encryption key; means coupled to receive data and the first encryption key for encoding the data in accordance with the first encryption key; means responsive to the pre-stored identification information and coupled to receive the generated selected number for producing a second encryption key;and means disposed at a second station to receive the encoded data and the second encryption key for decoding the encoded data in accordance with the second encryption key.
GB8213326A 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions Expired GB2099195B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US05/902,444 US4281215A (en) 1978-05-03 1978-05-03 Method and apparatus for securing data transmissions
US06/003,898 US4268715A (en) 1978-05-03 1979-01-16 Method and apparatus for securing data transmissions
US06/009,532 US4283599A (en) 1979-01-16 1979-02-05 Method and apparatus for securing data transmissions

Publications (2)

Publication Number Publication Date
GB2099195A true GB2099195A (en) 1982-12-01
GB2099195B GB2099195B (en) 1983-05-18

Family

ID=27357510

Family Applications (3)

Application Number Title Priority Date Filing Date
GB7913559A Expired GB2020513B (en) 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions
GB8015757A Expired GB2047506B (en) 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions
GB8213326A Expired GB2099195B (en) 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions

Family Applications Before (2)

Application Number Title Priority Date Filing Date
GB7913559A Expired GB2020513B (en) 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions
GB8015757A Expired GB2047506B (en) 1978-05-03 1979-04-19 Method and apparatus for securing data transmissions

Country Status (6)

Country Link
JP (1) JPS54148402A (en)
CA (1) CA1149484A (en)
CH (1) CH646558A5 (en)
DE (1) DE2916454C2 (en)
FR (1) FR2425114A1 (en)
GB (3) GB2020513B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0197392A2 (en) * 1985-04-11 1986-10-15 International Business Machines Corporation Improvements in cryptographic communication
EP0266044A2 (en) * 1986-09-04 1988-05-04 The Manitoba Telephone System Telecommunication security system and key memory module therefor
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US10862924B2 (en) 2005-06-30 2020-12-08 The Chamberlain Group, Inc. Method and apparatus to facilitate message transmission and reception using different transmission characteristics
US10944559B2 (en) 2005-01-27 2021-03-09 The Chamberlain Group, Inc. Transmission of data including conversion of ternary data to binary data
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
US11423717B2 (en) 2018-08-01 2022-08-23 The Chamberlain Group Llc Movable barrier operator and transmitter pairing over a network

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0018129B1 (en) * 1979-04-02 1982-11-17 Motorola, Inc. Method of providing security of data on a communication path
US4349695A (en) * 1979-06-25 1982-09-14 Datotek, Inc. Recipient and message authentication method and system
FR2480539B1 (en) * 1980-04-09 1985-09-13 Cii Honeywell Bull METHOD AND SYSTEM FOR TRANSMITTING SIGNED MESSAGES
FR2496294B1 (en) * 1980-12-15 1987-01-02 Thomson Csf PROTECTED DEVICE FOR AUTHENTICATING USERS OF A MESSAGE TRANSMISSION TERMINAL AND TRANSACTION SYSTEM COMPRISING SUCH DEVICES
SE426128B (en) * 1981-04-08 1982-12-06 Philips Svenska Ab METHOD FOR TRANSFER OF DATA MESSAGES BETWEEN TWO STATIONS, AND TRANSFER PLANT FOR EXECUTING THE METHOD
EP0304547A3 (en) * 1981-04-22 1989-09-20 Siemens Aktiengesellschaft Identification control apparatus, method for cryptographic identity control and method for detecting an interruption between a terminal and a communication system
US4438824A (en) * 1981-04-22 1984-03-27 Siemens Corporation Apparatus and method for cryptographic identity verification
FR2514592A1 (en) * 1981-10-12 1983-04-15 Widmer Michel METHOD AND DEVICE FOR CONSULTING DATA FILES AND / OR BANKING TRANSACTIONS, PRESERVED FROM FRAUD THANKS TO A COMMUNICATION PROCESS BY RANDOM VARIABLE
EP0086286B1 (en) * 1982-02-11 1986-11-20 Powell, William S. Information communicating apparatus and method
FR2526977B1 (en) * 1982-05-14 1988-06-10 Cii Honeywell Bull METHOD AND DEVICE FOR AUTHENTICATING OR CERTIFYING AT LEAST INFORMATION CONTAINED IN A MEMORY OF AN ELECTRONIC MEDIUM IN PARTICULAR REMOVABLE AND PORTABLE SUCH AS A CARD
EP0112944B1 (en) * 1982-12-30 1987-03-04 International Business Machines Corporation Testing the validity of identification codes
EP0112943B1 (en) * 1982-12-30 1987-08-12 International Business Machines Corporation Data communication network
DE3300170C2 (en) * 1983-01-05 1986-12-18 DATA-LÖSCH Gesellschaft für Sicherheitstechniken im Datenschutz mbH, 4420 Coesfeld Barrier control system
JPS59132584U (en) * 1983-02-25 1984-09-05 山下 俊彦 Security key chain
JPS6062252A (en) * 1983-09-16 1985-04-10 Toshiba Corp Card incorporating enciphering circuit
GB2146815A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
GB2146814A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
GB2149944A (en) * 1983-11-14 1985-06-19 Softnet Inc Software distribution
DK152239C (en) * 1983-12-30 1988-07-04 Sp Radio As PROCEDURE FOR CRYPTOGRAPHIC TRANSFER OF SPEECH SIGNALS AND COMMUNICATION STATION FOR EXERCISING THE PROCEDURE
JPS6120442A (en) * 1984-07-09 1986-01-29 Toshiba Corp Chargeable broadcasting system
CH668134A5 (en) * 1985-03-15 1988-11-30 Hasler Ag Ascom DEVICE AND METHOD FOR RELEASING AND CONTROLLING THE STORAGE OF ANY PRESENT AMOUNTS IN THE PRESENT MEMORY OF A franking machine.
FR2582421B1 (en) * 1985-05-24 1987-07-17 Lefevre Jean Pierre IDENTITY AUTHENTICATION APPARATUS
GB8524020D0 (en) * 1985-09-30 1985-11-06 British Telecomm Electronic funds transfer
EP0246823A3 (en) * 1986-05-22 1989-10-04 Racal-Guardata Limited Data communication systems and methods
US4882752A (en) * 1986-06-25 1989-11-21 Lindman Richard S Computer security system
FR2615638B1 (en) * 1987-05-20 1989-07-21 Dassault Electronique COMPUTER OR TELEMATIC ENABLING DEVICE AND METHOD
US5239294A (en) * 1989-07-12 1993-08-24 Motorola, Inc. Method and apparatus for authenication and protection of subscribers in telecommunication systems
DE4003386C1 (en) * 1990-02-05 1991-05-23 Siemens Ag, 1000 Berlin Und 8000 Muenchen, De
US6175312B1 (en) 1990-05-29 2001-01-16 Microchip Technology Incorporated Encoder and decoder microchips and remote control devices for secure unidirectional communication
GB2260467A (en) * 1991-09-12 1993-04-14 Blick Communications Ltd Repeater
JPH07245605A (en) * 1994-03-03 1995-09-19 Fujitsu Ltd Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method
US5475757A (en) * 1994-06-07 1995-12-12 At&T Corp. Secure data transmission method
CA2193846C (en) 1995-05-17 2004-02-17 Bradford L. Farris Rolling code security system
US6690796B1 (en) 1995-05-17 2004-02-10 The Chamberlain Group, Inc. Rolling code security system
US5724423A (en) * 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
GB2306860A (en) * 1995-10-24 1997-05-07 Motorola Inc Encryption/decryption system encrypts data using encrypted key
WO1999000958A1 (en) * 1997-06-26 1999-01-07 British Telecommunications Plc Data communications
US6115699A (en) * 1998-12-03 2000-09-05 Nortel Networks Corporation System for mediating delivery of a document between two network sites
GB2434014A (en) * 2006-01-10 2007-07-11 Clive Leader Transaction verification using signed data combination
GB2440358B (en) * 2006-06-30 2009-04-08 G3 Vision Ltd Authentication system and method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1285445A (en) * 1968-08-30 1972-08-16 Smiths Industries Ltd Improvements in or relating to access-control equipment and item-dispensing systems including such equipment
CH516854A (en) * 1969-11-29 1971-12-15 Ciba Geigy Ag Method and device for encrypted transmission of information
US3654604A (en) * 1970-01-05 1972-04-04 Constellation Science And Tech Secure communications control system
US3938091A (en) * 1972-03-17 1976-02-10 Atalla Technovations Company Personal verification system
JPS549859B2 (en) * 1972-12-22 1979-04-27
JPS5099657A (en) * 1973-12-29 1975-08-07
US3956615A (en) * 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications
US4123747A (en) * 1977-05-20 1978-10-31 International Business Machines Corporation Identity verification method and apparatus

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0197392A3 (en) * 1985-04-11 1988-12-14 International Business Machines Corporation Improvements in cryptographic communication
EP0197392A2 (en) * 1985-04-11 1986-10-15 International Business Machines Corporation Improvements in cryptographic communication
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
EP0266044A2 (en) * 1986-09-04 1988-05-04 The Manitoba Telephone System Telecommunication security system and key memory module therefor
EP0266044A3 (en) * 1986-09-04 1990-07-18 Computrex Centres Ltd. Telecommunication security system and key memory module therefor
US10944559B2 (en) 2005-01-27 2021-03-09 The Chamberlain Group, Inc. Transmission of data including conversion of ternary data to binary data
US11799648B2 (en) 2005-01-27 2023-10-24 The Chamberlain Group Llc Method and apparatus to facilitate transmission of an encrypted rolling code
US10862924B2 (en) 2005-06-30 2020-12-08 The Chamberlain Group, Inc. Method and apparatus to facilitate message transmission and reception using different transmission characteristics
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US11122430B2 (en) 2017-12-21 2021-09-14 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US11778464B2 (en) 2017-12-21 2023-10-03 The Chamberlain Group Llc Security system for a moveable barrier operator
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
US11763616B1 (en) 2018-06-27 2023-09-19 The Chamberlain Group Llc Network-based control of movable barrier operators for autonomous vehicles
US11423717B2 (en) 2018-08-01 2022-08-23 The Chamberlain Group Llc Movable barrier operator and transmitter pairing over a network
US11869289B2 (en) 2018-08-01 2024-01-09 The Chamberlain Group Llc Movable barrier operator and transmitter pairing over a network
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training
US11462067B2 (en) 2019-05-16 2022-10-04 The Chamberlain Group Llc In-vehicle transmitter training

Also Published As

Publication number Publication date
JPS54148402A (en) 1979-11-20
FR2425114B1 (en) 1985-01-18
CH646558A5 (en) 1984-11-30
CA1149484A (en) 1983-07-05
DE2916454C2 (en) 1983-12-22
GB2047506A (en) 1980-11-26
GB2020513B (en) 1982-12-22
DE2916454A1 (en) 1979-11-15
GB2099195B (en) 1983-05-18
GB2020513A (en) 1979-11-14
FR2425114A1 (en) 1979-11-30
GB2047506B (en) 1982-11-24

Similar Documents

Publication Publication Date Title
GB2099195A (en) Method and apparatus for securing data transmissions
US4281215A (en) Method and apparatus for securing data transmissions
US4268715A (en) Method and apparatus for securing data transmissions
US4283599A (en) Method and apparatus for securing data transmissions
US4315101A (en) Method and apparatus for securing data transmissions
US4288659A (en) Method and means for securing the distribution of encoding keys
US5319710A (en) Method and means for combining and managing personal verification and message authentication encrytions for network transmission
US5557677A (en) Method and arrangement for communication of information
US8254570B2 (en) Method and system for encryption of data
US3798605A (en) Centralized verification system
US6073118A (en) Method for performing secure financial transactions using facsimile transmissions
CN101999132B (en) The strong authentication token of one-time password and signature is generated when credential server is verified
US4206315A (en) Digital signature system and apparatus
KR900008414B1 (en) Communication network system
DK181888D0 (en) PROCEDURE FOR SENDING SECRET KEYS TO SECURITY MODELS AND USER CARDS IN A DATA PROCESSING NETWORK
KR980007143A (en) Authentication method, communication method and information processing device
US20080101615A1 (en) Certification of transactions
CA1159920A (en) Method and apparatus for securing data transmissions
EP0140388A2 (en) Pocket terminal, method and system for secured banking transactions
KR102045052B1 (en) Method and apparatus for transit of financial service
CA1159124A (en) Method and apparatus for securing data transmissions
JPS59161151A (en) Data communication system
JPH01161938A (en) Cryptographic information communication system
TW279296B (en) Security authentication system of open network and method thereof
CA2270694A1 (en) Method and apparatus for securing data transmissions

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19930419