GB2087606A - Computer Systems - Google Patents
Computer Systems Download PDFInfo
- Publication number
- GB2087606A GB2087606A GB8021511A GB8021511A GB2087606A GB 2087606 A GB2087606 A GB 2087606A GB 8021511 A GB8021511 A GB 8021511A GB 8021511 A GB8021511 A GB 8021511A GB 2087606 A GB2087606 A GB 2087606A
- Authority
- GB
- United Kingdom
- Prior art keywords
- computer
- modems
- protection unit
- programmed
- integrity protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
This invention is an arrangement for protecting a computer system in which a central computer is connected by a common 'Bus', and a number of modems to external terminals. There is an integrity protection unit connected between the central computer, and the modems, and programmed by a control unit directed to it to recognise only codes from the modems selected by a programme. The protection unit prevents a thief when connected to the 'Bus' being able to deceive the computer.
Description
SPECIFICATION
Computer Systems
This invention relates to computer systems including 3 central computer connected by a common bus connection and a number of modems via a telephone network to external terminals.
In such a system, the computer identifies which particular piece of equipment is operating by calling it (or being called) with a unique code number. In this way although the computer is communicating with the common 'Bus', only the intended equipment is responding. Thus a thief when connected to the 'Bus' is able to deceive the computer which believes him to be any piece of equipment of which he chooses to transmit the code number.
An object of the invention is to improve the security of such a system.
According to the present invention, such a system is characterised by an integrity protection unit connected between the central computer and the modems and programmed by a control unit connected directly to it to recognise only codes from the modems selected by such programmes.
Further features and details of the invention will be apparent from the following description of one specific embodiment that will be given by way of example with reference to the accompanying drawing which is a very greatly simplified diagram of a computer integrity protection system embodying the invention.
The invention will be described as applied to a clearing Bank office in the City and a thief with a portable computer terminal attached to a telephone line somewhere in the suburbs. The
Bank computer is connected to a number of modems (devices for sending data along Post
Office telephone lines) and to terminals in the building as well as cheque reading machines and the data store where bank account contents are recorded. Without the invention such a system may be liable to abuse in the following manner. A thief calls the telephone number of the Bank computer which responds by asking for identification. The thief identifies himself as a particular Branch of an acceptable Bank. He knows that the computer will not accept credit transfer without documentation, so he runs a short program to transfer cash from a nonexistant company into an account to which he has access.He now sends a code from his terminal to tell the computer that the cheque reader is "on line". The computer responds to the cheque reader which is not operating and the thief confirms that there are cheques being read and data to be transferred. The computer asks for the information and the thief sends his non-existant cheque data. The thief signs off as a chequereader and signs on as a computer terminal telling the computer that he is a maintenance engineer.
He asks the computer to find his non-existant company debit and print its location via the modem to his portable terminal. When he has the address of his cheque he tells the computer (as the engineer) to erase that particular area of memory, and the computer does so. The thief signs off as a computer terminal and signs off as a
Branch Bank.
The situation now is that the thief has a sum of money credited to him and the Bank computer is not checking for an account to debit. The Bank is not short of cash, until someone checks physical cash against theoretical cash.
To reduce the danger of this in accordance with the invention, a computer integrity protection unit is connected into the computer system to confirm that a given code number is being originated, or responded to, by the correct computer component or attached equipment. This unit is wired across the computer bus and connected to a computer terminal or terminals in the building housing the computer. The protection unit would be programmed to accept instructions only from terminals connected directly to it. By programming the unit to recognise certain codes it would be able to respond if those codes appeared on the bus at a prearranged time but not otherwise. It would be possible therefore to allow say, credit transfers to take place while this is expected, but not at other times without authority through a protection unit terminal.If an attempt was made, through an unauthorised access channel, to operate the computer on certain codes, the protection unit could inform the computer of an illegal activity. A pre-programmed unit could be fitted to any piece of equipment to determine whether or not that particular item was the source of data alleged so to be. In this way one or more protection units could be fitted to a computer system to avoid fraudulent operation from without or within the computer system.
Each protection unit would contain batteries to maintain the system in the absence of power, as well as a real-time clock to enable records to be kept of codes recognised, responses made and the time and date of such occurrances.
As the protection unit is itself an intelligent micro-processor controlled device it is capable of being re-programmed at any time. The method and ability to re-program the unit would be controlled by its own permanent memory to avoid re-programming from the computer Bus.
Claims (5)
1. A computer system including a central computer connected by a common bus connection and a number of modems via a telephone network or direct lines to external terminals characterised by an integrity protection unit connected between the central computer and the modems and programmed by a control unit connected directly to it to recognise only codes from the modems selected by such programs.
2. A system as claimed in Claim 1 in which the protection unit is programmed to detect an attempt to operate the computer by an unauthorised code and give warning of illegal activity.
3. A system as claimed in Claim 1 or Claim 2 provided with batteries to maintain the system in the absence of mains power.
4. A system as claimed in any one of the preceding claims including a real-time clock to enable timed records of events to be kept.
5. A computer system having an integrity protection unit as specifically described herein with reference to the accompanying drawing.
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8021511A GB2087606A (en) | 1980-07-01 | 1980-07-01 | Computer Systems |
JP50221880A JPS56501302A (en) | 1979-10-09 | 1980-10-07 | |
EP80901852A EP0040198A1 (en) | 1979-10-09 | 1980-10-07 | Computer system |
PCT/GB1980/000156 WO1981001063A1 (en) | 1979-10-09 | 1980-10-07 | Computer system |
AU63388/80A AU6338880A (en) | 1979-10-09 | 1980-10-07 | Computer system |
ES495779A ES495779A0 (en) | 1979-10-09 | 1980-10-09 | IMPROVEMENTS IN PROTECTION SYSTEMS FOR TERMINALS AND-OR PERIPHERAL COMPUTER DEVICES |
EP80303565A EP0027058A1 (en) | 1979-10-09 | 1980-10-09 | Computer system |
DK229681A DK229681A (en) | 1979-10-09 | 1981-05-26 | PC TERMINAL |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8021511A GB2087606A (en) | 1980-07-01 | 1980-07-01 | Computer Systems |
Publications (1)
Publication Number | Publication Date |
---|---|
GB2087606A true GB2087606A (en) | 1982-05-26 |
Family
ID=10514443
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB8021511A Withdrawn GB2087606A (en) | 1979-10-09 | 1980-07-01 | Computer Systems |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2087606A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2181281A (en) * | 1985-10-03 | 1987-04-15 | Isolation Systems Limited | Device for controlling access to computer peripherals |
GB2204973A (en) * | 1987-05-19 | 1988-11-23 | Gen Electric Co Plc | Data processing system |
US5202997A (en) * | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
-
1980
- 1980-07-01 GB GB8021511A patent/GB2087606A/en not_active Withdrawn
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5202997A (en) * | 1985-03-10 | 1993-04-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
GB2181281A (en) * | 1985-10-03 | 1987-04-15 | Isolation Systems Limited | Device for controlling access to computer peripherals |
GB2181281B (en) * | 1985-10-03 | 1989-09-13 | Isolation Systems Limited | Device for controlling access to computer peripherals |
GB2204973A (en) * | 1987-05-19 | 1988-11-23 | Gen Electric Co Plc | Data processing system |
EP0292248A2 (en) * | 1987-05-19 | 1988-11-23 | THE GENERAL ELECTRIC COMPANY, p.l.c. | Data processing system |
EP0292248A3 (en) * | 1987-05-19 | 1990-10-31 | The General Electric Company, P.L.C. | Data processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA1246747A (en) | Apparatus for controlling the use of computer software | |
CA1207460A (en) | Method and apparatus for authorizing the holder of a portable object such as a card to gain access to at least one service provided by at least one authorizing entity | |
US4558211A (en) | Transaction terminal system | |
US5495531A (en) | Equipment which included electronics | |
US4105156A (en) | Identification system safeguarded against misuse | |
US5012074A (en) | Apparatus for securing an IC-card issuing station | |
US3971916A (en) | Methods of data storage and data storage systems | |
EP0185365B1 (en) | A pay phone system or a pay service system | |
EP0084441A2 (en) | Method and apparatus for the protection of proprietary computer software | |
US4498000A (en) | Security method and device for communicating confidential data via an intermediate stage | |
EP0296179B1 (en) | Telelink monitoring and reporting system | |
US5191608A (en) | Method for the management of an application program loaded in a microcircuit medium | |
KR880000254B1 (en) | Terminal apparatus | |
US5072370A (en) | System and method for monitoring electronic data processing equipment | |
US4549075A (en) | Method for certifying the origin of at least one item of information stored in the memory of a first electronic device and transmitted to a second electronic device, and system for carrying out the method | |
US4531023A (en) | Computer security system for a time shared computer accessed over telephone lines | |
US5179373A (en) | Information network | |
CA1326304C (en) | Secure data interchange system | |
WO1998007092A9 (en) | Smart card reader having multiple data enabling storage compartments | |
GB2191881A (en) | Ic card and an identification system thereof | |
ES2069553T3 (en) | TERMINAL CONTROLLED BY DATA SUPPORT IN A DATA EXCHANGE SYSTEM. | |
US4819204A (en) | Method for controlling memory access on a chip card and apparatus for carrying out the method | |
GB2211050A (en) | Telephone system | |
US4712177A (en) | Circuit for a cord carrier having a memory and an access control unit for secure data access | |
FI78574B (en) | KOPPLINGSANORDNING FOER SAEKRING AV DATA I FLYKTIGA SKRIV-LAESMINNEN (RAM). |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |