GB2188762A - Secure data communication system - Google Patents
Secure data communication system Download PDFInfo
- Publication number
- GB2188762A GB2188762A GB08608244A GB8608244A GB2188762A GB 2188762 A GB2188762 A GB 2188762A GB 08608244 A GB08608244 A GB 08608244A GB 8608244 A GB8608244 A GB 8608244A GB 2188762 A GB2188762 A GB 2188762A
- Authority
- GB
- United Kingdom
- Prior art keywords
- code
- terminal
- personal identification
- encryption
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
Abstract
A secure data communication system has one or more local terminals (5) connected, e.g. via modems (3, 10), encryption/decryption units (4, 11) and telephone network (2), to a remote data base (1). To transmit data, a security device in the local terminal (5) must be actuated first. The security device comprises a code reader (9) into which a personal identification device (12) e.g. a card with a coded magnetic stripe, can be removably inserted. The card (12) may provide an identification code (compared with a code keyed in at 7) and also a key for the encryption/decryption. The reader (9) can change the code and key on the card (12) under control of the data base (1). <IMAGE>
Description
SPECIFICATION
Secure data communication system
This invention relates to a secure data communication system.
It is common practice to use the public telephone network as a data communication link between local terminals and a remote computerised data base. For security reasons it is known to encrypt the communicated data and this usually involves the incorporation of encryption/deencryption units in the local terminals with a fitted encryption key in each such unit. However, with this arrangement there is the problem of preventing unauthorised communication with the data base whilst permitting easy and convenient use of the terminals by authorised personnel. In particular, if there are different levels of security data using different encryption keys, it may be necessary to allocate different terminals to different authorised users.
An object of the present invention is to overcome or at least minimise the abovementioned problem.
According to the invention therefore there is provided a secure data communication system comprising at least one local terminal, at least one remote data handling device, interface devices arranged to connect such terminal and data handling device to a data communication link, and a security device at such terminal requiring actuation in order to permit data communication in a desired mode with such data handling device, characterised in that said security device has a code-reading device with which a coded portable personal identification device is removably locatable in interactive proximity for code reading purposes, said code-reading device being arranged to effect said actuation of said security device when a predetermined code is read from said identification device.
With this arrangement, it is possible to safeguard against unauthorised use of the terminal whilst at the same time permitting use by an authorised person in a particularly convenient manner. In this respect, the coding of the identification device may include a code word or number which is verified by the terminal, for example, by automatic cross-checking against a pre-programmed list of authorised codes, or by comparison with a code entered manually by the user via a keyboard.
The personal identification device may be in the form of a card although other structural forms are also possible. The mode of interaction with the code-reading device may be such that electrical contact or interconnection therebetween is not necessary. Thus, the code-reading device may be arranged to read a magnetic stripe on the identification device or it may be arranged to couple inductively with a circuit on the identification device as described in co-pending Application No.
8514219.
The system may be used with multiple differently coded personal identification devices.
In this case, there may be multiple terminals and the arrangement may be such that any identification device can actuate any terminal or alternatively that each identification device can only actuate a respective one of the terminals. Advantageously, the terminals may be of standardised form and any required differences in operation thereof may be achieved by utilisation of different operational data derived from the codes of the respective identification devices. Thus, for example, the security device of the or each terminal may comprise an encryption and/or de-encryption device and the personal identification device which is used to actuate the respective terminal may be arranged to provide, in its coding, part or all of an encryption key necessary for the proper operation of the security device.
Most preferably, the code-reading device of the or each terminal is capable of writing to as well as reading from the personal identification device. In this way it is possible to achieve particularly good security in so far as the coding of the personal identification device can be changed or updated from time to time.
For example, the identification device may carry, as part of its coding, a transaction number which is indexed each time the device is used and the system may be arranged to check the value of the transaction number against a stored transaction record in order to verify the identification device. Such writing and verification procedures may be effected locally and/or remotely. For example, the abovementioned indexing of the transaction number may be effected locally by the security device whereas the checking of the current value of the transaction number may be effected remotely at the data handling device.
Other transactional information may be written to and read from the identification device such as date or duration of the last transaction etc.
Moreover, part or all of the coding of the identification device, such as the abovementioned personal code word or code number and/or the abovementioned encryption key, can be changed at appropriate intervals, for example, after predetermined periods of time, after predetermined numbers of transactions or the like.
The invention will now be described further by way of example only and with reference to the accompanying drawing which is a diagrammatic view of one form of a communication system according to the invention.
As shown in the drawing, a secure communication system comprises a central computerised data base 1 which is connected to the public telephone network 2 via a modem 3 and an encryption/de-encryption unit 4.
Multiple identical terminals 5 are also con
nected to the telephone network 2 at different
locations remote from the data base 1. Only
one terminal 5 is shown for the sake of convenience.
The terminal 5 comprises a microcomputer 6 with a connected keyboard 7 and vdu display 8. The microcomputer 6 is also connected to a reading device 9 and to the tele
phone network 2 via a modem 10 and an encryption/de-encryption unit 11.
Each person authorised to use the terminal 5 has a respective portable identification device which may be in the form of a "credit card" 12 with a magnetic stripe. The card 12 can be inserted into a slot in the reading device 9 so that coded information on the stripe can be read automatically by the reading device 9 and also so that information can be written by the reading device onto the stripe.
When a card 12 is inserted into the reading device 9 the information on the magnetic stripe is read and is verified in the first instance by the microcomputer 6. That is, the user enters a code word or number via the keyboard 7 and the microcomputer 6 checks to see if this is the same as a personal identification code which is on the card. The terminal 5 is then actuated to the extent that it is now possible to establish a communication link with the central data base 1, by dialling the communication number of the data base 1 in the usual way. Once communication has been established, data can be transmitted to and received from the data base 1 via the modem 10 and the encryption/deencryption unit 11. At this stage, for proper operation of the unit 4, an encryption key is required and this is read from the magnetic stripe on the card 12.This constitutes a further verification since intelligible data communication cannot take place if the correct key is not read from the card 12.
A further verification operation is carried out in that transactional information is read from the card and is checked by the central data base 1. For example, each time the card 12 is used, at the end of the transaction the reading device 9 under the local control of the microcomputer 6 reads a transaction number on the card and then overwrites this with a number which is one higher. The data base 1 stores a transaction record for each card and can check to see if the stored transaction number is equal to the number on the card. if desired other transactional information, such as the date of a transaction can be read, written, stored and checked.
The reading device 9 can also change the personal identification code and/or the encryption key on the card under the instructions of the data base 1. For example, the personal identification code may be changed periodically so that the card can only be used to actuate the terminal 5 by a person who is familiar with the current code to be entered via the keyboard. This periodic changing may be effected automatically at the end of or during a transaction when the card is first used following a predetermined change-over date.
The encryption key may also be changed automatically likewise at the end of or during a transaction when the card is first used following a predetermined change-over date.
The reading device 9 may be arranged to eradicate the information stored on the card
12, under local or remote control, in the event that read information is not verified, for example, if three unsuccessful attempts are made to enter a correct personal identification code via the keyboard 7.
With the arrangement described above great security can be achieved in a particularly simple and convenient manner.
A user of the system can gain access to the data base 1- simply by inserting his identification card into the reading device 9 of any terminal 5 and entering his personal identification code via the keyboard 7.
Different personnel having different levels of security clearance can use the system even though the terminals 5 are of a common standardised form. This can be achieved conveniently because it is possible to provide different personal identification cards with different encryption keys so that the user can only gain access to data which is encrypted on the data base in a format corresponding to that person's encryption key.
It is of course to be understood that the invention is not intended to be restricted to the details of the above embodiment which are described by way of example only. Thus, although reference is made to telephone network it is to be understood that any other suitable form of communication link may be used between the data base 1 and the terminals 5.
Claims (9)
1. A secure data communication system comprising at least one local terminal, at least one remote data handling device, interface devices arranged to connect such terminal and data handling device to a data communication link and a security device at such terminal requiring actuation in order to permit data communication in a desired mode with such data handling device, characterised in that said security device has a code-reading device with which a coded portable personal identification device is removably locatable in interative proximity for code reading purposes, said code-reading device being arranged to effect said actuation of said security device when a predetermined code is read from said identification device.
2. A system according to claim 1 characterised in that the personal identification device is in the form of a card.
3. A system according to claim 1 or 2 char acterised in that there are multiple said terminals for use with multiple differently coded personal identification devices.
4. A system according to claim 3 characterised in that the terminals are of standardised form and differences in operation thereof are achieved by utilisation of different operational data derived from the codes of the respective identification devices.
5. A system according to claim 4 characterised in that the security device of each terminal comprises an encryption and/or de-encryption device and the personal identification device which is used to actuate the respective terminal provides in its coding part or all of an encryption key necessary for the proper operation of the security device.
6. A system according to any one of claim 1 to 5 characterised in that the code-reading device of the or each terminal is capable of writing to as well as reading from the personal identification device.
7. A system according to claim 6 characterised in that the identification device carries as part of its coding a transaction number which is indexed each time the device is used and the system is arranged to check the value of the transaction number against a stored transaction record.
8. A system according to claim 7 characterised in that the indexing of the transaction number is effected locally by the security device whereas the checking of the currant value of the transaction number is effected remotely at the data handling device.
9. A system according to claim 1 substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8608244A GB2188762B (en) | 1986-04-04 | 1986-04-04 | Secure data communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8608244A GB2188762B (en) | 1986-04-04 | 1986-04-04 | Secure data communication system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB8608244D0 GB8608244D0 (en) | 1986-05-08 |
GB2188762A true GB2188762A (en) | 1987-10-07 |
GB2188762B GB2188762B (en) | 1989-11-15 |
Family
ID=10595671
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB8608244A Expired GB2188762B (en) | 1986-04-04 | 1986-04-04 | Secure data communication system |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2188762B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2202354A (en) * | 1987-03-12 | 1988-09-21 | Security Services Plc | Keys |
GB2237912A (en) * | 1989-11-06 | 1991-05-15 | Mercury Communications | Fraud control system |
GB2315804A (en) * | 1996-07-29 | 1998-02-11 | Christopher James Hunter | Programmable key and lock |
NL1004823C2 (en) * | 1996-12-18 | 1998-06-19 | Petronella Catharina Anna Roze | Method for separating genuine passports or travel authorisation from those which are false |
GB2340644A (en) * | 1998-08-18 | 2000-02-23 | Rover Group | Security system |
GB2342115A (en) * | 1998-09-30 | 2000-04-05 | Marconi Comm Ltd | Locking a vending machine |
FR2786007A1 (en) * | 1998-11-18 | 2000-05-19 | Gemplus Card Int | METHOD FOR CONTROLLING THE USE OF A CHIP CARD |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1294232A (en) * | 1969-03-04 | 1972-10-25 | Omron Tateisi Electronics Co | System for automatically conducting office work required for transactions at a bank or the like |
GB1300848A (en) * | 1969-04-26 | 1972-12-20 | Omron Tateisi Electronics Co | Automatic deposit receiving and cash dispensing system |
GB1458495A (en) * | 1974-06-25 | 1976-12-15 | Ibm | Controlled access systems |
GB1464703A (en) * | 1974-02-01 | 1977-02-16 | Omron Tateisi Electronics Co | Value dispensing system |
GB1559962A (en) * | 1977-05-20 | 1980-01-30 | Ibm | Identity verification apparatus |
GB1576463A (en) * | 1977-02-04 | 1980-10-08 | Diebold Inc | System and method for verifying authorized holders of identification cards |
GB2060228A (en) * | 1979-10-09 | 1981-04-29 | Mastiff Security Syst Ltd | Computer System |
EP0129139A2 (en) * | 1983-06-16 | 1984-12-27 | Gerhard-Günter Gassmann | Charge-checking arrangement at the receiver end of information transmission systems |
-
1986
- 1986-04-04 GB GB8608244A patent/GB2188762B/en not_active Expired
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1294232A (en) * | 1969-03-04 | 1972-10-25 | Omron Tateisi Electronics Co | System for automatically conducting office work required for transactions at a bank or the like |
GB1300848A (en) * | 1969-04-26 | 1972-12-20 | Omron Tateisi Electronics Co | Automatic deposit receiving and cash dispensing system |
GB1464703A (en) * | 1974-02-01 | 1977-02-16 | Omron Tateisi Electronics Co | Value dispensing system |
GB1458495A (en) * | 1974-06-25 | 1976-12-15 | Ibm | Controlled access systems |
GB1576463A (en) * | 1977-02-04 | 1980-10-08 | Diebold Inc | System and method for verifying authorized holders of identification cards |
GB1559962A (en) * | 1977-05-20 | 1980-01-30 | Ibm | Identity verification apparatus |
GB2060228A (en) * | 1979-10-09 | 1981-04-29 | Mastiff Security Syst Ltd | Computer System |
EP0129139A2 (en) * | 1983-06-16 | 1984-12-27 | Gerhard-Günter Gassmann | Charge-checking arrangement at the receiver end of information transmission systems |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2202354A (en) * | 1987-03-12 | 1988-09-21 | Security Services Plc | Keys |
US4926665A (en) * | 1987-03-12 | 1990-05-22 | Security Services Plc | Remotely programmable key and programming means therefor |
GB2202354B (en) * | 1987-03-12 | 1991-03-06 | Security Services Plc | Remotely programmable key and programming means therefor |
GB2237912A (en) * | 1989-11-06 | 1991-05-15 | Mercury Communications | Fraud control system |
GB2237912B (en) * | 1989-11-06 | 1993-04-21 | Mercury Communications | Fraud control system |
GB2315804A (en) * | 1996-07-29 | 1998-02-11 | Christopher James Hunter | Programmable key and lock |
NL1004823C2 (en) * | 1996-12-18 | 1998-06-19 | Petronella Catharina Anna Roze | Method for separating genuine passports or travel authorisation from those which are false |
GB2340644A (en) * | 1998-08-18 | 2000-02-23 | Rover Group | Security system |
GB2342115A (en) * | 1998-09-30 | 2000-04-05 | Marconi Comm Ltd | Locking a vending machine |
GB2342115B (en) * | 1998-09-30 | 2001-04-18 | Marconi Comm Ltd | Improvements in or relating to locking arrangements for a vending machine |
US6615623B1 (en) | 1998-09-30 | 2003-09-09 | Vending Management Services, Ltd. | Vending machine lock arrangements |
FR2786007A1 (en) * | 1998-11-18 | 2000-05-19 | Gemplus Card Int | METHOD FOR CONTROLLING THE USE OF A CHIP CARD |
WO2000030049A1 (en) * | 1998-11-18 | 2000-05-25 | Gemplus | Method for controlling the use of a smart card |
Also Published As
Publication number | Publication date |
---|---|
GB2188762B (en) | 1989-11-15 |
GB8608244D0 (en) | 1986-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU725952B2 (en) | Method for Authorization Check | |
US4707592A (en) | Personal universal identity card system for failsafe interactive financial transactions | |
US5259025A (en) | Method of verifying fake-proof video identification data | |
US4531023A (en) | Computer security system for a time shared computer accessed over telephone lines | |
US4498000A (en) | Security method and device for communicating confidential data via an intermediate stage | |
US6010067A (en) | Mobile funds transaction device for transferring funds between remote banking facilities | |
KR970005640B1 (en) | Transaction system | |
US4962449A (en) | Computer security system having remote location recognition and remote location lock-out | |
CA2083228C (en) | Apparatus and method for controlled access to a secured location | |
US4601011A (en) | User authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units | |
US3938090A (en) | Terminal apparatus | |
EP0614559B1 (en) | Personal identification devices and access control systems | |
ES2319164T3 (en) | PROVISION FOR AUTHENTICATION OF A USER AND AUTHORIZATION OF USE OF A SECURE SYSTEM. | |
CA1326304C (en) | Secure data interchange system | |
JP4225691B2 (en) | How to authenticate personal code of IC card user | |
GB2168514A (en) | Security module | |
JPS60230284A (en) | Chip card system | |
CA2140564A1 (en) | AuTh Card Access Module System | |
US5907616A (en) | Method for accessing a portion of the data on a microprocessor card | |
GB2211050A (en) | Telephone system | |
GB2211695A (en) | Security device for a telephone | |
GB2188762A (en) | Secure data communication system | |
EP0638880B1 (en) | A method of verifying fake-proof video identification data | |
EP1073961A2 (en) | A method of storing and retrieving personal codes | |
JPH0730677A (en) | Door lock control system using radio telephone set |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732 | Registration of transactions, instruments or events in the register (sect. 32/1977) | ||
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 19980404 |