GB2188762A - Secure data communication system - Google Patents

Secure data communication system Download PDF

Info

Publication number
GB2188762A
GB2188762A GB08608244A GB8608244A GB2188762A GB 2188762 A GB2188762 A GB 2188762A GB 08608244 A GB08608244 A GB 08608244A GB 8608244 A GB8608244 A GB 8608244A GB 2188762 A GB2188762 A GB 2188762A
Authority
GB
United Kingdom
Prior art keywords
code
terminal
personal identification
encryption
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB08608244A
Other versions
GB2188762B (en
GB8608244D0 (en
Inventor
Philip Hall Bertenshaw
John Jones
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB8608244A priority Critical patent/GB2188762B/en
Publication of GB8608244D0 publication Critical patent/GB8608244D0/en
Publication of GB2188762A publication Critical patent/GB2188762A/en
Application granted granted Critical
Publication of GB2188762B publication Critical patent/GB2188762B/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption

Abstract

A secure data communication system has one or more local terminals (5) connected, e.g. via modems (3, 10), encryption/decryption units (4, 11) and telephone network (2), to a remote data base (1). To transmit data, a security device in the local terminal (5) must be actuated first. The security device comprises a code reader (9) into which a personal identification device (12) e.g. a card with a coded magnetic stripe, can be removably inserted. The card (12) may provide an identification code (compared with a code keyed in at 7) and also a key for the encryption/decryption. The reader (9) can change the code and key on the card (12) under control of the data base (1). <IMAGE>

Description

SPECIFICATION Secure data communication system This invention relates to a secure data communication system.
It is common practice to use the public telephone network as a data communication link between local terminals and a remote computerised data base. For security reasons it is known to encrypt the communicated data and this usually involves the incorporation of encryption/deencryption units in the local terminals with a fitted encryption key in each such unit. However, with this arrangement there is the problem of preventing unauthorised communication with the data base whilst permitting easy and convenient use of the terminals by authorised personnel. In particular, if there are different levels of security data using different encryption keys, it may be necessary to allocate different terminals to different authorised users.
An object of the present invention is to overcome or at least minimise the abovementioned problem.
According to the invention therefore there is provided a secure data communication system comprising at least one local terminal, at least one remote data handling device, interface devices arranged to connect such terminal and data handling device to a data communication link, and a security device at such terminal requiring actuation in order to permit data communication in a desired mode with such data handling device, characterised in that said security device has a code-reading device with which a coded portable personal identification device is removably locatable in interactive proximity for code reading purposes, said code-reading device being arranged to effect said actuation of said security device when a predetermined code is read from said identification device.
With this arrangement, it is possible to safeguard against unauthorised use of the terminal whilst at the same time permitting use by an authorised person in a particularly convenient manner. In this respect, the coding of the identification device may include a code word or number which is verified by the terminal, for example, by automatic cross-checking against a pre-programmed list of authorised codes, or by comparison with a code entered manually by the user via a keyboard.
The personal identification device may be in the form of a card although other structural forms are also possible. The mode of interaction with the code-reading device may be such that electrical contact or interconnection therebetween is not necessary. Thus, the code-reading device may be arranged to read a magnetic stripe on the identification device or it may be arranged to couple inductively with a circuit on the identification device as described in co-pending Application No.
8514219.
The system may be used with multiple differently coded personal identification devices.
In this case, there may be multiple terminals and the arrangement may be such that any identification device can actuate any terminal or alternatively that each identification device can only actuate a respective one of the terminals. Advantageously, the terminals may be of standardised form and any required differences in operation thereof may be achieved by utilisation of different operational data derived from the codes of the respective identification devices. Thus, for example, the security device of the or each terminal may comprise an encryption and/or de-encryption device and the personal identification device which is used to actuate the respective terminal may be arranged to provide, in its coding, part or all of an encryption key necessary for the proper operation of the security device.
Most preferably, the code-reading device of the or each terminal is capable of writing to as well as reading from the personal identification device. In this way it is possible to achieve particularly good security in so far as the coding of the personal identification device can be changed or updated from time to time.
For example, the identification device may carry, as part of its coding, a transaction number which is indexed each time the device is used and the system may be arranged to check the value of the transaction number against a stored transaction record in order to verify the identification device. Such writing and verification procedures may be effected locally and/or remotely. For example, the abovementioned indexing of the transaction number may be effected locally by the security device whereas the checking of the current value of the transaction number may be effected remotely at the data handling device.
Other transactional information may be written to and read from the identification device such as date or duration of the last transaction etc.
Moreover, part or all of the coding of the identification device, such as the abovementioned personal code word or code number and/or the abovementioned encryption key, can be changed at appropriate intervals, for example, after predetermined periods of time, after predetermined numbers of transactions or the like.
The invention will now be described further by way of example only and with reference to the accompanying drawing which is a diagrammatic view of one form of a communication system according to the invention.
As shown in the drawing, a secure communication system comprises a central computerised data base 1 which is connected to the public telephone network 2 via a modem 3 and an encryption/de-encryption unit 4.
Multiple identical terminals 5 are also con nected to the telephone network 2 at different locations remote from the data base 1. Only one terminal 5 is shown for the sake of convenience.
The terminal 5 comprises a microcomputer 6 with a connected keyboard 7 and vdu display 8. The microcomputer 6 is also connected to a reading device 9 and to the tele phone network 2 via a modem 10 and an encryption/de-encryption unit 11.
Each person authorised to use the terminal 5 has a respective portable identification device which may be in the form of a "credit card" 12 with a magnetic stripe. The card 12 can be inserted into a slot in the reading device 9 so that coded information on the stripe can be read automatically by the reading device 9 and also so that information can be written by the reading device onto the stripe.
When a card 12 is inserted into the reading device 9 the information on the magnetic stripe is read and is verified in the first instance by the microcomputer 6. That is, the user enters a code word or number via the keyboard 7 and the microcomputer 6 checks to see if this is the same as a personal identification code which is on the card. The terminal 5 is then actuated to the extent that it is now possible to establish a communication link with the central data base 1, by dialling the communication number of the data base 1 in the usual way. Once communication has been established, data can be transmitted to and received from the data base 1 via the modem 10 and the encryption/deencryption unit 11. At this stage, for proper operation of the unit 4, an encryption key is required and this is read from the magnetic stripe on the card 12.This constitutes a further verification since intelligible data communication cannot take place if the correct key is not read from the card 12.
A further verification operation is carried out in that transactional information is read from the card and is checked by the central data base 1. For example, each time the card 12 is used, at the end of the transaction the reading device 9 under the local control of the microcomputer 6 reads a transaction number on the card and then overwrites this with a number which is one higher. The data base 1 stores a transaction record for each card and can check to see if the stored transaction number is equal to the number on the card. if desired other transactional information, such as the date of a transaction can be read, written, stored and checked.
The reading device 9 can also change the personal identification code and/or the encryption key on the card under the instructions of the data base 1. For example, the personal identification code may be changed periodically so that the card can only be used to actuate the terminal 5 by a person who is familiar with the current code to be entered via the keyboard. This periodic changing may be effected automatically at the end of or during a transaction when the card is first used following a predetermined change-over date.
The encryption key may also be changed automatically likewise at the end of or during a transaction when the card is first used following a predetermined change-over date.
The reading device 9 may be arranged to eradicate the information stored on the card 12, under local or remote control, in the event that read information is not verified, for example, if three unsuccessful attempts are made to enter a correct personal identification code via the keyboard 7.
With the arrangement described above great security can be achieved in a particularly simple and convenient manner.
A user of the system can gain access to the data base 1- simply by inserting his identification card into the reading device 9 of any terminal 5 and entering his personal identification code via the keyboard 7.
Different personnel having different levels of security clearance can use the system even though the terminals 5 are of a common standardised form. This can be achieved conveniently because it is possible to provide different personal identification cards with different encryption keys so that the user can only gain access to data which is encrypted on the data base in a format corresponding to that person's encryption key.
It is of course to be understood that the invention is not intended to be restricted to the details of the above embodiment which are described by way of example only. Thus, although reference is made to telephone network it is to be understood that any other suitable form of communication link may be used between the data base 1 and the terminals 5.

Claims (9)

1. A secure data communication system comprising at least one local terminal, at least one remote data handling device, interface devices arranged to connect such terminal and data handling device to a data communication link and a security device at such terminal requiring actuation in order to permit data communication in a desired mode with such data handling device, characterised in that said security device has a code-reading device with which a coded portable personal identification device is removably locatable in interative proximity for code reading purposes, said code-reading device being arranged to effect said actuation of said security device when a predetermined code is read from said identification device.
2. A system according to claim 1 characterised in that the personal identification device is in the form of a card.
3. A system according to claim 1 or 2 char acterised in that there are multiple said terminals for use with multiple differently coded personal identification devices.
4. A system according to claim 3 characterised in that the terminals are of standardised form and differences in operation thereof are achieved by utilisation of different operational data derived from the codes of the respective identification devices.
5. A system according to claim 4 characterised in that the security device of each terminal comprises an encryption and/or de-encryption device and the personal identification device which is used to actuate the respective terminal provides in its coding part or all of an encryption key necessary for the proper operation of the security device.
6. A system according to any one of claim 1 to 5 characterised in that the code-reading device of the or each terminal is capable of writing to as well as reading from the personal identification device.
7. A system according to claim 6 characterised in that the identification device carries as part of its coding a transaction number which is indexed each time the device is used and the system is arranged to check the value of the transaction number against a stored transaction record.
8. A system according to claim 7 characterised in that the indexing of the transaction number is effected locally by the security device whereas the checking of the currant value of the transaction number is effected remotely at the data handling device.
9. A system according to claim 1 substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
GB8608244A 1986-04-04 1986-04-04 Secure data communication system Expired GB2188762B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB8608244A GB2188762B (en) 1986-04-04 1986-04-04 Secure data communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB8608244A GB2188762B (en) 1986-04-04 1986-04-04 Secure data communication system

Publications (3)

Publication Number Publication Date
GB8608244D0 GB8608244D0 (en) 1986-05-08
GB2188762A true GB2188762A (en) 1987-10-07
GB2188762B GB2188762B (en) 1989-11-15

Family

ID=10595671

Family Applications (1)

Application Number Title Priority Date Filing Date
GB8608244A Expired GB2188762B (en) 1986-04-04 1986-04-04 Secure data communication system

Country Status (1)

Country Link
GB (1) GB2188762B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2202354A (en) * 1987-03-12 1988-09-21 Security Services Plc Keys
GB2237912A (en) * 1989-11-06 1991-05-15 Mercury Communications Fraud control system
GB2315804A (en) * 1996-07-29 1998-02-11 Christopher James Hunter Programmable key and lock
NL1004823C2 (en) * 1996-12-18 1998-06-19 Petronella Catharina Anna Roze Method for separating genuine passports or travel authorisation from those which are false
GB2340644A (en) * 1998-08-18 2000-02-23 Rover Group Security system
GB2342115A (en) * 1998-09-30 2000-04-05 Marconi Comm Ltd Locking a vending machine
FR2786007A1 (en) * 1998-11-18 2000-05-19 Gemplus Card Int METHOD FOR CONTROLLING THE USE OF A CHIP CARD

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1294232A (en) * 1969-03-04 1972-10-25 Omron Tateisi Electronics Co System for automatically conducting office work required for transactions at a bank or the like
GB1300848A (en) * 1969-04-26 1972-12-20 Omron Tateisi Electronics Co Automatic deposit receiving and cash dispensing system
GB1458495A (en) * 1974-06-25 1976-12-15 Ibm Controlled access systems
GB1464703A (en) * 1974-02-01 1977-02-16 Omron Tateisi Electronics Co Value dispensing system
GB1559962A (en) * 1977-05-20 1980-01-30 Ibm Identity verification apparatus
GB1576463A (en) * 1977-02-04 1980-10-08 Diebold Inc System and method for verifying authorized holders of identification cards
GB2060228A (en) * 1979-10-09 1981-04-29 Mastiff Security Syst Ltd Computer System
EP0129139A2 (en) * 1983-06-16 1984-12-27 Gerhard-Günter Gassmann Charge-checking arrangement at the receiver end of information transmission systems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1294232A (en) * 1969-03-04 1972-10-25 Omron Tateisi Electronics Co System for automatically conducting office work required for transactions at a bank or the like
GB1300848A (en) * 1969-04-26 1972-12-20 Omron Tateisi Electronics Co Automatic deposit receiving and cash dispensing system
GB1464703A (en) * 1974-02-01 1977-02-16 Omron Tateisi Electronics Co Value dispensing system
GB1458495A (en) * 1974-06-25 1976-12-15 Ibm Controlled access systems
GB1576463A (en) * 1977-02-04 1980-10-08 Diebold Inc System and method for verifying authorized holders of identification cards
GB1559962A (en) * 1977-05-20 1980-01-30 Ibm Identity verification apparatus
GB2060228A (en) * 1979-10-09 1981-04-29 Mastiff Security Syst Ltd Computer System
EP0129139A2 (en) * 1983-06-16 1984-12-27 Gerhard-Günter Gassmann Charge-checking arrangement at the receiver end of information transmission systems

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2202354A (en) * 1987-03-12 1988-09-21 Security Services Plc Keys
US4926665A (en) * 1987-03-12 1990-05-22 Security Services Plc Remotely programmable key and programming means therefor
GB2202354B (en) * 1987-03-12 1991-03-06 Security Services Plc Remotely programmable key and programming means therefor
GB2237912A (en) * 1989-11-06 1991-05-15 Mercury Communications Fraud control system
GB2237912B (en) * 1989-11-06 1993-04-21 Mercury Communications Fraud control system
GB2315804A (en) * 1996-07-29 1998-02-11 Christopher James Hunter Programmable key and lock
NL1004823C2 (en) * 1996-12-18 1998-06-19 Petronella Catharina Anna Roze Method for separating genuine passports or travel authorisation from those which are false
GB2340644A (en) * 1998-08-18 2000-02-23 Rover Group Security system
GB2342115A (en) * 1998-09-30 2000-04-05 Marconi Comm Ltd Locking a vending machine
GB2342115B (en) * 1998-09-30 2001-04-18 Marconi Comm Ltd Improvements in or relating to locking arrangements for a vending machine
US6615623B1 (en) 1998-09-30 2003-09-09 Vending Management Services, Ltd. Vending machine lock arrangements
FR2786007A1 (en) * 1998-11-18 2000-05-19 Gemplus Card Int METHOD FOR CONTROLLING THE USE OF A CHIP CARD
WO2000030049A1 (en) * 1998-11-18 2000-05-25 Gemplus Method for controlling the use of a smart card

Also Published As

Publication number Publication date
GB2188762B (en) 1989-11-15
GB8608244D0 (en) 1986-05-08

Similar Documents

Publication Publication Date Title
AU725952B2 (en) Method for Authorization Check
US4707592A (en) Personal universal identity card system for failsafe interactive financial transactions
US5259025A (en) Method of verifying fake-proof video identification data
US4531023A (en) Computer security system for a time shared computer accessed over telephone lines
US4498000A (en) Security method and device for communicating confidential data via an intermediate stage
US6010067A (en) Mobile funds transaction device for transferring funds between remote banking facilities
KR970005640B1 (en) Transaction system
US4962449A (en) Computer security system having remote location recognition and remote location lock-out
CA2083228C (en) Apparatus and method for controlled access to a secured location
US4601011A (en) User authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units
US3938090A (en) Terminal apparatus
EP0614559B1 (en) Personal identification devices and access control systems
ES2319164T3 (en) PROVISION FOR AUTHENTICATION OF A USER AND AUTHORIZATION OF USE OF A SECURE SYSTEM.
CA1326304C (en) Secure data interchange system
JP4225691B2 (en) How to authenticate personal code of IC card user
GB2168514A (en) Security module
JPS60230284A (en) Chip card system
CA2140564A1 (en) AuTh Card Access Module System
US5907616A (en) Method for accessing a portion of the data on a microprocessor card
GB2211050A (en) Telephone system
GB2211695A (en) Security device for a telephone
GB2188762A (en) Secure data communication system
EP0638880B1 (en) A method of verifying fake-proof video identification data
EP1073961A2 (en) A method of storing and retrieving personal codes
JPH0730677A (en) Door lock control system using radio telephone set

Legal Events

Date Code Title Description
732 Registration of transactions, instruments or events in the register (sect. 32/1977)
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19980404