HK78690A - Data communication systems and methods - Google Patents
Data communication systems and methodsInfo
- Publication number
- HK78690A HK78690A HK786/90A HK78690A HK78690A HK 78690 A HK78690 A HK 78690A HK 786/90 A HK786/90 A HK 786/90A HK 78690 A HK78690 A HK 78690A HK 78690 A HK78690 A HK 78690A
- Authority
- HK
- Hong Kong
- Prior art keywords
- methods
- data communication
- communication systems
- systems
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8612519 | 1986-05-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
HK78690A true HK78690A (en) | 1990-10-12 |
Family
ID=10598300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK786/90A HK78690A (en) | 1986-05-22 | 1990-10-03 | Data communication systems and methods |
Country Status (7)
Country | Link |
---|---|
US (1) | US4890323A (xx) |
EP (1) | EP0246823A3 (xx) |
JP (1) | JPS6310839A (xx) |
AU (1) | AU590082B2 (xx) |
GB (1) | GB2190820B (xx) |
HK (1) | HK78690A (xx) |
SG (1) | SG46990G (xx) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4866666A (en) * | 1984-10-29 | 1989-09-12 | Francisco Michael H | Method for maintaining data integrity during information transmission by generating indicia representing total number of binary 1's and 0's of the data |
US5168520A (en) * | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
US4885778A (en) * | 1984-11-30 | 1989-12-05 | Weiss Kenneth P | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
JP2754062B2 (ja) * | 1988-02-11 | 1998-05-20 | ヴォーゲル、ピーター、サムュエル | 文書作成装置 |
GB2227111B (en) * | 1989-01-17 | 1993-05-19 | Toshiba Kk | Certification system |
US5097505A (en) * | 1989-10-31 | 1992-03-17 | Securities Dynamics Technologies, Inc. | Method and apparatus for secure identification and verification |
US5120939A (en) * | 1989-11-09 | 1992-06-09 | At&T Bell Laboratories | Databaseless security system |
US5313564A (en) * | 1990-07-11 | 1994-05-17 | Fontech Ltd. | Graphic matter and process and apparatus for producing, transmitting and reading the same |
AU649190B2 (en) * | 1990-10-19 | 1994-05-12 | Emc Corporation | Method and apparatus for personal identification |
DE69022424T2 (de) * | 1990-11-09 | 1996-03-28 | Ibm | Nichtablehnung in Rechnernetzwerken. |
US5148479A (en) * | 1991-03-20 | 1992-09-15 | International Business Machines Corp. | Authentication protocols in communication networks |
US5237614A (en) * | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
US6836548B1 (en) | 1991-10-29 | 2004-12-28 | The Commonwealth Of Australia | Communications security and trusted path method and means |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
EP0635181B1 (de) * | 1992-04-09 | 1997-01-15 | Siemens Aktiengesellschaft | Verfahren zum erkennen einer unberechtigten wiedereinspielung beliebiger von einem sender zu einem empfänger übertragener daten |
GB9211648D0 (en) * | 1992-06-02 | 1992-07-15 | Racal Datacom Ltd | Data communication system |
DE4223258C3 (de) * | 1992-07-15 | 2001-03-15 | Telefunken Microelectron | Verfahren zur verifizierbaren Übertragung von Daten |
GB2449410B (en) * | 1992-10-30 | 2009-04-08 | Commw Of Australia | Communications trusted path means |
US5390252A (en) * | 1992-12-28 | 1995-02-14 | Nippon Telegraph And Telephone Corporation | Authentication method and communication terminal and communication processing unit using the method |
US5757913A (en) * | 1993-04-23 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for data authentication in a data communication environment |
US5432851A (en) * | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US5668876A (en) * | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
WO1996004602A1 (en) * | 1994-07-29 | 1996-02-15 | Certicom Corp. | Elliptic curve encryption systems |
US5671283A (en) * | 1995-06-08 | 1997-09-23 | Wave Systems Corp. | Secure communication system with cross linked cryptographic codes |
US5602918A (en) * | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method |
US5892902A (en) * | 1996-09-05 | 1999-04-06 | Clark; Paul C. | Intelligent token protected system with network authentication |
GB2317790B (en) * | 1996-09-26 | 1998-08-26 | Richard Billingsley | Improvements relating to electronic transactions |
US6400823B1 (en) | 1996-12-13 | 2002-06-04 | Compaq Computer Corporation | Securely generating a computer system password by utilizing an external encryption algorithm |
US5949882A (en) * | 1996-12-13 | 1999-09-07 | Compaq Computer Corporation | Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm |
US5960084A (en) * | 1996-12-13 | 1999-09-28 | Compaq Computer Corporation | Secure method for enabling/disabling power to a computer system following two-piece user verification |
US5887131A (en) * | 1996-12-31 | 1999-03-23 | Compaq Computer Corporation | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password |
US5953422A (en) * | 1996-12-31 | 1999-09-14 | Compaq Computer Corporation | Secure two-piece user authentication in a computer network |
US6581162B1 (en) | 1996-12-31 | 2003-06-17 | Compaq Information Technologies Group, L.P. | Method for securely creating, storing and using encryption keys in a computer system |
GB2321741B (en) | 1997-02-03 | 2000-10-04 | Certicom Corp | Data card verification system |
NL1007495C2 (nl) | 1997-11-07 | 1999-05-12 | Koninkl Kpn Nv | Werkwijze voor het beveiligd uitlezen van een vercijferd, opgeslagen cryptografische sleutel en communicatieapparaten daarvoor. |
US6128737A (en) * | 1998-04-20 | 2000-10-03 | Microsoft Corporation | Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key |
GB9811071D0 (en) | 1998-05-23 | 1998-07-22 | Ncr Int Inc | Automated teller machine |
WO2000011834A1 (en) * | 1998-08-25 | 2000-03-02 | Schlumberger Industries, S.A. | Graphic digital signatures |
JP2000276445A (ja) * | 1999-03-23 | 2000-10-06 | Nec Corp | バイオメトリクス識別を用いた認証方法、装置、認証実行機、認証プログラムを記録した記録媒体 |
US7134145B1 (en) * | 1999-04-30 | 2006-11-07 | Koninklijke Philips Electronics N.V. | Registering copy protected material in a check-out, check-in system |
US6985583B1 (en) * | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
CA2403283A1 (en) | 2000-03-15 | 2001-09-20 | Edward J. Hogan | Method and system for secure payments over a computer network |
AU2012201255B2 (en) * | 2000-04-11 | 2015-08-13 | Mastercard International Incorporated | An improved method and system for conducting secure payments over a computer network |
US7318050B1 (en) * | 2000-05-08 | 2008-01-08 | Verizon Corporate Services Group Inc. | Biometric certifying authorities |
AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
AU2002239481A1 (en) * | 2000-10-30 | 2002-05-27 | Raf Technology, Inc. | Verification engine for user authentication |
US7996321B2 (en) * | 2000-12-18 | 2011-08-09 | Burlington English Ltd. | Method and apparatus for access control to language learning system |
US7203840B2 (en) * | 2000-12-18 | 2007-04-10 | Burlingtonspeech Limited | Access control for interactive learning system |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US6961000B2 (en) * | 2001-07-05 | 2005-11-01 | Amerasia International Technology, Inc. | Smart tag data encoding method |
JP2003085084A (ja) * | 2001-09-12 | 2003-03-20 | Sony Corp | コンテンツ配信システム及びコンテンツ配信方法、携帯端末、配信サーバ、並びに記憶媒体 |
US20030088794A1 (en) * | 2001-11-05 | 2003-05-08 | Aladdin Knowledge Systems Ltd. | Method and system for rendering secure pin entry |
US7363494B2 (en) * | 2001-12-04 | 2008-04-22 | Rsa Security Inc. | Method and apparatus for performing enhanced time-based authentication |
US7343623B2 (en) * | 2002-05-29 | 2008-03-11 | Raf Technology, Inc. | Authentication query strategizer and results compiler |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US20050044387A1 (en) * | 2003-08-18 | 2005-02-24 | Ozolins Helmars E. | Portable access device |
US9003548B2 (en) | 2004-04-13 | 2015-04-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
WO2006035400A1 (en) * | 2004-09-30 | 2006-04-06 | Koninklijke Philips Electronics N.V. | Method of authentication based on polynomials |
US8467535B2 (en) * | 2005-01-18 | 2013-06-18 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
CA2935823C (en) | 2005-01-18 | 2019-01-15 | Certicom Corp. | Accelerated verification of digital signatures and public keys |
CN101120351B (zh) * | 2005-02-18 | 2010-10-06 | Rsa安全公司 | 派生种子的分发方法 |
US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
US8239682B2 (en) | 2005-09-28 | 2012-08-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US7961674B2 (en) * | 2009-01-27 | 2011-06-14 | Sony Corporation | Multi-tier wireless home mesh network with a secure network discovery protocol |
US8904177B2 (en) * | 2009-01-27 | 2014-12-02 | Sony Corporation | Authentication for a multi-tier wireless home mesh network |
US8964634B2 (en) * | 2009-02-06 | 2015-02-24 | Sony Corporation | Wireless home mesh network bridging adaptor |
US7990897B2 (en) | 2009-03-11 | 2011-08-02 | Sony Corporation | Method and apparatus for a wireless home mesh network with network topology visualizer |
US8745376B2 (en) | 2011-10-14 | 2014-06-03 | Certicom Corp. | Verifying implicit certificates and digital signatures |
US9954832B2 (en) | 2015-04-24 | 2018-04-24 | Encryptics, Llc | System and method for enhanced data protection |
WO2017182411A1 (en) * | 2016-04-18 | 2017-10-26 | Bancontact-Mistercash Nv/Sa | Method and device for authorizing mobile transactions |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2020513B (en) * | 1978-05-03 | 1982-12-22 | Atalla Technovations | Method and apparatus for securing data transmissions |
US4223403A (en) * | 1978-06-30 | 1980-09-16 | International Business Machines Corporation | Cryptographic architecture for use with a high security personal identification system |
US4315101A (en) * | 1979-02-05 | 1982-02-09 | Atalla Technovations | Method and apparatus for securing data transmissions |
US4302810A (en) * | 1979-12-28 | 1981-11-24 | International Business Machines Corporation | Method and apparatus for secure message transmission for use in electronic funds transfer systems |
US4326098A (en) * | 1980-07-02 | 1982-04-20 | International Business Machines Corporation | High security system for electronic signature verification |
US4393269A (en) * | 1981-01-29 | 1983-07-12 | International Business Machines Corporation | Method and apparatus incorporating a one-way sequence for transaction and identity verification |
GB2102606B (en) * | 1981-06-19 | 1985-01-30 | Nat Res Dev | Apparatus and methods for making payments electronically |
FR2514593B1 (fr) * | 1981-10-09 | 1986-12-26 | Bull Sa | Procede et dispositif pour authentifier la signature d'un message signe |
US4453074A (en) * | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
US4503287A (en) * | 1981-11-23 | 1985-03-05 | Analytics, Inc. | Two-tiered communication security employing asymmetric session keys |
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
US4500750A (en) * | 1981-12-30 | 1985-02-19 | International Business Machines Corporation | Cryptographic application for interbank verification |
NL8201077A (nl) * | 1982-03-16 | 1983-10-17 | Philips Nv | Kommunikatiesysteem, bevattende een centrale dataverwerkende inrichting, toegangsstations en externe stations, waarbij een kryptografische kontrole is voorzien op vervalsing van een extern station, alsmede externe stations voor gebruik in zo een kommunikatiesysteem. |
FR2530053B1 (fr) * | 1982-07-08 | 1986-04-25 | Bull Sa | Procede pour certifier la provenance d'au moins une information enregistree dans une memoire d'un premier dispositif electronique et transmise a un deuxieme dispositif electronique, et systeme pour la mise en oeuvre d'un tel procede |
US4723284A (en) * | 1983-02-14 | 1988-02-02 | Prime Computer, Inc. | Authentication system |
EP0140388B1 (en) * | 1983-10-31 | 1991-05-08 | Atalla Corporation | Pocket terminal, method and system for secured banking transactions |
US4575621A (en) * | 1984-03-07 | 1986-03-11 | Corpra Research, Inc. | Portable electronic transaction device and system therefor |
US4596898A (en) * | 1984-03-14 | 1986-06-24 | Computer Security Systems, Inc. | Method and apparatus for protecting stored and transmitted data from compromise or interception |
EP0168667B1 (en) * | 1984-07-19 | 1992-03-04 | Tandem Computers Incorporated | Secured message transfer system and method using updated session code |
US4652698A (en) * | 1984-08-13 | 1987-03-24 | Ncr Corporation | Method and system for providing system security in a remote terminal environment |
JPH0670818B2 (ja) * | 1984-09-07 | 1994-09-07 | カシオ計算機株式会社 | 照合カード及びその認証方法 |
US4677670A (en) * | 1985-07-01 | 1987-06-30 | Henderson Jr Paul B | Paired-secure message identification controller for computers and the like |
-
1987
- 1987-05-15 EP EP87304329A patent/EP0246823A3/en not_active Withdrawn
- 1987-05-18 GB GB8711651A patent/GB2190820B/en not_active Expired
- 1987-05-20 US US07/052,257 patent/US4890323A/en not_active Expired - Fee Related
- 1987-05-21 AU AU73264/87A patent/AU590082B2/en not_active Ceased
- 1987-05-22 JP JP62125656A patent/JPS6310839A/ja active Pending
-
1990
- 1990-06-30 SG SG46990A patent/SG46990G/en unknown
- 1990-10-03 HK HK786/90A patent/HK78690A/xx unknown
Also Published As
Publication number | Publication date |
---|---|
GB8711651D0 (en) | 1987-06-24 |
SG46990G (en) | 1990-08-17 |
AU7326487A (en) | 1987-11-26 |
JPS6310839A (ja) | 1988-01-18 |
US4890323A (en) | 1989-12-26 |
AU590082B2 (en) | 1989-10-26 |
EP0246823A3 (en) | 1989-10-04 |
GB2190820A (en) | 1987-11-25 |
GB2190820B (en) | 1990-01-24 |
EP0246823A2 (en) | 1987-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2190820B (en) | Data communication systems and methods | |
GB2230403B (en) | Communication methods and systems | |
EP0283295A3 (en) | Data communication system | |
EP0325384A3 (en) | Data processing and communication | |
EP0215526A3 (en) | Data communication system | |
IL84240A (en) | Method and system for radar compatible data communication | |
GB2198018B (en) | Simultaneous communication method and system | |
GB2166327B (en) | Data communication system | |
EP0201253A3 (en) | Data communication system | |
GB2185362B (en) | Time limited data communication system | |
GB8824205D0 (en) | Data communication system | |
GB2181927B (en) | Serial data communication system | |
GB2219177B (en) | Modem and data communication system | |
EP0411553A3 (en) | Data communication system | |
GB2168515B (en) | Communication and data processing systems | |
EP0195626A3 (en) | Data communications system | |
GB2188762B (en) | Secure data communication system | |
EP0366044A3 (en) | Data communications system | |
GB8904443D0 (en) | Secure data communication system | |
GB2213969B (en) | Data communication system | |
GB8904444D0 (en) | Secure data communication system | |
GB8403989D0 (en) | Data communication system | |
SG70094G (en) | Modem and data communication system | |
IE880993L (en) | Data communication systems | |
GB8705232D0 (en) | Data communications systems |