Transaction execution system with secure data storage and communications
Personal authority verification system
Security means for transaction terminal system
Identity verification method and apparatus
Personal identification system
Cryptographic architecture for use with a high security personal identification system
Cryptographic file security for single domain networks
Security system for electronic funds transfer system Patent #: 4259720
ApplicationNo. 06/129110 filed on 03/10/1980
US Classes:705/71, Including key management235/379, Banking systems235/382, Permitting access380/281, Using master key (e.g., key-encrypting-key)380/45, Multiple key level705/43, Including Automatic Teller Machine (i.e., ATM)705/72, Verifying PIN713/185, Using record or token902/2, Protects transmitted data (e.g., encryption or decryption)902/5And to verify identity of user*
ExaminersPrimary: Birmiel, Howard A.
Attorney, Agent or Firm
International ClassesG06Q 20/00 (20060101)
G07F 7/10 (20060101)
AbstractA method for efficiently protecting transactions and providing authentication of users and devices in on-line systems that transfer funds electronically, dispense cash, or provide a good or permit a service to be utilized is provided. The transaction may be initiated by a magnetic-striped plastic card at an attended or unattended terminal (10, 11, 12) and requires the entry of a preassigned Personal Identification Number through a keyboard (20). The Personal Identification Number is encrypted (23) more than once at the terminal and other means are used in order to prevent the utilization of certain tapped-line data. The data required to validate and authorize the transaction is transmitted securely to a centralized computer (14) which accesses from its stored data base (15) the data that is required to decrypt and validate the transaction, including the encrypted Personal Identification Number corresponding to the received transaction data. A secret Terminal Master Key must be maintained securely at each terminal and may differ at each terminal. A list of such Terminal Master Keys and other secret data must be securely maintained at the centralized computer. Means for multiple-encryptions and decryptions in a predetermined way must also be maintained at each terminal and at the centralized computer. Means (34) are provided for securely returning a response to the terminal at which the transaction was initiated to authorize or reject the requested transaction. These functions are accomplished in a way that permits efficient utilization of data communications lines and reduces or eliminate perpetration of fraud by any of various means.