WO1999040701A1 - Secured network system - Google Patents

Secured network system Download PDF

Info

Publication number
WO1999040701A1
WO1999040701A1 PCT/US1998/016925 US9816925W WO9940701A1 WO 1999040701 A1 WO1999040701 A1 WO 1999040701A1 US 9816925 W US9816925 W US 9816925W WO 9940701 A1 WO9940701 A1 WO 9940701A1
Authority
WO
WIPO (PCT)
Prior art keywords
switch
relay
data
manual
classified
Prior art date
Application number
PCT/US1998/016925
Other languages
French (fr)
Inventor
Stephen W. Bouthillier
Ross E. Seybold
Sydney R. Blowers
Robert V. Sulkowski, Jr.
Randall P. Morse
Original Assignee
The Government Of The United States Of America As Represented By The Secretary Of The Navy
Market Central Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/035,409 external-priority patent/US6021497A/en
Application filed by The Government Of The United States Of America As Represented By The Secretary Of The Navy, Market Central Inc. filed Critical The Government Of The United States Of America As Represented By The Secretary Of The Navy
Priority to AU91979/98A priority Critical patent/AU9197998A/en
Publication of WO1999040701A1 publication Critical patent/WO1999040701A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • the present invention relates generally to secured network systems. More
  • the present invention relates to a secured network system which allows only
  • programs are adapted to provide access control to a computer's data or the data base of a
  • the computer may result in the computer crashing which renders the computer unusable.
  • the secured network system includes a
  • readykey controller which has connected thereto a first card reader and a power relay
  • the user of the secured network system inserts a microchip embedded card into
  • the first card reader then transmits a first electrical authorization
  • readykey controller in response to the first electrical authorization signal, supplies a first
  • the secured network system also allows the user to receive and process classified
  • readykey controller responsive to the second authorization signal, sends a second enable
  • the second enable signal enables the data relay switch
  • Fig. 1 is an electrical schematic diagram of a secured network system
  • Fig. 2 is an electrical schematic diagram of the power relay switch of Fig. 1;
  • Figs. 3a and 3b are electrical schematic diagrams of the data relay switch of Fig.
  • FIG. 1 there is shown a secured network system 10 which receives
  • a readykey controller 12 which has connected thereto a central processing unit
  • Card reader 14 upon receiving the microchip embedded card and verifying
  • the card transmits an electrical authorization signal to readykey controller 12 indicating
  • the readykey controller 12 is also connected to an administrative personal
  • relay 42 The enable signal energizes the coil of relay 40 closing normally open contacts
  • the enable signal also energizes the coil of relay 42 opening
  • Terminal J4 of power relay switch 16 is connected to the power supply for
  • switch 16 via normally closed contact 1 of relay 42 is a status or test line.
  • controller 12 indicating that power relay switch 16 is off and computer 18 is not
  • Power relay switch 16 includes a tamper switch 22 which has its normally open
  • controller 12 which indicates that an individual has attempted to power relay switch 16 of
  • secured network system 10 includes a manual A/B
  • switch 28 which allows the user of computer 18 to receive unclassified data from a
  • Patent Application Serial Number 08/687,102 "Shielded Computer Network Switch"
  • switch 28 When switch 28 is set at a first position such that unsecured network server 30 is
  • manual A/B switch 28 is set at a second position allowing secured
  • network server 32 to be connected to computer 18. The user next inserts his proximity
  • readykey controller 12 responsive to
  • the authorization signal from network card reader 24 sends an enable signal to a data
  • network server 32 to computer 18 through data relay switch 26 and manual A/B switch
  • FIGs. 1, 3a and 3b there is shown in Figs. 3a and 3b a detailed
  • Data relay switch 26 includes three
  • Secured network server 32 is connected to computer 18 through relays 60, 62 and
  • Readykey controller 12 supplies an enable signal via terminal
  • the enable signal energizes the coil of each relay 62 and 64 which closes the
  • Data relay switch 26 also has a status or test line 94 which indicates the status of
  • the second set of relays 66, 68 and 70 allows for the transfer of classified data
  • second enable signal is supplied by readykey controller 12 to the coils of relays 66, 68
  • Data relay switch 26 has a status or test line 96 which indicates the status of the
  • the third set of relays 72, 74 and 76 allows for the transfer of
  • Data relay switch 26 has a status or test line 98 which indicates the status of the
  • the readykey controller 12 used in secured network system 10 is a Readykey
  • processing unit card reader 14 and network card reader 24 are Readykey K2001
  • Manual A/B switch 28 is a Secure Switch Ethernet/Ethernet, Model
  • the present invention comprises a new,

Abstract

A secured network system (10) comprising a ready key controller (12) connected to a first card reader (14) and a power relay switch (16). The user inserts a microchip embedded card into the first card reader which transmits a first electrical authorization signal to the ready key controller indicating that the user is authorized to use a computer (18) for receiving and processing classified data. The ready key controller then supplies a first enable signal to a first power relay switch (16) activating the power relay switch which couples the computer's power supply to an external power source. The secured network system also allows the user to receive and process classified data, by setting a manual A/B switch (28) to a predetermined position which allows a secured network server (32) to be connected to the computer. The user next inserts his proximity card into a second card reader (28) which then transmits a second electrical authorization signal to the ready key controller.

Description

SECURED NETWORK SYSTEM
DESCRIPTION
The present invention relates generally to secured network systems. More
particularly, the present invention relates to a secured network system which allows only
a user with proper authorization to access classified data provided by a secured network
server and unclassified data provided by an unsecured network server from the user's
personal computer.
In the past computer security for the military services and the intelligence
agencies has been provided by a variety of commercially available computer programs
which are adapted for use with a variety of microcomputers such as DOS based operating
system personal computers and Apple Macintosh personal computers. These computer
programs are adapted to provide access control to a computer's data or the data base of a
Local Area Network that is coupled to the computer.
Computer security programs often reside in the memory of the computer's central
processing unit. Placing computer security programs in the computer's memory slows the
computer's processing time because the computer must perform repetitive identification
and auditing tasks stored in the computer's memory. In addition, conflicts between
security software and the computer operating system or other computer software used by
the computer may result in the computer crashing which renders the computer unusable.
Recently microchip embedded cards or "Smart Cards" have been used with
computer security software to insure that classified data is not accessible to an individual who is not authorized to access the classified data. However,
"Smart Cards" also rely on performing authentication
and auditing functions which are stored in the computer's memory.
Accordingly, there is a need for a secure network system which will allow only
authorized individuals to access classified data, but will not require the use of computer
memory to perform authentication and auditing functions associated with the accessing of
classified data.
The present invention overcomes some of the disadvantages of the prior art
including those mentioned above in that it comprises a relatively simple yet highly
effective secured network system which will allow only an authorized user of the secured
network system to access classified data. The secured network system includes a
readykey controller which has connected thereto a first card reader and a power relay
switch. The user of the secured network system inserts a microchip embedded card into
the first card reader. The first card reader then transmits a first electrical authorization
signal to the readykey controller indicating that the user is authorized to use a personal
computer and its associated monitor for receiving and processing classified data. The
readykey controller, in response to the first electrical authorization signal, supplies a first
enable signal to a power relay switch activating the power relay switch which couples the
computer's power supply to an external power source.
The secured network system also allows the user to receive and process classified
data, by setting a manual A/B secured network switch to a predetermined position which
allows a secured network server to be connected to the personal computer. The user next inserts his proximity card into a second card reader which then transmits a second
electrical authorization signal to the readykey controller indicating that the user is
authorized to receive and process classified data from the secured network server. The
readykey controller, responsive to the second authorization signal, sends a second enable
signal to a data relay switch. The second enable signal enables the data relay switch
connecting the secured network switch to the secured network server via the data relay
switch which allows for the transmission of classified data between the secured network
server and the personal computer.
Fig. 1 is an electrical schematic diagram of a secured network system which
includes power relay switch and a data relay switch;
Fig. 2 is an electrical schematic diagram of the power relay switch of Fig. 1; and
Figs. 3a and 3b are electrical schematic diagrams of the data relay switch of Fig.
1.
Referring to Fig. 1 there is shown a secured network system 10 which receives
and processes classified data as well as unclassified data. Secured network system 10
includes a readykey controller 12 which has connected thereto a central processing unit
card reader 14 and a power relay switch 16. The user of secured network system 10
presents, that is inserts a proximity card which is a microchip embedded card into card
reader 14. Card reader 14 upon receiving the microchip embedded card and verifying
the card transmits an electrical authorization signal to readykey controller 12 indicating
that the user is authorized to use a computer 18 and its associated monitor 20 for
receiving and processing classified data. The readykey controller 12 is also connected to an administrative personal
computer (not illustrated) which monitors controller 12 to keep track of individuals
accessing computer 18 and to insure an attempt at unauthorized access of data stored in
computer 18 or available to computer 18 through a Local Area Network is not made.
Referring now to Figs. 1 and 2, readykey controller 12, in response to the
electrical authorization signal from card reader 14, supplies an enable signal via terminal
Jl, Pin 1 and a relay power line 39 to the positive input of the coil of a relay 40 and a
relay 42. The enable signal energizes the coil of relay 40 closing normally open contacts
1 and 2 of relay 40. The enable signal also energizes the coil of relay 42 opening
normally closed contact 1 of relay 42.
Closing normally open contacts 1 and 2 of relay 40 connects power line 44, and
neutral line 46 from terminal J3 of power relay switch 16 through relay 40 to terminal J4
of switch 16. Terminal J4 of power relay switch 16 is connected to the power supply for
computer 18 so that closure of normally open contacts 1 and 2 of relay 40 provides 120
VAC to the power supply of computer 18, thereby activating computer 18 which allows
the user of computer 18 to receive and process data. Line 48 between terminals J3 and J4
provides a ground for computer 18.
Line 50 which connects pin 6, terminal Jl of switch 16 to pin 4, terminal J2 of
switch 16 via normally closed contact 1 of relay 42 is a status or test line. When
normally closed contact 1 of relay 42 is closed a test signal is supplied to readykey
controller 12 indicating that power relay switch 16 is off and computer 18 is not
operational. Opening normally closed contact 1 of relay 42 results in a test signal being provided to readykey controller 12 which indicates that power relay switch 16 is on and
computer 18 is operational.
Power relay switch 16 includes a tamper switch 22 which has its normally open
terminals 1 and 2 connected through terminal Jl and terminal J2 of power relay switch 16
to readykey controller 12. Unauthorized removal of the power relay switch 16 from
computer 18 activates tamper switch 22 sending an electrical signal to readykey
controller 12 which indicates that an individual has attempted to power relay switch 16 of
computer 18.
Referring again to Fig. 1 , secured network system 10 includes a manual A/B
switch 28 which allows the user of computer 18 to receive unclassified data from a
unsecured network server 30 and classified data from a secured network server 32. The
manual A/B switch 28 used in secured network system 10 is fully disclosed in U.S.
Patent Application Serial Number 08/687,102, "Shielded Computer Network Switch",
filed 07/22/96, by Stephen W. Bouthillier.
When switch 28 is set at a first position such that unsecured network server 30 is
connected to computer 18, the user of computer 18 may receive and process unclassified
data from unsecured network server 30.
When the user of secured network system 10 needs to receive and process
classified data, manual A/B switch 28 is set at a second position allowing secured
network server 32 to be connected to computer 18. The user next inserts his proximity
card into a network card reader 24 which then transmits an electrical authorization signal
to readykey controller 12 indicating that the user is authorized to receive and process classified data from secured network server 32. Readykey controller 12, responsive to
the authorization signal from network card reader 24 sends an enable signal to a data
relay switch 26. This enable signal enables data relay switch 26 connecting secured
network server 32 to computer 18 through data relay switch 26 and manual A/B switch
28.
Referring to Figs. 1, 3a and 3b, there is shown in Figs. 3a and 3b a detailed
electrical schematic diagram of data relay switch 26. Data relay switch 26 includes three
sets of three relays 60, 62 and 64; 66, 68 and 70; 72, 74 and 76 which allow three
computers to be connected to secured network server 32.
Secured network server 32 is connected to computer 18 through relays 60, 62 and
64 of data relay switch 26. Readykey controller 12 supplies an enable signal via terminal
J7, Pin 2 of switch 26 and enable line 80 to the negative input of the coils of relays 60, 62
and 64. The enable signal energizes the coil of each relay 62 and 64 which closes the
normally open contacts 1 and 2 of each relay 62 and 64. Closing the normally open
contacts 1 and 2 of each relay 62 and 64 completes a data path for the four data lines 86
between secured network server 32 and computer 18 allowing for the transfer of
classified data between secured network server 32 and computer 18.
Data relay switch 26 also has a status or test line 94 which indicates the status of
the data path or the four data lines 86 between secured network server 32 and computer
18. When the coil of relay 60 is de-energized, normally closed contact 1 of relay 60 is
closed sending a test signal to readykey controller 12 via status line 94 which indicates
that the data path between secured network server 32 and computer 18 is inactive. Energizing the coil of relay 60 opens normally closed contact 1 of relay 60 which
indicates that the data path between secured network server 32 and computer 18 is active.
The second set of relays 66, 68 and 70 allows for the transfer of classified data
between secured network server 32 and a second computer (not illustrated) whenever a
second enable signal is supplied by readykey controller 12 to the coils of relays 66, 68
and 70 via enable line 82. Energizing the coil of each relay 66 and 68 completes a data
path for the four data lines 88 between secured network server 32 and the second
computer allowing for the transfer of classified data between secured network server 32
and the second computer.
Data relay switch 26 has a status or test line 96 which indicates the status of the
data path or the four data lines 88 between secured network server 32 and the second
computer. When the coil of relay 66 is de-energized, normally closed contact 1 of relay
66 is closed sending a second test signal to readykey controller 12 via status line 96
which indicates that the data path between secured network server 32 and the second
computer is inactive. Energizing the coil of relay 66 opens normally closed contact 1 of
relay 66 which indicates that the data path between secured network server 32 and the
second computer is active.
In a like manner, the third set of relays 72, 74 and 76 allows for the transfer of
classified data between secured network server 32 and a third computer (not illustrated)
whenever a third enable signal is supplied by readykey controller 12 to the coils of relays
72, 74 and 76 via enable line 84. Energizing the coil of each relay 72 and 74 completes a
data path for the four data lines 90 between secured network server 32 and the third computer allowing for the transfer of classified data between secured network server 32
and the third computer.
Data relay switch 26 has a status or test line 98 which indicates the status of the
data path or the four data lines 90 between secured network server 32 and the third
computer. When the coil of relay 72 is de-energized, normally closed contact 1 of relay
72 is closed sending a third test signal to readykey controller 12 via status line 98 which
indicates that the data path between secured network server 32 and the third computer is
inactive. Energizing the coil of relay 72 opens normally closed contact 1 of relay 72
which indicates that the data path between secured network server 32 and the third
computer is active.
The readykey controller 12 used in secured network system 10 is a Readykey
K2100 Controller commercially available from Radionics of Solinas, Californiar Central
processing unit card reader 14 and network card reader 24 are Readykey K2001
Touchfree proximity readers also commercially available from Radionics of Solinas,
California. Manual A/B switch 28 is a Secure Switch Ethernet/Ethernet, Model
SW456A commercially available from Black Box Corporation of Pittsburgh,
Pennsylvania.
From the foregoing, it may readily be seen that the present invention comprises a new,
unique and exceedingly useful secured network system for receiving and processing
classified and unclassified data which constitutes a considerable improvement over the
known prior art. Obviously, many modifications and variations of the present invention
are possible in light of the above teachings. It is, therefore to be understood that within the scope of the appended claims that the invention may be practiced otherwise than as
specifically described.

Claims

CLAIMSWhat is claimed is:
1. A secured network system comprising:
data processing means for receiving and processing classified data and
unclassified data;
a manual A/B switch connected to said data processing means;
an unclassified network server connected to said manual A/B switch, said
unclassified network server providing said unclassified data to said manual A/B switch;
said manual A/B switch connecting said unclassified network server to said data
processing means whenever said manual A/B switch is set to a first position which allows
said unclassified data to pass through said manual A/B switch to said data processing
means;
authorization signal generating means located in proximity to said manual A/B
switch, said authorization signal generating means being adapted to receive a microchip
embedded card authorizing a user to process said classified data with said data processing
means, said authorization signal generating means providing an authorization signal
whenever said microchip embedded card is presented to said authorization signal
generating means and received by said authorization signal generating means;
controller means connected to said authorization signal generating means to
receive said authorization signal, said controller means, responsive to said authorization
signal, generating an enable signal; a data relay switch connected to said controller means to receive said enable
signal, said data relay switch being connected to said manual A/B switch;
a classified network server connected to said data relay switch, said classified
network server providing said classified data to said data relay switch;
said data relay switch, responsive to said enable signal, connecting said classified
network server to said manual A/B switch which allows said classified to pass through
said data relay switch to said manual A/B switch;
said manual A/B switch connecting said classified network server to said data
processing means through said data relay switch whenever said manual A/B switch is set
to a second position which allows said classified data to pass through said manual A/B
switch to said data processing means.
2. The secured network system of claim 1 wherein said data processing means
comprises a computer.
3. The secured network system of claim 1 wherein said authorization signal
generating means comprises a network card reader.
4. The secured network system of claim 1 wherein said controller means
comprises a readykey controller.
5. The secured network system of claim 1 wherein said data relay switch
comprises: a first relay having a coil and a pair of normally open contacts, the coil of said
first relay being connected to said controller means to receive said enable signal, the pair
of normally open contacts of said first relay being connected to said classified network
switch and said manual A/B switch;
a second relay having a coil and a pair of normally open contacts, the coil of said
second relay being connected to said controller means to receive said enable signal, the
pair of normally open contacts of said second relay being connected to said classified
network switch and said manual A/B switch;
said enable signal energizing the coils of said first relay and said second relay
closing the pair of normally open contacts of said first relay and said second relay
providing a classified data path between said classified network switch and said manual
A/B switch.
6. The secured network system of claim 5 wherein said data relay switch has a
third relay, said relay having a coil connected to said controller means and a normally
closed contact connected to said controller means, the normally closed contact of said
third relay providing a status signal to said controller means whenever the coil of said
third relay is de-energized, said status signal indicating that said classified data path is inactive.
7. The secured network system of claim 1 further comprising a monitor
connected to data processing means.
8. A secured network system comprising:
data processing means for receiving and processing classified data and unclassified data;
a manual A/B switch connected to said data processing means;
an unclassified network server connected to said manual A/B switch, said
unclassified network server providing said unclassified data to said manual A/B switch;
said manual A/B switch connecting said unclassified network server to said data
processing means whenever said manual A/B switch is set to a first position which allows
said unclassified data to pass through said manual A/B switch to said data processing
means;
a network card reader located in proximity to said manual A/B switch, said
network card reader being adapted to receive a microchip embedded card authorizing a
user to process said classified data with said data processing means, said network card
reader providing an authorization signal whenever said microchip embedded card is
presented to said network card reader and received by said network card reader;
a readykey controller connected to said network card reader to receive said
authorization signal, said readykey controller, responsive to said authorization signal,
generating an enable signal;
a data relay switch connected to said readykey controller and said manual A/B
switch;
a classified network server connected to said data relay switch, said classified
network server providing said classified data to said data relay switch; said data relay switch including a first relay having a coil and a pair of normally
open contacts, the coil of said first relay being connected to said readykey controller to
receive said enable signal, the pair of normally open contacts of said first relay being
connected to said classified network switch and said manual A/B switch;
a second relay having a coil and a pair of normally open contacts, the coil of said
second relay being connected to said readykey controller to receive said enable signal, the
pair of normally open contacts of said second relay being connected to said classified
network switch and said manual A/B switch;
said enable signal energizing the coils of said first relay and said second relay
closing the pair of normally open contacts of said first relay and said second relay
providing a classified data path between said classified network switch and said manual
A/B switch allowing said classified to pass through said data relay switch to said manual
A/B switch;
said manual A/B switch connecting said classified network server to said data
processing means through said data relay switch whenever said manual A/B switch is set
to a second position which allows said classified data to pass through said manual A/B
switch to said data processing means.
9. The secured network system of claim 8 wherein said data processing means
comprises a computer.
10. The secured network system of claim 8 further comprising a monitor
connected to said data processing means.
11. A secured network system comprising:
a computer for receiving and processing classified data and unclassified data;
a manual A/B switch connected to said computer;
an unclassified network server connected to said manual A/B switch, said
unclassified network server providing said unclassified data to said manual A/B switch;
said manual A/B switch connecting said unclassified network server to said
computer whenever said manual A/B switch is set to a first position which allows said
unclassified data to pass through said manual A/B switch to said computer;
a network card reader located in proximity to said manual A/B switch, said
network card reader being adapted to receive a microchip embedded card authorizing a
user to process said classified data with said computer, said network card reader
providing an authorization signal whenever said microchip embedded card is presented to
said network card reader and received by said network card reader;
a readykey controller connected to said network card reader to receive said
authorization signal, said readykey controller, responsive to said authorization signal,
generating an enable signal;
a data relay switch connected to said readykey controller and said manual A/B
switch;
a classified network server connected to said data relay switch, said classified
network server providing said classified data to said data relay switch;
said data relay switch including a first relay having a coil and a pair of normally
open contacts, the coil of said first relay being connected to said readykey controller to receive said enable signal, the pair of normally open contacts of said first relay being
connected to said classified network switch and said manual A/B switch;
a second relay having a coil and a pair of normally open contacts, the coil of said
second relay being connected to said readykey controller to receive said enable signal, the
pair of normally open contacts of said second relay being connected to said classified
network switch and said manual A/B switch;
said enable signal energizing the coils of said first relay and said second relay
closing the pair of normally open contacts of said first relay and said second relay
providing a classified data path between said classified network switch and said manual
A/B switch allowing said classified to pass through said data relay switch to said manual
A/B switch;
a third relay having a coil connected to said readykey controller and a normally
closed contact connected to said readykey controller, the normally closed contact of said
third relay providing a status signal to said readykey controller whenever the coil of said
third relay is de-energized, said status signal indicating that said classified data path is
inactive;
said manual A/B switch connecting said classified network server to said
computer through said data relay switch whenever said manual A/B switch is set to a
second position which allows said classified data to pass through said manual A/B switch
to said computer.
12. The secured network system of claim 11 further comprising a monitor
connected to said computer.
PCT/US1998/016925 1998-02-10 1998-08-13 Secured network system WO1999040701A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU91979/98A AU9197998A (en) 1998-02-10 1998-08-13 Secured network system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/035,409 1998-02-10
US09/035,409 US6021497A (en) 1997-08-15 1998-02-10 Secured network system

Publications (1)

Publication Number Publication Date
WO1999040701A1 true WO1999040701A1 (en) 1999-08-12

Family

ID=21882509

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/016925 WO1999040701A1 (en) 1998-02-10 1998-08-13 Secured network system

Country Status (2)

Country Link
AU (1) AU9197998A (en)
WO (1) WO1999040701A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001086388A1 (en) * 2000-05-12 2001-11-15 Zakrytoye Aktsionernoe Obschestvo 'mezhotraslevoyeyuridicheskoye Agentstvo Yurpromkonsalting' Method and system for protection of data input/output, storage and processing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
US4974193A (en) * 1987-03-04 1990-11-27 Siemens Aktiengesellschaft Circuit arrangement for protecting access to a data processing system with the assistance of a chip card
US5548721A (en) * 1994-04-28 1996-08-20 Harris Corporation Method of conducting secure operations on an uncontrolled network
US5671367A (en) * 1992-01-14 1997-09-23 Gemplus Card International Microcomputer PC-card having switching circuit for controlling access to memory based on control signals from internal microprocessor on control signals from external PC
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5836010A (en) * 1995-03-14 1998-11-10 Samsung Electronics Co., Ltd. Personal computer using chip-in card to prevent unauthorized use

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4974193A (en) * 1987-03-04 1990-11-27 Siemens Aktiengesellschaft Circuit arrangement for protecting access to a data processing system with the assistance of a chip card
US4962449A (en) * 1988-04-11 1990-10-09 Artie Schlesinger Computer security system having remote location recognition and remote location lock-out
US5671367A (en) * 1992-01-14 1997-09-23 Gemplus Card International Microcomputer PC-card having switching circuit for controlling access to memory based on control signals from internal microprocessor on control signals from external PC
US5548721A (en) * 1994-04-28 1996-08-20 Harris Corporation Method of conducting secure operations on an uncontrolled network
US5836010A (en) * 1995-03-14 1998-11-10 Samsung Electronics Co., Ltd. Personal computer using chip-in card to prevent unauthorized use
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001086388A1 (en) * 2000-05-12 2001-11-15 Zakrytoye Aktsionernoe Obschestvo 'mezhotraslevoyeyuridicheskoye Agentstvo Yurpromkonsalting' Method and system for protection of data input/output, storage and processing

Also Published As

Publication number Publication date
AU9197998A (en) 1999-08-23

Similar Documents

Publication Publication Date Title
US5894552A (en) Method and apparatus for manually switching to a secured network
EP0379333B1 (en) Secure data interchange system
US5854891A (en) Smart card reader having multiple data enabling storage compartments
US6389542B1 (en) Multi-level secure computer with token-based access control
US6643783B2 (en) Multi-level secure computer with token-based access control
US4961142A (en) Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
US5036461A (en) Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
US6351817B1 (en) Multi-level secure computer with token-based access control
CA1266326A (en) Ic card system
US20090050697A1 (en) Apparatus for distributed data storage of security identification and security access system and method of use thereof
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
JP2004528655A (en) Frequency method
US9355277B2 (en) Installable secret functions for a peripheral
AU2002257249A1 (en) Smart card access control system
WO1998007092A9 (en) Smart card reader having multiple data enabling storage compartments
JPH08212066A (en) Loading method to protection memory area of information processor and apparatus related to it
US20140067689A1 (en) Security module and method of securing payment information
CN1221160A (en) Personal identification system using fingerprint
US6092724A (en) Secured network system
US20140281527A1 (en) Detecting Fraud Using Operational Parameters for a Peripheral
US5841120A (en) Secured network system
EP1228433A1 (en) Security arrangement
US6219792B1 (en) Secured network system
US6012632A (en) Secured network system
US20100211488A1 (en) License enforcement

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA