WO1990010919A1 - Controller card and associated reading unit - Google Patents

Controller card and associated reading unit Download PDF

Info

Publication number
WO1990010919A1
WO1990010919A1 PCT/SE1990/000142 SE9000142W WO9010919A1 WO 1990010919 A1 WO1990010919 A1 WO 1990010919A1 SE 9000142 W SE9000142 W SE 9000142W WO 9010919 A1 WO9010919 A1 WO 9010919A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
characteristic
card
reading unit
permitted
Prior art date
Application number
PCT/SE1990/000142
Other languages
French (fr)
Inventor
Hanafi Ameur
Original Assignee
Hanafi Ameur
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hanafi Ameur filed Critical Hanafi Ameur
Publication of WO1990010919A1 publication Critical patent/WO1990010919A1/en
Priority to NO91913487A priority Critical patent/NO913487L/en
Priority to FI914283A priority patent/FI914283A0/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Definitions

  • the present invention relates to a controller card and
  • the system is also time consuming, as the competence of each user is stored. This implies taht the computer must constantly search the competence of the various users to permit access, which implies a long searching time as the computer is occupied by this operating step. Also a large storage capacity is required.
  • US patent 3 764 742 discloses a cryptographic identifying card. This cryptographic card is used as an identification system. After identification the software program takes over and gives the user access to a given account or the like.
  • the controller card according to the invention comprises at least an identifying code which is associated with an individual code and at least one using and/or reference
  • the using and/or reference characteristics are read in co-operation with an input/output system whereupon
  • the characteristics As soon as the identifying code has been confirmed by statement and acceptance of the individual code, whereupon access has been permitted, a reading of the using and/or reference characteristics comprised in the card is started. Thereupon the possessor is permitted access access or access and use of the computer, data base or the like in accordance with the directions and limitations of the using and/or reference characteristics.
  • the using characteristics specify a limitation, for example time, date, area, level characteristics, which are comprised in the controller card. This means that even if someone would know the individual code of a single possessor, he or she cannot find out which limitations this implies as regards access or access and use of the computer or the like.
  • Existing systems permit access according to stored competence data which are related to the identifying code.
  • the controller card permits access or access and use of the computer, data base or hardware of other type during a certain period of the day, during specified days, within a specified area and at a specified level.
  • the possessor can make use of the card only in accordance with the using and/or reference characteristics which are imposed on him, for example a certain time of the day and specified days.
  • the possessor is allowed to enter into his area, for example Cad, word-processing or other area, and only with respect to the correct level characteristic, i.e. that the possessor can for example only update, copy etc.
  • Figure 1 shows a controller card according to the invention.
  • Figure 2 shows the reading unit corresponding to a controller card.
  • Figure 3 shows schematically a series of events taking place when inserting the card and when the identifying code is accepted.
  • Figure 1 shows a controller card 1.
  • the controller card is provided with a magnetic layer 1 , bar codes or the like.
  • an identifying code 2 which corresponds to an individual code 3, and thereupon follows at least one formatted using characteristic 4, which is digitalized, coded or the like. This may be for example: t e m p o r a l u s i n g c h a r a c t e r i s t i c s, i.e. specifying the time when the card is valid of access or access and use,
  • the card Since the card comprises using characteristics, the card obtains a watching function and becomes a controller card which can retain the possessor from unauthorized use of the computer. Thereby, the use of the computer or hardware
  • controller card whereto the controller card is connected can for example be controlled so that the possessor will not obtain access in unauthorized time, date or month, during periods of
  • the use of the card produces an activation of the memory unit of the processing register, which thereby documents the identity of the user, the processing time, the
  • the problem is that it is not possible to show what each individual user has done.
  • the present system permits an identification which gives access to the use of the computer, but it is not checked physically that the
  • FIG. 2 shows schematically the controller card with associate reading unit according to the invention.
  • the controller card 5 is used in co-operation with a reading unit 6 connected to a key-board 7.
  • the reading unit 6 with associated key-board 7 are connected to a processor 8, a memory unit and to the input/output characteristicssystem. These are connected to an I/O identifying system where the identifying code of the individual is read whereupon a specific code for the individual is entered and checked to correspond to the identifying code by the identifying circuit.
  • the memory unit comprises directories connected to an operating register memory unit 10 which records the time of use, the operations performed, when and by whom.
  • Figure 3 shows schematically the sequence of operations
  • using and reference characteristics comprise characteristics for time, date, area, level etc.
  • An operating register memory unit co-operates with the
  • the card includes for example the temporal characteristics
  • the possessor will have access or access and use of the
  • reference characteristics are read whereupon the authorized area is opened: for example Cad/cam directory, word-processing, calculation, book-keeping etc.
  • the area characteristic can be for example invoicing in which case this area is opened.
  • Invoicing may be a directory for invoicing for services.
  • invoicing it may be restrictions for example only to open up new files, i.e. write, invoice new services, or only to update in existing files.
  • output system is a surveillance system which is active
  • the I/O system will prevent access and
  • controller card gives a very good secrecy and integrity protection and is moreover particularly easily administered.
  • the input/ output system constantly carries surveillance of the use of the card so that no transgression occurs. Attempts at transgression are recorded and may release alarm of report.
  • the input/output system permits the establishment of a
  • a controller card includes a reference characteristic to another controller card, access or access and use of the computer or the like is subjected to a further restriction which is included in the reference characteristic. This may be for example that the possessor of the card has access only to the single journal, that of the card
  • the computer is provided with two reading units, this may mean that it is desired to have the using and reference characteristics of one controller card connected to the reference characteristics of another controller card and that checking of the reference characteristics takes place simultaneously before the input/output system gives access according to the restrictions in the reference characteristic or characteristics. In this manner further strengthening of the control has been included.
  • the reference characteristics may be used where double check is necessary, such as opening a strong-room or the like.
  • the invention is not-limited to the above description, but many use characteristics and reference characteristics can be added.
  • the number of reference characteristics and reading units can be multiplied.

Abstract

A controller card with identifying codes and an associated reading unit comprising at least one use and/or reference characteristic. Each use and/or reference characteristic included in the card consists of directions and restrictions for access or access and use of a computer or the like. The use and/or reference characteristics are arranged to co-operate with the input/output system so that the directions and restrictions which are specified by the use and/or reference characteristics will not be transgressed.

Description

Controller card and associated reading unit
The present invention relates to a controller card and
an associated reading unit which permits access to a
computer, main frame or data base or hardware to
which it is connected.
The use of cards as a means for gaining access to computers is well known in the art. The card is used as an identifying member which, once it is accepted, permits access only with respect to an individual code related to the identifying code on the card. When confirmation of the acceptance of the
individual code has been obtained, a specific program stored in the computer is started. This program specifies the
competence of the possessor of the card and permits access in accordance with this competence. Thus, the competence of different users is always incorporated in the program. Any amendment requires amendment of the main program. Such a process has great deficiencies, in particularly as regards to security and integrity. With respect to security, all information is avaiable to the programmer who thereby obtains an uncontrolled position of power. Since the programmer has access to all information as well as to the competence of each user, which moreover he or she has specified himself, it is clear that with such a process sensitive information lacks a satisfactory security protection. A system which to such a high degree is based on the contributions of a single person is of course very vulnerable. It is also time consuming and inflexible, as the activity depends on the presence and availability of this single person. The system is also time consuming, as the competence of each user is stored. This implies taht the computer must constantly search the competence of the various users to permit access, which implies a long searching time as the computer is occupied by this operating step. Also a large storage capacity is required.
Another substantial deficiancy of existing system relates to the integrity. Problems relating to secrecy and integrity are presently considerable. In various sectors of the society, such as nursing, insurance, banking, defense, industry etc, the same problem complex is met: How can sensitive information be protected? How can access to and authority to gain access to or to use data or the like be apportioned and/or limited?
Computers exist which are provided with means for permitting access by means of magnetic code cards, IC cards with for example ROM, EPROM with associated readers and program ware. The use of so called "smart cards", i.e. cards having a
memory circuit, is carried out so that information is stored. Such a "smart card", when used for example for medicinal purposes, enables data about the patient, for example blood pressure, to be stored. When the card is inserted the blood pressure of the individual for a certain specified period of time is read. Data which have been stores in this manner are only particulars, information or the like and forms only working data, i.e. memory data intended for processing or comparison.
US patent 3 764 742 discloses a cryptographic identifying card. This cryptographic card is used as an identification system. After identification the software program takes over and gives the user access to a given account or the like.
In this connection a programmer is required who makes up an extensive program for this purpose.
The present invention is intended to eliminate such disadvantages, and the invention is more particularly disclosed by the following description, the accompanying drawings and the patant claims.
The controller card according to the invention comprises at least an identifying code which is associated with an individual code and at least one using and/or reference
characteristic in co-operation with a discriminating operative system (input/output characteristic system) which constantly checks and controls that the use of the controller card is carried out in accordance with the directions and limitations which are associated with the using and/or reference characteristics comprised in the card. When using the card according to the invention the identifying code is checked, whereupon the user is directed to state the individual code. On agreement between the individual code and the identifying code the using and/or reference characteristics which are comprised in the card are raed in a reading unit, whereupon access to or access to and use of the computer, the data base or the hardware to which it is connected, is granted in
accordance with the directions and limitations of the
using and/or reference characteristics. In the reading unit the using and/or reference characteristics are read in co-operation with an input/output system whereupon
access is permitted in accordance with the meaning of
the characteristics. As soon as the identifying code has been confirmed by statement and acceptance of the individual code, whereupon access has been permitted, a reading of the using and/or reference characteristics comprised in the card is started. Thereupon the possessor is permitted access access or access and use of the computer, data base or the like in accordance with the directions and limitations of the using and/or reference characteristics. The using characteristics specify a limitation, for example time, date, area, level characteristics, which are comprised in the controller card. This means that even if someone would know the individual code of a single possessor, he or she cannot find out which limitations this implies as regards access or access and use of the computer or the like. Existing systems on the other hand permit access according to stored competence data which are related to the identifying code.
The controller card according to the invention permits access or access and use of the computer, data base or hardware of other type during a certain period of the day, during specified days, within a specified area and at a specified level.
Provided that identification has taken place, i.e. that the identifying code of the card is accepted and/or the individual code corresponds to the identifying code, the possessor can make use of the card only in accordance with the using and/or reference characteristics which are imposed on him, for example a certain time of the day and specified days. When these conditions are fulfilled, the possessor is allowed to enter into his area, for example Cad, word-processing or other area, and only with respect to the correct level characteristic, i.e. that the possessor can for example only update, copy etc. Figure 1 shows a controller card according to the invention.
Figure 2 shows the reading unit corresponding to a controller card.
Figure 3 shows schematically a series of events taking place when inserting the card and when the identifying code is accepted.
Figure 1 shows a controller card 1. The controller card is provided with a magnetic layer 1 , bar codes or the like.
In the card layer 1 there is provided an identifying code 2, which corresponds to an individual code 3, and thereupon follows at least one formatted using characteristic 4, which is digitalized, coded or the like. This may be for example: t e m p o r a l u s i n g c h a r a c t e r i s t i c s, i.e. specifying the time when the card is valid of access or access and use,
d a t e u s i n g c h a r a c t e r i s t i c s, i.e.
specifying the period of time, such as days, months or
particular intervals, when the card is valid of access or access and use,
a r e a u s i n g c h a r a c t e r i s t i c s, i.e.
specifying the area processing, for example CAD, book-keeping, word-processing etc. to which access or access and use are permitted.
l e v e l u s i n g c h a r a c t e r i s t i c s, i.e.
relating to the level within a certain area of use, for example erasure, copying, opening of new documents etc, to which access and use are permitted.
Since the card comprises using characteristics, the card obtains a watching function and becomes a controller card which can retain the possessor from unauthorized use of the computer. Thereby, the use of the computer or hardware
whereto the controller card is connected can for example be controlled so that the possessor will not obtain access in unauthorized time, date or month, during periods of
vacation etc If the competence or position or the like of an employee is changed, the controller card is exchanged.
Thereby the competence and the access to the data processing will be administered in a very simple manner. Additionally, the use of the card produces an activation of the memory unit of the processing register, which thereby documents the identity of the user, the processing time, the
operations carried out and the time.
Using characteristics provided in the card opens up a
novel perspective with respect to security and integrity in a computerized society.
Existing cards with identifying codes from banking automatons and other automatons, as well as identifying cards for computers, have had great deficiencies, since these cards can be used by others at an other point of time or because of the fact that several persons have access to the same
identifying card. The problem is that it is not possible to show what each individual user has done. The present system permits an identification which gives access to the use of the computer, but it is not checked physically that the
user has authority to make use of the computer at certain times, certain dates or the like.
When the user inserts his controller card in the reading unit, his identifying code is read. If this is correct he is
requested to give his individual code whereupon the possessor of the controller card indicates his individual code. If this individual code corresponds to the identifying code the possessor has identified himself. After this identification the use characteristics or reference characteristics are read whereupon access or access and use are permitted.
Figure 2 shows schematically the controller card with associate reading unit according to the invention. The controller card 5 is used in co-operation with a reading unit 6 connected to a key-board 7. The reading unit 6 with associated key-board 7 are connected to a processor 8, a memory unit and to the input/output characteristicssystem. These are connected to an I/O identifying system where the identifying code of the individual is read whereupon a specific code for the individual is entered and checked to correspond to the identifying code by the identifying circuit.
The memory unit comprises directories connected to an operating register memory unit 10 which records the time of use, the operations performed, when and by whom. Figure 3 shows schematically the sequence of operations
when a controller card is inserted into the reading unit.
When the controller card is inserted in the associated
reading unit the identifying code is checked whereupon the individual code is requested. Upon agreement with the
entered individual code with the identifying code the
computer or the like is opened and access or access and
use thereof are controlled in accordance with the limitations and directions of the using and/or reference characteristics. These using and reference characteristics comprise characteristics for time, date, area, level etc.
An operating register memory unit co-operates with the
reading and different directories so that the whole sequence of events is recorded. Access is now granted according to the references and directions included in the formatted use and reference characteristics. Upon insertion of the controller card and identification and acceptance the using and/or
reference characteristics are read. When the card includes for example the temporal characteristics
t1 = 8.00
t2 = 16.00
the possessor will have access or access and use of the
computer or the like between 8.00 and 16.00.
If there are only area characteristics its using and/or
reference characteristics are read whereupon the authorized area is opened: for example Cad/cam directory, word-processing, calculation, book-keeping etc. The area characteristic can be for example invoicing in which case this area is opened.
Invoicing may be a directory for invoicing for services.
When the invoicing directory has been opened, access can thus be limited to this area alone.
Level characteristics relate to limitations within the
operating area.. In the example of invoicing it may be restrictions for example only to open up new files, i.e. write, invoice new services, or only to update in existing files.
All activities are recorded in the memory unit for the operating register with the associated time when they were carried out. Access is controlled according to the using and/or reference characteristics under constant surveillance which is carried in co-operation with an input/output system. This input/
output system is a surveillance system which is active
in the background.
If the user tries to gain access to the operative system or in any other way attempts to enter any other areas than
the authorized, the I/O system will prevent access and
the attempt to gain access to the operative system or the like will be recorded.
In hospitals, government offices and the like it will be
possible by means of c card to obtain directly the use of the computer for a certain duty, such as for example
retrieving, reading, updating journals and the like. The
integrity will be considerably greater than today. The
persons performing the work will also be recorded constantly. It will not be recorded in the program which person has which authority; in other words no programmer knows about the
person who is authorized within a certain area. Each possessor has knowledge only of his own and/or reference characteristics. Thus the controller card gives a very good secrecy and integrity protection and is moreover particularly easily administered. When amendments are required with respect to the access
only the controller card has to be exchanged. Thus it will no longer be necessary to program the competence in the
computer. It will not be necessary to disclose which duties each person has. In each controller card using and/or reference characteristics are included. In this manner a great flexibility has been obtained.
To the time and date using characteristics area and level using and/or reference characteristics are added. Thus the control is total in all respects. After the identity has been checked the possessor can use, gain access to data or the like only within a given area characteristic. The area
characteristic permits access to the associated directory according to the read out level characteristic. The input/ output system constantly carries surveillance of the use of the card so that no transgression occurs. Attempts at transgression are recorded and may release alarm of report.
The input/output system permits the establishment of a
operation memory register. If a controller card includes a reference characteristic to another controller card, access or access and use of the computer or the like is subjected to a further restriction which is included in the reference characteristic. This may be for example that the possessor of the card has access only to the single journal, that of the card
possessor himself, the file of the banking card possessor himself, or that access or access and use are permitted only if some other person has given his permission by
inserting his card.
If the computer is provided with two reading units, this may mean that it is desired to have the using and reference characteristics of one controller card connected to the reference characteristics of another controller card and that checking of the reference characteristics takes place simultaneously before the input/output system gives access according to the restrictions in the reference characteristic or characteristics. In this manner further strengthening of the control has been included. The reference characteristics may be used where double check is necessary, such as opening a strong-room or the like.
The invention is not-limited to the above description, but many use characteristics and reference characteristics can be added. The number of reference characteristics and reading units can be multiplied.

Claims

CLAIMS .
1. Card comprising an identifying code adapted to co-operate with an associated reading unit provided in a computer or the like or connected to controlling means
characterized in that it comprises at least one use
characteristic or reference characteristic according
to which access or access and use is permitted in cooperation with an input/output characteristic system.
2. Card according to claims 1 and 2 characterized in that
the input/output characteristic system is a discriminating operative system adapted to co-operate with the reading unit to constantly check and make sure that the controller card is used in accordance with directions and restrictions connected to the use and/or reference characteristics read by the reading unit.
3. Card according to claims 1 - 3, characterized in that the use and/or reference characteristics are formatted and/or crypto coded and permit a direct access to a permitted area, document or the like or an indirect access by checking the use and/or reference characteristics in an index register which comprises the sense of each characteristic.
4. Card according to claims 1 - 4, characterized in that the use and/or reference characteristics are directions and restrictions according to which access or access and use are permitted and that they are digitalized, bar coded or the like and arranged to be read in a corresponding reading unit.
5. Card according to claims 1 - 5, characterized in that the use and/or reference characteristics are directions and restrictions arranged to co-operate with at least one other controller card whereupon access or access and use are permitted for at least one of the controller card possessors.
6. Card according to claims 1 - 6, characterized in that
it includes at least one use and/or reference characteristic and that the sense and meaning of the characteristics are read in a reading unit, whereupon the input/output system requests the insertion of a second controller card, whereby the use and reference characteristics are
controlled, and access to or access to and use of a
single file, document or the like is permitted.
7. Card according to claims 1 - 7, characterized in that the
use characteristics include at least one time characteristic, date characteristic, area characteristic, level characteristic etc, and that the time characteristic specifies a temporal frame for access or access and use, and that the date
characteristic specifies a period of time for access or access and use, and that the area characteristic specifies the operating area for access or access and use and that the level characteristic specifies restrictions in the operation within an operating area for access or access and use.
PCT/SE1990/000142 1989-03-13 1990-03-05 Controller card and associated reading unit WO1990010919A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
NO91913487A NO913487L (en) 1989-03-13 1991-09-05 CONTROL CARDS AND RELATED READING UNIT.
FI914283A FI914283A0 (en) 1989-03-13 1991-09-12 OEVERVAKNINGSKORT OCH DAERTILL HOERANDE LAESENHET.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE8900864A SE463484B (en) 1989-03-13 1989-03-13 CONTROL CARD WITH INTERACTION WITH RELATED READING UNIT
SE8900864-3 1989-03-13

Publications (1)

Publication Number Publication Date
WO1990010919A1 true WO1990010919A1 (en) 1990-09-20

Family

ID=20375312

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1990/000142 WO1990010919A1 (en) 1989-03-13 1990-03-05 Controller card and associated reading unit

Country Status (7)

Country Link
EP (1) EP0464103A1 (en)
JP (1) JPH04505226A (en)
AU (1) AU5336890A (en)
CA (1) CA2049030A1 (en)
FI (1) FI914283A0 (en)
SE (1) SE463484B (en)
WO (1) WO1990010919A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE467759B (en) * 1991-09-20 1992-09-07 Lennart Eriksson PROCEDURE AND SYSTEM FOR MONITORING TIME OR PASSENGER CONTROL

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3866173A (en) * 1973-10-02 1975-02-11 Mosler Safe Co Access control system for restricted area
US4095739A (en) * 1977-08-26 1978-06-20 A-T-O Inc. System for limiting access to security system program
US4148012A (en) * 1975-09-26 1979-04-03 Greer Hydraulics, Inc. Access control system
GB2154344A (en) * 1984-02-13 1985-09-04 Nat Res Dev Apparatus and methods for granting access to computers
WO1988003287A1 (en) * 1986-10-24 1988-05-05 Harcom Security Systems Corporation Computer security system
US4795890A (en) * 1987-02-02 1989-01-03 Light Signatures, Inc. Device authentication system for on and off line use

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3866173A (en) * 1973-10-02 1975-02-11 Mosler Safe Co Access control system for restricted area
US4148012A (en) * 1975-09-26 1979-04-03 Greer Hydraulics, Inc. Access control system
US4095739A (en) * 1977-08-26 1978-06-20 A-T-O Inc. System for limiting access to security system program
GB2154344A (en) * 1984-02-13 1985-09-04 Nat Res Dev Apparatus and methods for granting access to computers
WO1988003287A1 (en) * 1986-10-24 1988-05-05 Harcom Security Systems Corporation Computer security system
US4795890A (en) * 1987-02-02 1989-01-03 Light Signatures, Inc. Device authentication system for on and off line use

Also Published As

Publication number Publication date
CA2049030A1 (en) 1990-09-14
JPH04505226A (en) 1992-09-10
EP0464103A1 (en) 1992-01-08
SE463484B (en) 1990-11-26
SE8900864D0 (en) 1989-03-13
FI914283A0 (en) 1991-09-12
AU5336890A (en) 1990-10-09
SE8900864L (en) 1990-09-29

Similar Documents

Publication Publication Date Title
US5629508A (en) Dual smart card access control electronic data storage and retrieval system and methods
US7475812B1 (en) Security system for access control using smart cards
US4885788A (en) IC card
JP2837813B2 (en) Method for controlling access to information, interface device, and personal identification and information storage element
CA2472195A1 (en) System and method of reading a security clearance card
US20060059365A1 (en) Facility security with optical cards
US20090140045A1 (en) PIV card model # 6800
US20120131657A1 (en) Apparatus and Method for Authenticated Multi-User Personal Information Database
JPH087720B2 (en) Area access method for IC cards for multiple services
DK0614559T3 (en) Person identification devices and access control systems
EP0614159A1 (en) Ic card
JP2003091456A (en) Personal electronic health file system protected by data destruction or illegal reading preventing countermeasures
US20090133111A1 (en) System for centralizing personal identification verification and access control
EP0237529A1 (en) Distributed data system for medical records
WO2000026823A9 (en) A system for protection of unauthorized entry into accessing records in a record database
WO1990010919A1 (en) Controller card and associated reading unit
WO1990005965A1 (en) Process for identifying a person for access, on the one hand, to a computer installation, and, on the other hand, to premises and/or computer-controlled equipment, on the basis of the person's characteristic odour
US6380843B1 (en) Secured access checking system enabling the automatic transfer of entitlement to produce keys
JPH06314288A (en) Security system of information control system
JPS6272049A (en) Resource using control method in information processing system
RU2130643C1 (en) Method for accessing data in database management system
JPS61117375A (en) Entrance and exit control system
JPS62231352A (en) Ic card
JP2764406B2 (en) IC card access control system
WO1997023846A1 (en) A security system for the recognition of data, in particular personal identity data

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BR CA FI JP KP KR MC NO SU US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB IT LU NL SE

WWE Wipo information: entry into national phase

Ref document number: 1990905255

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2049030

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 914283

Country of ref document: FI

WWP Wipo information: published in national office

Ref document number: 1990905255

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1990905255

Country of ref document: EP

ENP Entry into the national phase

Ref country code: CA

Ref document number: 2049030

Kind code of ref document: A

Format of ref document f/p: F