throbber
United States Patent [19J
`Lang
`
`[11] Patent Number:
`[45] Date of Patent:
`
`5,065,429
`Nov. 12, 1991
`
`[76]
`
`[54] METHOD AND APPARATUS FOR
`PROTECTING MATERIAL ON STORAGE
`MEDIA
`Inventor: Gerald S. Lang, 812 Downs Dr.,
`Silver Spring, Md. 20904
`[21] Appl. No.: 626,409
`[22] Filed:
`Oct. 14, 1990
`
`[ 63]
`
`Related U.S. Application Data
`Continuation of Ser. No. 358,263, May 30, 1990, aban(cid:173)
`doned, which is a continuation-in-part of Ser. No.
`331,800, Apr. 3, 1989, abandoned.
`Int. CI.s ............................................... H04K 1/00
`[51]
`[52] U.S. CI •.......................................... 380/25; 380/4;
`380/23
`[58] Field of Search ................... 380/4, 23, 24, 25, 49,
`380/50; 364/246.6, 246.9, 969, 969.3, 969.4
`References Cited
`U.S. PA TENT DOCUMENTS
`
`[56]
`
`4,349,695 9/1982 Morgan et al. ....................... 380/25
`4,471,163 9/1984 Donald et al. ........................ 380/25
`4,599,489 6/1986 Cargile .................................. 380/25
`4,652,990 3/1987 Pailen et al. .......................... 380/25
`4,677,434 6/1987 Fascenda .............................. 380/23
`4,713,753 12/1987 Boebert et al. ....................... 380/25
`4,731,841 3/1988 Rosen et al. .......................... 380/23
`4,740,890 4/1988 Tobin ...................................... 380/4
`4,747,139 5/1988 Tagfe ...................................... 380/4
`4,785,361 11/1988 Brotby .................................... 380/4
`4, 799,258 11/1989 Davies ................................... 380/23
`4,862,501 8/1989 Kamitake et al. .................... 380/50
`4,864,616 9/1989 Pond et al. ............................ 380/25
`4,888,798 12/1989 Earnest ................................... 380/4
`
`4,930,073 5/1990 Cina, Jr ................................. 380/23
`4,941,175 7/1990 Enescu et al. .......................... 380/4
`6,590,470 5/1986 Koenig .................................. 380/49
`
`Primary Examiner-Thomas H. Tarcza
`Assistant Examiner-Tod Swann
`Attorney, Agent, or Firm-Hoffman, Wasson & Gitler
`ABSTRACT
`[57]
`A method and apparatus for granting selected access to
`material such as data and databases, messages and other
`textual information, graphs, tables, maps, facsimiles
`(FAX) of all manner of transmitted materials, audio
`such as speech and music, video, images, and photo(cid:173)
`graphs, provided on storage media utilizing information
`encoded in the storage media. The storage media are
`included in one or more reading devices associated with
`a computer. A storage accessing device, such as a smart
`card, is used in conjuction with the computer to deter(cid:173)
`mine whether access to a particular user to specific
`storage media is granted. The storage media can be
`sub-divided into a plurality of logical zones and access
`to all or a portion of the material on the storage media
`is granted based upon the logical zones to which the
`user is allowed access. Infonnation provided on the
`storage media would include an index table listing the
`security identification code, the logical zones to which
`a particular user is assigned as well as a personal secu(cid:173)
`rity key used in conjunction with a personal· security
`key provided in the smart card. The interaction be(cid:173)
`tween the user's personal accessing device and the index
`table provided on the storage media detennine if access
`is granted as well as access privileges accorded to the
`user.
`
`24 Claims, 4 Drawing Sheets
`
`SECURITY
`IDENTIFICATION CODE
`. . . . - - - - " ' - - - -
`SYSTEM
`ZONE
`ACCESS
`IDENTIFICATION
`LOGICAL ZONES CODES
`CODES
`1,9,26
`01
`
`000:000
`
`PERSONAL
`SECURITY
`KEYS
`
`1,9,26,911
`
`02
`
`33
`
`27
`
`017°144
`
`.
`.
`
`000,000
`
`02iu2
`
`000,000
`'
`006104
`
`10, 11
`
`33
`
`000010
`
`10,11,19
`
`34
`
`46,47,48,54
`
`11
`
`I
`I
`
`000011
`
`.
`
`550,000
`
`I
`
`550003
`
`300,000
`'
`3081156
`
`xx xx .
`xx'xx
`xx:xx
`I xxxx
`.
`xxxx
`xx' xx
`. I
`xx xx
`xx xx
`.
`xx xx
`xx'xx
`xx xx
`xx'xx
`
`I
`
`I
`
`~
`
`~
`
`M.
`
`~
`
`'•
`
`IPR2017-00430
`UNIFIED EX1010
`
`

`

`HUMAN
`READER
`
`14 ........... X---
`
`;~
`,
`
`12,
`
`PERSONAL [
`ACCESSING
`DEVICE
`
`FIG. 1
`
`18
`
`20
`
`0
`
`22
`
`22
`
`COMPUTER
`KEYBOARD
`
`AUTOMATIC
`READER
`WITH
`KEYPAD
`
`COMPUTER
`OR
`INFORMATION
`PROCESSING
`DEVICE
`
`STORAGE
`MEDIUM
`READER
`

`
`---
`
`STORAGE
`MEDIUM
`READER
`

`
`10/
`
`18
`
`~ •
`00
`•
`"'C
`~
`"""'"
`
`('D = """'"
`
`z
`0
`~
`""""
`~
`""""
`\C
`\C
`""""
`
`00
`
`=-ti>
`.....
`ti>
`"""" 0
`......
`.fl>
`
`UI
`.,.
`0
`~
`UI
`.,.
`~
`N
`\0
`
`

`

`U.S. Patent
`U.S. Patent
`
`Nov. 12, 1991
`Nov. 12, 1991
`
`Sheet 2 of 4
`Sheet 2 of 4
`
`5,065,429
`5,065,429
`
`Zu.. ~~ Oo GJ[j
`C") GG
`~~ G G
`[j[J
`
`C\I
`
`~ rt
`
`w
`
`- :
`
`c
`u
`
`

`

`INPUT
`PERSONAL
`IDENTIFICATION
`CODE INTO
`PERSONAL
`ACCESSING
`DEVICE ( PAD)
`
`FIG.3
`
`I
`
`PERSONAL
`ACCESSING DEVICE
`DISPLAYS SECURITY
`IDENTIFICATION
`CODE (SIC)
`
`SIC ENTERED I
`
`INTO COMPUTER
`
`I
`
`COMPUTER VERIFIES
`BONAFIDE SIC
`ENTRY
`
`RESPONSE TO
`RANDOM NUMBER IS
`ENTERED INTO
`COMPUTER
`
`RESPONSES ARE
`COMPARED
`
`l
`
`ACCESS TO
`LOGICAL ZONES IS
`GRANTED IF
`RESPONSES MATCH
`
`I
`
`-..
`
`COMPUTER
`RETRIEVES
`SECURITY KEY
`PAIRED TO SIC
`I
`COMPUTER
`GENERATES AND
`DISPLAYS RANDOM
`NUMBER
`I
`RANDOM NUMBER
`IS INTRODUCED TO PAD
`AS A CHALLENGE
`CODE
`
`I
`
`ALGORITHM IN PAD
`AND COMPUTER
`OPERATE ON RANDOM
`NUMBER
`
`DOM NUMBER IS
`DISPLAYED ON PAD
`
`RESPONSE TO RAN· -l
`
`~ •
`7J'J.
`•
`'"'C
`~
`t"'t-
`=
`n>
`t"'t-
`
`z
`0
`~
`lo-&
`~N
`lo-&
`\0
`\0
`lo-&
`
`rJ1
`
`=-tD
`....
`tD
`w
`0 .....
`.J:o.
`
`(JI
`-..
`
`0 °' (JI
`
`-..
`~
`N
`\0
`
`

`

`U.S. Patent
`
`Nov. 12, 1991
`
`Sheet 4 of 4
`
`5,065,429
`
`FIG .. 4
`STORAGE MEDIUM
`INDEX TABLE
`
`ZONE
`ACCESS
`LOGICAL ZONES CODES
`1,9,26
`01
`
`SECURITY
`IDENTIFICATION CODE
`
`SYSTEM
`IDENTIFICATION
`CODES
`000000
`•
`087144
`
`I
`
`I
`
`.
`
`I
`
`PERSONAL
`SECURITY
`KEYS
`xx xx
`•
`•
`xx xx
`xx xx
`..
`xx xx
`xx xx
`xx xx
`xx xx
`xx xx
`xx xx
`•
`xx xx
`xx xx
`•
`•
`I xx xx
`
`I
`I
`
`I
`I
`I
`
`I
`I
`I
`
`I
`I
`
`1,9,26,99
`
`02
`
`000000
`•
`029142
`
`33
`
`10,11
`
`10,11,99
`
`46,47 ,48,54
`
`-
`36
`
`27
`
`33
`
`34
`
`81
`
`32
`
`000000
`
`006104
`
`I
`I
`I
`
`000010
`•
`000018
`
`I
`I
`
`550000
`•
`I
`I
`550003
`
`300000
`3081156
`
`I
`I
`
`34
`
`38
`
`

`

`1
`
`5,065,429
`
`2
`only a limited portion of the material provided on the
`storage media. This is important since only a single
`master print of any entire file may be manufactured and
`distributed to various personnel with limited access of
`5 material granted to each of the personnel. If limiting
`access was not possible, various storage devices and
`quite possibly many more storage devices, must be man(cid:173)
`ufactured and given to each of the personnel, based
`upon the section of the material to which each individ-
`10 ual has been granted access.
`Similarly, no device was discovered in which the
`storage media, provided with software program infor(cid:173)
`mation thereon, is used to allow access to only a portion
`of the program information, or one or more programs
`from a plurality of programs.
`
`METHOD AND APPARATUS FOR PROTECTING
`MATERIAL ON STORAGE MEDIA
`
`This is a continuation of copending application Ser.
`No. 07/358,263 filed on May 30, 1990 now abandoned
`which is a continuation -in-part of 331,800 filed Apr. 3,
`1989 now also abandoned.
`
`BACKGROUND OF THE INVENTION
`In the approximately 45 years since the development
`of the first crude computer, our society has seen a vir(cid:173)
`tual explosion of information storage as well as informa(cid:173)
`tion processing machines. With the advent of the per(cid:173)
`sonal computer, this information explosion has perme- 15
`ated virtually every facet of our daily lives. In the busi(cid:173)
`ness community, personal computers are used to store
`and process a large amount of material which was pre(cid:173)
`viously maintained in paper files. Similarly, many
`homes now include a personal computer for the storage 20
`of personal data as well as the processing of other types
`of information.
`During the infancy of the computer industry, when
`only very large companies or the government were able
`to afford to purchase and maintain relatively large 25
`mainframe computers provided with bulky storage me(cid:173)
`dia, security for access to this storage media was gener(cid:173)
`ally maintained by limiting access to the area in which
`the computer was stored as well as access to the com(cid:173)
`puter itself. Typically, an authorized user was issued 30
`either a computer password or security card allowing
`access to the computer and any files included in the
`storage media utilized with the company. In other
`words, the person attempting to gain access to the com(cid:173)
`puter must possess the knowledge and/or the tools of 35
`the authorized user. However, used .in the context of
`today's smaller personal computers and the utilization
`of relatively small, portable storage media, this type of
`security program has proven to be inadequate. For
`example, if the password or security card would be 40
`stolen from the authorized personnel, computer access
`to an authorized person would be granted. Addition(cid:173)
`ally, since the storage media is relatively small in size
`and, due to the need for allowing access to the material
`provided on this storage media to various authorized 45
`personnel remote from one another, it is important that
`a system be developed in which the storage media can
`be sent to various locations without the security of the
`material on the media being compromised.
`In this context, several methods have been developed 50
`for protecting access to software programs stored on
`storage media such as read-only-memory (ROM). Ex(cid:173)
`amples of these devices are discussed in U.S. Pat. Nos.
`4,757,468 issued to Domenik et al and 4,740,890 issued
`to William. Both of these patents describe apparatuses 55
`for protecting software programs which will be distrib(cid:173)
`uted on a magnetic disk or similar storage media. Verifi(cid:173)
`cation routines provided directly on the storage media
`are utilized to protect access to the entire program.
`However, no device has been developed in which stor- 60
`age media itself is utilized to protect non-program infor(cid:173)
`mation, such as textual material, data, graphs, or other
`digitally stored material. Furthermore, since various
`personnel may be granted access to only selective mate(cid:173)
`rial which would be on the storage disk, the scenarios 65
`described with respect to the Domenik et al and Wil(cid:173)
`liam patents would not be applicable to an instance in
`which various personnel would be granted access to
`
`SUMMARY OF THE INVENTION
`The deficiencies of the prior art are overcome by the
`present invention which is directed to a method and
`system for granting complete or limited access to infor(cid:173)
`mation stored in a storage medium or media utilizing
`information physically stored in the storage medium or
`media. The particular storage medium or media are
`included in an appropriate reader which is connected to
`a standard personal computer, minicomputer, or a main(cid:173)
`frame computer having a means for entering personal
`and system access data therein, such as a keyboard. The
`storage medium can be any permanent or erasable item
`such as an optical disk, a CD ROM, a WORM, a floppy
`disk, a disk pack, a smart card, an integrated circuit
`card, an optical card, as well as special items such as a
`BERNOULLI box disk, or any other type of storage
`medium. However, for simplicity sake, we shall de(cid:173)
`scribe the present invention with respect to a CD ROM
`storage medium. Additionally, a storage accessing de(cid:173)
`vice (used interchangeably herein with the following
`terms- personal accessing device and smart card) pro(cid:173)
`vided with an encrypted or non-encrypted personal
`security key as well as personal identification code is
`included to allow an individual access to the storage
`medium or media. Furthermore, for ease of understand(cid:173)
`ing the present invention, we shall describe the storage
`accessing device with respect to a SMART card that
`does not require an electronic, optical, capacitive or
`magnetic reader to receive or transmit personal and
`system data.
`Initially, when the CD ROM is mastered, the infor(cid:173)
`mation storage portion of the CD ROM is broken up
`according to a predetermined classification ·system and
`stored in various logical zones, each of which contains
`a discrete set of databases or other material therein.
`There may be one or more logical zones recorded on
`the CD ROM. Users, based on theii- need to know, as
`well as the sensitivity of the material to be stored on the
`CD ROM, are accorded access privileges that corre(cid:173)
`spond to previously designated logical zones. Based on
`an organization's or person's storage classification sys(cid:173)
`tem, material are categorized and stored in the corre(cid:173)
`sponding logical zones when the CD ROM is manufac(cid:173)
`tured. Therefore, for each user being granted access
`privileges, a determination is made as to which logical
`zones each particular user would be allowed access.
`Based upon this determination, each user is assigned a
`particular zone access code (ZAC) which is translated
`into corresponding logical zones using an index table
`stored in the CD ROM. At the same time, paired to the
`ZAC, is a list of authorized system identification codes,
`each with its assigned unique personal security key
`
`

`

`5,065,429
`
`3
`(SK). Each authorized user is assigned a ZAC and a
`unique system identification code. For extremely secure
`applications, the intended user's biometric coded infor(cid:173)
`mation can be paired with the personal security key.
`The ZAC, the system identification code, the personal
`security key code, plus the possible use of biometric
`coded information, as well as the logical zones assigned
`to the ZAC for each user or class of user, is included on
`the CD ROM in the form of an index table when it is
`manufactured.
`When an individual wishes to gain access to the CD
`ROM, the user would correctly enter his particular
`personal identification code in the aforementioned
`smart card which would then display both the ZAC as
`well as the system identification code in either en- 15
`crypted or non-encrypted form. Th_e user, utilizing a
`keyboard, would enter this code into the computer
`which then compares the decrypted or encrypted codes
`obtained from both the smart card and CD ROM and if
`a match is obtained, would then verify that this particu- 20
`Jar system ID code is proper and that material this
`accessor seeks access to is stored on the storage medium
`or media. The computer then retrieves the paired per(cid:173)
`sonal security key (SK). The computer would then
`generate a random number which is displayed upon its 25
`screen to serve as a challenge to the personal accessing
`device (smart card). The user would input this random
`number into the smart card via its keypad. The smart
`card as well as the computer are provided with a partic(cid:173)
`ular encryption/decryption algorithm (alternately a 30
`security microprocessor chip). Both the computer and
`the smart card would simultaneously compute a re(cid:173)
`sponse to the challenge code (random number) and this
`response is displayed on the smart card screen. This
`displayed response is then entered into the computer 35
`through its keyboard to determine .whether there is a
`match. If a match is shown to have occurred, the com(cid:173)
`puter will then display all the logical zones and material
`names therein to which access privileges have been
`granted and allow the user access to these logical zones 40
`provided in the storage media.
`Further, the system then releases the system security
`key (SSK) which is transferred to the information pro(cid:173)
`cessing device's volatile random access memory
`(RAM) or to the security microprocessor chip board 45
`installed in the information processing device. The sys(cid:173)
`tem security key is used to decrypt all the encrypted
`material transferred from the CD ROM. The informa(cid:173)
`tion processing device's copy of the system security key
`is destroyed when the information processing device 50
`loses its power or if said device concludes its CD ROM
`activities and is then used for other applications. Each
`CD ROM has its own system security key recorded on
`it which would be retrieved by the information process(cid:173)
`ing device for use during search and retrieval activities 55
`when authorized user access is established.
`The CD ROM search and retrieval program can be
`stored either on items such as floppy disks to be used at
`the time of CD ROM operation, on the information
`processing device's permanent memory, or on the CD 60
`ROM.
`If a type of contact or contactless smart card is used
`which requires a non-human reader, the operation is
`very similar to the activities described above. The per(cid:173)
`sonal identification code can be entered via the com- 65
`puter keyboard or via a keypad on the card reader. The
`entry of the correct personal identification code enables
`the smart card to start transmission and the paired ZAC
`
`4
`and system identification codes which are stored in the
`smart card microcomputer's EPROM or EEPROM are
`transmitted to the computer. Based on the transmitted
`ZAC, the index table on the storage media is searched
`5 to determine if there is a match. If the corresponding
`ZAC is not stored in the index table of the storage
`medium or media, a message is displayed on the com(cid:173)
`puter screen that access will not be granted. If there is
`a match of the ZAC's, then the associated system identi-
`10 fication codes stored on the storage medium or media
`are accessed until an exact match is found. If no match
`is found, the accessor will not be granted access. If an
`exact match is found, the personal security key paired
`with the user's system identification code is retrieved by
`the computer and is used to operate upon a randomly
`computer generated number. At the same time, the
`random number is also transmitted to the smart card
`reader which inputs the number to the smart card. The
`authorized user's smart card has both an identical en(cid:173)
`cryption/ decryption algorithm or microprocessor chip
`and personal security key to that of the information
`processing device and the CD ROM. The smart card
`operates on the random number using its internally
`stored personal security key and transmits the result
`through the card reader to the computer (information
`processing device). The information processing device
`uses an encryption/decryption algorithm or micro(cid:173)
`processor chip to compare the results of both operations
`upon the random number. If a match occurs, the acces(cid:173)
`sor's authorized status is ascertained and the predeter(cid:173)
`mined access privileges are granted.
`With respect to software program application, while
`prior art devices include verification routines provided
`on the storage media to protect access to the entire
`program, no prior art device, however, limits access to
`only a portion of this program, or access to one pro-
`gram from two or more stored programs. Additionally,
`access can be provided to one or more programs from a
`plurality of programs. To prevent unauthorized access,
`the storage accessing device can be programmed to
`permit only one download or a specific number of
`downloads of the portion of the program or one or
`more programs from a plurality of programs on the
`media allowed access by the user.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`These and. other advantages of the objects of the
`invention can be understood from the following de(cid:173)
`tailed description of a preferred embodiment of the
`invention described in conjunction with the drawings
`wherein:
`FIG. 1 is a block diagram of the system of the present
`invention;
`FIG. 2 is a diagram of a typical personal· accessing
`device;
`FIG. 3 is a flow diagram of a method of granting
`access to the storage media based upon the present
`invention; and
`FIG. 4 is a diagram showing a single entry in the
`index table of a storage medium.
`
`DETAILED DESCRIPTION OF THE
`DRAWINGS
`The present invention is directed to a method and
`apparatus for granting access to information such as
`data and databases, messages and other textual informa(cid:173)
`tion, graphs, tables, maps, facsimiles (FAX) of all man(cid:173)
`ner of transmitted materials, audio such as speec~ and
`
`

`

`5,065,429
`
`5
`music, video, images, photographs, or the like ,provided
`on a storage medium or media such as a CD ROM or
`the like. Contrary to most methods and devices for
`allowing access to the material provided on a storage
`medium or media, wherein access is granted to a com- 5
`puter included a storage media file, the present inven(cid:173)
`tion grants access to the storage media itself or a portion
`thereof based upon an indexed table included directly
`on the storage medium or media. The storage media,
`hereinafter a CD ROM, can be, if desired, divided into 10
`a plurality of logical zones. Based upon a user's need to
`know, access can be granted to all of the logical zones
`or a particular combination oflogical zones. Based upon
`these logical zones, the user is assigned a zone access
`code, along with a system identification code, and a 15
`personal security key. For a more secure system, bio(cid:173)
`metric coded information can also be assigned as part of
`the personal identifier. This information for each of the
`users is stored on the CD ROM along with the transla(cid:173)
`tion of each zone access code into its .corresponding 20
`logical zone(s). Additionally, each of the users is as(cid:173)
`signed a personal identification code for use with the
`smart card to corroborate the user's identity and there(cid:173)
`after enable the smart card to initiate the challenge(cid:173)
`response dialogue with the storage medium or media. 25
`Once all of the relevant information is directly pro(cid:173)
`vided for a user within the CD ROM as well as a per(cid:173)
`sonal accessing device such as a smart card, a user can
`gain access utilizing the system 10 illustrated with re(cid:173)
`spect to FIG. 1. As shown therein, access to the storage 30
`media CD ROM is provided utilizing a personal access(cid:173)
`ing device 12. This device 12 can be various configura(cid:173)
`tions of devices. As a smart card, it can be of types of
`smart card which would automatically interface with an
`automatic reader 16 connected to a computer or infor- 35
`mation processing device 20, or through the interven(cid:173)
`tion of a human reader 14 with a keyboard 18. The
`computer or information processing device would run
`the gamut from microcomputers, minicomputers to
`mainframe computers. For illustrative purposes only, 40
`we shall discuss the present invention with respect to a
`smart card 24 shown in FIG. 2 with a keypad and light
`crystal display. An ON/OFF key 26 of the smart card
`24 is depressed and the smart card is turned on. Addi(cid:173)
`tionally, it is noted that the smart card may use an en- 45
`cryption/decryption algorithm or microprocessor chip
`or any other encryption device if a security key device
`is employed with the CD ROM. Once the smart card is
`turned on and the correct personal identification code is
`entered into the smart card, and the CD ROM is in- 50
`serted into a storage media reader 22, the challenge(cid:173)
`response process is ready to begin.
`Initially, the user would input a four digit or charac(cid:173)
`ter personal identification code (PIC) into the smart
`card 24. It is noted that the exact number of digits of the 55
`PIC is not important and could consist of alphanumeric
`characters. The integrated circuit or microprocessor
`chip provided in the smart card contains the system
`identification code that will let the computer or infor(cid:173)
`mation processing device know the identity of the au- 60
`thorized user. Typical system identification codes 34 are
`shown in the illustrative storage medium index table
`with respect to FIG. 4. Although the authorized user's
`security identification code consists of a two-digit zone
`access code, and a six-digit system identification code, 65
`the exact number of digits employed, as well as the use
`of alphanumerics can be modified based upon system
`needs and preference. The code is displayed at 30 of the
`
`6
`smart card. Once the security identification code is
`displayed on the smart card 24, the accessor enters it
`into the computer or information processing device 20
`via keyboard 18. At this point, the corresponding zone
`access code is searched for in the index table to find out
`if the storage medium or media contains stored material
`for that zone's access privileges. If the corresponding
`zone access code is missing from the storage medium or
`media index table, then a message will be displayed on
`the computer or information processing device screen
`20 indicating that access is denied. If the zone access
`codes match, then the computer or information process(cid:173)
`ing device verifies that the accessor may have privileges
`to material stored on the CD ROM(s) and will look up
`the paired personal security key 38 stored on the CD
`ROM. To ensure that the security aspect of the present
`invention is as inclusive as possible, the personal secu(cid:173)
`rity key can be encrypted directly in the CD ROM. The
`zone access code 32 corresponds to the particular logi(cid:173)
`cal zones assigned to one or more authorized users. For
`example, as shown in FIG. 4, a zone access code of 33
`corresponds to the logical zone 36 portion of the index
`table indicating that logical zones 10 and 11 will be
`allowed access. Any one of the logical zones on the CD
`ROM can contain one or more databases or other mate(cid:173)
`rial. Therefore, as shown, any one of the zone access
`codes can be assigned to a user, who in turn, can be
`assigned an individualized system identification code
`associated with that zone access code from the total of
`up to 1,000,000 unique code numbers available. Cer(cid:173)
`tainly, if more user codes are required, alphanumeric
`characters can be used or the number of characters of
`the system identification codes 34 can be increased.
`A special logical zone can be set aside to control the
`downloading of data from the storage medium or me(cid:173)
`dia. As shown in FIG. 4, the zone access code 32 value
`of 01 corresponds to logical zone access privileges 1, 9,
`26. Zone access code 02 gives authorized users access to
`the same three logical zones of 1, 9 and 26, but the
`addition of logical zone 99 enables the authorized user
`to download the stored material. Without logical zone
`99 privileges, an authorized user could not perform
`downloading.
`Once the zone access code and system identification
`code are entered and accessed and matches confirmed,
`the personal security key code paired with this system
`identification code is utilized to verify the proper identi(cid:173)
`fication of the accessor.
`A random number generator provid.ed within the
`computer or information processing device 20 gener(cid:173)
`ates a random number, such as a four-digit number
`which is displayed by the computer or information
`processing device and serves as a challenge to the smart
`card 24. The user depresses the challenge key 38 and
`enters the random number into a smart card 24 using the
`keypad 28 and then depresses the enter key 40. An
`identical encryption/decryption algorithm or micro(cid:173)
`processor chip and personal security key provided in
`both the computer or information processing device 20
`as well as the smart card 24 performs an operation on
`the random number. The response to the challenge by
`the smart card is displayed and this number is entered
`into the keyboard 18. The computer or information
`processing device then compares this result with the
`result that it generated utilizing the CD ROM transmit(cid:173)
`ted personal security key which is paired to the system
`identification code. If these two results are identical,
`access to the particular logical zones corresponding to
`
`

`

`5,065,429
`
`60
`
`7
`the zone access code 32 would be allowed to that partic(cid:173)
`ular user.
`This type of accessing system would allow the CD
`ROM to be circulated among a number of authorized
`users; allowing each user access potentially to all or 5
`only a discrete portion of the information included in
`the CD ROM, according to each person's access privi(cid:173)
`leges.
`The CD ROM or any type of storage media which is
`utilized would operate in conjunction with retrieval 10
`software stored in a number of ways such as on the CD
`ROM or on the computer or information processing
`device non-volatile memory. If it is stored on floppy
`disks or other reusable media, such as the computer's
`hard disk, it can be updated as necessary to detect and 15
`deactivate outdated, duplicated or lost personal access(cid:173)
`ing devices, such as smart cards, which are presented
`for system access. An added feature could be that if a
`reported lost smart card 12 was used to gain access, and
`the computer or information processing device 20 de- 20
`termined it was a lost smart card, a "killer" challenge
`code could be displayed, which when entered into the
`smart card would deactivate the device.
`As illustrated in FIG. 1, an automatic reader 16 can
`be employed instead of manually inputting the informa- 25
`tion onto the smart card 12 or the computer keyboard
`by the human reader. In this instance, the smart card 12
`and the computer or information processing device 20
`would after the correct personal identification code is
`given, engage in its dialogue automatically to determine 30
`whether access by the accessor would be allowed.
`While the invention has been illustrated in some de(cid:173)
`tail, according to the preferred embodiments shown in
`the accompanying drawings, there is no intention to
`limit the invention to such detail. On the contrary, it is 35
`intended to cover all modification, alterations and
`equivalents falling with the spirit and scope of the ap(cid:173)
`pended claims.
`What is claimed is:
`1. A security system for granting user access to digi- 40
`tized materials provided on a storage medium or media,
`said system comprising:
`a computer system including at least one computer
`and a display screen,
`a storage medium subdivided into a plurality of man- 45
`agement control, program and user logical zones,
`each of said logical zones provided with particular
`material therein, said storage medium directly pro(cid:173)
`vided thereon with an access management control
`means for indicating which of said user logical 50
`zone on zones the user will be allowed to access
`based upon accessing information provided to the
`system by the user, said access management control
`means provided in said storage medium at a loca(cid:173)
`tion remote from, and non-contiguous with, said 55
`user logical zones;
`a reader or drive for reading the digitized material
`provided in said plurality of logical zones as well as
`said access management control means of said stor-
`age medium;
`a personal accessing device containing a security
`identification code, to enable said personal access(cid:173)
`ing device to be in communication with said com(cid:173)
`puter system for transmitting said security identifi-
`cation code to said computer system;
`wherein, said security identification code is compared
`to said access management control means provided
`on said storage medium to determine the particular
`
`65
`
`8
`user logical zone or zones to which the user is
`allowed access utilizing said display screen of said
`computer system.
`2. The security system in accordance with claim 1,
`wherein said personal accessing device is initiated by a
`correct personal identification code entered by the user.
`3. The security system in accordance with claim 1
`wherein said access management control means and
`said personal accessing device are further provided
`with a particular personal security key code associated
`with said security identification code for each autho(cid:173)
`rized user, and said computer system is further provided
`with a random number generator, both said computer
`system or alternately said storage medium and said
`personal accessing device furth~r provided with identi(cid:173)
`cal or cooperating encryption decryption algorithm for
`utilizing a number generated by said random number
`generator for determining whether user access is
`granted to one or more particular logical zones associ(cid:173)
`ated with the user's security identification code.
`4. The security system in accordance with claim 3
`wherein

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket