scispace - formally typeset
Search or ask a question

Showing papers on "Password published in 1980"


Patent
19 Jul 1980
TL;DR: In this paper, a user inputs a user's name and specific password to keyboard 1 to send a connection request to system controller 2. Controller 2 outputs the user name and password to user discriminator 3.
Abstract: PURPOSE:To fix and shorten the time of access to a command by constituting a hierarchy group of users which can use a system on the basis of attributes of users and then by making them to correspond to a group of usable commands. CONSTITUTION:A user inputs a user's name and specific password to keyboard 1 to send a connection request to system controller 2. Controller 2 outputs the user's name and password to user discriminator 3. Discriminator 3 receives user list 4 stored in an external memory unit to attain the matching of the user's name and check on the password from controller 2 and when the both agree, the information is outputted to controller 2. Controller 2 moves the control to command controller 6 and the user inputs a command. Controller 6 collates command list 7 with the input command and when the both agree, information on the group of users corresponding to the command is extracted. This information and user information stored in controller 2 are AND-ed and the execution of the command from the user is permitted.

8 citations


Patent
19 Nov 1980
TL;DR: In this article, the secret number of a computer user and the master key of an organization to which the user belongs are given to the manager of the organization to enable the use of the computer system.
Abstract: PURPOSE:To utilize a computer system and to achieve effective secrecy security in an easy way by inputting both the secret number of computer user's and a master key given to the manager of an organization to which the user belongs. CONSTITUTION:A secret number 15 is assigned fixedly to a computer system user 14, and algorithm by which a variable master key 13 a computer system has individually is generated is given to the manager 12 of an organization where the computer system user 14 belongs. For the use of the system, the user 14 is informed of the variable master key 13 by the manager 12 and inputs the secret number 15 and the key as the password of a program to a terminal equipment 11 at an input 17 together with a transaction TID and data to be processed, thereby using the computer system.

5 citations