Method for operating a transaction execution system having improved verification of personal identification

作者: Donald J. Chesarek

DOI:

关键词: AuthorizationData processing systemTerminal (electronics)DatabaseOperator (computer programming)Identification (information)Host (network)EncryptionDatabase transactionComputer science

摘要: A transaction execution system including at least one terminal in communication with a host data processing system. the is authorized based, part, upon correspondence of personal identification entered by operator keyboard account read from an card. When not derived data, check made comparison encrypted validation data. The may, failure correspondence, communicate conditional authorization message to terminal, which enables again attempt enter correct base stores as and only double appears on lines.

参考文章(7)
May L. Gee, Robert W. Anderson, Steven F. Brock, Transaction execution system with secure encryption key storage and communications ,(1978)
William A. Boothroyd, Thomas G. Anderson, Richard C. Frey, Transaction execution system with secure data storage and communications ,(1974)
Michael R. Kronewitter, Harold K. McCune, Card validation, method and system ,(1975)
Richard A. Gorgens, Cash dispensing system ,(1975)