Wireless device for verifying identification

作者: Leslie D. Servi

DOI:

关键词:

摘要: A wireless communication device using a verification protocol for verifying the identification of by network control station in presence eavesdroppers is disclosed. Upon receiving call request from claiming particular identity, sends mask consisting binary digits random order. The expected to respond this with reply that consistent both password contained and mask. Specifically, bits are "ANDed" result transmitted as reply.

参考文章(7)
William T. Gregor, Michael D. Sherwood, Richard W. Roth, Kenneth D. Snyder, Saddah El-Kilani, Data scrambling system and method ,(1983)
Larry C. Puhl, Richard A. Comroe, Robert W. Furtaw, Tracey L. Cantarutti, Portable authentification system ,(1990)
Goldman Alvin, Pruden Gerald A, Nissman Irwin J, Secure personnel access control system ,(1969)
George Bush, Estelle Ross, Robert Belfield, Portable pin card ,(1990)
Robert D. Lee, Hal Kurkowski, ID protected memory with a maskable ID template ,(1988)
Donald R. Moseley, Robert D. Drew, Identity verification method and apparatus ,(1985)