Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dennis G. Abraham is active.

Publication


Featured researches published by Dennis G. Abraham.


Ibm Systems Journal | 1991

Transaction security system

Dennis G. Abraham; George M. Dolan; Glen Paul Double; James Virgle Stevens

An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers. Users of the system are issued with intelligent secure bank cards, which include a microprocessor, ROS and RAM stores. The POS includes a personal key (KP) and an account number (PAN) stored on the card when the issuer issues it to the user. Users also have a personal identity number (PIN) which is stored or remembered separately. A transaction is initiated at a retail terminal when a card is inserted in an EFT module connected to the terminal. A request message including the PAN and a session key (KS) is transmitted to the issuers data processing center. The issuer generates an authentication parameter (TAP) based upon its stored version of KP and PIN and a time variant parameter received from the terminal. The TAP is then returned to the terminal in a response message, and based upon an imputed PIN, partial processing of the input PIN and KP on the card a derived TAP is compared with the received TAP in the terminal. A correct comparison indicating that the entered PIN is valid. The request message includes the PAN encoded under the KS and KS encoded under a cross-domain key. Message authentication codes (MAC) are attached to each message and the correct reception and regeneration of a MAC on a message including a term encoded under KS indicates that the received KS is valid and that the message originated at a valid terminal or card.


Ibm Systems Journal | 1991

A key-management scheme based on control vectors

Stephen M. Matyas; An V. Le; Dennis G. Abraham

This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme—built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products—has been implemented in the newly announced IBM Transaction Security System.


Archive | 1991

Transaction system security method and apparatus

Dennis G. Abraham; Steven George Aden; Todd W. Arnold; Steven William Neckyfarow; William S Rohland


Archive | 1992

User defined function facility

Dennis G. Abraham; Daniela Henningsmeyer; John Matthew Hudson; Donald B. Johnson; An V. Le; Stephen M. Matyas; James Virgle Stevens


Archive | 1992

Secure computer system having privileged and unprivileged memories

Dennis G. Abraham; Steven George Aden


Archive | 1985

Secure component authentication system

Dennis G. Abraham; Glen Paul Double; Steven William Neckyfarow


Archive | 1988

Secure management of keys using control vectors

Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh


Archive | 1989

Data cryptography operations using control vectors

Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh


Archive | 1989

Secure management of keys using extended control vectors

Stephen M. Matyas; Dennis G. Abraham; William C. Arnold; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Steve R. White; John D. Wilkins


Archive | 1989

Data cryptography using control vectors

Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh

Researchain Logo
Decentralizing Knowledge