Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dennis G. Abraham.
Ibm Systems Journal | 1991
Dennis G. Abraham; George M. Dolan; Glen Paul Double; James Virgle Stevens
An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers. Users of the system are issued with intelligent secure bank cards, which include a microprocessor, ROS and RAM stores. The POS includes a personal key (KP) and an account number (PAN) stored on the card when the issuer issues it to the user. Users also have a personal identity number (PIN) which is stored or remembered separately. A transaction is initiated at a retail terminal when a card is inserted in an EFT module connected to the terminal. A request message including the PAN and a session key (KS) is transmitted to the issuers data processing center. The issuer generates an authentication parameter (TAP) based upon its stored version of KP and PIN and a time variant parameter received from the terminal. The TAP is then returned to the terminal in a response message, and based upon an imputed PIN, partial processing of the input PIN and KP on the card a derived TAP is compared with the received TAP in the terminal. A correct comparison indicating that the entered PIN is valid. The request message includes the PAN encoded under the KS and KS encoded under a cross-domain key. Message authentication codes (MAC) are attached to each message and the correct reception and regeneration of a MAC on a message including a term encoded under KS indicates that the received KS is valid and that the message originated at a valid terminal or card.
Ibm Systems Journal | 1991
Stephen M. Matyas; An V. Le; Dennis G. Abraham
This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme—built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products—has been implemented in the newly announced IBM Transaction Security System.
Archive | 1991
Dennis G. Abraham; Steven George Aden; Todd W. Arnold; Steven William Neckyfarow; William S Rohland
Archive | 1992
Dennis G. Abraham; Daniela Henningsmeyer; John Matthew Hudson; Donald B. Johnson; An V. Le; Stephen M. Matyas; James Virgle Stevens
Archive | 1992
Dennis G. Abraham; Steven George Aden
Archive | 1985
Dennis G. Abraham; Glen Paul Double; Steven William Neckyfarow
Archive | 1988
Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh
Archive | 1989
Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh
Archive | 1989
Stephen M. Matyas; Dennis G. Abraham; William C. Arnold; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Steve R. White; John D. Wilkins
Archive | 1989
Stephen M. Matyas; Dennis G. Abraham; Donald B. Johnson; Ramesh K. Karne; An V. Le; Rostislaw Prymak; Julian Thomas; John D. Wilkins; Phil C. Yeh