US20050240987A1 - Password generation and verification system and method therefor - Google Patents
Password generation and verification system and method therefor Download PDFInfo
- Publication number
- US20050240987A1 US20050240987A1 US11/158,040 US15804005A US2005240987A1 US 20050240987 A1 US20050240987 A1 US 20050240987A1 US 15804005 A US15804005 A US 15804005A US 2005240987 A1 US2005240987 A1 US 2005240987A1
- Authority
- US
- United States
- Prior art keywords
- password
- elements
- sampled
- scramble
- predetermined number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Definitions
- the present invention relates to-systems and methods for verifying a password, and more specifically to a system and method for selecting and verifying elements that comprise a password on an element-by-element basis.
- a password is used to ensure security, so that only an owner of such security authorization can access the computer system, for example.
- the password typically comprises a combination of multiple alphabets and numerals.
- the user of the computer system registers his predetermined password with the system and enters that password whenever he accesses the system.
- the system compares the entered password against the registered password, and, if they match, grants him access to the system.
- a password should preferably be alphanumeric characters consisting of a complex combination of alphabets and numerals.
- a password comprising a easy-to-remember combination of alphanumeric characters, for example, a password including the name and/or birth date of the user, is chosen.
- Such a password is readily deciphered by an unauthorized intruder so that it is easily allowed to gain access to the system.
- passwords are demanded in many cases, for example, when a bank account is accessed from the ATM (Automatic Teller Machine), when the computer is started up, and when an online transaction is performed over the Internet. It is quite difficult to remember and manage a plurality of those passwords. As a result, there may be scenarios where you may forget or misremember your password so that you cannot withdraw cash, or you may fail to boot your computer so that you cannot perform business smoothly. Because of such inconvenience, the password user employs a single password for multiple systems, or write down multiple passwords on his notepad, for example. Such procedures compromise system security that would otherwise be provided by setting up passwords.
- a plurality of different categories are first selected and an element group comprised of a single or multiple password elements that belong to each category is stored in an element group storage means.
- an element group comprised of a single or multiple password elements that belong to each category is stored in an element group storage means.
- a specific number of categories that are randomly preset from the plurality of categories are selected.
- a sampled password element that belongs to each of those categories is sampled from the element group storage means (if multiple password elements are provided for a single category, one of them is randomly sampled).
- a predefined number of scramble elements that belong to the same category are randomly sampled from the scramble element storage means.
- the sampled scramble elements are mixed with the sampled password element, and a mixed element group, where those elements are arranged in random order, is subsequently generated on a category by category basis.
- the resulting mixed element group is displayed on a display means. From the group displayed, a selected password element is chosen according to the category, and correlated, on a category by category basis, by verifying means against the sampled password element stored in the password storage means. As a result of the verification, if all of the selected password elements match each of the sampled password elements, a match signal is outputted.
- FIG. 1 shows a block schematic diagram of a password generation and verification system according to the present invention
- FIG. 2 is a flowchart for explaining the procedures for generating an element group according to the present invention
- FIG. 3 is a flowchart for explaining the procedures for generating a mixed element group according to the present invention.
- FIG. 4 is a diagram for explaining the concept of a password according to the present invention.
- FIG. 5 is a diagram illustrating an example of how element groups are displayed on a display device
- FIG. 6 is a diagram illustrating scramble elements stored in a scramble element memory on a category by category basis
- FIG. 7 is a flowchart illustrating the procedures for generating a password element according to the present invention.
- FIG. 8 is a flowchart illustrating the procedures for verifying the password according to the present invention.
- FIG. 9 shows a block schematic diagram illustrating one embodiment that utilizes the password generation and verification system according to the present invention.
- a password generation and verification system offers the capabilities of generating target categories, generating a password, and verifying the password.
- a category where password elements are classified is preset by the user; the more categories, the more preferable in terms of security. They include, for example, the name of the user's acquaintance, his birthplace, alma mater (elementary school, junior high school, high school, university, etc.), name of the division to which he was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, his habit, and so forth. They are stored in the system.
- the password includes a plurality of password elements that are randomly sampled whenever it is used, and each of the password elements is preset by the user on a category by category basis.
- the password elements that are set are stored in the password generation and verification system.
- the system generates a mixed element group where randomly sampled scramble elements are added to a sampled password element that is arbitrarily sampled according to the category selected by the system (there may be a password element that is singularly determined at all times when a category, such as birthplace, is selected, or a plurality of password elements, such as the user's acquaintances; in the latter case, one of them is randomly sampled by the system).
- the mixed element group includes the sampled password element that was preset by the password user and has been sampled by the system as described above, and a plurality of scramble elements sampled by the system. The password user chooses a selected password element that is selected by the user from the mixed element group displayed on a display device.
- One selected password element is chosen from each element group, and when all the selected password elements are chosen as appropriate, the system correlates the sampled password element and the selected password element on a category by category basis. As a result, if all of the selected password elements match the sampled password elements, the system decides that the person who entered the password is an authorized user.
- password elements are often represented by a character string, but may be specific image information or audio information.
- image information for example, images stored in a predetermined format are stored as password elements into the system.
- the system may provide images as scramble elements and permit password elements to be selected on the display device. If image information is used as password elements, images that are familiar to the user are remembered for a long period of time, and thus suitable for storage and control of the password. In this way, various types of password elements may be used, though the implementation of the present invention is described in greater detail with reference to the drawings, in a case where a password element is a character string.
- FIG. 1 shows a password generation and verification system 10 according to the present invention, which comprises: a password generation and verification unit 16 including an element group setup portion 11 , a scramble element memory 12 , a mixed element group generating portion 13 , an input/output portion 14 , and a comparator portion 15 ; and a password setup input terminal 19 including a display device 17 and an input device 18 .
- the password generation and verification unit 16 is coupled to the password setup input terminal 19 via a wireline or wireless connection line 20 .
- a password according to the present invention is randomly set whenever it is used, and is made up of a plurality of password elements that are sampled according to the category.
- Each password element is arbitrarily preset by the password user and stored in the element group setup portion 11 of the system 10 .
- the process of generating an element group is described with reference to the flowchart of FIG. 2 .
- the system 10 makes available beforehand various categories 1 , 2 , 3 , . . . , N, including, for example, name of the user's acquaintance, his birthplace, alma mater (elementary school, junior high school, high school, university, etc.), name of the division to which he was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, his habit, and so forth, and the user of this system selects desired categories as many as possible among them. For example, categories 1 , 3 , 8 , 12 , . . . , and K are selected. When the categories are selected, the user enters familiar names to those categories.
- category 1 is the names of acquaintances, which include Tatsuo Maekawa, Taro Yamada, and Shiro Ono
- these names are entered in password elements 11 , 12 , and 13 .
- These password elements 11 , 12 , and 13 are stored as a element group 23 a into the element group setup 11 .
- categories 3 , 8 , 12 , . . . , K password elements for the respective categories are entered.
- category 8 is the birthplace, the user's birthplace is singular; thus, a single password element 81 is provided. In this way, once password elements are entered for all the categories 1 , 3 , 8 , 12 , . . .
- K selected by the user, they are stored into the element group setup 11 as element groups 23 a, 23 b, 23 c, 23 d, and 23 e.
- a sampled password element is randomly sampled by the mixed element group 13 according to each category, as described below.
- FIG. 3 is a flowchart for explaining the procedures for generating a mixed element group in the mixed element group generating portion of the system 10 .
- the element groups 23 a, 23 b, 23 c, 23 d, and 23 e generated by the user of the system 10 have already been stored in the element group setup 11 .
- the system 10 asks the user a category inquiry number.
- the category inquiry number is a number that determines on how many categories password elements are asked to the user.
- the system 10 randomly specifies, for example, element groups 23 a, 23 b, 23 c, and 23 e from the element groups 23 a, 23 b, 23 c, 23 d, and 23 e.
- the element groups that belong to those specified categories differ whenever the user attempts to gain authentication for the system 10 .
- the mixed element group generating portion 13 randomly samples one of the password elements contained in each element group, and thus extracts sampled password elements 1 , 2 , 3 , and 4 .
- a predefined number of scramble elements 31 a, 31 b, 31 c, and 31 d that belong to the same category as the sampled password elements, as stored in the scramble element memory 12 are selected according to the category, and mixed with the sampled password elements 1 , 2 , 3 , and 4 , respectively.
- the sampled password elements 1 , 2 , 3 , and 4 are mixed with the scramble elements 31 a, 31 b, 31 c, and 31 d, they are randomly rearranged, so that mixed element groups 32 a, 32 b, 32 c, and 32 d are generated for presentation on the display device 17 .
- the user selects as a selected password element an element that is most familiar to him among the mixed element groups presented on the display device 17 .
- the system 10 performs verification with the sampled password element on a category by category basis. If all are matched, the system 10 generates a match signal and gives authentication to the user.
- Password elements are provided by the password user via the input device 18 .
- the number of categories for entering the password elements is inquired from the password generation and verification unit 16 , and password elements are entered for each of the categories corresponding to that number.
- a list of categories made available by the system may be displayed on the display device 17 to permit the user to select them.
- Element groups may also be selected via a dedicated terminal unit, which is especially needed in banks and so forth where a high level of password security is demanded.
- Password elements are set as classified on a category by category basis; for example, “7” is entered as the number of categories, so that the name of acquaintance, birthplace, alma mater, name of division to which the user was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, and habit are selected as categories.
- “7” is entered as the number of categories, so that the name of acquaintance, birthplace, alma mater, name of division to which the user was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, and habit are selected as categories.
- Tatsuo Maekawa, Taro Yamada, and Shiro Ono are set as the names of acquaintances.
- Hakodate, Arlington, Yamagata, and Lyon Hakodate, Arlington, Yamagata, and Lyon are entered as the names of the cities he lived in the past. In this way, the names most familiar to the user for each category are set, according to the category,
- a password according to the present invention is made up of multiple password elements, but each password element is sampled from among the preset element groups as described above.
- FIG. 4 conceptually depicts the structure of a password 40 sampled as described above, where the password elements sampled and their respective assigned category numbers 41 , 42 , 43 , and 44 are stored in pair into the element group setup portion 11 .
- the category numbers are used when selecting scramble elements described below. It should be noted that a combination of password elements that comprise the password 40 differs whenever the user attempts to gain authentication for the system 10 .
- the mixed group generating portion 13 of the system 10 asks a category inquiry number to the user who enters the password. For example, if a category number “4” is entered from the input device 18 , the mixed element group generator 13 randomly selects four categories from the preset categories of element groups. For example, the name of acquaintance, birthplace, name of elementary school, and name of division categories are selected, and sampled password elements are randomly sampled from the password elements that have been set for each category.
- the fixed element group generator 13 extracts from the scramble element memory 12 a plurality of scramble elements that belong to the same category as the sampled password element, and mixes them with the sampled password element to generate a mixed element group where they are arranged in random order.
- the mixed group generator 13 extracts a sampled password element, “Taro Yamada”, from the element group setup portion 11 .
- the category number “1” is assigned to “Taro Yamada”; thus, when the element group generator 13 recognizes that “Taro Yamada” is the name of acquaintance, a predetermined number of names, for example, “Shiro Saito”, “Hajime Ogawa”, “Yoshihiko Ichikawa”, “Toru Kato” are randomly chosen as scramble elements from the names stored in the scramble element memory 12 .
- the scramble elements chosen are missed with the password element and rearranged in random order to generate a mixed element group. In this way, the mixed element group generated for each category is sent to the display device 16 .
- FIGS. 5 ( 1 )-( 4 ) show examples of mixed element groups according to the category, i.e., “name of acquaintance”, “birthplace”, “name of elementary school”, and “name of division”, presented on the display device 16 .
- the password user selects a certain password element and enters its number from the input device 17 .
- the password user enters number “4” as the selected password element “Taro Yamada”, because his pre-selected password element is “Taro Yamada”.
- “Yokohama” is selected as the selected password element in the birthplace category as shown in FIG.
- scramble elements stored in the scramble element memory 12 according to the category are shown.
- a category number and a serial number are assigned to a single scramble element, which are stored in the memory 12 .
- the category represents a word having the same meaning, such as name and birthplace, while the serial number denotes a continuous number used when randomly selecting a scramble element. Words that belong to category 1 are arranged in order of scramble elements, SE 11 , . . .
- the password generation and verification system 10 When the password generation and verification system 10 enters the password element generation mode, it firsts sets the element group inquiry number and element group option number, at block 71 .
- the element group inquiry number which is a number of categories used for inquiry among a plurality of categories available, is “4” in the above example, while the element group option number is “5”, as shown in FIG. 5 .
- the element group number and element group option number are queried at block 71 , although the system may have their default (or preset) values.
- an element group category(s) is selected, at block 72 .
- the password user may select desired category(s) within the range of the element group number selected at block 71 .
- the system may list prearranged categories on the display device 16 to allow the password user to choose from the categories listed. In the above example, “name of acquaintance”, “birthplace”, “name of elementary school” and “name of division” are selected.
- the process proceeds to block 73 , where a password element(s) for each category is entered. For example, in the “name of acquaintance” category, multiple names, in addition to “Taro Yamada”, are entered.
- block 74 it is determined whether password elements have been entered for all of the categories. If not, the process returns to block 73 , where a similar process as described above is performed. If password elements have been entered for all of the categories, the process proceeds to block 75 .
- the display device 16 displays all the password elements by category, and if there is any password element to be modified, the password user modifies the password element at block 77 .
- the process proceeds to block 78 , where the password user enters the re-set password elements by category, and checks if the input of the password user is accurate. When this check is completed, the password generation and verification unit 15 completes the password input and setup.
- the procedures for verifying the password are described in accordance with the flowchart 80 shown in FIG. 8 .
- the verification system 10 is activated and enters the verification mode
- the element groups as shown in FIG. 4
- the password user enters a desired number from the items presented on the display device 16 , using a keypad of the input device 17 . For example, in the name of acquaintance category, if it is judged that “Taro Yamada” is the selected password element of this category, then “4” is pressed on the keypad. Alternatively, the cursor may be scrolled to select its relevant position.
- the process proceeds to block 85 , where the pre-sampled password elements and the selected password elements entered are correlated each other. If all of the selected password elements match the sampled password elements, a match signal is outputted at step 87 ; if at least one of the selected password elements does not match the sampled password elements, a mismatch signal is outputted.
- the selected password elements entered from the password input terminal 18 are compared against the preset sampled password elements, and if they match all of the sampled password elements, authentication can be provided to the password user.
- FIG. 9 shows a block schematic diagram where a password generation and verification system 93 according to the present invention is applied to a computer system 92 installed in a bank 91 .
- the computer system 92 which processes banking transactions, is typically coupled to a terminal equipment 95 installed at a remote site via a wireline or wireless line 94 , including private or public lines.
- the terminal equipment 95 is often an automatic teller machine (ATM), but may also be a home computer terminal connected to a fixed or cellular telephone, due to recent proliferation of the Internet or i-mode service offered by NTT of Japan.
- ATM automatic teller machine
- the password generation and verification system 93 correlates to determine whether the password sent from the terminal equipment 95 matches the preset password. According to the present invention, it is determined whether the all of the selected password elements sent from the terminal equipment 95 match the password elements stored in the computer system 92 . If all match, the computer system 92 provides authentication to the person who operates the terminal equipment 95 as an authorized person. This authentication allows the terminal equipment 95 to be coupled to the computer system 92 , so that various transactions may be instructed.
- the present invention is applied to improve the security for the computer system in the bank, although it may also be applicable to any computer system of public organizations that requires authentication of whether a persona who operates the terminal equipment is authorized or not.
- the present invention may also be applied to improve system security.
- a connection may be established with a corporate or home computer from a remote office or hotel room during a business trip, so that necessary information may be sent and/or received at relatively low cost.
- the present invention may also be applied to computers that control locking and unlocking of their gateways.
- the present invention may be basically employed in circumstances where password-based identification is required.
- a plurality of password elements are used and each password element may be selected based on familiar numerals and words, or image and audio information; thus, unlike prior art methods, the present invention eliminates the need for bothering to remember unfamiliar passwords at all times.
- sampling of categories and sampling of correct password elements and, additionally, scramble elements are performed at random by the system (although some of the password elements, such as, for example, “birthplace”, are singularly determined at a time when a category is established).
- some of the password elements such as, for example, “birthplace”, are singularly determined at a time when a category is established.
- the resulting password is very dynamic, as compared to typical static passwords that are fixed for a certain period of time.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A system and method for facilitating password control and maintenance is provided. A system 10 is provided where a plurality of categories are set so that a single piece or multiple pieces of information that are familiar to the user can be set as a password element(s) for each category. Each sampled password element that is grouped according to each category that is randomly sampled from said categories is displayed, in random order, together with a plurality of scramble elements, on a display device 17. Of those displayed, the user chooses selected password elements that are familiar to him. If all of the selected password elements match the preset sampled password elements, authentication is issued to the user.
Description
- This application claims priority to Japanese Patent Application No. 2000-391720, filed 25 Dec. 2000.
- The present invention relates to-systems and methods for verifying a password, and more specifically to a system and method for selecting and verifying elements that comprise a password on an element-by-element basis.
- For access to computer systems and specific programs, activation of electronic devices, unlocking of doors, and so forth, a password is used to ensure security, so that only an owner of such security authorization can access the computer system, for example. The password typically comprises a combination of multiple alphabets and numerals. The user of the computer system registers his predetermined password with the system and enters that password whenever he accesses the system. The system compares the entered password against the registered password, and, if they match, grants him access to the system.
- In order to prevent unauthorized access effectively, a password should preferably be alphanumeric characters consisting of a complex combination of alphabets and numerals. However, because it is difficult to accurately remember complicated alphanumeric characters for a long period of time, a password comprising a easy-to-remember combination of alphanumeric characters, for example, a password including the name and/or birth date of the user, is chosen. Such a password is readily deciphered by an unauthorized intruder so that it is easily allowed to gain access to the system.
- In order to overcome such shortcomings, it is recommended not to use passwords that contain meaningful words, including, for example, common nouns, people's names, geographical names, and country names; additionally, security for passwords is enhanced by, for example, periodically changing the password. Such solutions inevitably result in reduced usability of passwords, so that an easy-to-remember password is eventually preferred. In other words, when security for a password is enhanced, its usability is degraded, whereas when its usability is improved, its security is lowered.
- Furthermore, as social life diversifies into various activities, the opportunity for using passwords will increase. Passwords are demanded in many cases, for example, when a bank account is accessed from the ATM (Automatic Teller Machine), when the computer is started up, and when an online transaction is performed over the Internet. It is quite difficult to remember and manage a plurality of those passwords. As a result, there may be scenarios where you may forget or misremember your password so that you cannot withdraw cash, or you may fail to boot your computer so that you cannot perform business smoothly. Because of such inconvenience, the password user employs a single password for multiple systems, or write down multiple passwords on his notepad, for example. Such procedures compromise system security that would otherwise be provided by setting up passwords.
- Furthermore, maintaining and using as appropriate complicated passwords for each purpose would be very burdensome for elderly people, and thus impractical. As the society becomes more and more information-rich with a greater aging population, password control and input will become a significant burden for the elders.
- Accordingly, it is an objective of the present invention to provide an improved password generation and verification system and a method therefore.
- It is also an objective of the present invention to provide a password generation and verification system that facilitates password control and input, and a method therefore.
- In order to achieve the above objectives, according to the present invention, a plurality of different categories are first selected and an element group comprised of a single or multiple password elements that belong to each category is stored in an element group storage means. When used, a specific number of categories that are randomly preset from the plurality of categories are selected. Next, a sampled password element that belongs to each of those categories is sampled from the element group storage means (if multiple password elements are provided for a single category, one of them is randomly sampled). Next, a predefined number of scramble elements that belong to the same category are randomly sampled from the scramble element storage means. The sampled scramble elements are mixed with the sampled password element, and a mixed element group, where those elements are arranged in random order, is subsequently generated on a category by category basis. The resulting mixed element group is displayed on a display means. From the group displayed, a selected password element is chosen according to the category, and correlated, on a category by category basis, by verifying means against the sampled password element stored in the password storage means. As a result of the verification, if all of the selected password elements match each of the sampled password elements, a match signal is outputted.
- The present invention that provides a method for verifying a password comprises the steps of: selecting from a plurality of preset categories a category to be displayed; randomly selecting a sampled password element that belongs to that category and a scramble element, different from the sampled password element, that belongs to the same category; mixing the two elements before generating, according to the category, a mixed element group where they are arranged in random order; displaying the element group; selecting, according to the category, a selected password element from the element group displayed; and verifying the selected password element to the sampled password element according to the same category.
-
FIG. 1 shows a block schematic diagram of a password generation and verification system according to the present invention; -
FIG. 2 is a flowchart for explaining the procedures for generating an element group according to the present invention; -
FIG. 3 is a flowchart for explaining the procedures for generating a mixed element group according to the present invention; -
FIG. 4 is a diagram for explaining the concept of a password according to the present invention; -
FIG. 5 is a diagram illustrating an example of how element groups are displayed on a display device; -
FIG. 6 is a diagram illustrating scramble elements stored in a scramble element memory on a category by category basis; -
FIG. 7 is a flowchart illustrating the procedures for generating a password element according to the present invention; -
FIG. 8 is a flowchart illustrating the procedures for verifying the password according to the present invention; and -
FIG. 9 shows a block schematic diagram illustrating one embodiment that utilizes the password generation and verification system according to the present invention. - A password generation and verification system according to the present invention offers the capabilities of generating target categories, generating a password, and verifying the password. With reference to the present invention in general, and more specifically to the capability of generating categories, a category where password elements are classified is preset by the user; the more categories, the more preferable in terms of security. They include, for example, the name of the user's acquaintance, his birthplace, alma mater (elementary school, junior high school, high school, university, etc.), name of the division to which he was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, his habit, and so forth. They are stored in the system.
- Next, with reference to the capability of generating a password, the password includes a plurality of password elements that are randomly sampled whenever it is used, and each of the password elements is preset by the user on a category by category basis. The password elements that are set are stored in the password generation and verification system.
- Further, with reference to the capability of verifying the password, the system generates a mixed element group where randomly sampled scramble elements are added to a sampled password element that is arbitrarily sampled according to the category selected by the system (there may be a password element that is singularly determined at all times when a category, such as birthplace, is selected, or a plurality of password elements, such as the user's acquaintances; in the latter case, one of them is randomly sampled by the system). The mixed element group includes the sampled password element that was preset by the password user and has been sampled by the system as described above, and a plurality of scramble elements sampled by the system. The password user chooses a selected password element that is selected by the user from the mixed element group displayed on a display device. One selected password element is chosen from each element group, and when all the selected password elements are chosen as appropriate, the system correlates the sampled password element and the selected password element on a category by category basis. As a result, if all of the selected password elements match the sampled password elements, the system decides that the person who entered the password is an authorized user.
- Typically, password elements are often represented by a character string, but may be specific image information or audio information. In the case of image information, for example, images stored in a predetermined format are stored as password elements into the system. The system may provide images as scramble elements and permit password elements to be selected on the display device. If image information is used as password elements, images that are familiar to the user are remembered for a long period of time, and thus suitable for storage and control of the password. In this way, various types of password elements may be used, though the implementation of the present invention is described in greater detail with reference to the drawings, in a case where a password element is a character string.
-
FIG. 1 shows a password generation andverification system 10 according to the present invention, which comprises: a password generation andverification unit 16 including an elementgroup setup portion 11, ascramble element memory 12, a mixed elementgroup generating portion 13, an input/output portion 14, and acomparator portion 15; and a passwordsetup input terminal 19 including adisplay device 17 and aninput device 18. The password generation andverification unit 16 is coupled to the passwordsetup input terminal 19 via a wireline orwireless connection line 20. - First, how an element group is generated is described. A password according to the present invention is randomly set whenever it is used, and is made up of a plurality of password elements that are sampled according to the category. Each password element is arbitrarily preset by the password user and stored in the element
group setup portion 11 of thesystem 10. The process of generating an element group is described with reference to the flowchart ofFIG. 2 . - The
system 10 makes available beforehandvarious categories categories category 1 is the names of acquaintances, which include Tatsuo Maekawa, Taro Yamada, and Shiro Ono, then these names are entered inpassword elements password elements element group 23 a into theelement group setup 11. By performing similar procedures forcategories category 8 is the birthplace, the user's birthplace is singular; thus, asingle password element 81 is provided. In this way, once password elements are entered for all thecategories element group setup 11 aselement groups mixed element group 13 according to each category, as described below. - Next, the capability of verifying the password is described.
FIG. 3 is a flowchart for explaining the procedures for generating a mixed element group in the mixed element group generating portion of thesystem 10. As described above, theelement groups system 10 have already been stored in theelement group setup 11. When the user provides a password to thesystem 10 to attempt to obtain authentication, thesystem 10 asks the user a category inquiry number. The category inquiry number is a number that determines on how many categories password elements are asked to the user. Assuming here that “4” is given, then thesystem 10 randomly specifies, for example,element groups element groups system 10. Once the element groups are specified, the mixed elementgroup generating portion 13 randomly samples one of the password elements contained in each element group, and thus extracts sampledpassword elements - Once the sampled
password elements scramble elements scramble element memory 12, are selected according to the category, and mixed with the sampledpassword elements password elements scramble elements mixed element groups display device 17. The user selects as a selected password element an element that is most familiar to him among the mixed element groups presented on thedisplay device 17. When the selected password element for each category is entered, thesystem 10 performs verification with the sampled password element on a category by category basis. If all are matched, thesystem 10 generates a match signal and gives authentication to the user. - The above process is further described with reference to the block diagram 10 shown in
FIG. 1 . First, setting of element groups is described. Password elements are provided by the password user via theinput device 18. Initially, the number of categories for entering the password elements is inquired from the password generation andverification unit 16, and password elements are entered for each of the categories corresponding to that number. Alternatively, a list of categories made available by the system may be displayed on thedisplay device 17 to permit the user to select them. Element groups may also be selected via a dedicated terminal unit, which is especially needed in banks and so forth where a high level of password security is demanded. Password elements are set as classified on a category by category basis; for example, “7” is entered as the number of categories, so that the name of acquaintance, birthplace, alma mater, name of division to which the user was first assigned in the company, name of the city where he lived in the past, name of the foreign country he visited, and habit are selected as categories. For example, when password elements in the name of acquaintance category are set, Tatsuo Maekawa, Taro Yamada, and Shiro Ono are set as the names of acquaintances. If the user lived in Hakodate, Tucson, Yamagata, and Lyon, then Hakodate, Tucson, Yamagata, and Lyon are entered as the names of the cities he lived in the past. In this way, the names most familiar to the user for each category are set, according to the category, as password elements into theelement group setup 11 from theinput device 18 via theconnection line 20. - A password according to the present invention is made up of multiple password elements, but each password element is sampled from among the preset element groups as described above.
FIG. 4 conceptually depicts the structure of apassword 40 sampled as described above, where the password elements sampled and their respective assignedcategory numbers group setup portion 11. The category numbers are used when selecting scramble elements described below. It should be noted that a combination of password elements that comprise thepassword 40 differs whenever the user attempts to gain authentication for thesystem 10. - Next, entering and verifying the password is described. The mixed
group generating portion 13 of thesystem 10 asks a category inquiry number to the user who enters the password. For example, if a category number “4” is entered from theinput device 18, the mixedelement group generator 13 randomly selects four categories from the preset categories of element groups. For example, the name of acquaintance, birthplace, name of elementary school, and name of division categories are selected, and sampled password elements are randomly sampled from the password elements that have been set for each category. The fixedelement group generator 13 extracts from the scramble element memory 12 a plurality of scramble elements that belong to the same category as the sampled password element, and mixes them with the sampled password element to generate a mixed element group where they are arranged in random order. For example, themixed group generator 13 extracts a sampled password element, “Taro Yamada”, from the elementgroup setup portion 11. As shown inFIG. 4 , the category number “1” is assigned to “Taro Yamada”; thus, when theelement group generator 13 recognizes that “Taro Yamada” is the name of acquaintance, a predetermined number of names, for example, “Shiro Saito”, “Hajime Ogawa”, “Yoshihiko Ichikawa”, “Toru Kato” are randomly chosen as scramble elements from the names stored in thescramble element memory 12. The scramble elements chosen are missed with the password element and rearranged in random order to generate a mixed element group. In this way, the mixed element group generated for each category is sent to thedisplay device 16. - FIGS. 5 (1)-(4) show examples of mixed element groups according to the category, i.e., “name of acquaintance”, “birthplace”, “name of elementary school”, and “name of division”, presented on the
display device 16. Referring to the mixed element groups displayed on thedisplay device 16, the password user selects a certain password element and enters its number from theinput device 17. In the name of acquaintance category, for example, the password user enters number “4” as the selected password element “Taro Yamada”, because his pre-selected password element is “Taro Yamada”. Then, “Yokohama” is selected as the selected password element in the birthplace category as shown inFIG. 5 (2); “Hodogaya Elementary School” in the name of school category; and “Supply Management Division” in the name of division category. These selected password elements are sent via theconnection line 20 to thecorrelator 15, where they are compared with the sampled password elements stored in the elementgroup setup portion 11, respectively. As a result of the comparison, if the sampled password elements match all of the selected password elements, a match/mismatch signal 21 is outputted externally. This signal is sent to another unit that utilizes the result of password verification. - Referring next to
FIG. 6 , scramble elements stored in thescramble element memory 12 according to the category are shown. As described above, because a predetermined number of scramble elements are randomly sampled when a mixed element group is generated, as many scramble elements as possible are provided beforehand as potential candidates, on a category by category basis. More specifically, a category number and a serial number are assigned to a single scramble element, which are stored in thememory 12. The category represents a word having the same meaning, such as name and birthplace, while the serial number denotes a continuous number used when randomly selecting a scramble element. Words that belong tocategory 1 are arranged in order of scramble elements, SE11, . . . , SE17, and so on; words that belong tocategory 2 are arranged in order of scramble elements, SE21, . . . , SE27, and so on. For example, when a scramble element ofcategory 1 is sampled, if “5” is generated by random-number generation, then scramble element, SE15, corresponding to that number is chosen. A predetermined number of scramble elements chosen in this way are sent to the elementgroup generator portion 13. A similar process is also performed forcategories - Next, the procedures for how a password element is set by the password user in the password generation and verification system are described in accordance with the
flowchart 70 shown inFIG. 7 . When the password generation andverification system 10 enters the password element generation mode, it firsts sets the element group inquiry number and element group option number, atblock 71. The element group inquiry number, which is a number of categories used for inquiry among a plurality of categories available, is “4” in the above example, while the element group option number is “5”, as shown inFIG. 5 . In this embodiment, the element group number and element group option number are queried atblock 71, although the system may have their default (or preset) values. Once the element group number and element group option number are set, an element group category(s) is selected, atblock 72. The password user may select desired category(s) within the range of the element group number selected atblock 71. For this selection, the system may list prearranged categories on thedisplay device 16 to allow the password user to choose from the categories listed. In the above example, “name of acquaintance”, “birthplace”, “name of elementary school” and “name of division” are selected. - Once the desired categories are set, the process proceeds to block 73, where a password element(s) for each category is entered. For example, in the “name of acquaintance” category, multiple names, in addition to “Taro Yamada”, are entered. At
block 74, it is determined whether password elements have been entered for all of the categories. If not, the process returns to block 73, where a similar process as described above is performed. If password elements have been entered for all of the categories, the process proceeds to block 75. - At
block 75, thedisplay device 16 displays all the password elements by category, and if there is any password element to be modified, the password user modifies the password element atblock 77. When all of the password elements displayed are acceptable atblock 76, or when modification of password elements is completed atblock 77, the process proceeds to block 78, where the password user enters the re-set password elements by category, and checks if the input of the password user is accurate. When this check is completed, the password generation andverification unit 15 completes the password input and setup. - Next, the procedures for verifying the password are described in accordance with the
flowchart 80 shown inFIG. 8 . First, when theverification system 10 is activated and enters the verification mode, the element groups, as shown inFIG. 4 , are displayed by category on thedisplay device 16, atblock 81. Proceeding to block 82, the password user enters a desired number from the items presented on thedisplay device 16, using a keypad of theinput device 17. For example, in the name of acquaintance category, if it is judged that “Taro Yamada” is the selected password element of this category, then “4” is pressed on the keypad. Alternatively, the cursor may be scrolled to select its relevant position. Once the selected password element is entered, that selected password element is stored in the memory, atblock 83. Proceeding to block 84, it is determined whether all of the selected password elements have been entered; if not, the process proceeds to block 81, where a similar process is performed as described above. - At
block 84, once all of the selected password elements have been entered, the process proceeds to block 85, where the pre-sampled password elements and the selected password elements entered are correlated each other. If all of the selected password elements match the sampled password elements, a match signal is outputted atstep 87; if at least one of the selected password elements does not match the sampled password elements, a mismatch signal is outputted. - As described above, the selected password elements entered from the
password input terminal 18 are compared against the preset sampled password elements, and if they match all of the sampled password elements, authentication can be provided to the password user. - It should be appreciated that in the procedures shown in
FIG. 7 , after all of the selected password elements have been entered, verification with the pre-sampled password elements is initiated; however, as each of the selected password element is entered, it may be compared with the sampled password elements. In that case, at a time when a mismatching selected password element is entered, the verification mode may be terminated to provide a notification to the person who entered the selected password that a password input error occurred. It should also be appreciated that a mismatch signal is outputted atblock 88, although this process is not especially needed, but only a match signal atblock 87 may be outputted externally. - The password generation and verification system according to the present invention may be applicable to various apparatuses and systems, thereby improving the security for those apparatuses and systems.
FIG. 9 shows a block schematic diagram where a password generation andverification system 93 according to the present invention is applied to acomputer system 92 installed in abank 91. Thecomputer system 92, which processes banking transactions, is typically coupled to aterminal equipment 95 installed at a remote site via a wireline orwireless line 94, including private or public lines. Theterminal equipment 95 is often an automatic teller machine (ATM), but may also be a home computer terminal connected to a fixed or cellular telephone, due to recent proliferation of the Internet or i-mode service offered by NTT of Japan. When an access is made from theterminal equipment 95 to thecomputer system 92, the password generation andverification system 93 correlates to determine whether the password sent from theterminal equipment 95 matches the preset password. According to the present invention, it is determined whether the all of the selected password elements sent from theterminal equipment 95 match the password elements stored in thecomputer system 92. If all match, thecomputer system 92 provides authentication to the person who operates theterminal equipment 95 as an authorized person. This authentication allows theterminal equipment 95 to be coupled to thecomputer system 92, so that various transactions may be instructed. - In the above embodiment, the present invention is applied to improve the security for the computer system in the bank, although it may also be applicable to any computer system of public organizations that requires authentication of whether a persona who operates the terminal equipment is authorized or not.
- In cases where a remote access is made to a corporate or home computer via a wireline or wireless line, the present invention may also be applied to improve system security. Especially, a connection may be established with a corporate or home computer from a remote office or hotel room during a business trip, so that necessary information may be sent and/or received at relatively low cost.
- Furthermore, for management of limited-access areas, such as, for example, houses, vaults, factory plants, research laboratories, and military facilities, the present invention may also be applied to computers that control locking and unlocking of their gateways.
- Only authorized persons may sometimes be allowed to operate specific vehicles, machines, and apparatuses (including automobiles, construction machineries, farming machineries, and factory machineries). In such cases, the present invention may be employed as an activation key to such machineries to verify the identity of such persons.
- In summary, the present invention may be basically employed in circumstances where password-based identification is required. In particular, a plurality of password elements are used and each password element may be selected based on familiar numerals and words, or image and audio information; thus, unlike prior art methods, the present invention eliminates the need for bothering to remember unfamiliar passwords at all times.
- On the other hand, sampling of categories and sampling of correct password elements and, additionally, scramble elements are performed at random by the system (although some of the password elements, such as, for example, “birthplace”, are singularly determined at a time when a category is established). This results in a very high level of randomness and thus very low predictability. In other words, the resulting password is very dynamic, as compared to typical static passwords that are fixed for a certain period of time. Accordingly, by employing a method whereby a certain limitation is imposed on response time and verification is denied if there is no input beyond that limitation, even if the whole preset categories and password elements were leaked to any third party, it would be extremely difficult for that third party to provide correct answers as quickly as the authorized person himself, and thus a high level of security is ensured.
Claims (19)
1-9. (canceled)
10. A password authentication system, comprising:
password element storage means for storing a plurality of password elements, each password element being pre-selected and having a category attribution;
scramble element storage means for storing a plurality of scramble elements, each scramble element having a category attribution;
setting means for setting a predetermined number of verification;
password element sampling means for randomly sampling sampled password elements for the predetermined number of verification from the plurality of password elements;
mixing means for mixing the sampled password element with a predetermined number of scramble elements having the same category attribution as the sampled password element to form a mixed element group, the predetermined number of scramble elements being randomly sampled from the plurality of scramble elements;
a display device for displaying the mixed element group;
receiving means for receiving a selected password element selected from the mixed element group displayed on the display device; and
authentication means for verifying the selected password element to the sampled password element for the predetermined number of verification to issue an authentication when all the selected password elements match to the sampled password elements, respectively.
11. The password authentication system according to claim 10 , wherein the authentication is rejected when the selected password element is received after passing a predetermined time.
12. The password authentication system according to claim 10 , wherein the password element and the scramble element includes image information.
13. The password authentication system according to claim 10 , wherein the mixed element group is transmitted to the display means via a telecommunication line, and the selected password element is transmitted to the receiving means via the telecommunication line.
14. The password authentication system according to claim 10 , wherein the sampled password elements have a same category attribution.
15. The password authentication system according to claim 10 , wherein the category attribution includes first and family name and at least one of first name and family name.
16. A machine-readable medium having stored thereon sequences of instructions for causing a computer to:
store a plurality of password elements, each password element being pre-selected and having a category attribution;
store a plurality of scramble elements, each scramble element having a category attribution;
set a predetermined number of verification;
randomly sample sampled password elements for the predetermined number of verification from the plurality of password elements;
mix the sampled password element with a predetermined number of scramble elements having the same category attribution as the sampled password element to form a mixed element group, the predetermined number of scramble elements being randomly sampled from the plurality of scramble elements;
display the mixed element group on a display device;
receive a selected password element selected from the mixed element group displayed on the display device; and
verify the selected password element to the sampled password element for the predetermined number of verification to issue an authentication when all the selected password elements match to the sampled password elements, respectively.
17. The password authentication system according to claim 16 , wherein the authentication is rejected when the selected password element is received after passing a predetermined time.
18. The password authentication system according to claim 16 , wherein the password element and the scramble element includes image information.
19. The password authentication system according to claim 16 , wherein the mixed element group is transmitted to the display means via a telecommunication line, and the selected password element is transmitted to the receiving means via the telecommunication line.
20. The password authentication system according to claim 16 , wherein the sampled password elements have a same category attribution.
21. The password authentication system according to claim 16 , wherein the category attribution includes first and family name and at least one of first name and family name.
22. A password authentication method, the method comprising the steps of:
storing a plurality of password elements, each password element being pre-selected and having a category attribution;
storing a plurality of scramble elements, each scramble element having a category attribution;
setting a predetermined number of verification;
randomly sampling sampled password elements for the predetermined number of verification from the plurality of password elements;
mixing the sampled password element with a predetermined number of scramble elements having the same category attribution as the sampled password element to form a mixed element group, the predetermined number of scramble elements being randomly sampled from the plurality of scramble elements;
displaying the mixed element group on a display device;
receiving a selected password element selected from the mixed element group displayed on the display device; and
verifying the selected password element to the sampled password element for the predetermined number of verification to issue an authentication when all the selected password elements match to the sampled password elements, respectively.
23. The password authentication system according to claim 22 , wherein the authentication is rejected when the selected password element is received after passing a predetermined time.
24. The password authentication system according to claim 22 , wherein the password element and the scramble element includes image information.
25. The password authentication system according to claim 22 , wherein the mixed element group is transmitted to the display means via a telecommunication line, and the selected password element is transmitted to the receiving means via the telecommunication line.
26. The password authentication system according to claim 22 , wherein the sampled password elements have a same category attribution.
27. The password authentication system according to claim 22 , wherein the category attribution includes first and family name and at least one of first name and family name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/158,040 US20050240987A1 (en) | 2000-12-25 | 2005-06-21 | Password generation and verification system and method therefor |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000-391720 | 2000-12-25 | ||
JP2000391720A JP3695695B2 (en) | 2000-12-25 | 2000-12-25 | Password generation verification system and method |
US09/909,383 US7065786B2 (en) | 2000-12-25 | 2001-07-19 | Password generation and verification system and method therefor |
US11/158,040 US20050240987A1 (en) | 2000-12-25 | 2005-06-21 | Password generation and verification system and method therefor |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/909,383 Continuation US7065786B2 (en) | 2000-12-25 | 2001-07-19 | Password generation and verification system and method therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050240987A1 true US20050240987A1 (en) | 2005-10-27 |
Family
ID=18857819
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/909,383 Expired - Fee Related US7065786B2 (en) | 2000-12-25 | 2001-07-19 | Password generation and verification system and method therefor |
US11/158,040 Abandoned US20050240987A1 (en) | 2000-12-25 | 2005-06-21 | Password generation and verification system and method therefor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/909,383 Expired - Fee Related US7065786B2 (en) | 2000-12-25 | 2001-07-19 | Password generation and verification system and method therefor |
Country Status (2)
Country | Link |
---|---|
US (2) | US7065786B2 (en) |
JP (1) | JP3695695B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007037703A1 (en) * | 2005-09-28 | 2007-04-05 | Chuan Pei Chen | Human factors authentication |
WO2007070014A1 (en) * | 2005-12-12 | 2007-06-21 | Mahtab Uddin Mahmood Syed | Antiphishing login techniques |
GB2486706A (en) * | 2010-12-21 | 2012-06-27 | Sharp Kk | A touch screen device with a random element unlocking mechanism |
US10924505B2 (en) * | 2017-08-24 | 2021-02-16 | Red Hat, Inc. | Passcode based access-control with randomized limits |
US11107017B2 (en) * | 2013-09-23 | 2021-08-31 | Farmobile, Llc | Farming data collection and exchange system |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7350078B1 (en) * | 2001-04-26 | 2008-03-25 | Gary Odom | User selection of computer login |
US7444676B1 (en) | 2001-08-29 | 2008-10-28 | Nader Asghari-Kamrani | Direct authentication and authorization system and method for trusted network of financial institutions |
US8281129B1 (en) | 2001-08-29 | 2012-10-02 | Nader Asghari-Kamrani | Direct authentication system and method via trusted authenticators |
US8346733B2 (en) * | 2006-12-22 | 2013-01-01 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
KR100450953B1 (en) * | 2002-03-05 | 2004-10-02 | 삼성전자주식회사 | User authentication method using password |
US20080005557A1 (en) * | 2002-09-16 | 2008-01-03 | Chester James S | Method of authentication and ownership verification of collectibles |
US7478248B2 (en) * | 2002-11-27 | 2009-01-13 | M-Systems Flash Disk Pioneers, Ltd. | Apparatus and method for securing data on a portable storage device |
US7124433B2 (en) * | 2002-12-10 | 2006-10-17 | International Business Machines Corporation | Password that associates screen position information with sequentially entered characters |
GB0229727D0 (en) * | 2002-12-19 | 2003-01-29 | Ibm | Improved password entry |
US7523318B2 (en) * | 2003-02-20 | 2009-04-21 | International Business Machines Corporation | Method and system for automated password generation |
AU2003248071A1 (en) * | 2003-07-15 | 2005-01-28 | Hitoshi Kokumai | Individual authentication method using a recording medium and individual authentication system using a recording medium |
JP4306390B2 (en) * | 2003-09-29 | 2009-07-29 | 日本電気株式会社 | Password authentication apparatus, method and program |
US7539874B2 (en) * | 2004-05-20 | 2009-05-26 | International Business Machines Corporation | Secure password entry |
JP2006079269A (en) * | 2004-09-08 | 2006-03-23 | Dainippon Printing Co Ltd | Password input method |
US20060059363A1 (en) * | 2004-09-16 | 2006-03-16 | Mese John C | Method for controlling access to a computerized device |
CN101048898B (en) * | 2004-10-29 | 2012-02-01 | 麦德托尼克公司 | Lithium-ion battery and medical device |
US7734911B2 (en) * | 2005-05-31 | 2010-06-08 | Tricipher, Inc. | Secure login using augmented single factor split key asymmetric cryptography |
JP4858811B2 (en) * | 2005-09-29 | 2012-01-18 | 三憲 本間 | Identification device |
US8732477B2 (en) * | 2006-05-24 | 2014-05-20 | Confident Technologies, Inc. | Graphical image authentication and security system |
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US8117458B2 (en) * | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
AU2007268223B2 (en) | 2006-05-24 | 2010-10-07 | Vidoop, L.L.C. | Graphical image authentication and security system |
US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
JP2008040961A (en) * | 2006-08-09 | 2008-02-21 | Toppan Printing Co Ltd | Personal identification system and personal identification method |
JP2008117324A (en) * | 2006-11-08 | 2008-05-22 | Nec Corp | Verification system, method therefor, data processing terminal using the same, and program |
US7958539B2 (en) * | 2006-12-06 | 2011-06-07 | Motorola Mobility, Inc. | System and method for providing secure access to password-protected resources |
US8006097B2 (en) * | 2007-01-31 | 2011-08-23 | International Business Machines Corporation | Password generation using genre selection |
EP2115919A2 (en) * | 2007-02-05 | 2009-11-11 | Vidoop, L.l.c. | Methods and systems for delivering sponsored out-of-band passwords |
US20110047605A1 (en) * | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
WO2008109661A2 (en) * | 2007-03-05 | 2008-09-12 | Vidoop, Llc. | Method and system for securely caching authentication elements |
US8370913B2 (en) | 2007-03-16 | 2013-02-05 | Apple Inc. | Policy-based auditing of identity credential disclosure by a secure token service |
WO2009039223A1 (en) * | 2007-09-17 | 2009-03-26 | Vidoop Llc | Methods and systems for management of image-based password accounts |
US20090119475A1 (en) * | 2007-11-01 | 2009-05-07 | Microsoft Corporation | Time based priority modulus for security challenges |
US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
US8695087B2 (en) * | 2008-04-04 | 2014-04-08 | Sandisk Il Ltd. | Access control for a memory device |
JP5263595B2 (en) * | 2008-10-21 | 2013-08-14 | 株式会社リコー | User authentication apparatus and method |
US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
US8495732B2 (en) * | 2008-12-15 | 2013-07-23 | Russell W. Guenthner | Entering an identifier with security improved by time based randomization of input steps |
US8166526B2 (en) * | 2008-12-29 | 2012-04-24 | Motorola Mobility, Inc. | System and method for providing secure access to password-protected resources |
US8083135B2 (en) | 2009-01-12 | 2011-12-27 | Novell, Inc. | Information card overlay |
US8632003B2 (en) * | 2009-01-27 | 2014-01-21 | Novell, Inc. | Multiple persona information cards |
US8910251B2 (en) | 2009-03-06 | 2014-12-09 | Facebook, Inc. | Using social information for authenticating a user session |
US8214892B2 (en) * | 2009-07-15 | 2012-07-03 | Hewlett-Packard Development Company, L.P. | Password authentication system and methods |
US8549314B2 (en) | 2010-04-29 | 2013-10-01 | King Saud University | Password generation methods and systems |
US8539574B2 (en) * | 2010-09-09 | 2013-09-17 | Christopher Michael Knox | User authentication and access control system and method |
JP2014021779A (en) * | 2012-07-19 | 2014-02-03 | Nec Personal Computers Ltd | Authentication information input device, server device, authentication system and program |
JP5782409B2 (en) * | 2012-08-03 | 2015-09-24 | Necパーソナルコンピュータ株式会社 | Authentication information input device, server device, authentication system, and program |
JP5732439B2 (en) * | 2012-08-03 | 2015-06-10 | Necパーソナルコンピュータ株式会社 | Authentication information input device, server device, authentication system, and program |
US9230092B1 (en) * | 2013-09-25 | 2016-01-05 | Emc Corporation | Methods and apparatus for obscuring a valid password in a set of passwords in a password-hardening system |
US9154496B2 (en) * | 2013-09-25 | 2015-10-06 | Emc Corporation | Proactivation methods and apparatus for password-hardening systems |
CN104751032A (en) | 2013-12-31 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Authentication method and authentication device |
CN105426740A (en) * | 2015-12-17 | 2016-03-23 | 无锡天脉聚源传媒科技有限公司 | Screen unlocking method and device |
CN106888201A (en) | 2016-08-31 | 2017-06-23 | 阿里巴巴集团控股有限公司 | A kind of method of calibration and device |
US11244041B2 (en) | 2020-03-05 | 2022-02-08 | International Business Machines Corporation | Dynamic password generation using morphological groups |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2112190B (en) * | 1981-12-23 | 1985-12-18 | Omron Tateisi Electronics Co | Personal identification system |
US5719560A (en) * | 1989-12-08 | 1998-02-17 | Watkins; Christopher John Cornish Hellaby | Method of automatic verification of personal identity |
ES2109277T3 (en) * | 1990-08-29 | 1998-01-16 | Hughes Aircraft Co | DISTRIBUTED USER AUTHENTICATION PROTOCOL. |
US6263439B1 (en) * | 1996-08-27 | 2001-07-17 | John G. Hondros | Verification system for non-traditional learning operations |
US6542583B1 (en) * | 1997-03-06 | 2003-04-01 | Avaya Technology Corp. | Caller identification verification system |
ES2619367T3 (en) * | 1998-05-21 | 2017-06-26 | Equifax Inc. | System and method for network user authentication |
US20060010487A1 (en) * | 2004-07-09 | 2006-01-12 | Fierer Robert G | System and method of verifying personal identities |
-
2000
- 2000-12-25 JP JP2000391720A patent/JP3695695B2/en not_active Expired - Fee Related
-
2001
- 2001-07-19 US US09/909,383 patent/US7065786B2/en not_active Expired - Fee Related
-
2005
- 2005-06-21 US US11/158,040 patent/US20050240987A1/en not_active Abandoned
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007037703A1 (en) * | 2005-09-28 | 2007-04-05 | Chuan Pei Chen | Human factors authentication |
WO2007070014A1 (en) * | 2005-12-12 | 2007-06-21 | Mahtab Uddin Mahmood Syed | Antiphishing login techniques |
GB2486706A (en) * | 2010-12-21 | 2012-06-27 | Sharp Kk | A touch screen device with a random element unlocking mechanism |
GB2486706B (en) * | 2010-12-21 | 2017-05-24 | Sharp Kk | Handset |
US11126937B2 (en) | 2013-09-23 | 2021-09-21 | Farmobile, Llc | Farming data collection and exchange system |
US11107017B2 (en) * | 2013-09-23 | 2021-08-31 | Farmobile, Llc | Farming data collection and exchange system |
US11151485B2 (en) | 2013-09-23 | 2021-10-19 | Farmobile, Llc | Farming data collection and exchange system |
US11164116B2 (en) | 2013-09-23 | 2021-11-02 | Farmobile, Llc | Farming data collection and exchange system |
US11361261B2 (en) | 2013-09-23 | 2022-06-14 | Farmobile, Llc | Farming data collection and exchange system |
US11361260B2 (en) | 2013-09-23 | 2022-06-14 | Farmobile, Llc | Farming data collection and exchange system |
US11410094B2 (en) | 2013-09-23 | 2022-08-09 | Farmobile, Llc | Farming data collection and exchange system |
US11507899B2 (en) | 2013-09-23 | 2022-11-22 | Farmobile, Llc | Farming data collection and exchange system |
US11941554B2 (en) | 2013-09-23 | 2024-03-26 | AGI Suretrack LLC | Farming data collection and exchange system |
US10924505B2 (en) * | 2017-08-24 | 2021-02-16 | Red Hat, Inc. | Passcode based access-control with randomized limits |
Also Published As
Publication number | Publication date |
---|---|
US20020083347A1 (en) | 2002-06-27 |
JP3695695B2 (en) | 2005-09-14 |
US7065786B2 (en) | 2006-06-20 |
JP2002197062A (en) | 2002-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7065786B2 (en) | Password generation and verification system and method therefor | |
US9843571B2 (en) | Identity confirmation method and identity confirmation system | |
US10171454B2 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
US6078908A (en) | Method for authorizing in data transmission systems | |
US8813219B2 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
US8140854B2 (en) | User authentication method and user authentication system | |
US20140359734A1 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
US8539574B2 (en) | User authentication and access control system and method | |
US9531706B2 (en) | Icon password setting apparatus and icon password setting method using keyword of icon | |
WO2003014887A2 (en) | Method for supporting dynamic password | |
JP2005196800A (en) | User authentication method and user authentication system | |
WO2003081401A2 (en) | Method and apparatus for dynamic personal identification number management | |
JP2011253340A (en) | Authentication system and authentication method for the same | |
US20020019939A1 (en) | Encryption display card | |
CN101877195A (en) | Password protection method | |
GB2402234A (en) | Authorising a user who has forgotten their computer password | |
US7715560B2 (en) | Systems and methods for hiding a data group | |
Yampolskiy | User authentication via behavior based passwords | |
WO2011124267A1 (en) | Authentication system and method thereof | |
US7441122B2 (en) | Method for providing secure access to a digital resource | |
US11341268B2 (en) | System and method for storing digital data with enhanced privacy | |
JP2006011959A (en) | Information terminal device and user authentication method | |
Mihajlov et al. | Recognition-based graphical authentication with single-object images | |
JP2005327307A (en) | Password authentication system and its authentication method | |
KR20070056578A (en) | Password resetting method of portable terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |