WO2004027632A1 - Method and system for processing password inputted by the matching of cells - Google Patents
Method and system for processing password inputted by the matching of cells Download PDFInfo
- Publication number
- WO2004027632A1 WO2004027632A1 PCT/KR2003/001617 KR0301617W WO2004027632A1 WO 2004027632 A1 WO2004027632 A1 WO 2004027632A1 KR 0301617 W KR0301617 W KR 0301617W WO 2004027632 A1 WO2004027632 A1 WO 2004027632A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- board
- matching
- cell
- password
- cells
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1033—Details of the PIN pad
- G07F7/1041—PIN input keyboard gets new key allocation at each use
Definitions
- the present invention relates to a password system, and in particular to a method and system for processing a password inputted by the matching of cells that are capable of preventing a password from being revealed to the others in such a manner that a password inputted by a certain person is not known to others even when another person watches a password input procedure.
- a user authentication system has been widely used in various industrial fields for checking a certain user.
- the user authentication system is directed to performing a user authentication process using information provided by a user and information stored in a system.
- information used for a user authentication there are information memorized by a user such as ID and password, information stored in a storing medium such as a RF card, magnetic card, etc., and a biological information implemented using a physical feature such as a fingerprint, an iris, face, etc.
- the password system is a user authentication system implemented using information memorized by a user. It is easy to use the same, and the cost is lower as compared to other user authentication systems. The password system is easily implemented. Therefore, the password system has been most widely used.
- the password system is formed of a system related module for a user authentication process, and a user interface related module for inputting an ID or password.
- the modules having an encoding function are selectively used based on the system.
- a password system of a single user system like a desktop-alone, cellular phone, etc. does not include a password module or other security platform module.
- a password system having a plurality of users like an Internet banking system and UNIX system includes a password module or other security platform module each implemented based on an open key structure.
- the password system is one of user authentication system most commonly used based on the above-described advantages.
- the password system has a very big problem that an input procedure of password may be revealed to others.
- the following technologies are disclosed. According to the Japanese patent laid-open No.
- a key alignment position of a key input apparatus is fixed, even when a third party person recognizes only the position of a key alignment inputted by a password input person, the inputted key value is easily known to others.
- the randomly changed key alignments are opened to others positioned near a password input person, the password is directly revealed to others.
- a password system includes a reference board a nd a matching board o n a user interface.
- the reference board and matching board each are formed of at least more than two cells.
- the matching board reacts with respect to a user or a system computation.
- the reference board does not react with respect to a user and a system computation.
- the cell in the matching board and the cell in the reference board may be matched by a user or a system.
- the cell in the matching board and the cell in the reference board may be concurrently matched i n multiple n umbers.
- the u ser selects a cell in the matching board, and the selected cell is matched with the cell h aving a password s ymbol i n t he reference b oard for thereby i nputting a password.
- the system selects a cell in the reference board matched with the cell including the password symbol in the matching board from the matched matching board and reference board for thereby inputting a password.
- a password system comprising a display unit having a reference board in which a plurality of cells including one real reference cell that is a reference for matching, and a plurality of cells including a plurality of virtual reference cells for disguising the real reference cell are aligned and displayed, and a matching board in which a plurality of cells having one real matching cell matched with the real reference cell and a plurality of virtual matching cells for disguising the real matching cell are aligned and displayed; a cell generation unit for generating a group of cells displayed on the reference board and the matching board; a display control unit for receiving information concerning a group of the cells generated by the cell generation unit and aligning and displaying on the reference board and the matching board; a matching unit for matching a real reference cell and a real matching cell so that a user inputs a password; a matching cell process unit for generating a group of matched cells when the symbols aligned on the reference board and the matching board are matched by the matching unit and inputting into an
- a user authentication method of a password system comprising the steps of a step for generating a first cell group including one real reference cell that is a reference for matching and a plurality of virtual reference cells for disguising the same, and a second cell group including one real matching cell matching with the real reference cell and a plurality of virtual matching cells for disguising the same; a step for displaying a reference board for displaying the first cell group and a matching board for displaying the second cell group on a display unit; a step for inputting a two-password for matching the real reference cell of the reference board and the real matching cell of the matching board by a matching unit; a step for generating a group of the matched cells when the symbols of the reference board and the matching boards are matched and inputting into an authentication process unit; and a step for performing an authentication process for a llowing o r d enying a n a ccess t o a main s ystem b
- the others do not know the cell matched with a cell including a password among a plurality of matched cells of the matching board and reference board, so that it is impossible to know the password even when others watch the password input procedure.
- Figures 1 through 27 are views for describing a first embodiment of the present invention
- Figure 1 is a view illustrating various expression types of a cell
- Figure 2 is a view illustrating various expression types of a board
- Figure 3 is a view illustrating an example of a method for mapping a certain board to a straight line shaped board
- Figure 4 is a view illustrating an example of overlapped cells
- Figure 5 is a view illustrating an example that two boards are overlapped
- Figure 6 is a view illustrating an example that four boards are overlapped
- Figure 7 is a view illustrating a condition that overlapped cells should satisfy
- Figure 8 is a view illustrating an example that at least m ore than one board are moved in the same direction by the same distance;
- Figure 9 is a view illustrating an example that at least m ore than one board are concurrently not shown on the user interface;
- Figure 10 is a view illustrating an example that a board reacts with respect to a computation for a board, and a board does not react with respect to the computation;
- Figure 11 is a view illustrating an example for describing a reference board formed of at least more than two boards
- Figure 12 is a view illustrating an example for describing that a cell in a matching board is matched with a cell in a reference board by performing a computing with respect to a matching board;
- Figure 13 is a view illustrating an example for describing a cell including a password symbol
- Figure 14 is a flow chart of a procedure that the password symbols are sequentially matched with one cell in a matching board for thereby inputting a password
- Figure 15 is a view illustrating an example that there is a cell in a matching board, which is not matched with a cell (cells) in a reference board when a computation is performed with respect to a matching board so that the cell in the matching board selected by a user is matched with the cell having the password symbols;
- Figure 16 is a view illustrating an example for describing a rotational movement using an imaginary reference board
- Figure 17 is a view illustrating the construction that an imaginary reference board is a straight line
- Figure 18 is a view illustrating an operation that a rotational movement is possible without an imaginary reference board
- Figure 19 is a view illustrating the construction that an imaginary reference board and a reference board are combined and recognized as one reference board;
- Figure 20 is a flow chart of a method that a system recognizes the cell selected by the user in the case that the system knows the length of password;
- Figure 21 is a view illustrating the construction that a special symbol is shown in a reference board
- Figure 22 is a flow chart of a method that a system is enabled to know a cell that the user selects in the case that the system does not know the length of password;
- Figure 23 is a flow chart illustrating a procedure that the system determines a password inputted by a user based on a method that the system knows the length of password in a method that the cell selected by a user in the matching board is matched with a password symbol in the reference board for thereby inputting a password;
- Figure 24 is a view illustrating a procedure that the cell selected by the user in the matching board is matched with a password symbol in the reference board for thereby inputting a password;
- Figure 25 is a view illustrating a procedure that a system determines one password
- Figures 26 and 27 are views illustrating another example of a first embodiment of the present invention.
- Figure 26 is a view illustrating an example that a reference board and a matching board are aligned in parallel, so that the reference board and the matching board are not overlapped;
- Figure 27 is a view illustrating an example that a straight line shaped matching board is overlapped with a matrix shaped reference board
- Figures 28 through 33 are views for describing a second embodiment of the present invention.
- Figure 28 is a flow chart of a procedure that a cell in the reference board matched with a password symbol in the matching board is selected for thereby inputting a password in the case that a system knows the length of password;
- Figure 29 is a flow chart of a procedure that a cell in the reference board matched with a password symbol in the matching board is selected for thereby inputting a password in the case that the system does not know the length of password;
- Figure 30 is a view illustrating an operation that a matching board is disappeared on a user interface;
- Figure 31 is a flow chart of an operation of a system in the case that a system knows the length of password
- Figure 32 is a view illustrating an example for describing a method that a system determines one password symbol in the case that a system knows the ⁇ length of password;
- Figure 33 is a view illustrating an example that a reference board and a matching board are aligned in parallel, so that they are not overlapped as another example of a second embodiment of the present invention
- Figures 34 through 36 are views for describing a third embodiment of the present invention
- Figures 34A and 34B are views for describing a password input method according to a third embodiment of the present invention, of which Figure 34A illustrates a reference board and a matching board before matching, and Figure 34B illustrates a reference board and a matching board after matching;
- Figure 35 is a view for describing a password input method according to a third embodiment of the present invention based on a set principle
- Figure 36A is a view illustrating a real image reference cell and an imaginary reference cell and a real image matching cell and an imaginary matching cell used in the reference board and matching board of Figure 34A;
- Figure 36B is a view i llustrating a real image matched RRC and RMC and an imaginary image matched VRC, VMC and MCG in the pairs of matched cells of Figure 34B;
- Figures 37A through 37B are views of an example that two passwords are inputted by repeatedly performing a plurality of cell matching processes;
- Figures 38A through 38D and Figures 39A and 39B are views of various examples for generating RMSG and RPSG from two passwords;
- Figure 40 is a block diagram illustrating a relationship between a password system and a main system adapting the same according to a preferred embodiment of the present invention
- Figure 41 is a view illustrating the construction of a password system and a user interface according to the present invention.
- Figure 42 is a flow chart illustrating a user authentication process of a password system according to the present invention
- Figure 43 is a view of a user interface in a main system according to an embodiment of the present invention
- Figures 44A through 44D are views illustrating various examples of a reference board and a matching board
- Figure 45 is a view illustrating an example that a reference board is omitted
- Figure 46 is a view illustrating another examples of a display type of a reference board and a matching board
- Figure 47 is a view illustrating another example for displaying at least more than matching boards in parallel;
- Figure 48 is a view of an example of a graphic user interface capable of providing an input window for inputting a forward movement distance of a reference board for a symbol matching;
- Figure 49 is a view of an example of a graphic user interface having a plurality of input buttons for circulation-matching symbol rows
- Figure 50 is a view illustrating an example of a graphic user interface in the case that a matching board is automatically circulated;
- Figure 51 is a view of an example of a user interface of a two-password system cooperating with an electronic circuit
- Figure 52 is a view illustrating another example that only one reference board is shown.
- Figure 53 is a view of an example of a circuit construction of a user interface of Figure 51 ;
- Figure 54 is a view of an example of a user interface of a password system cooperating with a mechanical mechanism
- Figure 55 is a view of an example of a circuit construction of a user interface of Figure 54;
- Figure 56 is a view of an example that cells are aligned for adjusting a revolution of matching board within a certain range
- Figures 57A through 57D are views for describing an example of a set of matched cells
- Figure 58 is a view illustrating a table of a set of matched cells of Figures 57A through 57D;
- Figure 59 is a flow chart of a detailed process of a password authentication process
- Figure 60 is a view illustrating the symbols of MCG matched with RMSG guided from a two-password
- Figures 61 and 62 are views of an example of authentication reference information stored in a memory
- Figure 63 is a view illustrating an example that a password system according to the present invention is mounted on a standalone system
- Figure 64 is a view illustrating an example that a password system according to the present invention is mounted on a main system based on a network;
- Figure 65 is a view illustrating an example that a password system is mounted in a communication terminal based on a network.
- the present invention provides a new password input method capable of preventing a revealing of password even when a password input procedure is shown to others and a user interface and a password system having a password authentication process for the above method.
- FIG. 1 is a view showing various cells, (a) shows a cell of 3. (b) shows a cell having a solid line rim and a transparent rectangular shape interior, (c) is a gray color rectangular cell.
- the set of cells is called as a board.
- the terminology "set” represents a common set.
- the board may be shown in various shapes on a user interface.
- Figure 2 is a view illustrating various shapes of boards. As shown in Figure 2, (a) shows a rectangular board having nine cells formed in a matrix shape, (b) shows a circular board formed of eight cells, (c) shows a board formed of six scattered cells, (d) shows a board formed of seven scattered number cells. As not shown in the drawings, a board may be formed of a plurality of cells in a straight line. The dotted lines in (c) and (d) are provided for simply figuring out a shape of a board. The dotted lines are not shown in an actual user interface.
- the shape of the board may be commonly formed. Assuming that a board formed of an n-number of cells is X, and a board formed of a n number of straight line shaped cells is Y, a sequence is provided to the cells in X, and the cell having an i-th sequence in X may correspond with the i-th cell of Y (1 ⁇ l ⁇ n). Therefore, in the present invention, when a board is mapped in a straight line shape, it is recognized as a board irrespective of the number and shape of the cells and a state that the same cells are overlapped or not.
- Figure 3B is a view showing the construction that a sequence is provided to the cells of the board
- Figure 3C is a view showing the construction that the cell having i-th sequence of Figure 3B corresponds to the i-th straight line shaped cell.
- Figure 4C is a view showing the construction that the cells of Figures 4A and 4B are overlapped. Since the cells may be overlapped and shown on user interface, the cells may be overlapped and shown on the board or user interface.
- Figure 5C is a view showing the construction that the board of number cells of Figure 5A is overlapped with the board formed of rectangular cells of Figure 5B. As shown in Figures 5A and 5C, the dotted lines surrounding the board formed of number cells are formed for only figuring out the shape of the board and are not actually shown on the user interface.
- Figure 6E is a view showing the construction that the boards of Figure 6B are overlapped.
- Figure 6F is a view showing the construction that the board of
- Figure 6C is overlapped with the board of Figure 6D.
- Figure 6G is a view showing the construction that two overiapped boards of Figure 6E are overlapped with two overlapped boards of Figure 6F.
- the dotted lines of Figures 6A, B, C, D, and E are formed for only figuring out the shape of the board and are not actually shown in the user interface.
- Figure 7C are fully seen at one cell, and the cell of Figure 7B and the cell of
- Figure 6G is a view showing the construction that four boards are overlapped. Namely, at least more than two cells in another board are not overlapped with one cell of one board. At this time, when the rims of two cells are abutted, it is recognized that they are not overlapped.
- Figure 8D is a view showing a result that the boards of Figures 8A and 8B are moved in the same direction by the same distance in a state of Figure 8C. As shown in Figure 8D, the boards in the original position before the movement are not shown on the user interface after the boards are moved. For easier understanding, the above boards are shown. In addition, the dotted lines of Figures 8A, B, C, and D are shown for only figuring out the shape of the board and are not actually shown on the user interface.
- Figure 9F is a view showing a state that the boards of Figures 9A and 9B are disappeared from the state of Figure 9E in which the boards of Figure 9A, B, C and D are overlapped.
- the dotted lines of Figure 9A, B and C are formed for only figuring out the shape of the board and are not actually shown on the user interface.
- the user or system computes with respect to the boards for i nputting symbols belonging to the password. At this time, the computation m eans t hat t he b oard i s c hanged from t he p revious state t o t he next state.
- Figure 10F represents that the boards of Figures 10A and 10B are moved from the states of F igure 1 OF i n which the boards of F igure 1 0A, B , C a nd D a re overlapped.
- Figure 10G is a view showing the construction that the boards of Figures 10A and 10B are moved. In the construction of Figure 10G, the boards of Figure 10C and 10D are not moved.
- the set formed of boards reacting with respect to the computation in the same manner is called as a matching board
- the set formed of the boards not reacting with respect to the computation is called as a reference board.
- the boards of Figure 10Aand Figure 10B react with respect to the computation and are moved in the same distance by the same distance. Therefore, the set formed of the boards of Figure 10A and Figure 10B is called as a matching board, and since two boards of (c) and (d) of Figure 10 do not react with respect to the computation, the set formed of two boards of Figure 10C and 10D is called as a reference board.
- the reference board is formed of at least more than one board, but it is recognized as one board.
- the board of Figure 10C is called as a reference board, even when the board of Figure 11 C is overlapped with the boards of Figure 11 A and Figure 11 B, the boards are recognized as one board. Therefore, in the case that the reference board is formed of at least more than two boards, and at least more than two cells in at least more than two boards are overlapped, the overlapped cells are set as one and are recognized as one cell in the reference board.
- the matching board is formed of at least more than one board, but it is recognized as one board. In addition, in the case that the matching board is formed of at least more than two boards, and at least more than two cells in at least more than two boards are overlapped, the overlapped cells are set and recognized as one cell in the matching board.
- P i is cell b ut is called as a password symbol (1 ⁇ l ⁇ n).
- the cell overlapped with the password symbol and the password symbol in the reference board or matching board are combined and called as a cell including the password symbol.
- Figure 13A shows the matching board, and password symbol is 1
- Figure 13B shows the cell including 1.
- the password symbol itself is called as the cell including the password symbol.
- Figure 13C shows the reference board, and the password symbol is 1
- Figure 13D shows the cell including 1.
- Figure 14 is a flow chart of a procedure that the password symbols in the reference board are sequentially matched with one cell in the matching board for thereby inputting a password.
- the system shows the matching board and the reference board on the user interface (S101).
- the user selects a certain cell in the matching board (S102).
- the user repeatedly performs the process for performing a computation with respect to the matching board so that the cell selected in the step S102 is matched with the cell included in P j (S103 through S106).
- the user transfers a password input completion signal to the system (S107).
- the system is n ot limited to show the reference board and the matching board one time.
- the user can repeatedly perform the process that the user selects a certain cell in the matching board, and the selected cell is matched with the cell including the password symbol.
- the system can show a new reference board and a matching board on the user interface whenever one cell selected by the user in the matching board is matched with one cell including the password symbol before the user completes inputting the password.
- the step S107 may be omitted in the case that the system knows the length of the password.
- the cell in the matching board selected by the user when the cell in the matching board selected by the user is matched with the cell including the password symbol in the reference board, the cell in the matching board that the user did not select should be matched with the cell including the symbols, the password symbol. All cells in the matching board are matched with the cells in the reference board, so that others who do not know the cells in the matching board selected by the user cannot know the user's password symbols even when others see the input procedure of the password symbols.
- the cell selected by the user since the cell selected by the user should be matched with the cell including the p assword symbol in the reference b oard, there should be cells including at least password symbol in the reference board.
- the reference board should include the cells including at least numbers from 0 to 9.
- the password symbols in the matching board are preferably shown in a certain recovery extraction sequence. Even when they are not sequentially shown, there is no problem. Since the user select a certain cell in the matching board, it is not needed that all cells in the matching board should be different. However, in the case that all cells are same, the user may confuse with the selected cell, so that it is not preferred that all cells are same.
- what the cell selected by the user is matched with the cell including the password symbol P ⁇ in the reference board may be implemented using an input apparatus.
- the matching board is recognized as a cursor, and the user drags the matching board and drops the same when the cell selected by the user is matched with the cell including P i in the reference cell.
- the step S107 may be omitted in the case that the system knows the length of the password. Namely, since the system knows the length of the password, when the user performs the step S104 by n- times, the system recognizes that the password input is completed. In the case that the system does not know the length of the password, the user transfers a signal that the password input is completed to the system using an input apparatus. For example, the user pushes a left button of the mouse for performing the step S104 and pushes a right button of the mouse for performing the step s 107.
- Figure 15A shows the matching board
- Figure 15B shows the matching board
- Figure 15C shows that there are the cells in the matching board not matching with the cells in the reference board.
- Figure 15A shows the matching board
- the matching board is moved in the direction of the arrow of Figure 15B
- eight imaginary reference boards are placed on the surrounding portions of the reference board.
- Figure 16A shows the positions on which eight imaginary reference boards are placed.
- the rectangular shape means the reference board.
- Figure 16B shows the moving direction of eight imaginary reference boards and the matching board.
- the cells indicated by the dotted lines in Figure 16B are not actually shown on the user interface but are provided for describing the rotation and movement.
- Figure 16C shows a result after the matching board is moved.
- the cell in the imaginary reference board matched with the cell in the matching board in Figure 16C is recognized as the cell in the reference board
- a nd the cells in the reference board not m atching with the cell in the matching board is recognized as the cell in the reference board.
- Figure 16E shows a result after the matching board is moved in the direction of the arrow.
- the movement of the matching board may be described using the imaginary reference board based on the shapes of the reference board and the matching board.
- the shape and number of the imaginary reference board may be different based on the computation with respect to the shape of the board and the matching board. For example, assuming that the rectangular cell indicated by the full line in Figure 17 is the cell in the reference board, and the computation with respect to the matching board is performed for moving the matching board in the left and -right directions, two imaginary reference boards indicated by the dotted line may be provided, and a result of computation will be described.
- Figure 18A shows the matching board
- Figure 18B shows the reference board
- Figure 18C concurrently shows the matching board and the reference board
- the user can enable the matching board to rotate.
- Figure 18D shows a result that the matching board is rotated in the right direction one time. Therefore, Figure 18D shows a result of the computation performed with respect to the matching board without using the imaginary reference board.
- the dotted lines of Figures 18A, B and D are provided for simply figuring out the shape of the board and are not actually shown on the user interface.
- Figure 19 shows the c ase t hat nine r eference boards a re s hown o n t he u ser i nterface. At t his time, since nine reference boards identically react with respect to the computation, they are recognized as one reference board.
- Figure 20 is a flow chart of a method for enabling the system to know a user's selection of a certain cell when the system knows the length of password.
- the user's password is P ⁇ P 2 ...P n •
- the user repeats a process of matching the cell selected in the step S202 with P ⁇ (1 ⁇ l ⁇ n)(S204). Since the system knows the length of password, when the user performs the step S204 n-times, at least more than one cell including the special symbol is transferred to the reference board (S207).
- Figure 21 is a view illustrating an example that there are special symbols * in nine cells in the reference board. The user matches the cell selected in the step S202 with a cell including the special symbol in the reference board (S208).
- FIG. 22 is a flow chart of a method for enabling the system to know the user selects a certain cell in the case that the system does not know the length of password.
- the user's password is P ⁇ P 2...P n
- the user repeats the process of matching the cell selected in the step S302 with P ⁇ (1 ⁇ Kn) (S307).
- the user transfers a signal that the step S304 is completed to the system (S307).
- the system shows at least more than one cell including a special symbol in the reference board (S308).
- the user matches the cell selected in the step S302 with the cell including a special symbol in the reference board (S309).
- the method according to the present invention is a preferred embodiment among multiple embodiments.
- Figure 23 is a flow chart of a procedure that the system determined the password inputted by the user based on the method of Figure 20 in a method for inputting the password in such a manner that the cell selected by the user is matched with the password symbol in the reference board.
- Figure 24A shows the reference board and the matching board on the user interface like Figure 24A, and the user selects the cell including the symbol of 8 in the matching board, and the system knows that the length of the password of the user is 4, and the user sequentially matches the cell including the symbol of 8 in the matching board with the cells including the symbols of 1 , 5, 2, and 8 in the symbol board.
- Figure 24B shows that the cell having the symbol of 8 in the matching board is matched with the cell including the symbol of 1 in the reference board.
- Figure 24C shows that the cell including the symbol of 8 in the matching board is matched with the cell including the symbol of 5 in the reference board.
- Figure 24D shows that the cell including the symbol of 8 in the matching board is matched with the cell including the symbol of 2 in the reference board
- Figure 24E shows that the cell including the symbol of 8 in the matching board is matched with the symbol of 8 in the reference board.
- the system shows the reference board formed of the cells including the special symbols of Figure 24F on the user interface when the user completes matching the cell in the matching board with the cell including the password symbol in the reference board.
- the user matches the cell including the symbol of 8 in the matching board with the cell including the special symbol of the reference board.
- Figure 24A A result of the above operation is shown in Figure 24A.
- the matching board is shown on the user interface, but the matching board is not shown for helping understanding.
- the system stores the symbols in the cell of the matching board. At this time, the same two cells may appear in the matching board.
- the matching board may be mapped in a straight line shape. Since a certain sequence may be provided to the straight line board, the sequences provided to the cell may be recognized as the symbols. It is recognized that the cell of the matching board includes symbols.
- Figure 25A shows an example that the symbols in the cell of the matching board are stored in one dimensional alignment formed of nine rooms.
- Figure 25B shows a result that the symbol included i n the cell i n the reference board matched with each symbol included in the cell of the matching board in Figure 24B is stored in the place in which the symbol included in the cell of the matching board is stored. It is recognized that the symbol in the same row as the symbol included in the cell in the reference board matched in Figures 25B, C, D, E and F is stored in the place in which the symbol included in the cell of the matching board is stored.
- Figure 25C shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in Figure 24C is stored in the place in which the symbol included in the cell of the matching board is stored.
- the sequence of the symbols stored in one row is a matched sequence.
- Figure 25D shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in Figure 24D is stored in the place in which the symbol included in the cell of the matching board is stored.
- Figure 25E s hows a result that the symbol included i n the cell i n the reference board matched with each symbol included in the cell of the matching board in Figure 24E is stored in the place in which the symbol included in the cell of the matching board is stored.
- Figure 25F shows a result that the symbol included i n the cell i n the reference board matched with each symbol included in the cell of the matching board in Figure 24G is stored in the place in which the symbol included in the cell of the matching board is stored.
- the system recognizes "1528" as the password inputted by the user.
- the first symbol in the row including the special symbol is the symbol included in the password.
- the system may recognizes the sequence of the remaining symbols including the first symbol in the row including the special symbol as a password.
- Figures 26 and 27 show the modified examples of the first embodiment of the present invention.
- Figure 26 shows an example that the reference board and the matching board are overlapped in a straight line shape in parallel
- Figure 27 shows an alignment in which the straight line shaped matching board is overlapped with the matrix shaped reference board.
- Figure 26A it is possible to align the reference board and the matching board in parallel in such a manner there are not overlapped with each other.
- matching the cell of the reference board and the cell of the matching board are performed in the same row.
- the matching method for inputting the password is implemented in the same method as the above method.
- the password is "1528”
- the user selects a certain cell, for example, 8 in the matching board and sequentially matches the cells including the password of the reference board as shown in Figures 26B through 26E using the selected cell. 8 of the matching board is last matched with the special symbol * displayed in the reference board.
- the circulating rows are aligned in multiple, and the straight line shaped matching boards are overlapped with the reference board having the matrix shape based on the widths of the reference board.
- the matching method for inputting the password is similar with the above method.
- the password is "1528”
- the user selects a certain cell, for example, the first cell in the matching board, and the cells including the password of the reference board are sequentially matched using the selected cell as shown in Figures 27B through 27E, and the first cell of the matching board is last matched with the special symbol * displayed in the reference board.
- the reference board and the matching board are overlapped or separated and are shown on the user interface.
- the reference board and the matching board each are formed of at least more than two cells.
- the matching board reacts with respect to the computation of the user, and the reference board reacts with respect to the computation of the user.
- the user selects a certain cell in the matching board, and inputs the password in such a manner that the selected cell is matched with the cell including the password symbol in the reference board.
- the other cells of the matching board and the other cells of the reference board are concurrently matched in multiple numbers. Therefore, others do not know the cells matched with the cells including the password symbols among a plurality of matched pairs of cells of the matching board and reference board, so that it is impossible to know the password even when the others see the input procedure of the password.
- the matching board reacts with respect to the computation of the user, and the reference board does not react with respect to the computation of the user.
- the reversed cases may be possible.
- the user selects a certain cell in the matching board, and the selected cell is matched with the cell including the password symbol in the reference board for thereby inputting the password.
- the reversed cases may be possible.
- Various modifications from the first embodiment of the present invention are possible, but are obvious to a person skilled in the art, so that the detailed examples are omitted.
- Figures 28 and 29 are flow charts of a procedure of selecting a cell in the reference board matched with the password symbol in the matching board and inputting the password.
- Figure 28 is a flow chart of a procedure for selecting a cell in the reference board matched with the password symbol in the matching board and inputting the password in the case that the system knows the length of password.
- the system shows the matching board and the reference board on the user interface (S502).
- the system enables the matching board to disappear from the user interface (S503).
- the user repeats the procedure for selecting the cell in the reference board matched with the cell including the password symbol Pi in the matching board in the step S502 in a state that the matching board is disappeared from the user interface (1 ⁇ l ⁇ n) (S504).
- Figure 29 is a flow chart of the procedure for inputting the password by selecting the cell in the reference board matched with the password symbol in the m atching board i n t he c ase that t he s ystem d oes n ot k now t he I ength o f password.
- the password of the user is P 1P2...P 1V
- the system shows the matching board and the reference board on the user interface (S602).
- the system enables the matching board to disappear from the user interface (S603).
- the user repeats the procedure for selecting the cell in the reference board matched with the cell including the password symbol P i in the matching board in the step S502 in a state that the matching board is disappeared from the user interface (1 ⁇ l ⁇ n) (S604).
- the user informs the system that the password input is completed (S607).
- all cells of the matching board are matched with all cells of the reference board, so that the others who do not know the password symbols do known know the cells including the password symbols in the matching board matched with the cell selected by the user in the reference board even when the others see the procedure of inputting the password by the user.
- the password symbols in the matching board are shown in a certain non-recovering extraction sequence. Even when they are not shown in the sequence, it does not matter.
- the user selects the cell in the reference board matched with the cell including the password symbol in the matching board, it is not needed that all cells in the reference board are different. In the case that they are all same, the user may confuse for selecting a certain cell, so that it is not preferred that all cells are same.
- selecting the cell in the reference board matching with the cell including the password symbol in the matching board is performed using the input apparatus.
- the user may transfer a signal that the password input is completed using the input apparatus to the system. For example, the user may use t he I eft b utton o f the mouse for s electing the cell i n the r eference b oard matching with the cell including the password symbol in the m atching board, and the user may use a right button of the mouse for informing the completion of the password input to the system.
- the cell including a certain password symbol since the user selects the cell in the reference board matched with the cell including the password in the matching board, the cell including a certain password symbol must be provided in the matching board. For example, assuming that the password symbol is a number between 0 and 9, there should be a cell including a certain number between 0 and 9 in the matching board.
- Figure 31 is a flow chart of the operation of the system based on the operation of Figure 28.
- the system shows the matching board and the reference on the user interface (S701).
- the system disappears the matching board from the user interface (S702).
- the symbol included in the cell in the matching board matching with the cell selected in the step S701 is recognized as the password symbol.
- Figure 32 shows a procedure for determining the password symbol. It is assumed that the system shows the matching board and the reference board on the user interface as shown in Figure 32A, and Figure 32B shows a state that the matching board is disappeared from the user interface. In addition, it is further assumed that the password symbol that the user wants to input is 6.
- the user selects the cell in the reference board shown in Figure 32B matching with the cell including the symbol 6 in the matching board in Figure 32A.
- the user selects the cell including the symbol 2 of Figure 32B, and the system determines the password symbol that the user wants to input the symbol 6 in the cell including the symbol 6 matching with the cell including the symbol 2 in the reference board in Figure 32A.
- Figure 33 shows a modified example of the second embodiment of the present invention and is an example that the reference board and the matching board are not overlapped and are aligned in parallel.
- the reference board and the matching board are not overlapped and are aligned in the straight line shape, it is known that it is possible to input the password in the same manner as the above method.
- the method for inputting the password by matching a certain cell will be first described.
- an actual image reference symbol set and an actual image matching symbol set forming the two-password will be described.
- the user interface proper to the two-password input method will be described.
- the password system adapting the above password input method and the password authentication process will be described.
- the user matches a certain cell of the reference board and the matching board based on a certain matching rule, and the password input is performed by repeating the matching process at least more than one time.
- the password input is performed by repeating the matching process at least more than one time.
- a false matching of each pair of cells are performed. Therefore, a plurality of cells are mixed and matched, so that even when the password input procedure is seen by others. It is impossible to recognize the actual cell matching for inputting the password, so that others cannot know the password.
- Figures 34A and 34B are views for describing the password input method according to a third embodiment of the present invention.
- Figure 34A shows the reference board and the matching board before the matching
- Figure 34B shows the reference board and the matching board after the matching.
- a reference board 1 formed of a plurality of cells on the upper side of the same
- a matching board 2 formed of a plurality of cells in a lower side of the same.
- the numbers of the cells aligned in the reference board 1 are sequential, and the numbers of the cells aligned in the matching board 3 are non-sequential.
- the symbol board 1 and the matching board 3 may be displayed on type of the graphic user interface on a display apparatus.
- the user inputs a password in such a manner that a specific cell in the symbol board 1 is matched with a specific cell in the matching board 3 based on a certain matching rule.
- the matching rule is directed to aligning the cells of the symbol board 1 and the matching board 3 in the same vertical row.
- the user circulates the matching board 3 four times (or five times in the left circulation direction) in the right direction for the password input, and as shown in Figure 34B, 3 of the symbol board 1 and 5 of the matching board 3 are aligned in the same vertical row.
- the pairs of the cells 5 matched in the vertical row in the symbol board 1 and the matching board 3 are formed (1 ,2), (2,9), (3,5), (4,7), (5,6), (6,1), (7,3), (8,4), and (9,8).
- the total number of the same is 9.
- the above pairs are all number pairs obtained when moving the matching board 3 four times in the right circulation direction.
- Figure 35 is a view for describing the password input method according to a third embodiment of the present invention implemented based on the common s et concept.
- the user selects one element of the set A and one element of the set B for the password input and matches the selected two elements.
- the other elements of the sets A and B are matched with each other based on a certain matching rule.
- a method for matching two cells of two sets A and B there is a method for changing the aligned sequences of the elements belonging to a certain set. For example, the aligning sequence of the elements of the set B is changed. Therefore, a set C of the matched elements is generated based on a certain matching rule between the set B having the changed aligning sequence and the set A.
- each element of the sets A and B is provided.
- the aligned sequence of the elements of the set B is changed.
- a set C formed of a pair of matched elements is generated based on a matching sequence of the elements of the set A and the set B'.
- An authentication is achieved based on the generated set C.
- a certain element of the set A that is a reference for the matching is called as a real reference cell (RRC), and the remaining elements for disguising the RRC is called as a virtual reference cell (VRC).
- a certain element of the set B for matching to the RRC is called as a real matching cell (RMC).
- VMC virtual matching cell
- the VRC of the set A and the RMC of the set B are matched.
- the pairs of the sets C that the set A and the set B are matched based on a certain matching rule are called as a matched cells group (MCG).
- MCG matched cells group
- the matching of the RRC and the RMC is performed by at least more than one time.
- a plurality of cell matching procedures are repeatedly performed for thereby inputting a password.
- the hatched symbols are provided for helping a better understanding of the descriptions. They are shown on the user interface in the same shape as the other symbols.
- the contents in the upper sides are the reference board 7 and the matching board 9 for showing the after-matching state with respect to the before-matching contents of the lower side.
- the RRC of the symbol board 7 and the RMC of the matching board 9 are aligned in the same vertical row. For example, assuming that the RRC is 3, 7, 2, 9 and the RMC is 5, 1 , 6, 6, in order to match with the RRC and RMC, as shown in Figures 37A through 37D,3 and 5, 7 and 1 , 2 and 6, and 9 and 6 are sequentially matched using the symbol board 6 and the matching board 9.
- the group of the symbols formed of a plurality of RRC is called as a real reference cell group (RRCG), and the group formed of a plurality of RMC is called as a real matching cell group (RMCG).
- RRCG real reference cell group
- RMCG real matching cell group
- the RRCG is 3729
- the RMCG is 5166.
- the number of the cells including the RRC and VRC is the same as the number of the cells including the RMC and VMC (in the embodiment, the number of the same is 9), but they are not needed to be same. Namely, they may be different in another embodiment of the present invention.
- the number of the symbol rows aliened in the upper side may be 9, and the number of the symbol rows aligned in the lower side may be 7.
- the password used in a password input method of a third embodiment of the present invention is different from a password used in the common password system, the password used in the third embodiment of the present invention is called as a two-password.
- the password used in the common password system is a symbol group in which symbols are sequentially aligned. Therefore, it is needed to sequentially input the password in a determined sequence based on the symbol group designed as a password into the password system. For example, in the case that the password of a credit card is set as 2976, when it is intended to use the credit card in an automatic teller machine (ATM), the user should sequentially input 2, 9, 7 and 6 using the number keypad provided in the ATM.
- ATM automatic teller machine
- the two-password has different from the conventional password of the above input method.
- the two-password may be formed of RRCG and RMCG.
- the two-password may be either RRCG or RMCG or may be induced from the same. Therefore, what the symbol group formed of RRCG and RMCG is called as the two-password.
- various methods for determining the RRCG and RMCG from the two-password will be described with reference to Figures 38A through 38D and Figures 39A and 39B. First, an example that the two-password is formed of RRCG and RMCG will be described.
- the front side four numbers of 3729 are defined as RRCG
- the rear side four numbers of 5166 are defined as RMCG.
- the sequential pairs of the real matched RRC and RMC are (3,5), (7,1), (2,6), and (9,6).
- the method for generating the RRCG and RMCG from the two-password may be implemented follows.
- the RRCG and RMCG are as follows.
- the sequential pairs of the RRC and RMC are implemented as follows.
- Two-password Xi X 2 X3 ... Xn-2 X n - ⁇ Xi Xi X2 X ⁇ ... Xn-2 Xn-1 Xn (n is natural number)
- RRCG X-) X 2 X3... Xn-2 Xn-1 Xn RMCG: Y 1 Y 2 Y 3 ... Y ⁇ .2 Yn-l Yn
- the two-password is formed of RRCG and RMCG.
- the RRCG and RMCG are formed using the groups of the numbers alternately selected from the two-password. For example, when the two- password is 37295166, the RRCG and RMCG are 3256 and 7916, respectively. In this case, the sequence pairs of the RRC and RMC real-matched for the input of the password is (3,7), (2,9), (5,1 ), (6,6).
- the method for generating the RRCG and RMCG from the two-password may be implemented as follows. As shown in Figure 38B, in the case that the two-password is defined, the RRCG and RMCG are as follows. At this time, the sequence pairs of the RRC and the RMC may be expressed as follows.
- the RMCG is induced from the above two-password.
- the two-password is 37295166
- the entire number group of the same is used as the RRCG, and the RMCG is induced therefrom.
- the inducing rule is to use the number group obtained by rotating the RRCG one time.
- the RMCG becomes 72951663.
- the sequence pairs of the real-matched RRC and RMC for the input of the password is (3,7), (7,2), (2,9), (9,5), (5,1 ), (1 ,6), (6,6), (6,3).
- the method for generating the RRCG and RMCG from the two-password will be implemented as follows.
- the RRCG and RMCG are as follows.
- the sequence pairs of the RRC and RMC are implemented and expressed as follows.
- a part of the two-password is RRCG.
- Another part including a part of the RRCG is RMCG.
- the two-password is 37295166
- the remaining group 3729516 except for the last number is used as RRCG.
- the sequence pairs of the real matched RRC and RMC for the input of the password is (3,7), (7,2), (2,9), (9,5), (5,1), (1 ,6), (6,6).
- the method for generating the RRCG and RMCG from the two-password may be implemented as follows. As shown in Figure 38D, the two-password may be defined, and the RRCG and RMCG may be defined as follows. At this time, the sequence pairs of the RRC and RMC may be implemented as follows.
- Two-password X1X2X3... X n -2 X n - ⁇ Xn (n is natural number)
- RRCG X-i X2 X3--- Xn-2 Xn-1
- the RRCG and RMCG generated from the two-password have a relationship of 1 :1. They may have a relationship of 1 :n or n:1.
- RRCG and RMCG generated from the two-password may have a relationship of 1 :n or n:1.
- Figures 39A and 39B only one RRC is generated as RRCG from the two-password, and the remaining symbol group is generated as RMCG.
- the reverse generation is also possible.
- the sequence pairs of the RRC and RMC may be expressed as follows.
- the sequence pairs of RRC and RMC (RRQ, RMQ) : (Xj, X n ) (1 ⁇ i ⁇ n-1)
- the method for generating RRCG and RMCG from the two-password, and the method for forming a sequence pair of RRC and RMC may be modified and applied in various methods.
- the above various modifications and applications are obvious to a person skilled in the art.
- the other modification and a pplications described in the present d escription m ay be included in the concept of the present invention.
- the t hree-password is also possible, a nd the four-password or the more passwords are also possible.
- the above applications and extensions should be implemented in considered with the users. Namely, memorizing the two-password should be easy to the users, and the procedure for matching the symbols for inputting the two-password should be easy.
- the password input method based on the matching of cells may be implemented based on a password system having a user interface and a password authentication process.
- Figure 40 is a block diagram showing a relationship between the password system and a main system adapting the same according to a preferred embodiment of the present invention.
- the password system 30 provides a user interface 20 so that a user 10 can input a two-password.
- the user interface 20 includes interface members for inputting the two-password by the matching of cells by the user.
- the password system 30 receives the two- password inputted from the user through the user interface 20 and performs an authentication and enables the authenticated person to access the main system 40.
- the user interface 20 is not limited to a few embodiments to be described later.
- the detained embodiments of the user interface 20 that will be described later are provided for only easier understanding of the present invention.
- Various modifications and applications of the detailed constructions of the user interface 20 based on the characteristics of the main system 40 adapting the password system 30 are obvious to a person skilled in the art.
- the user interface 20 may include a graphic user interface.
- the user interface 20 may include a mechanical system and an electronic circuit.
- Figure 41 is a view illustrating the basic construction of the user interface for the password system according to the present invention
- Figure 42 is a flow chart illustrating a user authentication process of the password system of the present invention.
- the two-password system 30 includes a display control unit 31 , a cell generation unit 32, a matching cell process unit 33, an authentication process unit 34, and a memory 35.
- the user interface 20 for the two-password input includes a display unit 22 and a matching unit 24.
- the cell generation unit 32 generates a group of cells included in each cell of the reference board and the matching board displayed on the display unit 22 and provides the group to the display control unit 31.
- the display control unit 31 includes the provided symbol group into the cells of the reference board and the matching board and outputs to the display unit 22, so that the reference board and the matching board are displayed on the display unit 22.
- a step S30 the user 10 matches the cells of the reference board and the matching board displayed on the display unit 22 using the matching unit 24.
- the matching cell process unit 33 generates a matched cell group MCG based on the input of the user through the matching unit 24.
- the generated group is inputted into the authentication process unit 34.
- the authentication process unit 34 performs a password authentication process based on the authentication reference information 36 stored in the memory 35. The detailed process thereon will be described later.
- the group of the cells for inputting the two- password is generated and displayed to the user differently from the conventional password system.
- the authentication process based on the matched cell group MCG is different t from the conventional password system in their characteristics. The detailed descriptions thereon will be provided later.
- Figure 43 is a view illustrating an embodiment of the user interface based on the main system according to the present invention.
- the password system 30 may be mounted on the main system 40 such as a system having a graphic user interface, for example, a p ersonal computer system, PDA, ATM financial terminal, etc.
- the user i nterface 20 i excludes the display apparatus 50 a s a display unit 22 such as a CRT display apparatus, a L CD apparatus, etc., and the graphic user interface 60.
- an input apparatus 54 as a matching unit 24 such as a keyboard apparatus, a pointing apparatus, etc.
- the graphic user interface 60 displayed on the screen 52 of the display apparatus 50 includes a reference board 61 and a matching board 62.
- the user 10 uses an input apparatus 54 for inputting the two-password.
- the cells aligned on the reference board 61 and/or the matching board 62 are circulation-moved in accordance with a control of the user 10.
- the reference board 61 may be fixedly displayed, and the matching board 62 may be circulated in the right or left direction.
- the symbol row aligned on the reference board 61 is a reference for the matching, it is preferred that a display sequence is sequentially displayed so that the RRC is quickly recognized.
- the aligning sequence of the reference board 61 may be randomly displayed in a non- sequence. It is preferred that the symbols aligned on the matching board 62 are randomly displayed based on a non-recovering method.
- the reference board 61 and the matching board 62 may be circulated and displayed in different directions.
- the aligning sequence of the reference board 61 may be randomly displayed based on the non-sequential method. It is preferred that the symbols aligned on the matching board 62 are randomly displayed.
- the reference board 61 and the matching board 62 may be circulated and displayed in different directions.
- the reference board 61 may be fixedly displayed, and each cell of the matching board 62 may be circulated and displayed, being moved from its original place to the upward side or downward side.
- the above circulation display method may be modified and applied in various methods in addition to the above- described method. The above applications and modifications are obvious to a person skilled in the art.
- the reference board 61 and the matching board 62 may be displayed in a straight line shape and may be displayed in various shapes. For example, as shown in Figures 44A through 44D, it may have a circular shape or a matrix shape.
- the aligned cells may be formed in numbers, characters, graphics, pictures, and a combination of the same.
- the aligned cells may be displayed with a color so that a user can easily recognize.
- the cells of the matching board 62 may have different colors in a circle having numbers. The method for selecting colors is determined so that the user can quickly recognize the symbols.
- the cells may be formed in a board.
- the reference board 61 or the matching board 62 is fixedly displayed for recognition, the display of the same may be omitted.
- the reference board 61 and the matching board 62 may have switched display shapes.
- the symbols aligned on the matching board 62 may be sequentially aligned, and the sequences of the symbols aligned on the reference board 61 may be aligned randomly based on the non-recovery method.
- the matching board 62 may be fixed, and the reference board 61 may be circulated and displayed in accordance with a control of the user. The above modification is obvious to a person skilled in the art.
- At least more than two matching boards 62 may be concurrently displayed in parallel.
- the user inputs the two-password by sequentially performing the symbol matching with the reference board 61 using each cell.
- the number of the cells displayed on the matching board 62 is determined by the number of the RMCG. It may be smaller than the number of the RMCG.
- the cells not displayed when the cells are circulated a nd moved may appear a nd may be displayed.
- the symbol row is circulated for the symbol matching.
- the circulation moving distance of the symbol row may be directly inputted.
- an additional input window 63 may be provided on the graphic user interface 60, so that the circulation moving distance of the matching board 62 may be directly i nputted by the user.
- i n the case that the RPCG is 3 as one RRC, and the RMCG is 5618
- the numbers 5, 6, 1 and 8 of the matching board 62 are circulated in the right direction and are matched with respect to the cell 3 of the reference board 61.
- the circulation moving distance is 4 times, 2 times, 1 time, and 7 times. Therefore, 4217 are inputted on the input window 63.
- a plurality of matching control buttons 64 may be provided on the graphic user interface 60 for circulating and matching the symbol row.
- the matching control button 64 includes a left, right circulation movement button, a start reset button, a matching button and an input completion button.
- the reference board 61 or the matching board 62 may be automatically circulated, and the user performs an input operation when the RRC of the reference board 61 and the RMC of the matching board 62 are matched.
- the matching board 62 when the matching board 62 is automatically circulated, the user may input the enter button 65 displayed on the graphic user interface 60 and informs that the symbols are matched or may input the enter key of the input apparatus 54.
- the arrow indicated by the dotted line of the matching board 62 represents a rotation direction, but is not actually displayed.
- the graphic user interface is not limited to the above descriptions. At least more than two above-described embodiments may be combined.
- the number of the cells aligned on the reference board 61 and the matching board 62 may be limited to a certain number in consideration with the user's state and security. For example, in the case that it is intended to increase the security, it is needed to increase the number of the cells aligned, and in the case that a fast password input and process is needed, the number of the cells aligned may be decreased.
- the two-password system according to t he p resent i nvention m ay b e mounted on a mechanical system and a system having an electronic circuit, for example, a locking system such as an electrical door lock, and an entrance control system.
- the two-password system may be cooperate with the mechanical system and electronic circuit mounted on the main system.
- the user interface may be constituted as follows.
- Figure 51 is a view illustrating an example of a user interface of the two- password system cooperating with the electronic circuit.
- Figure 52 is a view illustrating a n example of d isplaying o ne m atching board, a nd F igure 53 i s a view illustrating the construction of a circuit of a user interface of Figure 51.
- the password input panel 70 is provided as a user interface for inputting the two-password in the main system 40 like the electronic door lock or entrance control system.
- the password input panel 70 includes a LCD 71 as a display unit for displaying the symbol group.
- the images of the reference board 72 for displaying the RRC and VRC and the matching board 73 for displaying the RMC and VMC are displayed.
- the matching board 73 may be displayed on the LCD 71
- the reference board display region 72a may be provided on an upper side of the front surface of the password input panel 70 for thereby printing and displaying a corresponding cell.
- the matching control buttons 74 on the front surface of the password input panel 70.
- the matching control button 74 there are a left and right circulation movement button, a start/reset button, a matching button, and an input completion button.
- the password input panel 70 includes the LCD control circuit and the button input process circuit 75 and displays the reference board 72 and the matching board 73 on the LCD 71 in response to a display control signal provided from the password system 30.
- the user inputs the two-password using the matching control button 74.
- the LCD control circuit and the button input detection circuit 75 receive an input of the matching control button 74 and provides to the two-password system 30.
- Figure 54 is a view illustrating an example of the user interface of the password system cooperating with the mechanical system.
- Figure 55 is a view illustrating an example of the circuit construction of the user interface of Figure 54.
- the password input panel 80 includes a reference board display region 81 in an upper side of the front surface, and the symbols displaying the RRC and VRC are printed and displayed.
- the matching board for displaying the RMC and VMC includes a wheel mechanism 82 coupled with a plurality of wheels 83. A plurality of symbols are circulated and printed on each wheel 83.
- the password input panel 80 includes a wheel driving and rotation degree detection circuit 85 for thereby driving the wheel mechanism 82 in response to a display control signal from the two-password system 30. The user inputs a two-password using the wheel control button 74.
- the wheel control button 74 is constituted in such a manner that a wheel adapted to rotate the wheel-mechanism 82 in upward and downward directions and a button adapted to generate a matching input signal are combined.
- the wheel driving and rotation degree detection circuit 85 receives an input of the wheel control button 84 and provides to the two-password system 30.
- the user interface of the two-password system using the wheel mechanism 82 may be implemented using the above-described graphic user interface.
- the reference board and/or matching board may be displayed using the graphic user interface and may be implemented based on the up and down movement method.
- the control of the up and down circulation movement is implemented by providing an additional input apparatus or by displaying a wheel control button on the screen.
- the matching board When circulating and moving the matching board, it is possible to perform a matching input using the left or right (up or down) direction key. For example, when a certain cell of the designated matching board is matched with a certain cell of the reference board by circulating the cells in one direction, the direction conversion is performed. When the time when the conversion of the circulation direction is judged to be a matching state, it is not needed to additionally provide a button for the matching input.
- the user interface for the two-password input of the two-password system may be implemented in various manners based on the characteristics of the main system 30.
- the password input method based on the symbol matching may be adapted by a user skilled in the art.
- a cell generation unit 32 in a step S10 of the two-password authentication process, generates a group of the cells displayed on the display unit 22.
- the cell generation unit 32 generates the cells a capitad o n the reference board a nd the matching b oard
- the g eneration sequence of the cells is randomly performed based on the non-recovery method or the generation may be performed based on a determined sequence or may be performed in a combined method.
- the cells aligned in the matching board may be randomly generated based on the non-recovery method in a determined sequence in the case of the cells aligned in the reference board.
- the cells aligned in both the reference board and the matching board may be randomly generated based on the non-recovery method.
- the cells aligned in the matching board may be randomly g enerated b ased o n t he n on-recovery m ethod.
- the RRCG and RMCG are extracted based on the authentication reference information 36 stored in the memory 35, and the aligning sequence of the symbols is determined based on the extracted information.
- An aligning sequence of the symbols may be determined in a sequence that the user feels easy for inputting the two-password.
- the aligning sequence of the symbols may be determined in such a manner that the rotation number of the matching board is within a certain range.
- Figures 5 and 6 show an example that the cells are aligned in such a manner that the rotation number of the matching board is within a certain range.
- the matching board 62 is automatically rotated in the right direction, when the two-password is 134672, and the RRCG is 147, a nd the RMCG is 362, the group of the cells aligned in the matching board 62 is generated with 378612954.
- the numbers 1 and 3, and 4 and 6 are matched by pressing the enter button 65 by two times.
- the matching board 65 is moved in the right direction by one field, the numbers 7 and 2 are matched, and then the enter button 65 is inputted.
- the aligning sequence of the symbols may be determined based on the user's convenience. However, what there is not a circulation and movement of the cells in all cell matching should be excluded. In the case of all cell matching, only when the enter button 65 is inputted, a security may be weakened. Namely, at least more than one time cell movement should be performed for obtaining a desired security.
- the aligning of the cells should be performed in such a manner that over circulation and movement do not occur, and a desired security is obtained.
- the important thing is to provide a convenience in maximum when the user inputs the two-password.
- a step for inputting a two-password and inputting an inherent ID provided to the user.
- the main system 40 is a system having a plurality of users, it is needed to separately input the user's ID. The detailed description thereon will be provided later.
- a step may be further provided for extracting authentication reference information 36 from the memory 35 using the ID inputted.
- the process for determining the symbol aligning sequence and generating a symbol group may be performed one time during the input process of the two-password or may be repeatedly performed during every cell matching.
- the group of the cells generated is provided to the display control unit 31.
- the display control unit 31 outputs the group of the generated cells to the display unit 22.
- the display unit 20 displays the group of the cells in accordance with a control of the display control unit 31.
- the method for displaying the group of the cells is implemented based on one among the various embodiments of the user interface for the input of the two-password.
- a step S30 the user 10 matches the symbols displayed on the display unit 22 using the matching unit 24.
- the matching cell process unit 33 generates the matched cell group MCG based on the input by the user through the matching means 24. The example of the generation of the MCG will be described with reference to Figures 24A through 24D.
- the symbols hatched in the reference board 90 and the matching board 91 are provided to an easier understanding. When they are shown on the user interface, they are displayed in the same manner as other symbols.
- the user sequentially matches 3 and 5, 7 and 1 , 2 and 6, and 9 and 6 of the reference board 90 and the matching board 91 based on the step of the matching.
- the generated MCG is shown in Figure 58.
- the MCG (MCG_1 ⁇ MCG_4) generated in every step are inputted into the authentication process means 34 in a step S50.
- only the symbols aligned in the matching board 91 may be transferred to the authentication process unit 34 at the time of the matching.
- all information of the symbols aligned in the matching board 91 with respect to only the first match are transferred, and the information concerning the rotation number of the matching board 91 is transferred from the time of the second matching.
- all symbols in the reference board 90 and the matching board 91 may be transferred in a sequence at the time of the matching.
- the information transferred to the authentication process unit 34 may be modified or applied in various forms based on the characteristic of the user interface. The above modification and application are obvious to a person skilled to the art.
- the transfer to the authentication process unit 34 may be performed one time at the time of the completion of the password input. Whenever one time patching is performed, the transfer may be implemented.
- a step S60 the authentication process unit 34 performs a password authentication process based on the authentication reference information 36 stored in the memory 35.
- the flow chart showing the detailed process of the password authentication process is shown in Figure 59.
- the authentication process means 34 received the MCG from a step S61.
- the authentication reference information 36 is patched from the memory 35 in a step S62.
- the authentication reference information is a two-password.
- the RRCG and RMCG are induced from the two-password.
- the cells matched with the RRCG induced from the two-password are determined by the MCG. For example, as shown in Figure 60, in the case that the RRCG is 3729, the symbols of the MCG matched are 5, 1 , 6, and 6.
- the symbol group determined in the MCG and the RMCG induced by the two-password are compared.
- the authentication reference information stored in the memory 35 may be a two-password or may be separated into the RRCG and MMCG and stored or one of the RRCG and MMCG may be stored.
- the RRCG is stored, and the RMCG is induced and used.
- the authentication reference information 36 may be patched from the memory 35 based on the ID inputted.
- the authentication process of the two-password system may be adapted to a single user system. In the case of a plurality of user systems, there is further provided a step for inputting the two-password and the user ID. As shown in Figure 61 , the authentication process unit 34 patches a corresponding authentication reference information 37 stored in the memory 35 based on the user ID.
- the a uthentication p rocess may be performed without an additional user ID input.
- the inputted MCG may be applied as an index.
- the cell generation u nit 32 patches the authentication reference i nformation u sing the MCG.
- the method for inputting a user ID may be implemented using an input apparatus or a button in the graphic user interface.
- the single user system may include a process for inputting a user ID.
- the password system may be adapted to any type of system requiring the password input.
- the present invention may be well adapted to a personal computer system, a locking system, an ATM financial terminal, a PDA, a cellular phone, an internet banking system, a cyber trading system, etc.
- the case that the password system 30 of the present invention is mounted on the standalone system 100 is shown in Figure 63.
- the user interface 20 of the two-password system 30 mounted on the standalone system 100 may be installed in an internal type or an external type.
- the user interface 20 may be formed of the graphic unit interface or the input apparatus or a combination of the same.
- Figure 64 is a view illustrating an example that the two-password system of the present invention is mounted on the main system under the network environment
- Figure 65 is a view illustrating an example that the password system is mounted on the communication terminal under the network environment.
- the password system of the present invention may be used under the network environment.
- the password system 30 may be mounted on the main system 40 connected through a communication network 120.
- the communication terminal 110 receives a group information of the cells from the main system 40 through the communication network 120 and displays using the user interface 20, and the user inputs a two-password using the user interface 20. T he information occurring by the input of the two-password, for example, the matched cell group MCG is inputted into the two-password system 30 mounted on the main system 40 through the communication network 120 by the communication terminal 110.
- the information transferred from the communication terminal 110 to the main system 40 may be transferred by a certain amount as much as the circulation movement distance of the cell during the cell matching.
- the transferring information may be encrypted or may be coupled with a security platform.
- the information transferred may include a user ID information.
- the MCG has the functions of the index, for example, in the case that only the user ID is shown, only the MCG is transferred.
- Various other modifications are possible.
- the user inputs only the two-password, and an additional ID input process may be omitted.
- the two-password system 30 mounted on the main system 40 may perform the patching of the two-password, real reference cell group and real matched cell group in the memory using the user ID provided from the communication terminal 110.
- the two-password system 30 may be mounted on the communication terminal 110.
- the authentication process is performed by the communication terminal 110.
- the user interface 20 and the other elements a s shown in Figure 41 may be mounted on the standalone system 200 or the communication terminal 110 connected with the communication network by a wired or wireless or computer network method or may be mounted on the main system 40. A part of the elements may be separated and separately constituted.
- the memory 35 adapted to store the authentication reference information 36 may be provided in the communication terminal 110 or the main system 40.
- one picture may be assembled like a picture puzzle or a special number may be assembled based on a two-password input method.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003252550A AU2003252550A1 (en) | 2002-08-09 | 2003-08-09 | Method and system for processing password inputted by the matching of cells |
EP03797730A EP1540489A4 (en) | 2002-08-09 | 2003-08-09 | Method and system for processing password inputted by the matching of cells |
JP2004568914A JP2005535990A (en) | 2002-08-09 | 2003-08-09 | Method and system for processing passwords entered by cell matching |
US10/523,797 US20050246138A1 (en) | 2002-08-09 | 2003-08-09 | Method and system for procssing password inputted by the matching of cells |
CNB038194619A CN100361115C (en) | 2002-08-09 | 2003-08-09 | Method and system for processing password inputted by the matching of cells |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020020047012A KR20020077838A (en) | 2002-08-09 | 2002-08-09 | Password system solving the controversial point of the password-exposure by the observation of other people |
KR10-2002-0047012 | 2002-08-09 | ||
KR1020020086889A KR20040014129A (en) | 2002-08-09 | 2002-12-30 | User interface and method for inputting password and password system using the same |
KR10-2002-0086889 | 2002-12-30 | ||
KR10-2003-0028103 | 2003-05-02 | ||
KR20030028103 | 2003-05-02 | ||
KR1020030029764A KR20030064665A (en) | 2002-08-09 | 2003-05-12 | The Password System processing the Password inputted by the Matching of Cells |
KR10-2003-0029764 | 2003-05-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004027632A1 true WO2004027632A1 (en) | 2004-04-01 |
Family
ID=32034351
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2003/001617 WO2004027632A1 (en) | 2002-08-09 | 2003-08-09 | Method and system for processing password inputted by the matching of cells |
Country Status (7)
Country | Link |
---|---|
US (2) | US7240367B2 (en) |
EP (1) | EP1540489A4 (en) |
JP (1) | JP2005535990A (en) |
KR (4) | KR20020077838A (en) |
CN (1) | CN100361115C (en) |
AU (1) | AU2003252550A1 (en) |
WO (1) | WO2004027632A1 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1782251A1 (en) * | 2004-05-31 | 2007-05-09 | Park, Seoung-bae | A method for preventing input information from exposing to observers |
JP2008506198A (en) * | 2004-07-07 | 2008-02-28 | バローザ インコーポレイテッド | Online data encryption and decryption |
KR100949690B1 (en) * | 2005-03-01 | 2010-03-29 | 퀄컴 인코포레이티드 | System and method for using a visual password scheme |
GB2471142A (en) * | 2009-06-18 | 2010-12-22 | Splashclick Ltd | A computing device with a graphical authentication interface |
EP2306362A1 (en) * | 2009-09-15 | 2011-04-06 | Samsung Electronics Co., Ltd. | Method and apparatus to prevent shoulder surfing |
EP2605166A1 (en) * | 2011-12-16 | 2013-06-19 | Gemalto SA | Method for entering a personal identification code in a device |
US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8931083B2 (en) | 2010-12-16 | 2015-01-06 | Blackberry Limited | Multi-layer multi-point or randomized passwords |
US9135426B2 (en) | 2010-12-16 | 2015-09-15 | Blackberry Limited | Password entry using moving images |
EP2946353A1 (en) * | 2013-01-18 | 2015-11-25 | Licentia Group Limited | Authentication device & related methods |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
WO2020231566A1 (en) * | 2019-05-10 | 2020-11-19 | Microsoft Technology Licensing, Llc | Systems and methods for input interfaces promoting obfuscation of user navigation and selections |
US11086514B2 (en) | 2019-05-10 | 2021-08-10 | Microsoft Technology Licensing, Llc | Systems and methods for obfuscating user navigation and selections directed by free-form input |
US11112881B2 (en) | 2019-05-10 | 2021-09-07 | Microsoft Technology Licensing, Llc. | Systems and methods for identifying user-operated features of input interfaces obfuscating user navigation |
US11301056B2 (en) | 2019-05-10 | 2022-04-12 | Microsoft Technology Licensing, Llc | Systems and methods for obfuscating user selections |
US11526273B2 (en) | 2019-05-10 | 2022-12-13 | Microsoft Technology Licensing, Llc | Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations |
Families Citing this family (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040034801A1 (en) * | 2001-02-15 | 2004-02-19 | Denny Jaeger | Method for creating and using computer passwords |
BRPI0414616A (en) * | 2003-09-25 | 2006-11-07 | Solmaze Co Ltd | secure certification service method |
US7725712B2 (en) * | 2003-10-14 | 2010-05-25 | Syferlock Technology Corporation | User authentication system and method |
US9191215B2 (en) * | 2003-12-30 | 2015-11-17 | Entrust, Inc. | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques |
AT413775B (en) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM |
AT413894B (en) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | NOT PERSONALIZED ACCESS CODE |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US8065525B2 (en) * | 2004-09-22 | 2011-11-22 | Bekad Mgmt. Ii, Llc | Device with built-in user authentication and method for user authentication and identity theft protection |
EP1825413A2 (en) * | 2004-12-16 | 2007-08-29 | Mark Dwight Bedworth | User validation using images |
US7953983B2 (en) | 2005-03-08 | 2011-05-31 | Microsoft Corporation | Image or pictographic based computer login systems and methods |
AU2006242555A1 (en) * | 2005-04-29 | 2006-11-09 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
KR100718984B1 (en) * | 2005-09-09 | 2007-05-16 | 주식회사 비티웍스 | Virtual Keyboard Displaying Apparatus and Method for Preventing Exposure of Input Contents |
US20070124598A1 (en) * | 2005-11-08 | 2007-05-31 | Schneider John K | System And Method For Providing Security |
US8739278B2 (en) * | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
KR100877593B1 (en) * | 2006-05-09 | 2009-01-07 | (주)씽크에이티 | The Security Method for Authentication which using of Random Password |
US8117458B2 (en) * | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
US20070277224A1 (en) | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
EP2020114A4 (en) | 2006-05-24 | 2014-01-22 | Vidoop L L C | Graphical image authentication and security system |
US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
US9106422B2 (en) * | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
WO2008098004A2 (en) * | 2007-02-05 | 2008-08-14 | Vidoop Llc | Methods and systems for delivering sponsored out-of-band passwords |
US20110047605A1 (en) * | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
US20100250937A1 (en) * | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
US7941834B2 (en) * | 2007-04-05 | 2011-05-10 | Microsoft Corporation | Secure web-based user authentication |
JP5056212B2 (en) * | 2007-06-29 | 2012-10-24 | 船井電機株式会社 | Password input device |
US20090038006A1 (en) * | 2007-08-02 | 2009-02-05 | Traenkenschuh John L | User authentication with image password |
US20110202982A1 (en) * | 2007-09-17 | 2011-08-18 | Vidoop, Llc | Methods And Systems For Management Of Image-Based Password Accounts |
US8024775B2 (en) * | 2008-02-20 | 2011-09-20 | Microsoft Corporation | Sketch-based password authentication |
US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
US8117652B1 (en) * | 2008-04-30 | 2012-02-14 | Trend Micro, Inc. | Password input using mouse clicking |
US20100037319A1 (en) * | 2008-08-08 | 2010-02-11 | Microsoft Corporation | Two stage access control for intelligent storage device |
US8516561B2 (en) * | 2008-09-29 | 2013-08-20 | At&T Intellectual Property I, L.P. | Methods and apparatus for determining user authorization from motion of a gesture-based control unit |
US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
WO2010085020A1 (en) * | 2009-01-23 | 2010-07-29 | 인하대학교 산학협력단 | Method and apparatus for secure personal identification |
WO2010085021A1 (en) * | 2009-01-23 | 2010-07-29 | 인하대학교 산학협력단 | Method and apparatus for personal identification using a symbol array |
US8458485B2 (en) | 2009-06-17 | 2013-06-04 | Microsoft Corporation | Image-based unlock functionality on a computing device |
KR101059798B1 (en) | 2009-07-03 | 2011-08-26 | 한국인터넷진흥원 | Password input system and method using two alpha-numeric matrices |
KR101155532B1 (en) * | 2009-07-30 | 2012-06-19 | 신화식 | Method for processing security number and system using the same |
KR101051037B1 (en) * | 2009-10-13 | 2011-07-21 | 인하대학교 산학협력단 | User authentication method |
CN102207809A (en) * | 2010-03-30 | 2011-10-05 | 国基电子(上海)有限公司 | Handheld device and unlocking method thereof |
TWI406552B (en) * | 2010-04-06 | 2013-08-21 | Hon Hai Prec Ind Co Ltd | Handheld device and unlocking method thereof |
KR101039909B1 (en) * | 2010-04-19 | 2011-06-09 | 인하대학교 산학협력단 | User authentication system and method for immunizing from hacking |
US20120082306A1 (en) * | 2010-10-05 | 2012-04-05 | Andrew William Hulse | Data Encryption and Input System |
US9576122B2 (en) * | 2011-04-25 | 2017-02-21 | Softlayer Technologies, Inc. | System and method for secure data entry |
AU2011202415B1 (en) | 2011-05-24 | 2012-04-12 | Microsoft Technology Licensing, Llc | Picture gesture authentication |
TWI460606B (en) * | 2011-07-15 | 2014-11-11 | Ind Tech Res Inst | Authentication methods and systems of applying captcha |
US8990726B2 (en) | 2011-09-12 | 2015-03-24 | Microsoft Technology Licensing, Llc | Text box clearing selector |
US9588595B2 (en) | 2011-09-12 | 2017-03-07 | Microsoft Technology Licensing, Llc | Password reveal selector |
US20140304834A1 (en) * | 2011-10-04 | 2014-10-09 | Andrew Hulse | Personalized Secure Data Access Techniques |
KR101841039B1 (en) * | 2011-11-28 | 2018-03-28 | 삼성전자주식회사 | Method for authenticating password and Portable Device thereof |
KR101290850B1 (en) * | 2011-12-02 | 2013-07-30 | 비씨카드(주) | Method and apparatus for authenticating password using scroll wheel of user device |
KR101269419B1 (en) | 2011-12-05 | 2013-06-04 | (주)네오위즈게임즈 | Method, server, terminal and recording medium for serving authentication process |
KR101416537B1 (en) * | 2012-04-18 | 2014-07-09 | 주식회사 로웸 | User authentication method using icon combined with input pattern password input apparatus |
US8881251B1 (en) * | 2012-05-30 | 2014-11-04 | RememberIN, Inc. | Electronic authentication using pictures and images |
US9111073B1 (en) | 2012-11-19 | 2015-08-18 | Trend Micro Inc. | Password protection using pattern |
US20140157382A1 (en) * | 2012-11-30 | 2014-06-05 | SunStone Information Defense, Inc. | Observable authentication methods and apparatus |
CN103853992B (en) | 2012-11-30 | 2017-06-16 | 国际商业机器公司 | The method and apparatus for receiving private information input |
KR101425005B1 (en) * | 2012-12-31 | 2014-08-01 | 세종대학교산학협력단 | Device and method for inputting secure pin |
US9135427B2 (en) | 2013-01-30 | 2015-09-15 | Arris Technology, Inc. | Authentication using a subset of a user-known code sequence |
JP5796725B2 (en) * | 2013-03-22 | 2015-10-21 | カシオ計算機株式会社 | Authentication processing apparatus, authentication processing method, and program |
US10120989B2 (en) * | 2013-06-04 | 2018-11-06 | NOWWW.US Pty. Ltd. | Login process for mobile phones, tablets and other types of touch screen devices or computers |
CZ309308B6 (en) * | 2013-07-12 | 2022-08-17 | Aducid S.R.O. | A method of entering classified information into electronic digital devices |
CN103324303A (en) * | 2013-07-16 | 2013-09-25 | 褚万青 | Random code input method and random code unlocking method |
US9117068B1 (en) * | 2013-09-25 | 2015-08-25 | Trend Micro Inc. | Password protection using pattern |
CN104182678A (en) * | 2014-04-24 | 2014-12-03 | 东莞盛世科技电子实业有限公司 | Password verifying device and password verifying method |
US20160241556A1 (en) * | 2015-02-17 | 2016-08-18 | Qualcomm Incorporated | Mutual authentication with integrated user muscle memory |
US9596231B1 (en) * | 2015-08-21 | 2017-03-14 | Ca, Inc. | Grid-based authentication on touch-aware devices |
US20170154173A1 (en) * | 2015-11-27 | 2017-06-01 | Chao-Hung Wang | Array password authentication system and method thereof |
US10769271B2 (en) | 2017-11-03 | 2020-09-08 | Ande Allen Smith | Apparatus for creating and storing passwords |
CN111787620B (en) | 2018-02-14 | 2023-04-07 | Oppo广东移动通信有限公司 | Indication method, detection method and related equipment |
US10218708B1 (en) | 2018-06-21 | 2019-02-26 | Capital One Services, Llc | Systems for providing electronic items having customizable locking mechanism |
CN116170557B (en) * | 2023-04-21 | 2023-06-20 | 北京点聚信息技术有限公司 | Data processing method for realizing synchronous display of multiple terminals on same screen |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5276314A (en) * | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
US5428349A (en) * | 1992-10-01 | 1995-06-27 | Baker; Daniel G. | Nondisclosing password entry system |
US5815083A (en) * | 1993-07-01 | 1998-09-29 | Bull Cp8 | Process for entry of a confidential piece of information and associated terminal |
US6209104B1 (en) * | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6209102B1 (en) * | 1999-02-12 | 2001-03-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
US6332192B1 (en) * | 1997-05-13 | 2001-12-18 | Passlogix, Inc. | Generalized user identification and authentication system |
KR20020002231A (en) * | 2000-06-30 | 2002-01-09 | 포만 제프리 엘 | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2654238B1 (en) * | 1989-11-07 | 1992-01-17 | Lefevre Jean Pierre | METHOD FOR AUTHENTICATING THE IDENTITY OF A PHYSICAL PERSON AND AUTHENTICATING DEVICE FOR IMPLEMENTING THE METHOD. |
US5465084A (en) * | 1990-03-27 | 1995-11-07 | Cottrell; Stephen R. | Method to provide security for a computer and a device therefor |
GB9125540D0 (en) * | 1991-11-30 | 1992-01-29 | Davies John H E | Access control systems |
TW299410B (en) * | 1994-04-04 | 1997-03-01 | At & T Corp | |
JPH08249284A (en) * | 1995-03-10 | 1996-09-27 | Toshiba Corp | System and method for processing password |
US5623546A (en) * | 1995-06-23 | 1997-04-22 | Motorola, Inc. | Encryption method and system for portable data |
US5821933A (en) * | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
JPH09190237A (en) * | 1996-01-10 | 1997-07-22 | Sharp Corp | Password input device |
JP3601013B2 (en) * | 1996-09-10 | 2004-12-15 | 達司 溝部 | Setting method of access code or security code |
JPH11149454A (en) * | 1997-09-10 | 1999-06-02 | Fujitsu Ltd | Authenticating device, user authenticating method, card for authenticating user and recording medium |
US6571336B1 (en) * | 1998-02-12 | 2003-05-27 | A. James Smith, Jr. | Method and apparatus for securing a list of passwords and personal identification numbers |
US6192478B1 (en) * | 1998-03-02 | 2001-02-20 | Micron Electronics, Inc. | Securing restricted operations of a computer program using a visual key feature |
JP2000066791A (en) * | 1998-08-20 | 2000-03-03 | Toshiba Corp | Information processor and password input method applied to the same |
JP2000172644A (en) * | 1998-12-03 | 2000-06-23 | Fujitsu Ltd | Method and device for identification |
US6021653A (en) * | 1999-02-12 | 2000-02-08 | Pimpo; William | Variable combination alphabetic indicia padlock |
EP1249008A1 (en) * | 2000-01-17 | 2002-10-16 | Roger Solioz | Method for producing a data structure for use in password identification |
JP2001306174A (en) * | 2000-04-25 | 2001-11-02 | Sony Corp | Password input method and device |
WO2001099338A1 (en) * | 2000-06-03 | 2001-12-27 | Threewin.Com Co., Ltd. | Method and apparatus for inputting secret information |
US20030005329A1 (en) * | 2001-06-29 | 2003-01-02 | Ari Ikonen | System and method for transmitting data via wireless connection in a secure manner |
US7036091B1 (en) * | 2001-09-24 | 2006-04-25 | Digeo, Inc. | Concentric curvilinear menus for a graphical user interface |
US20040030934A1 (en) * | 2001-10-19 | 2004-02-12 | Fumio Mizoguchi | User selectable authentication interface and universal password oracle |
WO2003079204A1 (en) * | 2002-03-19 | 2003-09-25 | Fujitsu Limited | Password input unit, password inputting method and program for executing that method on computer |
FI20030920A0 (en) * | 2003-06-19 | 2003-06-19 | Nokia Corp | A method and system for generating a graphical password and a terminal |
CA2495445A1 (en) * | 2005-01-29 | 2005-07-13 | Hai Tao | An arrangement and method of graphical password authentication |
-
2002
- 2002-08-09 KR KR1020020047012A patent/KR20020077838A/en not_active Application Discontinuation
- 2002-12-30 KR KR1020020086889A patent/KR20040014129A/en active Search and Examination
-
2003
- 2003-03-18 US US10/389,924 patent/US7240367B2/en not_active Expired - Fee Related
- 2003-05-12 KR KR1020030029764A patent/KR20030064665A/en active Search and Examination
- 2003-08-09 EP EP03797730A patent/EP1540489A4/en not_active Withdrawn
- 2003-08-09 US US10/523,797 patent/US20050246138A1/en not_active Abandoned
- 2003-08-09 JP JP2004568914A patent/JP2005535990A/en not_active Ceased
- 2003-08-09 CN CNB038194619A patent/CN100361115C/en not_active Expired - Fee Related
- 2003-08-09 WO PCT/KR2003/001617 patent/WO2004027632A1/en active Application Filing
- 2003-08-09 AU AU2003252550A patent/AU2003252550A1/en not_active Abandoned
- 2003-08-09 KR KR1020057002317A patent/KR100806521B1/en not_active IP Right Cessation
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5276314A (en) * | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
US5428349A (en) * | 1992-10-01 | 1995-06-27 | Baker; Daniel G. | Nondisclosing password entry system |
US5815083A (en) * | 1993-07-01 | 1998-09-29 | Bull Cp8 | Process for entry of a confidential piece of information and associated terminal |
US6209104B1 (en) * | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6332192B1 (en) * | 1997-05-13 | 2001-12-18 | Passlogix, Inc. | Generalized user identification and authentication system |
US6209102B1 (en) * | 1999-02-12 | 2001-03-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
KR20020002231A (en) * | 2000-06-30 | 2002-01-09 | 포만 제프리 엘 | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
Non-Patent Citations (1)
Title |
---|
See also references of EP1540489A4 * |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1782251A4 (en) * | 2004-05-31 | 2010-01-20 | Seoung-Bae Park | A method for preventing input information from exposing to observers |
EP1782251A1 (en) * | 2004-05-31 | 2007-05-09 | Park, Seoung-bae | A method for preventing input information from exposing to observers |
US8484455B2 (en) | 2004-07-07 | 2013-07-09 | Oracle International Corporation | Online data encryption and decryption |
JP2008506198A (en) * | 2004-07-07 | 2008-02-28 | バローザ インコーポレイテッド | Online data encryption and decryption |
US8145912B2 (en) | 2005-03-01 | 2012-03-27 | Qualcomm Incorporated | System and method for using a visual password scheme |
US9037993B2 (en) | 2005-03-01 | 2015-05-19 | Qualcomm Incorporated | System and method for using a visual password scheme |
KR100949690B1 (en) * | 2005-03-01 | 2010-03-29 | 퀄컴 인코포레이티드 | System and method for using a visual password scheme |
GB2471142B (en) * | 2009-06-18 | 2012-10-17 | Research In Motion Ltd | Computing device with graphical authentication interface |
US10325086B2 (en) | 2009-06-18 | 2019-06-18 | Blackberry Limited | Computing device with graphical authentication interface |
US10176315B2 (en) | 2009-06-18 | 2019-01-08 | Blackberry Limited | Graphical authentication |
GB2471142A (en) * | 2009-06-18 | 2010-12-22 | Splashclick Ltd | A computing device with a graphical authentication interface |
US9064104B2 (en) | 2009-06-18 | 2015-06-23 | Blackberry Limited | Graphical authentication |
EP2306362A1 (en) * | 2009-09-15 | 2011-04-06 | Samsung Electronics Co., Ltd. | Method and apparatus to prevent shoulder surfing |
US8413071B2 (en) | 2009-09-15 | 2013-04-02 | Samsung Electronics Co., Ltd. | Image processing apparatus and method |
US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
US10621328B2 (en) | 2010-12-16 | 2020-04-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8931083B2 (en) | 2010-12-16 | 2015-01-06 | Blackberry Limited | Multi-layer multi-point or randomized passwords |
US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
US9135426B2 (en) | 2010-12-16 | 2015-09-15 | Blackberry Limited | Password entry using moving images |
US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
WO2013087452A1 (en) * | 2011-12-16 | 2013-06-20 | Gemalto Sa | Method for entering a personal identification code in a device |
EP2605166A1 (en) * | 2011-12-16 | 2013-06-19 | Gemalto SA | Method for entering a personal identification code in a device |
EP2946353A1 (en) * | 2013-01-18 | 2015-11-25 | Licentia Group Limited | Authentication device & related methods |
WO2020231566A1 (en) * | 2019-05-10 | 2020-11-19 | Microsoft Technology Licensing, Llc | Systems and methods for input interfaces promoting obfuscation of user navigation and selections |
US11086514B2 (en) | 2019-05-10 | 2021-08-10 | Microsoft Technology Licensing, Llc | Systems and methods for obfuscating user navigation and selections directed by free-form input |
US11112881B2 (en) | 2019-05-10 | 2021-09-07 | Microsoft Technology Licensing, Llc. | Systems and methods for identifying user-operated features of input interfaces obfuscating user navigation |
US11132069B2 (en) | 2019-05-10 | 2021-09-28 | Microsoft Technology Licensing, Llc. | Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations |
US11209979B2 (en) | 2019-05-10 | 2021-12-28 | Microsoft Technology Licensing, Llc | Systems and methods for input interfaces promoting obfuscation of user navigation and selections |
US11301056B2 (en) | 2019-05-10 | 2022-04-12 | Microsoft Technology Licensing, Llc | Systems and methods for obfuscating user selections |
US11526273B2 (en) | 2019-05-10 | 2022-12-13 | Microsoft Technology Licensing, Llc | Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations |
Also Published As
Publication number | Publication date |
---|---|
KR20040014129A (en) | 2004-02-14 |
KR100806521B1 (en) | 2008-02-21 |
US20040030933A1 (en) | 2004-02-12 |
JP2005535990A (en) | 2005-11-24 |
US7240367B2 (en) | 2007-07-03 |
KR20020077838A (en) | 2002-10-14 |
US20050246138A1 (en) | 2005-11-03 |
CN1675629A (en) | 2005-09-28 |
EP1540489A1 (en) | 2005-06-15 |
EP1540489A4 (en) | 2008-02-27 |
AU2003252550A1 (en) | 2004-04-08 |
KR20030064665A (en) | 2003-08-02 |
CN100361115C (en) | 2008-01-09 |
KR20050074434A (en) | 2005-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004027632A1 (en) | Method and system for processing password inputted by the matching of cells | |
CA2765922C (en) | Graphical authentication | |
CA2689853C (en) | Secure access by a user to a resource | |
US8307424B2 (en) | Password authentication apparatus and password authentication method | |
CA2644272C (en) | Method and system for securing interface access via visual array paths in combination with hidden operators | |
JP2007264929A (en) | User authentication system, user authentication method, operation terminal and server or the like | |
WO2001077792A2 (en) | System and method for authenticating a user | |
WO2011124275A1 (en) | Authentication system and method thereof | |
CA2557105A1 (en) | User authentication | |
EP1181643A1 (en) | Method and apparatus for secure entry of access codes in a computer environment | |
US20100199100A1 (en) | Secure Access by a User to a Resource | |
JP2008033924A (en) | Password number input device by fake pointer and password number input method | |
Kim et al. | Secure and user friendly PIN entry method | |
WO2011135587A1 (en) | Authentication system and method using arrays | |
Salman et al. | A graphical PIN entry system with shoulder surfing resistance | |
KR101051037B1 (en) | User authentication method | |
KR101063523B1 (en) | User authentication method using a user authentication password consisting of two or more characters | |
KR101155532B1 (en) | Method for processing security number and system using the same | |
KR100617540B1 (en) | Password inputting method with enhanced safety | |
Huzaif et al. | Securing Social Media using Pair based Authentication | |
KR20210002310U (en) | A Multimodal Password Authentication System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1020057002317 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10523797 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004568914 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038194619 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003797730 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003797730 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020057002317 Country of ref document: KR |