GB2313460A - Graphical password entry - Google Patents
Graphical password entry Download PDFInfo
- Publication number
- GB2313460A GB2313460A GB9709891A GB9709891A GB2313460A GB 2313460 A GB2313460 A GB 2313460A GB 9709891 A GB9709891 A GB 9709891A GB 9709891 A GB9709891 A GB 9709891A GB 2313460 A GB2313460 A GB 2313460A
- Authority
- GB
- United Kingdom
- Prior art keywords
- log
- symbols
- password
- procedure
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Description
DESCRIPTION
GRAPHICAL PASSWORD ENTRY
The invention relates to a log-in procedure to a computer system with the aid of inputting a graphical password.
The log-in procedure to a computer system normally requires the user name and a user-specific password to be input by way of a keyboard. However, this password protection is not sufficient. In practice, passwords can be decoded in a short space of time with the aid of password generators. The reason for this is the human brain which is only able to recall well structured sequences, that is to say words which have a meaning. When the contents of the lexicons of different languages are examined, it is probable that the password will be decoded. In practice, password interrogation is the only hurdle to accessing a modern computer network. It is absolutely necessary to provide a reliable password interrogation for the purpose of protecting the system. Consequently it is naturally not permitted to note down the password anywhere and it must nevertheless comprise a simple structure such that it can be used again even after a long period. The system security sets a prerequisite that the ideal password however is to be an arbitrary combination of letters and 1 or numbers.
However, it is precisely this type of sequence which a human being is unable to retain in his / her memory.
A type of password entry is known wherein alphanumeric characters are displayed on a display screen. The actual password is achieved using a mouse by clicking on to the alphanumeric character in the correct sequence. it the case of this system it is, however, still possible for an unauthorized user to decode the password by observing the activity on the display screen.
In accordance with the present invention, there is provided a log-in procedure to a computer system for users of a data terminal, of the type in which the password is entered by selecting a graphical symbol in a position on the display screen, wherein the graphical symbols of the display screen are generated by the computer in any of the display screen positions1 which positions change from one log-in procedure to another, and wherein the symbols are fixedly allocated to a code stored in the computer and a fixed series of symbols in its entirety represents the password.
In contrast to the prior art, a log-in procedure in accordance with the present invention has the advantage that the symbols which are displayed on the display screen change position from one log-in procedure to the next. This has the advantage that an unauthorized user is not able to decode the password by observing the log-in procedure.
By virtue of the features set down in the subordinate claims it is possible to develop further and improve the log-in procedure stated in the main claim.
It is a further advantage that the computer system can allocate to the display screen positions code sequences of any length. It is particularly advantageous that the password is not bound to alphanumeric characters, but rather that graphical images can be displayed so that the system functions independently of the language area. It is also possible with this log-in procedure to illustrate Chinese or Japanese characters or even to illustrate a graphics picture which is particularly suitable for children. A further advantage is that it is possible to render it more difficult for others to read the password sequence simultaneously, in that the actual clicking on to the desired symbol is disguised by virtue of the fact that clicking noises produced by the computer are superimposed. The length of the password, i.e the number of graphical symbols clicked is fixed by the system. It is possible for these code sequences, which are allocated to these graphical symbols or to their positions on the display screen, to be of any length.
In an advantageous embodiment a picture illustration, and not individual graphical symbols, is projected on to the display screen.
An exemplified embodiment of the invention is explained in detail in the description hereinunder and illustrated in the drawing, in which
Figure 1 shows a display screen for the graphical password entry,
Figure 2 shows a sequence of correct graphical symbols.
The log-in procedure to a computer system is commenced by entering a user name at a data terminal. The system projects on the display screen of the terminal a two-dimensional arrangement of windows, in which symbols1 images or even alphanumeric characters are located. The system requests the user to enter his / her password. Depending upon the resolution and size of the display screen, the image which is displayed on the screen can contain up to 100 different symbols, wherein the prerequisite is that the images can be readily identified and comprise sufficient distinctive features. For example the graphical password consists of a row of eight symbols, which during input must be selected in a specific order by the user. The symbols are selected e.g by clicking on to the said symbols using a mouse. When using touch screens the symbol is selected by touching the screen. When selecting a symbol only one click tone is transmitted as an acknowledgement and the current number of symbols selected is indicated.
In so doing the actual graphical window containing the symbols does not change.
It is merely the xy-positions of the mouse click which are transmitted by way of the connection line between the data terminal and the computer. It is only in the computer itself that the position is allocated to the associated identification by way of a table [sic]. This identification forms the actual password, which is checked in the conventional manner in the computer, e.g the number of unsuccessful attempts, or a blocking of the password entry after three unsuccessful attempts can be fixed. By virtue of the fact that the password sequence is fixed merely by the xy-data and is transmitted by way of the line, it is also no longer possible to decode the password by monitoring the data transfer line.
If the user would like to log-in to the computer system on another occasion, the user is again provided with a display screen containing graphical symbols.
The number of symbols is maintained, however these symbols are arranged by the computer in a different sequence on the display screen. If the positions are changed from log-in procedure to log-in procedure, a list of the symbols, the xypositions and the identifications must also be changed in each case. A possible password entry is illustrated in Figure 2, wherein in this example no different symbols have been selected. In this case the password sequence consists of eight symbols, namely 4 "prams", 2 "child bicycles" and 2 "bicycles". A password sequence of this type can be more readily retained in the human brain, as it is possible to relate a story to the series of images. Moreover, the human brain is better able to recall images than alphanumeric characters. A possible password must be able to be fixed by the user, so that the advantages of storing graphics in the brain can be utilized.
The selection when fixing the password sequence occurs likewise by clicking on to the possible symbols which are all displayed on the display screen.
A click tone is produced as an acknowledgement to clicking on to a symbol and the current selection of the selected symbols is indicated.
A further protective feature can be incorporated for the log-in procedure to computer systems. In the case of this protective feature, in addition to the click tone when clicking on to the correct symbol, the system actually produces a series of tones, which are superimposed onto the actual log-in procedure. In this manner it is also made more difficult to deduce the positions of the graphical symbols by overhearing.
Claims (9)
1. A log-in procedure to a computer system for users of a data terminal, of the type in which the password is entered by selecting a graphical symbol in a position on the display screen, wherein the graphical symbols of the display screen are generated by the computer in any of the display screen positions, which positions change from one log-in procedure to another, and wherein the symbols are fixedly allocated to a code stored in the computer and a fixed series of symbols in its entirety represents the password.
2. A log-in procedure according to claim 1, wherein the position of the symbol selected is transmitted from the data terminal to the computer.
3. A log-in procedure according to claim 1 or 2, wherein the identification, stored in the computer, with respect to one position and thus to the symbol can contain any number of alphanumeric characters.
4. A log-in procedure according to claim 1 or 2, wherein it is possible to determine the number of symbols which represent a password.
5. A log-in procedure according to any of claims 1 to 4, wherein the symbols are selected by touching a touch-screen.
6. A log-in procedure according to any of claims 1 to 5, wherein a click tone is produced as an acknowledgement of clicking on to a symbol and there is a large number of symbols.
7. A log-in procedure according to any of claims 1 to 6, wherein the symbols can consist of alphanumeric characters or of images.
8. A log-in procedure according to any of claims 1 to 7, wherein the system produces click tones which are superimposed on to the actual clicking of the symbols.
9. A log-in procedure to a computer system, substantially as hereinbefore described, with reference to and as illustrated in the accompanying drawings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1996120346 DE19620346A1 (en) | 1996-05-21 | 1996-05-21 | Graphical password log-in procedure for user of data terminal in computer system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9709891D0 GB9709891D0 (en) | 1997-07-09 |
GB2313460A true GB2313460A (en) | 1997-11-26 |
GB2313460B GB2313460B (en) | 1998-07-08 |
Family
ID=7794845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9709891A Expired - Fee Related GB2313460B (en) | 1996-05-21 | 1997-05-16 | Graphical password entry |
Country Status (3)
Country | Link |
---|---|
JP (1) | JPH1097500A (en) |
DE (1) | DE19620346A1 (en) |
GB (1) | GB2313460B (en) |
Cited By (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013243A1 (en) * | 1999-08-13 | 2001-02-22 | Creditguard Ltd | User authentication system |
WO2001098912A1 (en) * | 2000-06-22 | 2001-12-27 | Mnemonic Security Limited | Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information |
WO2002008921A1 (en) * | 2000-07-25 | 2002-01-31 | Asahi Business Assist Limited | Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed |
WO2002023390A2 (en) * | 2000-09-12 | 2002-03-21 | International Business Machines Corporation | System and method for implementing robot proof web site |
WO2002054199A1 (en) * | 2001-01-05 | 2002-07-11 | Schlumberger Systemes | Method for accessing a secured system |
JP2002197065A (en) * | 2000-12-27 | 2002-07-12 | Asahi Business Assist:Kk | Notification system for abnormal state such as theft and confinement in personal identification |
WO2002071177A2 (en) * | 2001-03-03 | 2002-09-12 | Moneyhive.Com Pte Ltd | Method and system for substantially secure electronic transactions |
FR2825489A1 (en) * | 2001-06-05 | 2002-12-06 | Marguerite Paolucci | Method for secure individual authentication of connection to Internet/intranet server, comprises choice between CD and resident operating program and use of mouse/screen password procedure |
WO2005008455A1 (en) * | 2003-07-08 | 2005-01-27 | Intel Corporation (A Delaware Corporation) | Information hiding through time synchronization |
GB2410821A (en) * | 2004-02-05 | 2005-08-10 | Sun Microsystems Inc | Method and system for entering a pass code |
EP1574931A2 (en) * | 2004-03-11 | 2005-09-14 | Wincor Nixdorf International GmbH | Self-service device with a data imput device and method for inquiring the PIN |
AT413775B (en) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM |
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
WO2006010058A3 (en) * | 2004-07-07 | 2006-07-13 | Bharosa Inc | Online data encryption and decryption |
AT413894B (en) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | NOT PERSONALIZED ACCESS CODE |
CN100335989C (en) * | 2004-07-10 | 2007-09-05 | 三星电子株式会社 | User certification apparatus and user certification method |
US7376899B2 (en) | 2003-06-19 | 2008-05-20 | Nokia Corporation | Method and system for producing a graphical password, and a terminal device |
EP1987435A2 (en) * | 2006-02-09 | 2008-11-05 | Solmaze Co., Ltd. | Method and apparatus of otp based on challenge/response |
US20090083847A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
GB2454459A (en) * | 2007-11-06 | 2009-05-13 | Andrew Small | Personal identification code entry device |
US7543154B2 (en) * | 2000-09-29 | 2009-06-02 | Patev Gmbh & Co., Kg | Method and device for determining an access code |
WO2009078730A1 (en) * | 2007-12-19 | 2009-06-25 | Fast Search & Transfer As | A method for improving security in login and single sign-on procedures |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7680815B2 (en) * | 2005-09-27 | 2010-03-16 | Nec Nexsolutions, Ltd. | Image array authentication system |
US7793225B2 (en) | 2005-12-23 | 2010-09-07 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
US7849321B2 (en) | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
US7908645B2 (en) | 2005-04-29 | 2011-03-15 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
WO2011044630A1 (en) | 2009-10-16 | 2011-04-21 | Armorlog Ltd | System and method for improving security of user account access |
CN1856782B (en) * | 2003-09-25 | 2011-05-18 | 索尔玛泽株式会社 | The method of safe certification service |
US8174503B2 (en) | 2008-05-17 | 2012-05-08 | David H. Cain | Touch-based authentication of a mobile device through user generated pattern creation |
GB2486706A (en) * | 2010-12-21 | 2012-06-27 | Sharp Kk | A touch screen device with a random element unlocking mechanism |
EP2503479A1 (en) * | 2011-03-21 | 2012-09-26 | Research In Motion Limited | Login method based on direction of gaze |
WO2012146587A1 (en) * | 2011-04-27 | 2012-11-01 | Vance Burkill | Improvements in or relating to password generation and recall |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US8625847B2 (en) | 2011-03-21 | 2014-01-07 | Blackberry Limited | Login method based on direction of gaze |
US8739278B2 (en) | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US9106422B2 (en) | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
US9128614B2 (en) | 2010-11-05 | 2015-09-08 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9146673B2 (en) | 2010-11-05 | 2015-09-29 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9213822B2 (en) | 2012-01-20 | 2015-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11165963B2 (en) | 2011-06-05 | 2021-11-02 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19848501C2 (en) * | 1998-10-21 | 2001-03-22 | Sfr Ges Fuer Datenverarbeitung | Identity verification procedures |
US6209102B1 (en) * | 1999-02-12 | 2001-03-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
KR20000024087A (en) * | 2000-01-19 | 2000-05-06 | 김한성 | A password preparing method using image associable words |
US6720860B1 (en) * | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
HU0101106D0 (en) * | 2001-03-14 | 2001-05-28 | Tozai Trading Corp | Id alsorithm |
DE10118209A1 (en) * | 2001-04-11 | 2002-10-24 | Siemens Ag | Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation |
FR2824208A1 (en) * | 2001-04-26 | 2002-10-31 | Schlumberger Systems & Service | METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE |
KR20030002280A (en) * | 2001-06-30 | 2003-01-08 | 주식회사 비즈모델라인 | System and Method for providing the password related to client's behavior pattern |
CN1547688A (en) * | 2001-07-27 | 2004-11-17 | ����л����Үά�桤ŬŬ���� | Method and apparatus for entering computer database passwords |
SE0103598D0 (en) * | 2001-10-30 | 2001-10-30 | Thomas Gebel | AKF_inlog |
DE10153404A1 (en) * | 2001-11-01 | 2003-05-15 | Rene Baltus | Writer for normal pens |
KR100515683B1 (en) * | 2002-10-16 | 2005-09-23 | 정욱진 | System and method for registrating and identifiying a person by clicking password points in a image |
WO2004081767A1 (en) * | 2003-03-11 | 2004-09-23 | Koninklijke Philips Electronics N.V. | Method and system for enabling remote message composition |
JP2007004656A (en) * | 2005-06-27 | 2007-01-11 | Toshiba Corp | Server device, method and program |
EP1845469A1 (en) * | 2006-04-12 | 2007-10-17 | Siemens Aktiengesellschaft | Authentification method and system |
DE102006050315B4 (en) * | 2006-10-25 | 2019-12-24 | Carl Zeiss Ag | Head mounted display system and display method for a head mounted display system |
KR100844195B1 (en) | 2007-02-28 | 2008-07-04 | (주)민인포 | A user authentication method of having used graphic OTP |
JP5400301B2 (en) * | 2008-01-23 | 2014-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Authentication server device, authentication method, and authentication program |
JP5198951B2 (en) * | 2008-06-30 | 2013-05-15 | トッパン・フォームズ株式会社 | Identification system |
US8638939B1 (en) | 2009-08-20 | 2014-01-28 | Apple Inc. | User authentication on an electronic device |
JP5143258B2 (en) | 2011-06-17 | 2013-02-13 | 株式会社東芝 | Information processing apparatus, information processing method, and control program |
KR101741264B1 (en) * | 2011-08-05 | 2017-06-09 | 주식회사 네오플 | Method and apparatus for input password in using game |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4333090A (en) * | 1980-05-05 | 1982-06-01 | Hirsch Steven B | Secure keyboard input terminal |
EP0147837A2 (en) * | 1983-12-21 | 1985-07-10 | Omron Tateisi Electronics Co. | Password number inputting device with variable key reassignment |
EP0564832A1 (en) * | 1992-04-03 | 1993-10-13 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
EP0432409B1 (en) * | 1989-12-05 | 1994-06-22 | Theodor Kromer GmbH & Co.KG Spezialfabrik für Sicherheitsschlösser | Data input keyboard for coded locks or the like |
EP0632413A1 (en) * | 1993-07-01 | 1995-01-04 | Bull Cp8 | Method for confidential information input and associated terminal |
WO1996018139A1 (en) * | 1994-12-08 | 1996-06-13 | Philips Electronics N.V. | Security code input |
-
1996
- 1996-05-21 DE DE1996120346 patent/DE19620346A1/en not_active Ceased
-
1997
- 1997-05-16 GB GB9709891A patent/GB2313460B/en not_active Expired - Fee Related
- 1997-05-19 JP JP12772297A patent/JPH1097500A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4333090A (en) * | 1980-05-05 | 1982-06-01 | Hirsch Steven B | Secure keyboard input terminal |
EP0147837A2 (en) * | 1983-12-21 | 1985-07-10 | Omron Tateisi Electronics Co. | Password number inputting device with variable key reassignment |
EP0432409B1 (en) * | 1989-12-05 | 1994-06-22 | Theodor Kromer GmbH & Co.KG Spezialfabrik für Sicherheitsschlösser | Data input keyboard for coded locks or the like |
EP0564832A1 (en) * | 1992-04-03 | 1993-10-13 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
EP0632413A1 (en) * | 1993-07-01 | 1995-01-04 | Bull Cp8 | Method for confidential information input and associated terminal |
WO1996018139A1 (en) * | 1994-12-08 | 1996-06-13 | Philips Electronics N.V. | Security code input |
Cited By (144)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001013243A1 (en) * | 1999-08-13 | 2001-02-22 | Creditguard Ltd | User authentication system |
WO2001098912A1 (en) * | 2000-06-22 | 2001-12-27 | Mnemonic Security Limited | Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information |
WO2002008921A1 (en) * | 2000-07-25 | 2002-01-31 | Asahi Business Assist Limited | Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed |
EP1313027A1 (en) * | 2000-07-25 | 2003-05-21 | Asahi Business Assist Limited | Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed |
US8577807B2 (en) * | 2000-07-25 | 2013-11-05 | Mnemonic Security Limited | Method for protecting secret information in a system for reporting an emergency when secret information is accessed |
EP1313027A4 (en) * | 2000-07-25 | 2009-02-18 | Mnemonic Security Ltd | Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed |
US20090328162A1 (en) * | 2000-07-25 | 2009-12-31 | Mnemonic Security Limited | Mutual for reporting a theft in an authentication system |
WO2002023390A2 (en) * | 2000-09-12 | 2002-03-21 | International Business Machines Corporation | System and method for implementing robot proof web site |
WO2002023390A3 (en) * | 2000-09-12 | 2002-09-12 | Ibm | System and method for implementing robot proof web site |
US7543154B2 (en) * | 2000-09-29 | 2009-06-02 | Patev Gmbh & Co., Kg | Method and device for determining an access code |
JP2002197065A (en) * | 2000-12-27 | 2002-07-12 | Asahi Business Assist:Kk | Notification system for abnormal state such as theft and confinement in personal identification |
FR2819323A1 (en) * | 2001-01-05 | 2002-07-12 | Schlumberger Systems & Service | METHOD FOR ACCESSING A SECURE SYSTEM |
WO2002054199A1 (en) * | 2001-01-05 | 2002-07-11 | Schlumberger Systemes | Method for accessing a secured system |
WO2002071177A2 (en) * | 2001-03-03 | 2002-09-12 | Moneyhive.Com Pte Ltd | Method and system for substantially secure electronic transactions |
WO2002071177A3 (en) * | 2001-03-03 | 2005-03-10 | Moneyhive Com Pte Ltd | Method and system for substantially secure electronic transactions |
FR2825489A1 (en) * | 2001-06-05 | 2002-12-06 | Marguerite Paolucci | Method for secure individual authentication of connection to Internet/intranet server, comprises choice between CD and resident operating program and use of mouse/screen password procedure |
WO2002099608A2 (en) * | 2001-06-05 | 2002-12-12 | Marguerite Paolucci | Method for secure individual authentication for connection to an internet server by stealthy remote access |
WO2002099608A3 (en) * | 2001-06-05 | 2003-02-20 | Marguerite Paolucci | Method for secure individual authentication for connection to an internet server by stealthy remote access |
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
US7376899B2 (en) | 2003-06-19 | 2008-05-20 | Nokia Corporation | Method and system for producing a graphical password, and a terminal device |
WO2005008455A1 (en) * | 2003-07-08 | 2005-01-27 | Intel Corporation (A Delaware Corporation) | Information hiding through time synchronization |
US7337466B2 (en) | 2003-07-08 | 2008-02-26 | Intel Corporation | Information hiding through time synchronization |
CN1846188B (en) * | 2003-07-08 | 2010-05-26 | 英特尔公司 | Information hiding through time synchronization |
CN1856782B (en) * | 2003-09-25 | 2011-05-18 | 索尔玛泽株式会社 | The method of safe certification service |
US7882361B2 (en) | 2004-02-05 | 2011-02-01 | Oracle America, Inc. | Method and system for accepting a pass code |
GB2410821A (en) * | 2004-02-05 | 2005-08-10 | Sun Microsystems Inc | Method and system for entering a pass code |
EP1574931A3 (en) * | 2004-03-11 | 2008-09-24 | Wincor Nixdorf International GmbH | Self-service device with a data imput device and method for inquiring the PIN |
EP1574931A2 (en) * | 2004-03-11 | 2005-09-14 | Wincor Nixdorf International GmbH | Self-service device with a data imput device and method for inquiring the PIN |
AT413775B (en) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM |
AT413894B (en) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | NOT PERSONALIZED ACCESS CODE |
US7822990B2 (en) | 2004-07-07 | 2010-10-26 | Oracle International Corporation | Online data encryption and decryption |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US7616764B2 (en) | 2004-07-07 | 2009-11-10 | Oracle International Corporation | Online data encryption and decryption |
WO2006010058A3 (en) * | 2004-07-07 | 2006-07-13 | Bharosa Inc | Online data encryption and decryption |
US8484455B2 (en) | 2004-07-07 | 2013-07-09 | Oracle International Corporation | Online data encryption and decryption |
CN100335989C (en) * | 2004-07-10 | 2007-09-05 | 三星电子株式会社 | User certification apparatus and user certification method |
US7908645B2 (en) | 2005-04-29 | 2011-03-15 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
US7680815B2 (en) * | 2005-09-27 | 2010-03-16 | Nec Nexsolutions, Ltd. | Image array authentication system |
US10754538B2 (en) | 2005-12-23 | 2020-08-25 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US10078439B2 (en) | 2005-12-23 | 2018-09-18 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8745544B2 (en) | 2005-12-23 | 2014-06-03 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8694923B2 (en) | 2005-12-23 | 2014-04-08 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7793225B2 (en) | 2005-12-23 | 2010-09-07 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
US8640057B2 (en) | 2005-12-23 | 2014-01-28 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8627237B2 (en) | 2005-12-23 | 2014-01-07 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8046721B2 (en) | 2005-12-23 | 2011-10-25 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8209637B2 (en) | 2005-12-23 | 2012-06-26 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US11669238B2 (en) | 2005-12-23 | 2023-06-06 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8527903B2 (en) | 2005-12-23 | 2013-09-03 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US11086507B2 (en) | 2005-12-23 | 2021-08-10 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8286103B2 (en) | 2005-12-23 | 2012-10-09 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
EP1987435A2 (en) * | 2006-02-09 | 2008-11-05 | Solmaze Co., Ltd. | Method and apparatus of otp based on challenge/response |
EP1987435A4 (en) * | 2006-02-09 | 2009-07-29 | Solmaze Co Ltd | Method and apparatus of otp based on challenge/response |
US8739278B2 (en) | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US7849321B2 (en) | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
US9106422B2 (en) | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
US20090083847A1 (en) * | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US9304624B2 (en) | 2007-09-24 | 2016-04-05 | Apple Inc. | Embedded authentication systems in an electronic device |
US9274647B2 (en) | 2007-09-24 | 2016-03-01 | Apple Inc. | Embedded authentication systems in an electronic device |
US9953152B2 (en) | 2007-09-24 | 2018-04-24 | Apple Inc. | Embedded authentication systems in an electronic device |
US9519771B2 (en) | 2007-09-24 | 2016-12-13 | Apple Inc. | Embedded authentication systems in an electronic device |
US9250795B2 (en) | 2007-09-24 | 2016-02-02 | Apple Inc. | Embedded authentication systems in an electronic device |
US9134896B2 (en) | 2007-09-24 | 2015-09-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US9128601B2 (en) | 2007-09-24 | 2015-09-08 | Apple Inc. | Embedded authentication systems in an electronic device |
US8782775B2 (en) * | 2007-09-24 | 2014-07-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US8943580B2 (en) | 2007-09-24 | 2015-01-27 | Apple Inc. | Embedded authentication systems in an electronic device |
US9495531B2 (en) | 2007-09-24 | 2016-11-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9038167B2 (en) | 2007-09-24 | 2015-05-19 | Apple Inc. | Embedded authentication systems in an electronic device |
US9329771B2 (en) | 2007-09-24 | 2016-05-03 | Apple Inc | Embedded authentication systems in an electronic device |
US10275585B2 (en) | 2007-09-24 | 2019-04-30 | Apple Inc. | Embedded authentication systems in an electronic device |
GB2454459A (en) * | 2007-11-06 | 2009-05-13 | Andrew Small | Personal identification code entry device |
WO2009078730A1 (en) * | 2007-12-19 | 2009-06-25 | Fast Search & Transfer As | A method for improving security in login and single sign-on procedures |
US8453221B2 (en) | 2007-12-19 | 2013-05-28 | Microsoft International Holdings B.V. | Method for improving security in login and single sign-on procedures |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US8174503B2 (en) | 2008-05-17 | 2012-05-08 | David H. Cain | Touch-based authentication of a mobile device through user generated pattern creation |
AU2010306408B2 (en) * | 2009-10-16 | 2015-08-20 | Armorlog International Pty Ltd | System and method for improving security of user account access |
CN102741851A (en) * | 2009-10-16 | 2012-10-17 | 阿莫洛格有限公司 | System and method for improving security of user account access |
EP2489149A1 (en) * | 2009-10-16 | 2012-08-22 | Armorlog Ltd | System and method for improving security of user account access |
WO2011044630A1 (en) | 2009-10-16 | 2011-04-21 | Armorlog Ltd | System and method for improving security of user account access |
JP2013507699A (en) * | 2009-10-16 | 2013-03-04 | アーマーログ リミテッド | System and method for improving user account access security |
EP2489149A4 (en) * | 2009-10-16 | 2013-12-11 | Armorlog Ltd | System and method for improving security of user account access |
US9390249B2 (en) | 2009-10-16 | 2016-07-12 | Armorlog Ltd | System and method for improving security of user account access |
US9740832B2 (en) | 2010-07-23 | 2017-08-22 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US9146673B2 (en) | 2010-11-05 | 2015-09-29 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9128614B2 (en) | 2010-11-05 | 2015-09-08 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
GB2486706A (en) * | 2010-12-21 | 2012-06-27 | Sharp Kk | A touch screen device with a random element unlocking mechanism |
GB2486706B (en) * | 2010-12-21 | 2017-05-24 | Sharp Kk | Handset |
EP2503479A1 (en) * | 2011-03-21 | 2012-09-26 | Research In Motion Limited | Login method based on direction of gaze |
US8953845B2 (en) | 2011-03-21 | 2015-02-10 | Blackberry Limited | Login method based on direction of gaze |
US8625847B2 (en) | 2011-03-21 | 2014-01-07 | Blackberry Limited | Login method based on direction of gaze |
US9053294B2 (en) | 2011-04-27 | 2015-06-09 | Vance Burkill | Password generation and recall |
WO2012146587A1 (en) * | 2011-04-27 | 2012-11-01 | Vance Burkill | Improvements in or relating to password generation and recall |
US11165963B2 (en) | 2011-06-05 | 2021-11-02 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US9372978B2 (en) | 2012-01-20 | 2016-06-21 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US10007802B2 (en) | 2012-01-20 | 2018-06-26 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9213822B2 (en) | 2012-01-20 | 2015-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US10867059B2 (en) | 2012-01-20 | 2020-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10372963B2 (en) | 2013-09-09 | 2019-08-06 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US10055634B2 (en) | 2013-09-09 | 2018-08-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10410035B2 (en) | 2013-09-09 | 2019-09-10 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US12105874B2 (en) | 2018-09-28 | 2024-10-01 | Apple Inc. | Device control using gaze information |
US12124770B2 (en) | 2018-09-28 | 2024-10-22 | Apple Inc. | Audio assisted enrollment |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
Also Published As
Publication number | Publication date |
---|---|
GB9709891D0 (en) | 1997-07-09 |
GB2313460B (en) | 1998-07-08 |
JPH1097500A (en) | 1998-04-14 |
DE19620346A1 (en) | 1997-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2313460A (en) | Graphical password entry | |
EP2386974B1 (en) | A method and a device for generating a secret value | |
US8010797B2 (en) | Electronic apparatus and recording medium storing password input program | |
AU2006307996B2 (en) | Method and system for secure password/PIN input via mouse scroll wheel | |
US5559961A (en) | Graphical password | |
US6209102B1 (en) | Method and apparatus for secure entry of access codes in a computer environment | |
US5736976A (en) | Computer data entry apparatus with hand motion sensing and monitoring | |
CA2495445A1 (en) | An arrangement and method of graphical password authentication | |
US20020181747A1 (en) | Identification system | |
EP0593386A2 (en) | Method and apparatus for accessing touch screen desktop objects via fingerprint recognition | |
WO2003014887A2 (en) | Method for supporting dynamic password | |
WO2010078827A1 (en) | Security key inputting system for touch screen device | |
WO1996018139A1 (en) | Security code input | |
Ritter et al. | Miba: Multitouch image-based authentication on smartphones | |
JP2007310515A (en) | Password authentication system, password authentication server, password authentication method and program | |
CA2558208C (en) | Method for protecting a character entered at a graphical interface | |
US4885779A (en) | Personal identification encryptor system with error-correcting code and method | |
JP4734965B2 (en) | PIN code input device | |
JP2005250530A (en) | Character input device | |
AU2005228907A1 (en) | Method for safely logging onto a technical system | |
CN109472898B (en) | Password prompting method, augmented reality device, storage medium and system | |
JP6614099B2 (en) | Document file masking process, control program for the process, and computer system for implementing the control program | |
KR20080011362A (en) | Method for hacking protection of gotp | |
GB2342749A (en) | Identification system | |
CA2495450A1 (en) | A matrix based arrangement and method of graphical password authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20110516 |