CA2344448A1 - Apparatus and methods for unlocking password protected software systems to recover master password - Google Patents

Apparatus and methods for unlocking password protected software systems to recover master password Download PDF

Info

Publication number
CA2344448A1
CA2344448A1 CA002344448A CA2344448A CA2344448A1 CA 2344448 A1 CA2344448 A1 CA 2344448A1 CA 002344448 A CA002344448 A CA 002344448A CA 2344448 A CA2344448 A CA 2344448A CA 2344448 A1 CA2344448 A1 CA 2344448A1
Authority
CA
Canada
Prior art keywords
user
password
central
local system
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002344448A
Other languages
French (fr)
Inventor
Kenneth S. Hancock
Thomas E. Ward, Iii
Douglas B. Macrae
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Index Systems LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2344448A1 publication Critical patent/CA2344448A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Abstract

The present invention provides apparatus and method for recovering a forgott en password while maintaining the security and integrity of protected software system. In particular, the present invention provides for a centralized contact, as the "central administrator" or "central administration". The present invention further provides for the identification of the particular user (10, 20, 30, 40, 50 and 60) to the particular local system, the identification of the particular local system to the central administrator, and the identification of the particular user to the central administrator. After providing all of the above-described proper identifications, the prese nt invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user. Also alternatively, the invention provides for the identification by the central administrator of a key that will unlock the software system (300) fo r the user so that the user can access the identification of the user's passwo rd.

Description

APPARATUS AND METHODS FOR UNLOCKING PASSWORD PROTECTED
SOFTWARE S!~'STEMS TO RECOVER MASTER PASSWORD
RELATED APPLICATION
This application claims the benefit of provisional Application No. 60/100,73 filed September 17. 1998, the discl',osure of which is incorporated fully herein.
FIELD OF THE INVENTION
The present invention relates generally to password protected software systems. and more particularly, to password protected software systems with on screen display, such as parental control-equipped electronic programming guide systems for television viewing.
BACKGROUND OF THE IhdVENTION
Many software systems require the user to enter a password before the system will allow the user to access the system. Passwords must be recognized by the software system as giving the user authority to access the system. An example of a password protected software system is a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
It is typically the responsibility of the user to remember the user's own password. If a user forgets the password, the user cannot access the system until the user again learns the password.
Some password protected software systems are available on a network. In a networked system, there is typically a network administrator, online service provider, or the like, that establishes initial passwords, and assists the user in identifying a forgotten password.
In many password protected software systems, the user is provided a first-time password by the network adrrtinistrator, online service provider, or manufacturer. When the user tries to access the system, the system prompts the user foi the user's password. Some systems are programmed to rf;cognize if the password is a "first-time"
password. When the system detects a first-time password, the system prompts the user to choose a personal password. Alternatively, the "first-time" password is set to expire within a relatively short period of time or after a relatively short number of accesses. Systems are typically programmed to recognize the expiration date of a password and notify the user that the user must select a new password before the old password expires.
If the user forgets the chosen password, in the case of many online network systems, a svstems or network administrator can typically recover the identification of the forgotten password for the user. The systems or network administrator, who is typically at a location remote from the user, can check security files internal to the system. By reading the internal security files, the systems or network administrator can provide the user with the user's password. Before disclosing the password, the systems administrator typically requires that the user provide the systems administrator with the proper identification.
On the other hand, in the case of a system that is not networked, or in the case where the systems software is not accessible by the user or by a systems or network administrator, the password, once set, is known only to the system. In the present application, such systems will hereinafter be referred to as ''local systems." An example of a local system is an on screen system for parental control of television viewing such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
With a local system, there is no network administrator that can read the files from a location remote from the user and provide the user with the chosen password.
With such a local system, a user could uncover the forgotten password by dismantling the device;
detaching the system hardware component that contains the password (e.g., RAM
storage);
and sending the component to the manufacturer for analysis. This is a cumbersome and impractical solution.
Another way to provide the user with the ability to recover the identity of a forgotten password would be to allow the user to access the password. That is, the user could select an option in the system that would display the password. However, such a method would be self defeating, in that others could equally access the password.
Still another way to provide the user with the ability to recover the identity of a forgotten password would be to provide a "back door" method, such as:
unplugging and replugging the television; or pressing a combination of input keys, such as the keys on a television remote control device. However, such "back door" methods could quickly become discovered; as more and morE: households adapt the password protected system, such back door methods would become widely known.
Because it is inevitable that some users will, from time to time, forget their passwords, some method and apparatus for a user to recover a forgotten password is needed while maintaining the security and :integrity of the protected software system.
SUMMARY OF THE INVENTION
The present invention provides apparatus and methods that satisfy these needs.
Specifically, the present invention provides apparatus and methods for recovering a forgotten password while maintaining the security and integrity of the protected software system. In particular, the present invention provides for a centralized contact, hereinafter referred to as the ''central administrator'' or ''central administration." The present invention further provides for the identification, of the particular user to the particular local system, the identification of the particular local system to the central administrator, and the identification of the particular user to the central administrator. After providing all of the above-described proper identifications. the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user.
Alternatively, the invention provides for the identification by the central administrator of a key that will unlock the software system for the user so that the user can access the identification of the user's password.
The procedure of identifying a forgotten password is generally referred to hereinafter in this application as the master password recovery procedure.
DESCRIPTION OF THE DRAWINGS
1 ~ These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal identification information for a user and the user's selection of a master password;
FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure;
FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
DETAILED DESCRIPTION OF THE INVENTION
A central administration contact, hereinafter referred to in this application as the central administrator, is established. The central administrator would be accessible by the user, through, e.g., a 1-800, or 1-900 telephone number, a website, etc. In the preferred embodiment. the central administration contact is a completely automated Computer Telephone Interface system. In the preferred embodiment, the automated central administration system provides vocal communications to the user and requests that the user provide input to the central administrator by pressing buttons on the user's telephone keypad.
Alternatively. the automated ~;,entral administration system is programmed to recognize speech so that the user can speak to the central administration system to provide requested information.
A. MASTER PASSWORD SETUP PROCEDURE
When the user attempts to access the local system, the local system will prompt the user for the password. Typically, the first time that a password protected system is accessed, the system will allow the user to identify a password. This password is hereinafter referred to in this application as a "mast:er password."
Alternatively, the manufacturer may provide the buyer of the system with a first-time P~s"~'ord. FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure where the user has been supplied a first-time password.
When the local system is first accessed. the user/buyer is prompted to supply the first-time password 210. Input of the password and other user input referred to herein may be accomplished using a variety of devices 230 and 450, including but not limited to an infra-red I 5 remote control device. such as a television remote control 232a, 233a, 235a and 452a, or a keyboard 232b, 233b, 235b and 452b. The input device used is not a limitation of the present invention.
Once the user/buyer supplies the first-time password 220 and 232a and 232b, the system will typically invite tile user to choose a personal master password 250. Once the user chooses and inputs the master password 270 and FIG. 1, 80, the local system typically asks the user to confirm the master password by entering it a second time (not shown). If the user is unable to confirm the password, the local system typically reverts to the first-time password and the procedure starts all over again. The above-described procedure will be referred to hereinafter in this application as the "master password setup procedure." .
~5 During the master password setup procedure, one embodiment of the present invention requires that the user provide; some additional identification information.
This information would be information that would be known to the user but not typically known to others, such as, e.g., the user's mother's maiden name, the user's mother's birth date, or other such personal information.
FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal identification information for a user and the user's selection of a master password. In this embodiment, the user is invited to use a pull down menu (not shown) of the alphabet, special characters, and the numbers 0-9, or some other comparable method, to compose the user's input to the personal identification information screen. The personal identification information, to the extent that a particular embodiment of the present invention requires this information, will be referred to hereinafter in this application as "master password identification information." In FIG. I , the embodiment of the setup procedure display screen depicted requests the user to input the user's first name ( I 0), the user's middle initial (20), the user's last name (30), the user°s birth date in MM/DD/YYYY format (40), the user's mother's maiden name (50), and the user's mother's birth date in MM/DD/YYYY
format (60). The setup procedure display screen depicted provides for the user the serial number of the unit (70). In one embodiment, the serial number is encrypted through a hashing function.
The user is also requested to input a selected Master Password (80).
In one embodiment of the invention, the master password setup procedure instructs the user to contact the central administrator to provide certain user identification information 280. This further personal identification information may be in the way of a credit card number. or may be the same as the master password identification information or may include some personal identification information in addition to the master password identification information. This further personal identification information is referred to hereinafter in this application as "counter-identification information."
In one embodiment of the invention, the master password setup procedure requires confirmation from the central administrator that the counter-identification information has been provided. In this embodiment, the local system and the central administration system each use the same hashing function to each calculate a confirmation key. The central administration computer system (or alternatively, the manual procedure to be performed by the central administrator) and the local system are both programmed to perform a hashing function on information already "known" to the television, for instance, the date, day of the week, zip code of the locatian of the television, the cable or other programming service to which the television is connected, the serial number of the television, etc.
In an alternative embodiment, the hashing function could be programmed to incorporate as part of the calculation of the hashing key, information that was provided to both the local system and to the central administrator by the user as part of the identification information.
The central administrator uses the central administration system to calculate the appropriate confirmation key. The local system calculates the corresponding confirmation key 290. The user would then be instructed to enter the confirmation key provided by the central administrator into the: local system 235a and 235b. The local system would read the confirmation key input by the user 305. The local system would compare the input confirmation key with the key that had been calculated by the local system 310. If the two keys match. then the local system allows the user to proceed with the master password setup procedure 320.
B. MASTER PASSWORD CHANGE PROCEDURE
Most password protected systems allow the user to change the password after it has been established. Password change procedures typically require that the user identify the current password before entering the new password, once the new password has been entered. password change procedures typically require the user to confirm the new password by entering the new password a second time. Such a password change procedure is also included in references herein to the "master password setup procedure."

Every time after completing the master password setup procedure. whenever the user tries to access the local system, or in same embodiments, whenever the user tries to access protected blocked areas of the system, the local system prompts the user to supply the master password. If the user is unable to provide the master password, the system will not allow the i S user to pass the security screen of the system.
At this point, the invention provides that the user can access security processing for the local system. Specifically, the invention provides for a master password recovery process. FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
20 FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure. In an alternative embodiment, the user will refer to a user manual or contact the manufacturer or retailer to identify contact information for the central administration system.
The local system security processor will ask the user to supply the master password 25 identification information, to the extent that this information was requested during the master password setup procedure. The screen that requests the identification information will look like the setup screen, one embodiment of which is depicted in FIG. 1.
Once the requested infarmation has been input, the security system will display a screen that will instruct the user to access the central administrator. This screen is hereinafter 30 referred to as the "instruction screen." As seen in FIG. 3, the instruction screen will tell the user how to contact the central administrator (100), e.g., to dial a particular telephone number, such as a 1-900 number, 1-$00 number, or to access a particular website. The instruction screen will display information identifying the particular local system unit, such as the serial number of the particular local system unit ( 110, 405-410). In one embodiment, 35 the instruction screen will also display a character string (120, 420-430).
In one embodiment, the character string displayed will be encrypted and will contain. among other things, the forgotten master password. and to the extent that any was been requested by the local system, WO 00/1b190 PCT/US99/21507 the master password identification information.
Once the user contacts the central administrator, the central administrator will request that the user read from the instruction screen certain information. such as:
device unit identification information ( 110), fox example, the serial number of the particular local system unit; and/or other information displayed on the user's local system screen, such as an encrypted character string (120). In one embodiment, the central administrator will further request that the user provide the counter-identification information previously provided to the central administrator during the master password setup procedure.
The central administrator will then use the information provided by the user to either provide the user with the user's master password, or with a key to unlock the user's system to, depending upon the embodiment, discover the forgotten master password, or to choose a new master password. The central administrator's function may be manually performed, or alternatively, may be programmed in the central administration computer system.
Depending on the embodiment, the central administrator may need to de-encrypt the information provided by the user. To de-encrypt the user-provided information, the central administrator may use a manual procedure or may enter the information into the central administration computer system which is programmed to de-encrypt the user-provided information. Depending on the embodiment, the central administrator will then test the de-encrypted master password identification information against the counter-identification information. This comparison procedure may be either a manual procedure performed by the central administrator or may be performed by the central administration computer system.
In an embodiment in which the user reads to the central administrator an encrypted character string containing an encrypted master password, once the central administrator has determined that the identification information is in order, the central administrator will de-enerypt the character string to identify the forgotten password. In one embodiment of the invention, the central administrator will then instruct the user to request the system to calculate a confirmation key. T o do that, the user will choose an on screen option to calculate a confirmation key. In one embodiment, the local system will automatically calculate 440 and 490 a confirmation key ( 130) and/or a counter-confirmation key ( 140).
The security information system will display a screen that says that a confirmation key has been calculated (see FIG. 3. 130). The central administrator will then calculate a confirmation key and instruct the user to input the confirmation key. The user will then use a pull down menu (not shown), or some other comparable method, to input the confirmation key. Once the user has input 'the confirmation key, the local system will test the two keys. If the key matches the local system confirmation key, the system will then display on screen a counter-confirmation key ( I 40 and 500) and instruct the user to read the counter-confirmation key to the central administrator. In one embodiment, the local system will then set the master password to expire after a set period of time, e.g., a day, 48 hours, a week, a month, or after a set number of accesses. e.g., after 1, 2 or 3 further accesses by the user of the local system.
The central administrator will then tell the user the forgotten password.
In an alternative embodiment of the present invention, the central administrator, as described above, will calculate a confirmation key and instruct the user to input the confirmation key into the local system. The user will then use a pull down menu (not shown) or some other comparable method to input the confirmation key. Once the user has input the confirmation key, the local system will calculate, using the same hashing function used by the central administrator, a local system confirmation key.
The local system will then test the two keys. Ii'the key matches the local system confirmation key, the system will then display on screen the user's master password (similar to 140 and 500).
In another alternative embodiment of the present invention, the central administrator, as described above, will calculate a key, using, e.g., a hashing formula, that will unlock the user's system. The central administrator will then instruct the user to input the unlocking key. The user will then use a pull down menu {not shown) or some other comparable method to input the unlocking key. Once the user has input the unlocking key, the local system will calculate, as described above, a key, using, e.g., a hashing formula. The local system uses the same hashing formula as is used by the central administrator and/or the central administration computer system. In order for the two keys to match, the hashing formula must be applied by the local system to the same iinformation to which the central administrator's hashing formula was applied. If the unlocking; key matches the local system key, the local system will then display on screen the user's nnaster password (similar to 140 and 500). In an alternative embodiment. in the case where the keys match, the local system will require that the user immediately identify a new nnaster password.
D. AN ILLUSTRATIVE EMBODIMENT OF MASTER PASSWORD RECOVERY IN A V-CHIP
PLUS+ IN-GUIDE USER INTERFACE.
As an illustrative embodiment of the present invention, the master password setup procedure and the master password recovery procedure described above are implemented in the following manner to allow a parent to unlock and recover the parent's master password that governs a parental control-equipped electronic programming guide system such as 35 Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
The parentluser purchases a television equipped with a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V-_g_ Chip Plus+ In-Guide User Interface. The first time that the parent connects the television to a power supply and turns the system on. the parent is prompted through an initial setup procedure that includes a master password setup procedure. As part of the master password setup procedure. the user/parent identifies a master password.
Later, in the event that the user/parent forgets the master password, the user/parent selects a security system option that displays a screen (the "instruction screen") on the television display monitor that instructs the user/parent to contact a central administrator through a 1-900 telephone number. The central administrator in this embodiment is a completely automated Computer Telephone Interface system.
In an alternative embodiment, the user/parent refers to a user manual or contacts the manufacturer or retailer to identify contact information for the central administration system.
The central administration one-way hashing function will be performed on the current date to calculate an unlocking key. Alternatively, the central administrator, once contacted.
may ask the user to supply the television's serial number, and possibly, some other types of information as was described previously in this application. The user/parent will be instructed to enter the requested information using the user/parent's telephone key pad.
Other types of information requested would be information that would be "known" to the television set. such as, e.g., the zip code of the location of the television set, the cable service or other programming service to which the television is connected, etc.
The central administration computer system will then use a one-way hashing function to calculate an unlocking key. The central administration computer system will read the unlocking key to the user/parent and instruct the user/parent to enter the unlocking key into the user/parent's local television V-Chip Plus+ In-Guide User Interface system.
After the user/parent teas entered the unlocking key into the local system, the local system will calculate an unlocking key using the same one-way hashing function as was used by the central administration computer system. The local system will then compare the two keys.
If the two keys match, the local television V-Chip Plus+ In-Guide User Interface system will then display on tike television display monitor instructions to the user/parent to immediately choose a new master password. The user/parent must then use the appropriate keys on the viewer's remote control device to identify a new master password.
Once the user/parent has identified a new master password, the local system replaces the old master password in the system security files with the new master password and allows the user/parent to proceed with accessing local system functions.
As an optional feature:, the user's system displays notification on the television display monitor notiying the user that the master password has been changed. The notification may be displayed in the form of an information screen, insert, overlay, scrolling message, or other such notification. The notification would be displayed every time the user turns the television on for a certain number of times, or alternatively, for a certain number of days.
Illustrative Embodiments.
The embodiments of the invention described herein are only considered to be preferred and/or illustrative of the inventive concept; the scope of the invention is not to be restricted to such embodiments. Various and numerous other arrangements may be devised by one skilled in the art without departing from the spirit and scope of this invention. For example. the present invention can be implemented using a completely automated central administration system capable of recognizing user information input with the user's telephone keypad or capable of recognizing user speech. Alternatively, the present invention can be implemented using a partially or completely manual central administration contact.
IS

Claims (4)

CLAIMS:
1. A method of resetting a password on a consumer device comprising:
displaying, by a particular consumer device, one or more items of information that are specific to the particular consumer device;
communicating the one or more items of information to a central location;
performing a mathematical function on the one or more items of information to obtain a central key at the central location;
entering the central key into the consumer device;
performing, in the consumer device, a mathematical function on the one or more items of information to obtain a local key;
allowing the resetting of a password on the consumer device if the central key is found to have to the local key for a predetermined without entering the original password.
2. The method of claim 1 wherein the mathematical functions are one-way hashing functions
3. The method of claim 1 where the one or more items of information that are specific to the particular consumer device are unique to the particular consumer device.
4. The method of claim 1 wherein the one or more items of information that are specific to the particular consumer device are rare, but not necessarily unique.
CA002344448A 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password Abandoned CA2344448A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10075398P 1998-09-17 1998-09-17
US60/100,753 1998-09-17
PCT/US1999/021507 WO2000016190A1 (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password

Publications (1)

Publication Number Publication Date
CA2344448A1 true CA2344448A1 (en) 2000-03-23

Family

ID=22281360

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002344448A Abandoned CA2344448A1 (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password

Country Status (6)

Country Link
EP (1) EP1121632A1 (en)
JP (1) JP2002525706A (en)
CN (1) CN1359487A (en)
AU (1) AU6151499A (en)
CA (1) CA2344448A1 (en)
WO (1) WO2000016190A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191466B1 (en) 2000-07-25 2007-03-13 Laurence Hamid Flexible system and method of user authentication for password based system
WO2003062968A1 (en) * 2002-01-24 2003-07-31 Activcard Ireland, Limited Flexible method of user authentication for password based system
EP1540446A2 (en) 2002-08-27 2005-06-15 TD Security, Inc., dba Trust Digital, LLC Enterprise-wide security system for computer devices
US20040103325A1 (en) * 2002-11-27 2004-05-27 Priebatsch Mark Herbert Authenticated remote PIN unblock
US6934535B2 (en) * 2002-12-02 2005-08-23 Nokia Corporation Privacy protection in a server
WO2005064498A1 (en) * 2003-12-23 2005-07-14 Trust Digital, Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US7602910B2 (en) * 2004-11-17 2009-10-13 Microsoft Corporation Password protection
US7631082B2 (en) * 2005-06-10 2009-12-08 Microsoft Corporation Transparent resource administration using a read-only domain controller
CN1913431A (en) * 2006-08-24 2007-02-14 华为技术有限公司 Method and system of user password for managing network equipment and password management server
US8259568B2 (en) 2006-10-23 2012-09-04 Mcafee, Inc. System and method for controlling mobile device access to a network
CN101345622B (en) * 2007-07-10 2012-07-25 北京紫贝龙科技有限责任公司 Information safety device capable of defining authority of apparatus holder
US8718606B2 (en) * 2009-12-28 2014-05-06 Nokia Corporation Method and apparatus for user interaction while device is locked
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands
CN103310136A (en) * 2012-03-15 2013-09-18 苏州宝时得电动工具有限公司 Automatic walking system and set thereof

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
US4786900A (en) * 1985-09-30 1988-11-22 Casio Computer Co. Ltd. Electronic key apparatus
GB2295712B (en) * 1994-12-03 1998-06-17 Icl Systems Ab Theft protection for electrically-powered articles
US5666415A (en) * 1995-07-28 1997-09-09 Digital Equipment Corporation Method and apparatus for cryptographic authentication
US5832214A (en) * 1995-10-26 1998-11-03 Elonex I.P, Holdings, Ltd. Method and apparatus for data security for a computer
US5892906A (en) * 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US5944824A (en) * 1997-04-30 1999-08-31 Mci Communications Corporation System and method for single sign-on to a plurality of network elements

Also Published As

Publication number Publication date
WO2000016190A1 (en) 2000-03-23
JP2002525706A (en) 2002-08-13
EP1121632A1 (en) 2001-08-08
AU6151499A (en) 2000-04-03
CN1359487A (en) 2002-07-17
WO2000016190A9 (en) 2000-06-08

Similar Documents

Publication Publication Date Title
US20070130618A1 (en) Human-factors authentication
US8024567B2 (en) Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof
US20090300732A1 (en) Method and apparatus of otp based on challenge/response
US5971272A (en) Secured personal identification number
US5696824A (en) System for detecting unauthorized account access
AU2003211960B2 (en) User authentication method and user authentication system
US8561174B2 (en) Authorization method with hints to the authorization code
US20050039056A1 (en) Method and apparatus for authenticating a user using three party question protocol
US20080028447A1 (en) Method and system for providing a one time password to work in conjunction with a browser
CA2344448A1 (en) Apparatus and methods for unlocking password protected software systems to recover master password
US20120204246A1 (en) Establishing a secure channel with a human user
US8868918B2 (en) Authentication method
WO1996041446A1 (en) System for detecting unauthorized account access
US20080134307A1 (en) Methods for programming a PIN that is mapped to a specific device and methods for using the PIN
JP2004240637A (en) Password authentication system
JP2007124470A (en) Portable telephone, its user authentication method, and user authentication program
EP0976017B1 (en) Method and system for providing password protection
JP2006033780A (en) Network authentication system using identification by calling-back
GB2402234A (en) Authorising a user who has forgotten their computer password
KR20080085648A (en) Account fraud protection system having communication mechanism
EP1119147A1 (en) Provision of secure access for telecommunications system
CN1856782B (en) The method of safe certification service
JPH09218852A (en) Illegality checking system
US20020073345A1 (en) Secure indentification method and apparatus
KR20040009428A (en) Apparatus and method for mobile banking

Legal Events

Date Code Title Description
FZDE Discontinued