DE19620346A1 - Graphical password log-in procedure for user of data terminal in computer system - Google Patents

Graphical password log-in procedure for user of data terminal in computer system

Info

Publication number
DE19620346A1
DE19620346A1 DE1996120346 DE19620346A DE19620346A1 DE 19620346 A1 DE19620346 A1 DE 19620346A1 DE 1996120346 DE1996120346 DE 1996120346 DE 19620346 A DE19620346 A DE 19620346A DE 19620346 A1 DE19620346 A1 DE 19620346A1
Authority
DE
Germany
Prior art keywords
symbols
registration process
process according
password
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
DE1996120346
Other languages
German (de)
Inventor
Peter Van Dipl Ing Haperen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Priority to DE1996120346 priority Critical patent/DE19620346A1/en
Priority to GB9709891A priority patent/GB2313460B/en
Priority to JP12772297A priority patent/JPH1097500A/en
Publication of DE19620346A1 publication Critical patent/DE19620346A1/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A log-in procedure to a computer system for users of a data terminal, which procedure serves with the aid of a graphical password entry to render it more difficult to decode the password. For this purpose the computer displays on the display screen a number of graphical symbols which e.g must be clicked using the mouse pointer. The positions of the graphical symbols can be changed on the display screen from one log-in procedure to another.

Description

Stand der TechnikState of the art

Die Erfindung geht aus von einem Anmeldeverfahren an einem Rechnersystem mit Hilfe einer graphischen Paßworteingabe nach der Gattung des Hauptanspruchs.The invention is based on a registration process on a Computer system using a graphical password entry according to the genus of the main claim.

Die Anmeldung an einem Rechnersystem erfordert normalerweise die Eingabe von Benutzername und einem benutzerspezifischen Paßwort über eine Tastatur. Dieser Paßwortschutz ist allerdings unzureichend. Paßwörter können in der Praxis mit Hilfe von Paßwortgeneratoren in kurzer Zeit entschlüsselt werden. Der Grund dafür ist das menschliche Gedächtnis, das sich nur an gut strukturierte Sequenzen, also an sinnvolle Wörter erinnern kann. Indem man die Lexikainhalte verschiedener Sprachen abarbeitet, ist eine Entschlüsselung sehr wahrscheinlich. Die Paßwortabfrage ist in der Praxis die einzige Hürde zum Zugang eines modernen Computernetzes. Eine sichere Paßwortabfrage ist zum Schutz des Systems unbedingt erforderlich. Dafür darf das Paßwort natürlich nirgends notiert werden und muß trotzdem eine so einfache Struktur haben, daß es auch nach einer langen Zeit wieder anwendbar ist. Die Systemsicherheit setzt voraus, daß das ideale Paßwort jedoch eine willkürliche Buchstaben und/oder Zifferkombination sein soll. Genau eine solche Sequenz kann sich der Mensch aber nicht im Gedächtnis behalten. Logging on to a computer system usually requires entering a user name and a user-specific one Password using a keyboard. This password protection is however insufficient. Passwords can be used in practice Decrypted with the help of password generators in a short time will. The reason for this is human memory, the only well-structured sequences, meaning meaningful ones Words can remember. By looking at the lexicon content processing different languages is a decryption most likely. The password query is in practice the only hurdle to access a modern computer network. A secure password request is to protect the system absolutely necessary. Of course, the password is allowed nowhere to be noted and still has to be so simple Have structure that it will come back even after a long time is applicable. System security requires that ideal password however an arbitrary letter and / or Digit combination. Exactly such a sequence can but people do not keep in mind.  

Sequenz kann sich der Mensch aber nicht im Gedächtnis behalten.But humans cannot remember the sequence to keep.

Bekannt ist auch eine Form der Paßworteingabe, wobei auf einem Bildschirm alphanumerische Zeichen dargestellt werden. Das eigentliche Paßwort wird durch Anklicken der alphanumerischen Zeichen in der richtigen Reihenfolge über einen Maus gewonnen. Bei diesem System ist es allerdings noch möglich, daß ein unberechtigter Benutzer durch Beobachtung der Bildschirmaktionen das Paßwort entschlüsselt.A form of password entry is also known, on alphanumeric characters are displayed on a screen. The actual password is clicked on the alphanumeric characters in the correct order won a mouse. With this system, however, it is still possible that an unauthorized user by Watching the screen actions the password decrypted.

Vorteile der ErfindungAdvantages of the invention

Das erfindungsgemäße Anmeldeverfahren mit den kennzeichnenden Merkmalen des Hauptanspruchs hat demgegenüber den Vorteil, daß die auf dem Bildschirm angezeigten Symbole ihre Position von einem Anmeldevorgang zum nächsten verändern. Das hat den Vorteil, daß ein unberechtigter Benutzer nicht durch Beobachtung des Anmeldevorgangs das Paßwort entschlüsseln kann.The registration process according to the invention with the has characteristic features of the main claim on the other hand the advantage that the on the screen displayed symbols indicate their position from a login process change to the next. This has the advantage that a unauthorized user not by watching the Login process can decrypt the password.

Durch die in den Unteransprüchen aufgeführten Maßnahmen ist eine vorteilhafte Weiterbildung und Verbesserung des im Hauptanspruchs angegebenen Anmeldeverfahrens möglich.By the measures listed in the subclaims advantageous training and improvement of the Main claim specified registration process possible.

Ein weiterer Vorteil ist es, daß das Rechnersystem den Bildschirmpositionen beliebig lange Code folgen zuordnen kann. Besonders vorteilhaft ist dabei, daß das Paßwort nicht an alphanumerische Zeichen gebunden ist, sondern daß graphische Bilder angezeigt werden können, so daß das System unabhängig vom Sprachraum arbeitet. Es ist mit diesem Anmeldeverfahren auch möglich, chinesische oder japanische Schriftzeichen darzustellen, oder auch ein Grafikbild, das für Kinder besonders geeignet ist. Ein weiterer Vorteil ist es, daß man das Mitlesen der Paßwortsequenz erschweren kann, indem man das eigentliche Anklicken des gesuchten Symbols durch eine Überlagerung von vom Rechner erzeugten Klickgeräuschen verschleiert. Die Länge des Paßwortes, d. h. die Anzahl der angeklickten grafischen Symbole wird vom System festgelegt. Die diesen grafischen Symbolen bzw. deren Positionen auf dem Bildschirm zugeordneten Codereihen können beliebig lang sein.Another advantage is that the computer system Assign code positions of any length to follow the screen positions can. It is particularly advantageous that the password is not is bound to alphanumeric characters, but that graphic images can be displayed so that the System works independently of the language area. It is with this Registration process also possible, Chinese or Japanese To represent characters, or a graphic image that is particularly suitable for children. Another advantage is  that it can be difficult to read the password sequence, by actually clicking on the symbol you are looking for by overlaying computer generated Click noises obscured. The length of the password, i.e. H. the number of graphic symbols clicked is determined by the System set. The graphical symbols or their Code rows assigned to positions on the screen be any length.

Eine vorteilhafte Ausführung ist es, statt einzelnen grafischen Symbolen eine Bilddarstellung auf den Bildschirm zu projizieren.It is an advantageous embodiment instead of individual graphic symbols display an image on the screen to project.

Zeichnungdrawing

Ein Ausführungsbeispiel der Erfindung ist in den Zeichnungen dargestellt und in der nachfolgenden Beschreibung näher erläutert. Es zeigt Fig. 1 einen Bildschirm für die grafische Paßworteingabe, Fig. 2 eine Reihenfolge von korrekten grafischen Symbolen.An embodiment of the invention is shown in the drawings and explained in more detail in the following description. It shows Fig. 1 is a screen for the graphical password input, Fig. 2 is a sequence of correct graphic symbols.

Beschreibung des AusführungsbeispielsDescription of the embodiment

Die Anmeldung an einem Rechnersystem durch die Eingabe eines Benutzernamens an einem Datenendgerät gestartet. Das System projiziert auf dem Bildschirm des Terminals eine zweidimensionale Anordnung von Fenstern, in denen sich Symbole, Bilder oder auch alphanumerische Zeichen befinden. Das System fordert den Benutzer zur Eingabe seines Paßwortes auf. Das auf dem Bildschirm dargestellte Bild kann je nach Auflösung und Größe des Bildschirms bis zu 100 verschiedenen Symbolen enthalten, wobei die Voraussetzung die ist, daß die Bilder noch gut erkennbar sind und genügend Unterscheidungsmerkmale aufweisen. Das graphische Paßwort besteht beispielsweise aus einer Reihe von acht Symbolen, die bei der Eingabe der Reihe nach vom Benutzer angewählt werden müssen. Die Anwahl der Symbole geschieht z. B. durch das Anklicken mit einer Maus. Bei der Verwendung von Touch-Bildschirmen wird das Symbol durch Berührung des Schirms ausgewählt. Beim Anwählen eines Symbols wird als Quittung lediglich ein Klickton übertragen und es wird die aktuelle Anzahl der angewählten Symbole angezeigt. Das eigentliche grafische Fenster mit den Symbolen ändert sich dabei nicht. Über die Verbindungsleitung zwischen Datenendgerät und Rechner werden lediglich die xy-Positionen der Mausklicks übertragen. Erst im Rechner selbst wird den Position über einen Tabelle der dazugehörigen Kennung zugeordnet. Diese Kennung bildet das eigentliche Paßwort, daß auf dem üblichen Weg im Rechner geprüft wird, z. B. kann die Anzahl der Fehlversuche, oder ein Sperrung der Paßworteingabe nach drei Fehlversuchen festgelegt sein. Dadurch daß die Paßwortsequenz lediglich durch xy-Daten festgelegt und über die Leitung übertragen wird, ist es nicht mehr möglich, das Paßwort durch Abhören der Datenübertragungsleitung zu entschlüsseln.Logging on to a computer system by entering a User name started on a data terminal. The system projects one on the screen of the terminal two-dimensional arrangement of windows in which There are symbols, pictures or even alphanumeric characters. The system prompts the user to enter their password on. The image shown on the screen may vary Resolution and size of the screen up to 100 different Contain symbols, provided that the Images are still clearly recognizable and sufficient  Have differentiators. The graphical password for example, consists of a series of eight symbols, the one selected by the user when entering Need to become. The selection of the symbols happens z. B. by clicking with a mouse. When using Touch screens become the icon by touching the screen selected. When a symbol is selected, it is used as a receipt just transmit a click sound and it becomes the current one Number of selected symbols is displayed. The real thing graphic windows with the symbols do not change. Via the connecting line between the data terminal and The calculator only becomes the xy positions of the mouse clicks transfer. The position is only in the computer itself assigned a table of the associated identifier. This Identifier forms the actual password that on the usual Way is checked in the computer, e.g. B. can the number of Failed attempts, or a lock of password entry after three Failed attempts must be specified. Because the Password sequence determined only by xy data and over the line is transmitted, it is no longer possible that Password by listening to the data transmission line decrypt.

Möchte sich der Benutzer ein nächstes Mal im Rechnersystem anmelden, wird ihm wieder ein Bildschirm mit grafischen Symbolen zur Verfügung gestellt. Dabei bleibt die Anzahl der Symbole erhalten, allerdings werden diese Symbole vom Rechner in einer anderen Reihenfolge auf dem Bildschirm angeordnet. Werden die Positionen von Anmeldevorgang zu Anmeldevorgang verändert, muß jeweils im Rechner eine Liste der Symbole, der xy-Positionen und der Kennungen mitverändert werden. Eine mögliche Paßworteingabe ist in Fig. 2 dargestellt, wobei in diesem Beispiel keine unterschiedlichen Symbole gewählt wurden. In diesem Fall besteht die Paßwortsequenz aus acht Symbolen, nämlich 4 "Kinderwagen", 2 "Kinderfahrrädern" und 2 "Fahrräder". Eine solche Paßwortsequenz ist für das menschliche Gedächtnis leichter zu behalten, da man sich eine Geschichte zu der Bilderfolge merken kann. Das menschliche Gedächtnis kann sich zudem an Bilder besser als an alphanumerische Zeichen erinnern. Ein mögliches Paßwort muß vom Benutzer festlegbar sein, damit die Vorteile der grafischen Speicherung im Gedächtnis genützt werden können.If the user wants to log on to the computer system the next time, a screen with graphical symbols is made available again. The number of symbols is retained, but these symbols are arranged on the screen in a different order by the computer. If the positions are changed from one registration process to the next, a list of symbols, xy positions and identifiers must be changed on the computer. A possible password entry is shown in FIG. 2, with no different symbols being selected in this example. In this case, the password sequence consists of eight symbols, namely 4 "strollers", 2 "children's bicycles" and 2 "bicycles". Such a password sequence is easier for human memory to remember, since one can remember a story about the sequence of images. Human memory can also remember images better than alphanumeric characters. A possible password must be set by the user so that the advantages of graphical storage in memory can be used.

Die Auswahl bei Festlegung der Paßwortsequenz geschieht ebenfalls durch das Anklicken der möglichen Symbole, die insgesamt auf dem Bildschirm dargestellt sind. Als Quittung für das Anklicken eines Symbols wird ein Klickton erzeugt und die aktuelle Anzahl der angewählten Symbole angezeigt.The selection is made when the password sequence is specified also by clicking on the possible symbols that are shown overall on the screen. As a receipt a click sound is generated when a symbol is clicked and the current number of selected symbols is displayed.

Weitere AusführungsbeispieleOther embodiments

Eine weitere Schutzmaßnahme kann für das Anmelden an Rechnersystemen eingebaut werden. Bei dieser Schutzmaßnahme wird zusätzlich zu dem Klickton beim Anklicken des richtigen Symbols vom System selbst eine Folge von Tönen erzeugt, die den eigentlichen Anmeldeprozeß überlagern. Auf diese Art und Weise ist es zusätzlich erschwert, durch Mithören die Positionen der grafischen Symbole abzuleiten.Another protective measure can be used for logging on Computer systems are installed. With this protective measure becomes in addition to the click sound when clicking the right one Symbols generated by the system itself a sequence of tones that overlay the actual registration process. This way and It is even more difficult by listening to the Derive positions of the graphic symbols.

Claims (9)

1. Anmeldeverfahren an einem Rechnersystem für Benutzer eines Datenendgeräts, wobei die Eingabe des Paßwortes durch Anwählen eines grafischen Symbols an einer Bildschirmposition erfolgt, dadurch gekennzeichnet, daß die grafischen Symbole des Bildschirma vom Rechner an beliebigen, zwischen zwei Anmeldungen wechselnden Bildschirmpositionen generiert werden, wobei die Symbole eine feste Zuordnung zu einen im Rechner hinterlegten Code haben, und eine festgelegte Folge von Symbolen als Ganzes das Paßwort darstellt.1. Registration process on a computer system for users of a data terminal device, the password being entered by selecting a graphic symbol at a screen position, characterized in that the graphic symbols of the screen are generated by the computer at any screen position that changes between two logins, the Symbols have a fixed assignment to a code stored in the computer, and a defined sequence of symbols as a whole represents the password. 2. Anmeldeverfahren nach Anspruch 1, dadurch gekennzeichnet, daß vom Datenendgerät an den Rechner die Position des angewählten Symbols übertragen wird.2. Registration process according to claim 1, characterized in that that the position of the data terminal to the computer selected symbol is transmitted. 3. Anmeldeverfahren nach Anspruch 1 oder 2, dadurch gekennzeichnet, daß die im Rechner hinterlegte Kennung zu einer Position und somit zu dem Symbol eine beliebige Anzahl von alphanumerischen Zeichen enthalten kann.3. Registration process according to claim 1 or 2, characterized characterized in that the identifier stored in the computer a position and thus any number of the symbol of alphanumeric characters. 4. Anmeldeverfahren nach Anspruch 1 oder 2, dadurch gekennzeichnet, daß die Anzahl der Symbole, die ein Paßwort darstellen, festlegbar ist. 4. Registration process according to claim 1 or 2, characterized marked that the number of symbols that a password represent, is definable.   5. Anmeldeverfahren nach Anspruch 1 bis 4, dadurch gekennzeichnet, daß das Anwählen der Symbole über einen Mauszeiger geschieht.5. Registration process according to claim 1 to 4, characterized characterized in that the selection of the symbols via a Mouse pointer happens. 6. Anmeldeverfahren nach Anspruch 1 bis 4, dadurch gekennzeichnet, daß das Anwählen der Symbole über das Berühren eines Touch-Screens erfolgt.6. Registration process according to claim 1 to 4, characterized characterized in that the selection of the symbols via the Touching a touch screen takes place. 7. Anmeldeverfahren nach den Ansprüchen 1 bis 6, dadurch gekennzeichnet, daß als Quittung für das Anklicken eines Symbols ein Klickton erzeugt wird und die Anzahl der Symbole hochgezählt wird.7. Registration process according to claims 1 to 6, characterized characterized that as a receipt for clicking on a Icon a click sound is generated and the number of icons is counted up. 8. Anmeldeverfahren nach den Ansprüchen 1 bis 7, dadurch gekennzeichnet, daß die Symbole aus alphanumerischen Zeichen oder Bildern bestehen können.8. Registration process according to claims 1 to 7, characterized characterized in that the symbols consist of alphanumeric characters or images can exist. 9. Anmeldeverfahren nach den Ansprüchen 1 bis 8, dadurch gekennzeichnet, daß das System Klicktöne erzeugt, die dem eigentlichen Anklicken der Symbole überlagert werden.9. Registration process according to claims 1 to 8, characterized characterized in that the system produces clicks that correspond to the actual clicking of the symbols can be overlaid.
DE1996120346 1996-05-21 1996-05-21 Graphical password log-in procedure for user of data terminal in computer system Ceased DE19620346A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
DE1996120346 DE19620346A1 (en) 1996-05-21 1996-05-21 Graphical password log-in procedure for user of data terminal in computer system
GB9709891A GB2313460B (en) 1996-05-21 1997-05-16 Graphical password entry
JP12772297A JPH1097500A (en) 1996-05-21 1997-05-19 Method for logging on computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE1996120346 DE19620346A1 (en) 1996-05-21 1996-05-21 Graphical password log-in procedure for user of data terminal in computer system

Publications (1)

Publication Number Publication Date
DE19620346A1 true DE19620346A1 (en) 1997-11-27

Family

ID=7794845

Family Applications (1)

Application Number Title Priority Date Filing Date
DE1996120346 Ceased DE19620346A1 (en) 1996-05-21 1996-05-21 Graphical password log-in procedure for user of data terminal in computer system

Country Status (3)

Country Link
JP (1) JPH1097500A (en)
DE (1) DE19620346A1 (en)
GB (1) GB2313460B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19848501A1 (en) * 1998-10-21 2000-05-04 Sfr Ges Fuer Datenverarbeitung Identity check method for computer users, involves comparing characters allocated to regions of displayed image by user using different entries, establishing identity of characters coincide
EP1181643A1 (en) * 1999-02-12 2002-02-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
DE10118209A1 (en) * 2001-04-11 2002-10-24 Siemens Ag Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation
FR2824208A1 (en) * 2001-04-26 2002-10-31 Schlumberger Systems & Service METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE
DE10153404A1 (en) * 2001-11-01 2003-05-15 Rene Baltus Writer for normal pens
WO2003049001A2 (en) * 2001-10-30 2003-06-12 Thomas Gebel Method for graphical authentication
WO2004081767A1 (en) * 2003-03-11 2004-09-23 Koninklijke Philips Electronics N.V. Method and system for enabling remote message composition
WO2007000845A1 (en) * 2005-06-27 2007-01-04 Kabushiki Kaisha Toshiba Server device, method and program
EP1845469A1 (en) * 2006-04-12 2007-10-17 Siemens Aktiengesellschaft Authentification method and system
DE102006050315A1 (en) * 2006-10-25 2008-04-30 Carl Zeiss Ag Head mounted display-system, has clearing unit controlling clearing code on availability, and display module presenting image to user carrying display module on head based on image data transmitted when effective clearing code is existing

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013243A1 (en) * 1999-08-13 2001-02-22 Creditguard Ltd User authentication system
KR20000024087A (en) * 2000-01-19 2000-05-06 김한성 A password preparing method using image associable words
WO2001098912A1 (en) * 2000-06-22 2001-12-27 Mnemonic Security Limited Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information
US6720860B1 (en) * 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
AU2001272784A1 (en) * 2000-07-25 2002-02-05 Asahi Business Assist Limited Secret information recorded medium, secret information protection method, secretinformation protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
JP4868643B2 (en) * 2000-12-27 2012-02-01 株式会社ニーモニックセキュリティ Authentication system for input operation of personal authentication data recording medium
US7373510B2 (en) * 2000-09-12 2008-05-13 International Business Machines Corporation System and method for implementing a robot proof Web site
DE10050734A1 (en) * 2000-09-29 2002-04-11 Reinhold Rohrbach Method and device for determining the access code
FR2819323B1 (en) * 2001-01-05 2003-04-25 Schlumberger Systems & Service METHOD FOR ACCESSING A SECURE SYSTEM
WO2002071177A2 (en) * 2001-03-03 2002-09-12 Moneyhive.Com Pte Ltd Method and system for substantially secure electronic transactions
FR2825489B1 (en) * 2001-06-05 2003-09-05 Marguerite Paolucci SECURE INDIVIDUAL AUTHENTICATION METHOD FOR CONNECTION TO AN INTERNET / INTRANET SERVER BY REMOTE FURENT ACCESS
KR20030002280A (en) * 2001-06-30 2003-01-08 주식회사 비즈모델라인 System and Method for providing the password related to client's behavior pattern
US7536556B2 (en) 2001-07-27 2009-05-19 Yulia Vladimirovna Fedorova Method and device for entering a computer database password
KR100515683B1 (en) * 2002-10-16 2005-09-23 정욱진 System and method for registrating and identifiying a person by clicking password points in a image
US7073067B2 (en) * 2003-05-07 2006-07-04 Authernative, Inc. Authentication system and method based upon random partial digitized path recognition
FI20030920A0 (en) 2003-06-19 2003-06-19 Nokia Corp A method and system for generating a graphical password and a terminal
US7337466B2 (en) * 2003-07-08 2008-02-26 Intel Corporation Information hiding through time synchronization
CN1856782B (en) * 2003-09-25 2011-05-18 索尔玛泽株式会社 The method of safe certification service
US7882361B2 (en) * 2004-02-05 2011-02-01 Oracle America, Inc. Method and system for accepting a pass code
EP1574931A3 (en) * 2004-03-11 2008-09-24 Wincor Nixdorf International GmbH Self-service device with a data imput device and method for inquiring the PIN
AT413775B (en) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM
AT413894B (en) * 2004-04-15 2006-07-15 Helmut Dipl Ing Schluderbacher NOT PERSONALIZED ACCESS CODE
US7616764B2 (en) 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7596701B2 (en) 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
KR100716975B1 (en) * 2004-07-10 2007-05-10 삼성전자주식회사 User certification apparatus and user certification method
JP4954979B2 (en) 2005-04-29 2012-06-20 オラクル・インターナショナル・コーポレイション Systems and methods for fraud monitoring, detection, and hierarchical user authentication
JP4422088B2 (en) * 2005-09-27 2010-02-24 Necネクサソリューションズ株式会社 Image array type authentication system
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
US7480870B2 (en) 2005-12-23 2009-01-20 Apple Inc. Indication of progress towards satisfaction of a user input condition
KR100884376B1 (en) * 2006-02-09 2009-02-17 (주)솔메이즈 Method and apparatus of OTP based on Challenge/Response
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US7849321B2 (en) 2006-08-23 2010-12-07 Authernative, Inc. Authentication method of random partial digitized path recognition with a challenge built into the path
US9106422B2 (en) 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
KR100844195B1 (en) 2007-02-28 2008-07-04 (주)민인포 A user authentication method of having used graphic OTP
EP2203865A2 (en) 2007-09-24 2010-07-07 Apple Inc. Embedded authentication systems in an electronic device
GB2454459A (en) * 2007-11-06 2009-05-13 Andrew Small Personal identification code entry device
NO327152B1 (en) 2007-12-19 2009-05-04 Fast Search & Transfer Asa Procedure to improve security in login and service access procedures
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
JP5400301B2 (en) * 2008-01-23 2014-01-29 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication server device, authentication method, and authentication program
US8174503B2 (en) 2008-05-17 2012-05-08 David H. Cain Touch-based authentication of a mobile device through user generated pattern creation
JP5198951B2 (en) * 2008-06-30 2013-05-15 トッパン・フォームズ株式会社 Identification system
US8638939B1 (en) 2009-08-20 2014-01-28 Apple Inc. User authentication on an electronic device
KR101746732B1 (en) 2009-10-16 2017-06-27 아모르로그 엘티디 System and method for improving security of user account access
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US8587547B2 (en) 2010-11-05 2013-11-19 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
US8648823B2 (en) 2010-11-05 2014-02-11 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
GB2486706B (en) * 2010-12-21 2017-05-24 Sharp Kk Handset
EP2503479B1 (en) * 2011-03-21 2015-08-05 BlackBerry Limited Login method based on direction of gaze
US8625847B2 (en) 2011-03-21 2014-01-07 Blackberry Limited Login method based on direction of gaze
GB201106943D0 (en) * 2011-04-27 2011-06-01 Burkill Vance Improvements in or relating to password generation, recall and protection
US11165963B2 (en) 2011-06-05 2021-11-02 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
JP5143258B2 (en) 2011-06-17 2013-02-13 株式会社東芝 Information processing apparatus, information processing method, and control program
KR101741264B1 (en) * 2011-08-05 2017-06-09 주식회사 네오플 Method and apparatus for input password in using game
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8769624B2 (en) 2011-09-29 2014-07-01 Apple Inc. Access control utilizing indirect authentication
US9372978B2 (en) 2012-01-20 2016-06-21 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9483763B2 (en) 2014-05-29 2016-11-01 Apple Inc. User interface for payments
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
JP6736686B1 (en) 2017-09-09 2020-08-05 アップル インコーポレイテッドApple Inc. Implementation of biometrics
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3940104A1 (en) * 1989-12-05 1991-06-06 Kromer Theodor Gmbh & Co Kg INPUT DEVICE WITH KEYPAD FOR CODE LOCKS OR THE LIKE

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4333090A (en) * 1980-05-05 1982-06-01 Hirsch Steven B Secure keyboard input terminal
JPS60134377A (en) * 1983-12-21 1985-07-17 Omron Tateisi Electronics Co Password number input device
US5276314A (en) * 1992-04-03 1994-01-04 International Business Machines Corporation Identity verification system resistant to compromise by observation of its use
FR2708358B1 (en) * 1993-07-01 1995-09-01 Bull Cp8 Method for entering confidential information, terminal and associated verification system.
GB9424791D0 (en) * 1994-12-08 1995-02-08 Philips Electronics Uk Ltd Security code input

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3940104A1 (en) * 1989-12-05 1991-06-06 Kromer Theodor Gmbh & Co Kg INPUT DEVICE WITH KEYPAD FOR CODE LOCKS OR THE LIKE

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Datenbank: WPIDS auf STN. London: Derwent, AN 92-055712, benutzt am 28.11.96, AB. TP 19205 A *
Patent Abstracts of Japan, P-1192, 1991, Vol. 15, No. 156, JP 3-25569 A *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19848501C2 (en) * 1998-10-21 2001-03-22 Sfr Ges Fuer Datenverarbeitung Identity verification procedures
DE19848501A1 (en) * 1998-10-21 2000-05-04 Sfr Ges Fuer Datenverarbeitung Identity check method for computer users, involves comparing characters allocated to regions of displayed image by user using different entries, establishing identity of characters coincide
EP1181643A1 (en) * 1999-02-12 2002-02-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
EP1181643A4 (en) * 1999-02-12 2004-10-13 Arcot Systems Inc Method and apparatus for secure entry of access codes in a computer environment
WO2002073377A3 (en) * 2001-03-14 2003-10-23 Laszlo Jaloveczki Authorisation method for a user of a limited access system having an authorisation centre
WO2002073377A2 (en) * 2001-03-14 2002-09-19 Jaloveczki Laszlo Authorisation method for a user of a limited access system having an authorisation centre
DE10118209A1 (en) * 2001-04-11 2002-10-24 Siemens Ag Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation
WO2002089079A1 (en) * 2001-04-26 2002-11-07 Schlumberger Systemes Method and device for assigning an authentication code
FR2824208A1 (en) * 2001-04-26 2002-10-31 Schlumberger Systems & Service METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE
WO2003049001A2 (en) * 2001-10-30 2003-06-12 Thomas Gebel Method for graphical authentication
WO2003049001A3 (en) * 2001-10-30 2003-10-30 Thomas Gebel Method for graphical authentication
DE10153404A1 (en) * 2001-11-01 2003-05-15 Rene Baltus Writer for normal pens
WO2004081767A1 (en) * 2003-03-11 2004-09-23 Koninklijke Philips Electronics N.V. Method and system for enabling remote message composition
WO2007000845A1 (en) * 2005-06-27 2007-01-04 Kabushiki Kaisha Toshiba Server device, method and program
EP1845469A1 (en) * 2006-04-12 2007-10-17 Siemens Aktiengesellschaft Authentification method and system
DE102006050315A1 (en) * 2006-10-25 2008-04-30 Carl Zeiss Ag Head mounted display-system, has clearing unit controlling clearing code on availability, and display module presenting image to user carrying display module on head based on image data transmitted when effective clearing code is existing
DE102006050315B4 (en) 2006-10-25 2019-12-24 Carl Zeiss Ag Head mounted display system and display method for a head mounted display system

Also Published As

Publication number Publication date
GB9709891D0 (en) 1997-07-09
JPH1097500A (en) 1998-04-14
GB2313460B (en) 1998-07-08
GB2313460A (en) 1997-11-26

Similar Documents

Publication Publication Date Title
DE19620346A1 (en) Graphical password log-in procedure for user of data terminal in computer system
DE60311757T2 (en) System and method for authentication based on random partial pattern recognition
US7690025B2 (en) Methods and systems for accessing a network-based computer system
DE102007034413B4 (en) Method and device for authenticating a user
US8042159B2 (en) Website log in system with user friendly combination lock
CA2569634C (en) Method and system to generate an image for monitoring user interaction with a computer
DE102017113529A1 (en) Method and system for checking the authenticity of a trusted user interface
WO2007051842A1 (en) Method and system for transmitting data from a first data processing device to a second data processing device
DE112014001975T5 (en) Method and system for secure data entry into a unit
DE60122298T2 (en) data entry
DE2939458A1 (en) SYSTEM FOR LOCALIZING AREAS WITH MIXED TEXT / IMAGE EDITING ON THE SCREEN
EP1733293A1 (en) Method for safely logging onto a technical system
DE102007043843A1 (en) Character string tap-proof transmitting method for e.g. on-line bank account, involves providing information with image to position client, and inputting reconstruction of character string by client using server
DE60130832T2 (en) Method and device for arranging digital certificates on a hardware token
DE10050734A1 (en) Method and device for determining the access code
WO2009121437A1 (en) Dynamic authentication method
DE19961838A1 (en) Method and device for checking a file
DE19803339B4 (en) Method and device for checking the access authorization of a user for a particularly protected facility
DE102017127280B4 (en) PROTECTION AGAINST REALTIME PHISHING AND OTHER ATTACKS DURING A LOGIN PROCESS ON A SERVER
EP2512090A1 (en) Method for authenticating a subscriber
EP1245094A2 (en) Device for the password-protected handling of an electronic document
EP1785900A1 (en) Method and device for transferring data from a first data processing unit to a second data processing unit
DE19703970B4 (en) Method for collecting data and transmitting it in authentic form
DE60115541T2 (en) Method for authenticating a portable terminal
DE112019005599T5 (en) Process for the recognition of expression of opinion, which can guarantee anonymity and prevent Sybil attacks, process for registration, which stores identification information of the user, and process for the authentication of the user

Legal Events

Date Code Title Description
OP8 Request for examination as to paragraph 44 patent law
8131 Rejection