EP1192748A4 - Dispositif et procede de cryptage de securite - Google Patents

Dispositif et procede de cryptage de securite

Info

Publication number
EP1192748A4
EP1192748A4 EP00946912A EP00946912A EP1192748A4 EP 1192748 A4 EP1192748 A4 EP 1192748A4 EP 00946912 A EP00946912 A EP 00946912A EP 00946912 A EP00946912 A EP 00946912A EP 1192748 A4 EP1192748 A4 EP 1192748A4
Authority
EP
European Patent Office
Prior art keywords
photograph
security
security device
program
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00946912A
Other languages
German (de)
English (en)
Other versions
EP1192748A1 (fr
Inventor
Howard Stein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1192748A1 publication Critical patent/EP1192748A1/fr
Publication of EP1192748A4 publication Critical patent/EP1192748A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • the invention relates to an encryption security device and process to limit access to an associated apparatus.
  • the associated apparatus can comprise such diverse items as a computer, a computer program, a vehicle, a home, a safe or other devices or places to which access should be restricted.
  • the invention relates to the use of a photograph as an aspect of an encryption security device.
  • the security device comprises a security photograph, with a multiplicity of picture elements, which is inserted into a high-resolution scanner or equivalent.
  • An associated apparatus can be initialized such that it recognizes the specific security photograph and will not allow access without the insertion of said security photograph into the scanner.
  • the security photograph necessarily comprises a plurality of picture elements.
  • the security photograph comprises a picture which incorporates a vast number of random picture elements.
  • One type of photograph which can advantageously be used is an enlargement of the center of a cut gemstone. Enlargements of other items of unique structure can be used equally advantageously.
  • this encryption methodology prevents access by hackers trying to use alphabetical and numerical replacement methodology because the program sees the picture as a whole as well as made up of a series of elements. If one element is not correct in the whole, the hacker cannot determine which of the hacker's replacements is right or wrong because the security device either prevents further attempts to pass the security test or shuts the secured device down so that further hacking is impossible.
  • Figure 1 illustrates a process for access to a computer using one embodiment of the described security device.
  • Figure 2 illustrates a process of producing one embodiment of the present invention.
  • the described invention in one preferred embodiment, is a security device comprising a photograph.
  • the photograph necessarily incorporates a multiplicity of picture elements.
  • An apparatus such as a computer or a computer program or another apparatus requiring access which can be secured is associated with the security device.
  • the apparatus is initialized such that a specific security photograph is required to access the apparatus or an aspect of the workings of the apparatus.
  • the security photograph in order for the apparatus to be initialized the security photograph is scanned for initialization. Henceforth the identical photograph must be scanned for access to the associated apparatus.
  • the security photograph is encrypted onto the computer hard disc as a program file for the purpose of blocking access to the computer.
  • the computer can henceforth not be booted up without first scanning an identical security photograph.
  • the direction given by the encryption program when the computer is turned on is to place a 'security code' (security photograph) in a high-resolution scanner so that the original photograph used to encrypt entry to the computer is compared with the security photograph being scanned.
  • the two photographs must match exactly for the computer to become functional and allow a user to access the programs.
  • the requirements for the two photographs to match can require a high level of detail.
  • This process could further be used to access individual programs or files on the hard drive of the computer.
  • the process could also be used to protect already existing programs or files.
  • FIG. 1 illustrates an exemplary process of using an embodiment of the described security device.
  • security photograph 10 of an enlarged gemstone is placed in high-resolution scanner 11.
  • Scanner 11 is connected with computer 12.
  • security photograph 10 is initially placed in scanner 11
  • computer 12 is initialized to require security photograph 10 as a pass key equivalent. Thereafter the insertion of security photograph 10 in scanner 11 allows access to computer 12.
  • security photograph 10 is an enlargement of a photograph of the center of a gemstone.
  • a highly magnified interior of a gem is non- logical and a decoding device cannot use a logic based replacement program to determine what pattern the magnification of the internal structure of a gem will have unless the hacker knows exactly which gem has been used, the exact angle from which the picture of the gem was taken and the exact level of magnification used in the original passkey device.
  • Figure 2 illustrates the process used to obtain the security photograph in one embodiment of the invention.
  • Camera 20 is attached to microscope 21.
  • Camera 20 is employed to take a picture of an enlargement of the center of gemstone 22 (a cut diamond, emerald, ruby or other gem).
  • the enlargement used can be from a 10 to 40 power, the industry standard, or from two power to infinity depending on the level of random variability desired by the user for the security photograph.
  • the resulting picture can either be a transparency or a print.
  • Magnification of gemstone 22 is required because no two gems have identical internal structure and the greater the degree of magnification the greater the unpredictable variations of such internal structure will be revealed thus making duplication of the security photograph impossible.
  • a picture taken of the same gem using different magnification or which is taken from a different angle, no matter how minutely at variance from the original, will not be recognized by the program as the correct security photograph and the apparatus associated with the security photograph will not start.
  • a picture of the center of any polished gem could be used. Further a piece of granite could be cut into pieces and enlarged photographs of the unique structural surface of the granite could be used as a security photograph. No two security photographs would be exactly the same.
  • the security photograph could comprise a magnified photograph of any suitable object.
  • the security photograph could comprise any picture which comprises a multitude of random picture elements.
  • the described security device can be used to secure a computer, a computer program, a vehicle of any description, a gun, a home, a cash register, a safe or any other apparatus which requires secured access.
  • the program in the security device process will allow the user several levels of security from which to choose. For example the following options could be made available:
  • the described security photograph is not like any other security code because the complicated picture consists of so many thousands of randomly organized picture elements which cannot be decoded because they are in no logical order, nor do they consist of known alphabets or symbols. Even if an unauthorized user knew what the security photograph had been taken of, the security photograph could not be duplicated because the angle, distance and magnification would be different for each security photograph.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

La présente invention concerne un dispositif de cryptage de sécurité empêchant l'accès non autorisé à un appareil associé. Dans un des modes de réalisation, le dispositif de sécurité comprend une photographie de sécurité contenant une multitude de pixels, un programme initialisé pour reconnaître la photographie de sécurité et permettre l'accès à un appareil associé et un lecteur optique connecté au programme. Cette photographie de sécurité peut comprendre une photographie de l'intérieur d'une pièce précieuse, ou tout autre photographie appropriée contenant une multitude de pixels aléatoires. En outre, la présente invention concerne également un procédé d'utilisation du dispositif de sécurité pour sécuriser l'accès à l'appareil. Dans un autre mode de réalisation, ce procédé consiste à prendre une photographie d'un objet et à la numériser, à initialiser ensuite un programme pour reconnaître la photographie numérisée, et enfin à exiger de l'utilisateur de passer la photographie au lecteur optique pour accéder à l'appareil.
EP00946912A 1999-06-30 2000-06-29 Dispositif et procede de cryptage de securite Withdrawn EP1192748A4 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14127499P 1999-06-30 1999-06-30
US141274P 1999-06-30
PCT/US2000/017991 WO2001001620A1 (fr) 1999-06-30 2000-06-29 Dispositif et procede de cryptage de securite

Publications (2)

Publication Number Publication Date
EP1192748A1 EP1192748A1 (fr) 2002-04-03
EP1192748A4 true EP1192748A4 (fr) 2004-06-30

Family

ID=22494965

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00946912A Withdrawn EP1192748A4 (fr) 1999-06-30 2000-06-29 Dispositif et procede de cryptage de securite

Country Status (5)

Country Link
EP (1) EP1192748A4 (fr)
JP (1) JP2003503893A (fr)
AU (1) AU6059700A (fr)
CA (1) CA2377802A1 (fr)
WO (1) WO2001001620A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4179686A (en) * 1976-11-03 1979-12-18 Bonicalzi Maria P System for checking the authenticity of identification papers
US4245213A (en) * 1979-08-20 1981-01-13 Igor Kriger Security system
US5430277A (en) * 1992-11-10 1995-07-04 Kabushiki Kaisha Toshiba Image recording medium, a processing apparatus thereof, and an entrance/exit control system using the image recording medium
EP0730243A2 (fr) * 1995-02-28 1996-09-04 AT&T Corp. Système et méthode de vérification de cartes d'identification

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3764742A (en) * 1971-12-23 1973-10-09 Ibm Cryptographic identification system
JPH09508719A (ja) * 1994-02-04 1997-09-02 データカード・コーポレーション カード作成装置およびその方法
US5513272A (en) * 1994-12-05 1996-04-30 Wizards, Llc System for verifying use of a credit/identification card including recording of physical attributes of unauthorized users
US5988510A (en) * 1997-02-13 1999-11-23 Micron Communications, Inc. Tamper resistant smart card and method of protecting data in a smart card
US6106457A (en) * 1997-04-04 2000-08-22 Welch Allyn, Inc. Compact imaging instrument system
US6085976A (en) * 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
US6000608A (en) * 1997-07-10 1999-12-14 Dorf; Robert E. Multifunction card system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4179686A (en) * 1976-11-03 1979-12-18 Bonicalzi Maria P System for checking the authenticity of identification papers
US4245213A (en) * 1979-08-20 1981-01-13 Igor Kriger Security system
US5430277A (en) * 1992-11-10 1995-07-04 Kabushiki Kaisha Toshiba Image recording medium, a processing apparatus thereof, and an entrance/exit control system using the image recording medium
EP0730243A2 (fr) * 1995-02-28 1996-09-04 AT&T Corp. Système et méthode de vérification de cartes d'identification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO0101620A1 *

Also Published As

Publication number Publication date
WO2001001620A1 (fr) 2001-01-04
CA2377802A1 (fr) 2001-01-04
JP2003503893A (ja) 2003-01-28
EP1192748A1 (fr) 2002-04-03
AU6059700A (en) 2001-01-31

Similar Documents

Publication Publication Date Title
US4864494A (en) Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
KR101824787B1 (ko) 데이터 암호화 시스템 및 방법
US20060106729A1 (en) Method and apparatus for restricting use of a computer program
EP2626807A1 (fr) Système d'authentification d'utilisateur à deux facteurs, et procédé pour ce système
CN101523399A (zh) 基于用户认证修改完整性度量的方法和系统
US8904482B1 (en) Techniques for securing a one-time passcode with an alteration code
CN107111698B (zh) 认证服务器装置、存储介质及认证方法
CA2993346C (fr) Systeme et procede de reproduction d'etiquette d'acces sans fil
US20060212649A1 (en) License table for software protection
EP2924953A1 (fr) Procédé et système de synchronisation des données cryptées pour la gestion de données sécurisées
PL201058B1 (pl) Sposób autoryzacji elektromechanicznego układu klucza i zamka oraz elektromechaniczny układ klucza i zamka
Rodrigues et al. Two factor verification using QR-code: A unique authentication system for Android smartphone users
WO2001057628A1 (fr) Dispositif et procede d'identification physique et de securite informatique
JP4137468B2 (ja) プログラム使用認証方法
EP1192748A1 (fr) Dispositif et procede de cryptage de securite
US11601291B2 (en) Authentication method and device for matrix pattern authentication
US20240022403A1 (en) Delivering random number keys securely for one-time pad symmetric key encryption
US20020025040A1 (en) Method and apparatus for generating an encryption key
KR101624394B1 (ko) 패스워드 인증 장치 및 그 장치의 운용 방법
KR20040027826A (ko) 컴퓨터 파일 변형을 이용한 소프트웨어 보호 방법
CN102236754B (zh) 数据保密方法以及使用此数据保密方法的电子装置
Giles Encrypted file systems
KR101669770B1 (ko) 패스워드 인증 장치 및 그 장치의 운용 방법
US20100138927A1 (en) Apparatus and Method for Preventing Unauthorized Access to Secure Information
EP2699033A1 (fr) Dispositif de communication mobile avec une mémoire d'application non-sécurisée et une mémoire de donnée sécurisée

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020122

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

A4 Supplementary search report drawn up and despatched

Effective date: 20040517

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06F 1/00 B

Ipc: 7G 07C 9/00 A

17Q First examination report despatched

Effective date: 20041014

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20050426