EP3673479A1 - Device using rotating disks for encrypting and storing a password - Google Patents
Device using rotating disks for encrypting and storing a passwordInfo
- Publication number
- EP3673479A1 EP3673479A1 EP18758598.9A EP18758598A EP3673479A1 EP 3673479 A1 EP3673479 A1 EP 3673479A1 EP 18758598 A EP18758598 A EP 18758598A EP 3673479 A1 EP3673479 A1 EP 3673479A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- disc
- characters
- opening
- discs
- string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 claims description 11
- 239000000123 paper Substances 0.000 description 6
- 239000000463 material Substances 0.000 description 2
- 239000002861 polymer material Substances 0.000 description 2
- 102000001690 Factor VIII Human genes 0.000 description 1
- 108010054218 Factor VIII Proteins 0.000 description 1
- 241000590419 Polygonia interrogationis Species 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 229920000058 polyacrylate Polymers 0.000 description 1
- 239000004417 polycarbonate Substances 0.000 description 1
- 229920000515 polycarbonate Polymers 0.000 description 1
- 238000001556 precipitation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C3/00—Typewriters for ciphering or deciphering cryptographic text
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
- G09C1/06—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system wherein elements corresponding to the signs making up the clear text are operatively connected with elements corresponding to the signs making up the ciphered text, the connections, during operation of the apparatus, being automatically and continuously permuted by a coding or key member
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/38—Encryption being effected by mechanical apparatus, e.g. rotating cams, switches, keytape punchers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Definitions
- TECHNICAL FIELD This invention relates to devices and methods for encrypting and storing a number, for example a four-digit PIN-code.
- the numbers must be kept secret so that unauthorized use is avoided.
- some people still, against firm advice from banks, write down the numbers, for example on a piece of paper, and store the paper together with the credit cards in the wallet.
- a large number of passwords for websites, email and computers have to be remembered.
- the cipher disc was proposed in 1467 by the Italian architect and author Leon Battista Albert!. It is a simple cryptographic device that consists of two concentric circular plates mounted one on top of the other, where one disc displays the letter of the alphabet and the other displays the code, one letter for each clear text letter.
- the Alberti cipher disc is used only for translating a message from clear text to code and vice versa. It cannot be used for storing information.
- Paper disc calculators are known, for example for calculating body mass index, calculating photo exposure times, betting odds, and patent filing dates.
- a device for encrypting and storing a string of characters, such a PIN number or a password comprising at least three circular discs placed on top of each other, forming a stack of discs, the stack of discs being connected in the centre of the discs with a hub enabling the discs to rotate relative to each other, the stack having an upper side and a reverse side, where the middle disc has a plurality of openings arranged at an equal distance from the centre of the stack, where the upper disc has at least one first opening arranged at the same distance from the hub as the openings of the middle disc, thereby enabling viewing of parts of the upper surface of the bottom disc from the upper surface of the stack when the first opening of the upper disc is aligned with an opening of the middle disc, where the upper disc has a second opening, which may be an opening that is separate from the first opening or an opening that is a part of the first opening, said second opening enabling the viewing of a part of the upper surface of the middle
- the device makes it easy to encrypt a string of characters, such as PIN-codes or a password in a manner that is sufficiently safe, so that the codes or passwords does not have be remembered. It is very difficult for a person that does not know which key position the user has used to encrypt and store the number, to obtain the string of characters.
- the device cannot be hacked by computer hackers.
- the device is easy to carry around in a wallet or a handbag, or can be kept in an office drawer.
- the upper disc may have a plurality of sets of first and second openings in the upper disc, where the first and second opening of each set are visibly connected on the surface of the upper disc to form a reading position, where each reading position can be used to store and encrypt one string of characters. This makes it possible to store a plurality of strings of characters and also increases the safety of the device.
- the first openings of the different reading positions may be placed along the same distance from the hub of the device and where the second openings are placed at the same difference from the hub of the device. This makes it possible to reuse the non-coding characters.
- Each reading position may be visibly associated with a writing space or a unique identifier on the upper surface of the upper disc. This makes it easier for the user to find the correct code.
- the first and second opening of each reading position may be visibly connected by being aligned along a line drawn from the hub towards the circular edge of the upper disc.
- the key positions may be arranged as follows: The uppermost disc has a smaller diameter than the middle disc and the middle disc has a smaller diameter than the lowest disc, thereby enabling the viewing of the upper surface of rim of the middle disc and the upper surface of the rim of the lowest disc from the upper side of the device, and where the visible marks that uniquely identify a set of positions of the three discs relative to each other, or means for making such markings, thereby identifying a plurality of key positions, are arranged along said visible rims.
- the visible marks on the rims may be characters or symbols, where each character or symbol occurs at most once on each rim, and where each key position is defined by aligning three characters or symbols.
- the device may have a covering disc being placed on top of the other discs, the covering disc enabling the viewing of only one key position, the other key positions being hidden. This makes it difficult to other than the user to see the characters on the disc, and also protects the device from wear.
- a method for encrypting and storing a string of characters, such as a password or a PIN code, where the string of characters are made up from a predefined group of allowed characters comprising using a device according to claim 1 the method comprising the steps of a) writing a first part of the string of characters on a field of the bottom disc so that the characters are visible from the upper side when the device is set in a key position, b) writing the remaining part of the string of characters on the surface of the middle disc, so that the characters are visible from the second opening of the upper disc when the device is set in the same key position as in step a), and c) writing strings of characters, where the characters are selected from the predefined group of allowed characters, in at least one other field of the middle disc and in at least one other field of the bottom disc, where the two strings of characters together form a different string of characters than the encrypted string of characters, where the fields are associated with one other key position.
- Step c) may preferably be carried out for all key positions other than the key position used in step a) and b).
- the string of string of characters is a four-digit number and the first two or the last two digits are written in step a) and the other two digits are written in step b), and where two-digit numbers are written in step c).
- Fig. 1 is a side view of a device.
- Fig. 2 is a perspective view of a device.
- Fig. 3 is an exploded view of a device.
- Figs. 4-5 are exploded views of a device, before and after numbers have been written.
- Fig. 6 is a side view of a device with a cover disc.
- Fig. 7 is a perspective view of a device with a cover disc.
- Fig. 8 is a flowchart showing a method. DETAILED DESCRIPTION
- the device may be used for encrypting and storing a string of character, such as letters, digits or symbols that constitute a password or a PIN number.
- the characters may also be characters from other alphabets, such as the Cyrillic, Greek, Arabic, Chinese, Japanese, or Hindi alphabet, that are allowed in passwords or PIN-codes.
- the string of characters is a PIN-code, such as a four-digit PIN code.
- the device 1 comprises at least three circular discs 5, 6, 7 placed on top of each other such that a stack of discs is formed.
- the discs 5, 6, 7, 20 may be circular or essentially circular.
- the discs 5, 6, 7, 20 may have jagged edges or have protruding parts such as small handles or knobs to facilitate turning of discs 5, 6, 7, 20 by hand.
- the discs 5, 6, 7 are preferably made of a thin and stiff material such as polymer material, paper or metal.
- the device 1 is preferably of a size that is can be carried in a handbag, pocket or even a wallet. Thus, it is a portable device. At least some surfaces of the discs should be suitable for manually writing on (see below).
- the discs 5, 6, 7 are connected in the centre of each disc with a hub 2 enabling the discs 5, 6, 7 to rotate relative to each other. Thereby the user can rotate the discs 5, 6, 7 relative to each other.
- the stack has an upper side 3 and a reverse side 4, and when it is referred to "upper surface” it is the surface that is closest to the upper side 3.
- the discs 5, 6, 7, are referred to as the lower disc 5, the middle disc 6 and the upper disc 7, where the upper disc 7 is closest to the upper side 3 of the stack.
- the middle disc 6 has a plurality of openings 8 arranged at an equal distance from the centre of the stack, thus forming a ring of openings 8.
- the plurality of openings 8 are preferably evenly spaced.
- the upper disc 7 has at least one first opening 9 arranged at the same distance from the hub 2 as the openings 8 of the middle disc 6, thereby enabling viewing of parts of the upper surface 10 of the bottom disc 5 from the upper surface 3 of the stack when the first opening 9 of the upper disc 7 is aligned with an opening 8 of the middle disc 6.
- the upper disc 7 also has a second opening 11, which may be an opening that is separate from the first opening 9 or an opening that is a part of the first opening 9.
- the second open- ing 11 is arranged at a different distance from the hub 2 than the first opening 9, and enables the viewing of a part of the upper surface 23 of the middle disc 6 from the upper side 3 of the stack.
- the first 9 and second 11 opening in the upper disc 7 forms a set 12 of openings being a reading position 12.
- the first 9 and second 11 openings in the upper 7 disc may be comprised in one opening, where a part of the opening enables viewing of the openings 8 in the middle disc 6 and the other part enables viewing of the upper surface 23 of the middle disc 6.
- openings 8 and 9 are placed further from the hub 2 than opening 11, but opening 11 can just as well be placed further out from the hub 2 than openings 8 and 9.
- the stack of discs 5, 6, 7 also has visible markings 13 that uniquely identify a set of positions of the three discs 5, 6, 7 relative to each other, or means for making such markings, thereby identifying a plurality of key positions, where the number of key positions is at least the number of openings in the middle disc 8 and where each position of the discs 5, 6, 7 relative to each other where an opening 8 of the middle disc 6 is aligned with the first opening 9 of the upper disc 7 is defined by one, and only one, key position.
- every position where the upper surface 10 of the lower disc 5 can be seen from the upper side 3 is defined by one key position.
- the user can select the different key positions by rotating the discs relative to each other.
- the areas of the lower disc 5 and the middle disc 6 that is visible from the upper side 3 when the device 1 is set in the various key position has fields 14, 19 suitable for manually writing visible characters on such as letters or digits on, for example with a pen.
- the fields 14, 19 should be large enough so that the characters can be written so that they are legible. Writing can for example be done by hand, with a pen or a pencil.
- the fields 14, 19 may be blank, for example white or light grey, surfaces suitable for writing on.
- the openings 8, 9, 11 should be large enough so that the digits that are writ- ten in the fields 14, 19 can be seen from the upper side 3 of the stack.
- the key positions can be obtained in different ways.
- the key positions are arranged as follows.
- the uppermost disc 7 has a smaller diameter than the middle disc 6 and the middle disc 6 has a smaller diameter than the lowest disc 5, thereby enabling the viewing of at least a part the upper surface 15 of rim of the middle disc 6 and at least a part of the upper surface 16 of the rim of the lowest disc 5 from the upper side 3 of the device 1.
- letters from the Latin alphabet or from the Chinese, Japanese, Cyrillic, Arabic, Greek, Hindi or any other alphabet may also be used.
- Symbols such as emojis may also be used.
- the emojis “smiley” “dog” and “sun” may define one position
- the emojis “smiley”, “dog” and “flower” may define another position.
- the rim may alternatively comprise spaces for the user to make his or her own visible marks 13 for identifying the key positions.
- the marks 13 for uniquely identifying a set of positions of the three discs 5,6,7 relative to each other may for example comprise or consist of the letters of the English alphabet from A to Z, written on each of the rims of the discs.
- the key positions are identified by three- letter combinations, formed by aligning one letter from each disc.
- the key positions may also be viewed by openings in the discs, in a similar manner as openings 8, 9 and 11.
- the key positions can be created by the user, for example by writing the letters or writing symbols in predefined areas on the rims 16 and 15.
- the key positions are preferably evenly spaced, and spaced such that each key position is associated with one writing field 14 of the middle disc 6 and one writing field 19 of the lower disc 5 (see below), such that one, and only one, writing 14a field of the middle disc 6 and one writing field 19a of the lower disc 5 are visible in each key position.
- the device can be arranged to store more than one number. Thus, there may be more than one reading position 12, where each reading position 12 is used for storing one number.
- device may have a plurality of sets 12 of first 9 and second 11 openings in the upper disc 7, where the first 9 and second 11 opening of each set 12 are visibly connected on the surface 17 of the upper disc to form a reading position 12, where each set 12 can be used to store and encrypt one number.
- All of the first openings 9 and the second openings 11 are preferably placed at the same distance from the hub 2, thereby forming rings of openings in the upper disc 7. This has the advantage that the fields 14, 19 can be reused for all reading positions 12.
- the first openings 9 can form one circle and the second openings 11 can form another circle.
- the first opening 9 of the upper disc 7 can form an outer circle of openings in the upper disc 7.
- the second openings 11 may form an inner circle of openings in the upper disc 7. This is explained in more detail below.
- the device 1 is used in the following way for encrypting and storing a number, in this case a four-digit number, such as a PIN code.
- the method can be modified to be used with for example a six-digit number or passwords consisting of other types of characters such as letters or other characters.
- the invention is most easily understood with reference to Figs 3 and 8, but the method applies to Figs 2, 4, 5 and 7 also.
- step 100 the user writes the first or the last digits of the number on of the fields 14a of the middle disc 6 so that they are is visible from the upper side 3 when the device 1 is set in one of the key positions.
- Writing can for example be done with a pen or a pencil.
- the user may select the key position himself.
- the key positions are formed by three letter combinations, the user may select a three letter-letter combination that is easy to remember, for example the three-letter combination CAT (the combination CAT is shown in figure 7 only).
- the three-letter combination is kept secret since it is the key for retrieving the four-digit PIN code.
- the user writes 32 on the writing field 14a of the middle disc 6 which is visible in the second opening 11 when the key is set to CAT.
- the number 32 is thus visible from the upper side 3 of the device 1 because the field 14a is aligned with the second opening 11 in the upper disc 7.
- step 101 the user, while the device is still set in the same key position (CAT) writes the remaining digits (77) of the PIN-code in a writing field 19a on the upper surface 10 of the lower disc 5 so that the digits 77 are visible through opening 8 in the middle disc 6 and the aligned first opening 9 in the upper disc 7.
- CAT key position
- the numbers 32 and 77 are now visible from the upper side of the disc, trough openings 11 and 9, respectively.
- the user writes the numbers so that they are arranged so that the combination 3277 are seen when the device is set in the CAT position. This depends on the direction of writing and if the first or second opening is arranged furthest away from the hub. Alterna- tively, 32 is seen in the openings 8 and 9 and 77 is seen in opening 11.
- the user may choose to invert the numbers so that the digits 7732 is seen when the device is set in the CAT position. This increases security even more, but the user off course has to remember that the two numbers are inverted when using the PIN-code.
- steps 100 and 101 is repeated for the other codes.
- the remaining free fields 14,19 are used.
- the same key position (CAT) may be used, but this is not necessary.
- a plurality of strings may be stored for each reading position 12 by using more than one key position.
- one PIN code may be read in the reading position 12 when the selected key position is CAT and one other PIN code may be read in the reading position 12 when the selected key position is MIX.
- more than one string may be stored in the device 1 with one reading position 12 (Fig. 3) by using one key position for each string.
- the second key position should use different characters or markings than the first key position for avoiding the fields 14, 19 defined by the first key position (CAT).
- step 102 the user writes two-digit numbers in at least one other field 14 of the middle disc 6 and writes digits in at least one other field 19 of the bottom disc 5 (unoccupied fields), where the two-digit numbers are different from the numbers in steps 100 and 101 and are associated with one other key position, thus a key position other than CAT.
- the user writes numbers that are different from 32 or 77.
- the user then fills all the remaining writing fields 14, 19 associated with key positions with random two-digit numbers that does not form the four digit number 3277, thus other two digit numbers than 32 and 77. This can be done by rotating the device to the various key positions so that the fields is visible in the openings, and then writing in the fields.
- Fig. 4 shows a device 1 for storing eight different strings of characters before the user has written any number on the device.
- Fig. 5 shows the device 1 of Fig. 4 when the user has carried out step 102 for all fields 14, 19.
- Steps 100, 101 and 102 can be carried out in any order, although it is probably easier for the user to carry out steps 100 and 101 before 102.
- a step 103 is carried out where the user rotates the discs so that the device is not set in the key position that discloses the four-digit number, thus a position different from CAT in this example. Thereby the four-digit number is not seen in the first 9 and second 11 openings of the first disc. The device 1 is now in the encrypted state.
- step 104 the user retrieves the number.
- the user wants to retrieve the four-digit number the user only has to remember the visible marking 13 that indicates the key position, which in this example is the three-letter combination CAT.
- the user rotates the discs so that the key position CAT is obtained and reads the digits 32 in the second opening 11 in the upper disc and the digits 77 in the first opening 9 in the upper disc.
- step 103 is pref- erably carried out again, in order to hide the PIN code.
- the encryption security of the device 1 is dependent on the number of key positions.
- Each reading position 12 may be visibly associated with a writing space 18 or a unique identifier on the upper surface 17 of the upper disc.
- the first and second openings 9, 11 of each reading position 12 may be visibly connected by being aligned along a line drawn from the hub 2 towards the circular edge of the upper disc. However, this is not necessary and the first and second openings 9,11 of a reading position 12 can for example be associated with bent lines or coloured zones on the upper surface 17 of the upper disc 7.
- the embodiment shown in Figs. 2, 4-5 and 7 has eight reading positions 12, and can thus be used for, for example, to store PIN numbers for eight different credit cards or the like.
- Each reading position 12 may be associated with writing space 18 on the upper surface 17 of the upper disc 7 where the user may make notes for remembering what each reading positions is used for, such as "Card No. 1", Card No. 2 etc", preferably in a way that makes it impossi- ble to identify the card in question (For example, it is unsuitable to write "Visa that ends with 6542"). If this is done correctly someone who finds the device 1 and the credit card will not be able to pair the reading position 12 with the correct card.
- the different reading positions 12 can be identified with different symbols or colours.
- the device 1 may also be used for storing passwords for logging in to computers, email accounts web services, web shopping sites and the like, and the fields can be used for associating the correct reading position with the correct site, computer or web service.
- the use of multiple reading positions 12 increases the security with a factor equal to the number of reading positions 12. When there are eight reading positions the security is increased by a factor 8.
- the embodiment with letters 1-y shown in the figures and eight read- ing positions 12 thus has 4608 possible combinations, which makes the device 1 even safer.
- the device 1 may have a cover disc 20 (a fourth disc) placed on top of the upper disc 7.
- the cover disc 20 is made of a transparent and stiff material, for example a transparent polymer material such as polycarbonate or an acrylic polymer.
- the rim 21 of cover disc 20 is arranged such that all key positions but one cannot be seen, thus the other key positions are hidden.
- the lower disc 5, the middle disc 6 and the upper disc 7 can rotate relative to the covering disc 20.
- the rim 21 may be coloured so that only one key position is visible in a window 22.
- the covering disc 20 servers the purpose of covering the other key positions so that they are not seen by anyone but the user, for example people standing in line next to the user.
- This covering disc 20 also protects the upper disc 7, which may be made of paper, from damage and precipitation.
- the cover disc 20 protects the handwritten numbers from smearing and the like.
- the number may be divided into two groups each comprising one three-digit number, and each of the three- digit numbers are written on each space 14, 19.
- the number 123456 may be divided into 123 and 456.
- the devicel When the devicel is used for a five-digit number it may be divided into a two-digit number and a three-digit number.
- the device 1 may be designed to accommodate numbers of different length. For example, it may be difficult to fit writing spaces for long numbers for many (for example eight) differ- ent key positions. Therefore, the number of reading positions may be decreased in order to accommodate longer numbers.
- device 1 is used for storing a password comprising letters from an alphabet, or a combination of letters and/or digits and/or other symbols allowed in passwords such as question marks or exclamation marks, the method described above with reference to Fig. 8 can also be used.
- the password is then suitably divided into two parts and a first part is written on a field 19 on the lower disc 5 and a second part is written on field 14 of the middle disc 6.
- the password can, as an example, be divided into a first part “rai” and second part “n35 l".
- the remaining fields 14, 19 are then filled with random letters and/or digits and/or symbols that are allowed in passwords.
- the password can be divided in any suitable way, but it is often preferably to divide in two parts of approximately equal length.
- a string of characters consisting of an even number of characters is preferably divided in two equal parts, such as 2+2, 3+3 or 4+4.
- a string of characters consisting of an uneven number of characters is preferably divided into 2+3, 3+4, 4+5 number of characters, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Packaging For Recording Disks (AREA)
- Lock And Its Accessories (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1751014A SE1751014A1 (en) | 2017-08-23 | 2017-08-23 | |
PCT/EP2018/072490 WO2019038252A1 (en) | 2017-08-23 | 2018-08-21 | Device using rotating disks for encrypting and storing a password |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3673479A1 true EP3673479A1 (en) | 2020-07-01 |
Family
ID=63294234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP18758598.9A Withdrawn EP3673479A1 (en) | 2017-08-23 | 2018-08-21 | Device using rotating disks for encrypting and storing a password |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3673479A1 (en) |
SE (1) | SE1751014A1 (en) |
WO (1) | WO2019038252A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2564442B (en) * | 2017-07-10 | 2022-03-02 | Shayype Global Ltd | Method of registering and authenticating a user of an online system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10045467A1 (en) * | 2000-09-14 | 2002-04-25 | Wich Robert | Personal identity number (PIN) enciphering device e.g. for banks and credit cards, has at least three cipher discs arranged about common center |
US20120082306A1 (en) * | 2010-10-05 | 2012-04-05 | Andrew William Hulse | Data Encryption and Input System |
CA2872037A1 (en) * | 2014-11-20 | 2016-05-20 | Christophe Picot | Password-creating card and password reminder |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2007324341A1 (en) * | 2006-11-21 | 2008-05-29 | Michael P. Hennessy | Device for keeping track of passwords |
IL231159A0 (en) * | 2014-02-25 | 2014-09-30 | Abielraviv | Passwords safe tool |
-
2017
- 2017-08-23 SE SE1751014A patent/SE1751014A1/en not_active IP Right Cessation
-
2018
- 2018-08-21 EP EP18758598.9A patent/EP3673479A1/en not_active Withdrawn
- 2018-08-21 WO PCT/EP2018/072490 patent/WO2019038252A1/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10045467A1 (en) * | 2000-09-14 | 2002-04-25 | Wich Robert | Personal identity number (PIN) enciphering device e.g. for banks and credit cards, has at least three cipher discs arranged about common center |
US20120082306A1 (en) * | 2010-10-05 | 2012-04-05 | Andrew William Hulse | Data Encryption and Input System |
CA2872037A1 (en) * | 2014-11-20 | 2016-05-20 | Christophe Picot | Password-creating card and password reminder |
Non-Patent Citations (1)
Title |
---|
See also references of WO2019038252A1 * |
Also Published As
Publication number | Publication date |
---|---|
SE540742C2 (en) | 2018-10-30 |
WO2019038252A1 (en) | 2019-02-28 |
SE1751014A1 (en) | 2018-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4958066A (en) | Financial instrument verification and method of production | |
US5313564A (en) | Graphic matter and process and apparatus for producing, transmitting and reading the same | |
US4140272A (en) | Optical card, system and method for securing personal identification data | |
GB2434472A (en) | Verification using one-time transaction codes | |
GB2261540A (en) | Memory aiding device | |
JPS62265686A (en) | Data cryptographer and manufacture thereof | |
JPS5952358A (en) | Verification of use of document specified by user and document and apparatus for executing same | |
EP3673479A1 (en) | Device using rotating disks for encrypting and storing a password | |
US5321755A (en) | Information-encrypting device and method | |
US20090080652A1 (en) | System and method for password generation and storage | |
WO1996042075A1 (en) | System for generating a password | |
EP0397664B1 (en) | Personal identification encryptor system with error-correcting code and method | |
WO2015128859A1 (en) | Passwords safe tool | |
JP5692855B2 (en) | Password setting tool | |
EP0546681B1 (en) | Information-encrypting and decrypting method | |
JP2006201899A (en) | Input support method | |
CN101242280B (en) | Dynamic password device | |
WO2005081195A1 (en) | A memory aid device | |
WO2007023313A2 (en) | Secure data storage device | |
WO2008061302A1 (en) | Device for keeping track of passwords | |
JP7037221B2 (en) | Password management tool, mask set and password management method | |
GB2610415A (en) | Apparatus for generating, storing and scrambling passwords | |
Davis | Finding your place | |
WO2006128214A1 (en) | Device for keeping track of passwords | |
CN101247229A (en) | Cipher protection barrel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20200226 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20220119 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20220531 |