GB2313460A - Graphical password entry - Google Patents

Graphical password entry Download PDF

Info

Publication number
GB2313460A
GB2313460A GB9709891A GB9709891A GB2313460A GB 2313460 A GB2313460 A GB 2313460A GB 9709891 A GB9709891 A GB 9709891A GB 9709891 A GB9709891 A GB 9709891A GB 2313460 A GB2313460 A GB 2313460A
Authority
GB
United Kingdom
Prior art keywords
log
symbols
password
procedure
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9709891A
Other versions
GB9709891D0 (en
GB2313460B (en
Inventor
Haperen Peter Van
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Publication of GB9709891D0 publication Critical patent/GB9709891D0/en
Publication of GB2313460A publication Critical patent/GB2313460A/en
Application granted granted Critical
Publication of GB2313460B publication Critical patent/GB2313460B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Description

DESCRIPTION GRAPHICAL PASSWORD ENTRY The invention relates to a log-in procedure to a computer system with the aid of inputting a graphical password.
The log-in procedure to a computer system normally requires the user name and a user-specific password to be input by way of a keyboard. However, this password protection is not sufficient. In practice, passwords can be decoded in a short space of time with the aid of password generators. The reason for this is the human brain which is only able to recall well structured sequences, that is to say words which have a meaning. When the contents of the lexicons of different languages are examined, it is probable that the password will be decoded. In practice, password interrogation is the only hurdle to accessing a modern computer network. It is absolutely necessary to provide a reliable password interrogation for the purpose of protecting the system. Consequently it is naturally not permitted to note down the password anywhere and it must nevertheless comprise a simple structure such that it can be used again even after a long period. The system security sets a prerequisite that the ideal password however is to be an arbitrary combination of letters and 1 or numbers.
However, it is precisely this type of sequence which a human being is unable to retain in his / her memory.
A type of password entry is known wherein alphanumeric characters are displayed on a display screen. The actual password is achieved using a mouse by clicking on to the alphanumeric character in the correct sequence. it the case of this system it is, however, still possible for an unauthorized user to decode the password by observing the activity on the display screen.
In accordance with the present invention, there is provided a log-in procedure to a computer system for users of a data terminal, of the type in which the password is entered by selecting a graphical symbol in a position on the display screen, wherein the graphical symbols of the display screen are generated by the computer in any of the display screen positions1 which positions change from one log-in procedure to another, and wherein the symbols are fixedly allocated to a code stored in the computer and a fixed series of symbols in its entirety represents the password.
In contrast to the prior art, a log-in procedure in accordance with the present invention has the advantage that the symbols which are displayed on the display screen change position from one log-in procedure to the next. This has the advantage that an unauthorized user is not able to decode the password by observing the log-in procedure.
By virtue of the features set down in the subordinate claims it is possible to develop further and improve the log-in procedure stated in the main claim.
It is a further advantage that the computer system can allocate to the display screen positions code sequences of any length. It is particularly advantageous that the password is not bound to alphanumeric characters, but rather that graphical images can be displayed so that the system functions independently of the language area. It is also possible with this log-in procedure to illustrate Chinese or Japanese characters or even to illustrate a graphics picture which is particularly suitable for children. A further advantage is that it is possible to render it more difficult for others to read the password sequence simultaneously, in that the actual clicking on to the desired symbol is disguised by virtue of the fact that clicking noises produced by the computer are superimposed. The length of the password, i.e the number of graphical symbols clicked is fixed by the system. It is possible for these code sequences, which are allocated to these graphical symbols or to their positions on the display screen, to be of any length.
In an advantageous embodiment a picture illustration, and not individual graphical symbols, is projected on to the display screen.
An exemplified embodiment of the invention is explained in detail in the description hereinunder and illustrated in the drawing, in which Figure 1 shows a display screen for the graphical password entry, Figure 2 shows a sequence of correct graphical symbols.
The log-in procedure to a computer system is commenced by entering a user name at a data terminal. The system projects on the display screen of the terminal a two-dimensional arrangement of windows, in which symbols1 images or even alphanumeric characters are located. The system requests the user to enter his / her password. Depending upon the resolution and size of the display screen, the image which is displayed on the screen can contain up to 100 different symbols, wherein the prerequisite is that the images can be readily identified and comprise sufficient distinctive features. For example the graphical password consists of a row of eight symbols, which during input must be selected in a specific order by the user. The symbols are selected e.g by clicking on to the said symbols using a mouse. When using touch screens the symbol is selected by touching the screen. When selecting a symbol only one click tone is transmitted as an acknowledgement and the current number of symbols selected is indicated.
In so doing the actual graphical window containing the symbols does not change.
It is merely the xy-positions of the mouse click which are transmitted by way of the connection line between the data terminal and the computer. It is only in the computer itself that the position is allocated to the associated identification by way of a table [sic]. This identification forms the actual password, which is checked in the conventional manner in the computer, e.g the number of unsuccessful attempts, or a blocking of the password entry after three unsuccessful attempts can be fixed. By virtue of the fact that the password sequence is fixed merely by the xy-data and is transmitted by way of the line, it is also no longer possible to decode the password by monitoring the data transfer line.
If the user would like to log-in to the computer system on another occasion, the user is again provided with a display screen containing graphical symbols.
The number of symbols is maintained, however these symbols are arranged by the computer in a different sequence on the display screen. If the positions are changed from log-in procedure to log-in procedure, a list of the symbols, the xypositions and the identifications must also be changed in each case. A possible password entry is illustrated in Figure 2, wherein in this example no different symbols have been selected. In this case the password sequence consists of eight symbols, namely 4 "prams", 2 "child bicycles" and 2 "bicycles". A password sequence of this type can be more readily retained in the human brain, as it is possible to relate a story to the series of images. Moreover, the human brain is better able to recall images than alphanumeric characters. A possible password must be able to be fixed by the user, so that the advantages of storing graphics in the brain can be utilized.
The selection when fixing the password sequence occurs likewise by clicking on to the possible symbols which are all displayed on the display screen.
A click tone is produced as an acknowledgement to clicking on to a symbol and the current selection of the selected symbols is indicated.
A further protective feature can be incorporated for the log-in procedure to computer systems. In the case of this protective feature, in addition to the click tone when clicking on to the correct symbol, the system actually produces a series of tones, which are superimposed onto the actual log-in procedure. In this manner it is also made more difficult to deduce the positions of the graphical symbols by overhearing.

Claims (9)

1. A log-in procedure to a computer system for users of a data terminal, of the type in which the password is entered by selecting a graphical symbol in a position on the display screen, wherein the graphical symbols of the display screen are generated by the computer in any of the display screen positions, which positions change from one log-in procedure to another, and wherein the symbols are fixedly allocated to a code stored in the computer and a fixed series of symbols in its entirety represents the password.
2. A log-in procedure according to claim 1, wherein the position of the symbol selected is transmitted from the data terminal to the computer.
3. A log-in procedure according to claim 1 or 2, wherein the identification, stored in the computer, with respect to one position and thus to the symbol can contain any number of alphanumeric characters.
4. A log-in procedure according to claim 1 or 2, wherein it is possible to determine the number of symbols which represent a password.
5. A log-in procedure according to any of claims 1 to 4, wherein the symbols are selected by touching a touch-screen.
6. A log-in procedure according to any of claims 1 to 5, wherein a click tone is produced as an acknowledgement of clicking on to a symbol and there is a large number of symbols.
7. A log-in procedure according to any of claims 1 to 6, wherein the symbols can consist of alphanumeric characters or of images.
8. A log-in procedure according to any of claims 1 to 7, wherein the system produces click tones which are superimposed on to the actual clicking of the symbols.
9. A log-in procedure to a computer system, substantially as hereinbefore described, with reference to and as illustrated in the accompanying drawings.
GB9709891A 1996-05-21 1997-05-16 Graphical password entry Expired - Fee Related GB2313460B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE1996120346 DE19620346A1 (en) 1996-05-21 1996-05-21 Graphical password log-in procedure for user of data terminal in computer system

Publications (3)

Publication Number Publication Date
GB9709891D0 GB9709891D0 (en) 1997-07-09
GB2313460A true GB2313460A (en) 1997-11-26
GB2313460B GB2313460B (en) 1998-07-08

Family

ID=7794845

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9709891A Expired - Fee Related GB2313460B (en) 1996-05-21 1997-05-16 Graphical password entry

Country Status (3)

Country Link
JP (1) JPH1097500A (en)
DE (1) DE19620346A1 (en)
GB (1) GB2313460B (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013243A1 (en) * 1999-08-13 2001-02-22 Creditguard Ltd User authentication system
WO2001098912A1 (en) * 2000-06-22 2001-12-27 Mnemonic Security Limited Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information
WO2002008921A1 (en) * 2000-07-25 2002-01-31 Asahi Business Assist Limited Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
WO2002023390A2 (en) * 2000-09-12 2002-03-21 International Business Machines Corporation System and method for implementing robot proof web site
WO2002054199A1 (en) * 2001-01-05 2002-07-11 Schlumberger Systemes Method for accessing a secured system
JP2002197065A (en) * 2000-12-27 2002-07-12 Asahi Business Assist:Kk Notification system for abnormal state such as theft and confinement in personal identification
WO2002071177A2 (en) * 2001-03-03 2002-09-12 Moneyhive.Com Pte Ltd Method and system for substantially secure electronic transactions
FR2825489A1 (en) * 2001-06-05 2002-12-06 Marguerite Paolucci Method for secure individual authentication of connection to Internet/intranet server, comprises choice between CD and resident operating program and use of mouse/screen password procedure
WO2005008455A1 (en) * 2003-07-08 2005-01-27 Intel Corporation (A Delaware Corporation) Information hiding through time synchronization
GB2410821A (en) * 2004-02-05 2005-08-10 Sun Microsystems Inc Method and system for entering a pass code
EP1574931A2 (en) * 2004-03-11 2005-09-14 Wincor Nixdorf International GmbH Self-service device with a data imput device and method for inquiring the PIN
AT413775B (en) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM
US7073067B2 (en) * 2003-05-07 2006-07-04 Authernative, Inc. Authentication system and method based upon random partial digitized path recognition
WO2006010058A3 (en) * 2004-07-07 2006-07-13 Bharosa Inc Online data encryption and decryption
AT413894B (en) * 2004-04-15 2006-07-15 Helmut Dipl Ing Schluderbacher NOT PERSONALIZED ACCESS CODE
CN100335989C (en) * 2004-07-10 2007-09-05 三星电子株式会社 User certification apparatus and user certification method
US7376899B2 (en) 2003-06-19 2008-05-20 Nokia Corporation Method and system for producing a graphical password, and a terminal device
EP1987435A2 (en) * 2006-02-09 2008-11-05 Solmaze Co., Ltd. Method and apparatus of otp based on challenge/response
US20090083847A1 (en) * 2007-09-24 2009-03-26 Apple Inc. Embedded authentication systems in an electronic device
GB2454459A (en) * 2007-11-06 2009-05-13 Andrew Small Personal identification code entry device
US7543154B2 (en) * 2000-09-29 2009-06-02 Patev Gmbh & Co., Kg Method and device for determining an access code
WO2009078730A1 (en) * 2007-12-19 2009-06-25 Fast Search & Transfer As A method for improving security in login and single sign-on procedures
US7596701B2 (en) 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
US7680815B2 (en) * 2005-09-27 2010-03-16 Nec Nexsolutions, Ltd. Image array authentication system
US7793225B2 (en) 2005-12-23 2010-09-07 Apple Inc. Indication of progress towards satisfaction of a user input condition
US7849321B2 (en) 2006-08-23 2010-12-07 Authernative, Inc. Authentication method of random partial digitized path recognition with a challenge built into the path
US7908645B2 (en) 2005-04-29 2011-03-15 Oracle International Corporation System and method for fraud monitoring, detection, and tiered user authentication
WO2011044630A1 (en) 2009-10-16 2011-04-21 Armorlog Ltd System and method for improving security of user account access
CN1856782B (en) * 2003-09-25 2011-05-18 索尔玛泽株式会社 The method of safe certification service
US8174503B2 (en) 2008-05-17 2012-05-08 David H. Cain Touch-based authentication of a mobile device through user generated pattern creation
GB2486706A (en) * 2010-12-21 2012-06-27 Sharp Kk A touch screen device with a random element unlocking mechanism
EP2503479A1 (en) * 2011-03-21 2012-09-26 Research In Motion Limited Login method based on direction of gaze
WO2012146587A1 (en) * 2011-04-27 2012-11-01 Vance Burkill Improvements in or relating to password generation and recall
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US8625847B2 (en) 2011-03-21 2014-01-07 Blackberry Limited Login method based on direction of gaze
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US9106422B2 (en) 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US9128614B2 (en) 2010-11-05 2015-09-08 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
US9146673B2 (en) 2010-11-05 2015-09-29 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
US9213822B2 (en) 2012-01-20 2015-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9847999B2 (en) 2016-05-19 2017-12-19 Apple Inc. User interface for a device requesting remote authorization
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10142835B2 (en) 2011-09-29 2018-11-27 Apple Inc. Authentication with secondary approver
US10395128B2 (en) 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication
US10438205B2 (en) 2014-05-29 2019-10-08 Apple Inc. User interface for payments
US10484384B2 (en) 2011-09-29 2019-11-19 Apple Inc. Indirect authentication
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11165963B2 (en) 2011-06-05 2021-11-02 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19848501C2 (en) * 1998-10-21 2001-03-22 Sfr Ges Fuer Datenverarbeitung Identity verification procedures
US6209102B1 (en) * 1999-02-12 2001-03-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
KR20000024087A (en) * 2000-01-19 2000-05-06 김한성 A password preparing method using image associable words
US6720860B1 (en) * 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
HU0101106D0 (en) * 2001-03-14 2001-05-28 Tozai Trading Corp Id alsorithm
DE10118209A1 (en) * 2001-04-11 2002-10-24 Siemens Ag Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation
FR2824208A1 (en) * 2001-04-26 2002-10-31 Schlumberger Systems & Service METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE
KR20030002280A (en) * 2001-06-30 2003-01-08 주식회사 비즈모델라인 System and Method for providing the password related to client's behavior pattern
US7536556B2 (en) 2001-07-27 2009-05-19 Yulia Vladimirovna Fedorova Method and device for entering a computer database password
SE0103598D0 (en) * 2001-10-30 2001-10-30 Thomas Gebel AKF_inlog
DE10153404A1 (en) * 2001-11-01 2003-05-15 Rene Baltus Writer for normal pens
KR100515683B1 (en) * 2002-10-16 2005-09-23 정욱진 System and method for registrating and identifiying a person by clicking password points in a image
US20060098841A1 (en) * 2003-03-11 2006-05-11 Pim Tuyls Method and system for enabling remote message composition
JP2007004656A (en) * 2005-06-27 2007-01-11 Toshiba Corp Server device, method and program
EP1845469A1 (en) * 2006-04-12 2007-10-17 Siemens Aktiengesellschaft Authentification method and system
DE102006050315B4 (en) * 2006-10-25 2019-12-24 Carl Zeiss Ag Head mounted display system and display method for a head mounted display system
KR100844195B1 (en) 2007-02-28 2008-07-04 (주)민인포 A user authentication method of having used graphic OTP
JP5400301B2 (en) * 2008-01-23 2014-01-29 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication server device, authentication method, and authentication program
JP5198951B2 (en) * 2008-06-30 2013-05-15 トッパン・フォームズ株式会社 Identification system
US8638939B1 (en) 2009-08-20 2014-01-28 Apple Inc. User authentication on an electronic device
JP5143258B2 (en) 2011-06-17 2013-02-13 株式会社東芝 Information processing apparatus, information processing method, and control program
KR101741264B1 (en) * 2011-08-05 2017-06-09 주식회사 네오플 Method and apparatus for input password in using game

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4333090A (en) * 1980-05-05 1982-06-01 Hirsch Steven B Secure keyboard input terminal
EP0147837A2 (en) * 1983-12-21 1985-07-10 Omron Tateisi Electronics Co. Password number inputting device with variable key reassignment
EP0564832A1 (en) * 1992-04-03 1993-10-13 International Business Machines Corporation Identity verification system resistant to compromise by observation of its use
EP0432409B1 (en) * 1989-12-05 1994-06-22 Theodor Kromer GmbH & Co.KG Spezialfabrik für Sicherheitsschlösser Data input keyboard for coded locks or the like
EP0632413A1 (en) * 1993-07-01 1995-01-04 Bull Cp8 Method for confidential information input and associated terminal
WO1996018139A1 (en) * 1994-12-08 1996-06-13 Philips Electronics N.V. Security code input

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4333090A (en) * 1980-05-05 1982-06-01 Hirsch Steven B Secure keyboard input terminal
EP0147837A2 (en) * 1983-12-21 1985-07-10 Omron Tateisi Electronics Co. Password number inputting device with variable key reassignment
EP0432409B1 (en) * 1989-12-05 1994-06-22 Theodor Kromer GmbH & Co.KG Spezialfabrik für Sicherheitsschlösser Data input keyboard for coded locks or the like
EP0564832A1 (en) * 1992-04-03 1993-10-13 International Business Machines Corporation Identity verification system resistant to compromise by observation of its use
EP0632413A1 (en) * 1993-07-01 1995-01-04 Bull Cp8 Method for confidential information input and associated terminal
WO1996018139A1 (en) * 1994-12-08 1996-06-13 Philips Electronics N.V. Security code input

Cited By (140)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001013243A1 (en) * 1999-08-13 2001-02-22 Creditguard Ltd User authentication system
WO2001098912A1 (en) * 2000-06-22 2001-12-27 Mnemonic Security Limited Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information
US20090328162A1 (en) * 2000-07-25 2009-12-31 Mnemonic Security Limited Mutual for reporting a theft in an authentication system
WO2002008921A1 (en) * 2000-07-25 2002-01-31 Asahi Business Assist Limited Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
EP1313027A4 (en) * 2000-07-25 2009-02-18 Mnemonic Security Ltd Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
EP1313027A1 (en) * 2000-07-25 2003-05-21 Asahi Business Assist Limited Secret information recorded medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed
US8577807B2 (en) * 2000-07-25 2013-11-05 Mnemonic Security Limited Method for protecting secret information in a system for reporting an emergency when secret information is accessed
WO2002023390A2 (en) * 2000-09-12 2002-03-21 International Business Machines Corporation System and method for implementing robot proof web site
WO2002023390A3 (en) * 2000-09-12 2002-09-12 Ibm System and method for implementing robot proof web site
US7543154B2 (en) * 2000-09-29 2009-06-02 Patev Gmbh & Co., Kg Method and device for determining an access code
JP2002197065A (en) * 2000-12-27 2002-07-12 Asahi Business Assist:Kk Notification system for abnormal state such as theft and confinement in personal identification
FR2819323A1 (en) * 2001-01-05 2002-07-12 Schlumberger Systems & Service METHOD FOR ACCESSING A SECURE SYSTEM
WO2002054199A1 (en) * 2001-01-05 2002-07-11 Schlumberger Systemes Method for accessing a secured system
WO2002071177A2 (en) * 2001-03-03 2002-09-12 Moneyhive.Com Pte Ltd Method and system for substantially secure electronic transactions
WO2002071177A3 (en) * 2001-03-03 2005-03-10 Moneyhive Com Pte Ltd Method and system for substantially secure electronic transactions
FR2825489A1 (en) * 2001-06-05 2002-12-06 Marguerite Paolucci Method for secure individual authentication of connection to Internet/intranet server, comprises choice between CD and resident operating program and use of mouse/screen password procedure
WO2002099608A2 (en) * 2001-06-05 2002-12-12 Marguerite Paolucci Method for secure individual authentication for connection to an internet server by stealthy remote access
WO2002099608A3 (en) * 2001-06-05 2003-02-20 Marguerite Paolucci Method for secure individual authentication for connection to an internet server by stealthy remote access
US7073067B2 (en) * 2003-05-07 2006-07-04 Authernative, Inc. Authentication system and method based upon random partial digitized path recognition
US7376899B2 (en) 2003-06-19 2008-05-20 Nokia Corporation Method and system for producing a graphical password, and a terminal device
US7337466B2 (en) 2003-07-08 2008-02-26 Intel Corporation Information hiding through time synchronization
CN1846188B (en) * 2003-07-08 2010-05-26 英特尔公司 Information hiding through time synchronization
WO2005008455A1 (en) * 2003-07-08 2005-01-27 Intel Corporation (A Delaware Corporation) Information hiding through time synchronization
CN1856782B (en) * 2003-09-25 2011-05-18 索尔玛泽株式会社 The method of safe certification service
US7882361B2 (en) 2004-02-05 2011-02-01 Oracle America, Inc. Method and system for accepting a pass code
GB2410821A (en) * 2004-02-05 2005-08-10 Sun Microsystems Inc Method and system for entering a pass code
EP1574931A2 (en) * 2004-03-11 2005-09-14 Wincor Nixdorf International GmbH Self-service device with a data imput device and method for inquiring the PIN
EP1574931A3 (en) * 2004-03-11 2008-09-24 Wincor Nixdorf International GmbH Self-service device with a data imput device and method for inquiring the PIN
AT413775B (en) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM
AT413894B (en) * 2004-04-15 2006-07-15 Helmut Dipl Ing Schluderbacher NOT PERSONALIZED ACCESS CODE
US8484455B2 (en) 2004-07-07 2013-07-09 Oracle International Corporation Online data encryption and decryption
WO2006010058A3 (en) * 2004-07-07 2006-07-13 Bharosa Inc Online data encryption and decryption
US7596701B2 (en) 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US7616764B2 (en) 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7822990B2 (en) 2004-07-07 2010-10-26 Oracle International Corporation Online data encryption and decryption
CN100335989C (en) * 2004-07-10 2007-09-05 三星电子株式会社 User certification apparatus and user certification method
US7908645B2 (en) 2005-04-29 2011-03-15 Oracle International Corporation System and method for fraud monitoring, detection, and tiered user authentication
US7680815B2 (en) * 2005-09-27 2010-03-16 Nec Nexsolutions, Ltd. Image array authentication system
US8046721B2 (en) 2005-12-23 2011-10-25 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8745544B2 (en) 2005-12-23 2014-06-03 Apple Inc. Unlocking a device by performing gestures on an unlock image
US10078439B2 (en) 2005-12-23 2018-09-18 Apple Inc. Unlocking a device by performing gestures on an unlock image
US7657849B2 (en) 2005-12-23 2010-02-02 Apple Inc. Unlocking a device by performing gestures on an unlock image
US10754538B2 (en) 2005-12-23 2020-08-25 Apple Inc. Unlocking a device by performing gestures on an unlock image
US11086507B2 (en) 2005-12-23 2021-08-10 Apple Inc. Unlocking a device by performing gestures on an unlock image
US7793225B2 (en) 2005-12-23 2010-09-07 Apple Inc. Indication of progress towards satisfaction of a user input condition
US8694923B2 (en) 2005-12-23 2014-04-08 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8640057B2 (en) 2005-12-23 2014-01-28 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8209637B2 (en) 2005-12-23 2012-06-26 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8627237B2 (en) 2005-12-23 2014-01-07 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8527903B2 (en) 2005-12-23 2013-09-03 Apple Inc. Unlocking a device by performing gestures on an unlock image
US11669238B2 (en) 2005-12-23 2023-06-06 Apple Inc. Unlocking a device by performing gestures on an unlock image
US8286103B2 (en) 2005-12-23 2012-10-09 Apple Inc. Unlocking a device by performing gestures on an unlock image
EP1987435A4 (en) * 2006-02-09 2009-07-29 Solmaze Co Ltd Method and apparatus of otp based on challenge/response
EP1987435A2 (en) * 2006-02-09 2008-11-05 Solmaze Co., Ltd. Method and apparatus of otp based on challenge/response
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US7849321B2 (en) 2006-08-23 2010-12-07 Authernative, Inc. Authentication method of random partial digitized path recognition with a challenge built into the path
US9106422B2 (en) 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US9038167B2 (en) 2007-09-24 2015-05-19 Apple Inc. Embedded authentication systems in an electronic device
US9329771B2 (en) 2007-09-24 2016-05-03 Apple Inc Embedded authentication systems in an electronic device
US20090083847A1 (en) * 2007-09-24 2009-03-26 Apple Inc. Embedded authentication systems in an electronic device
US10275585B2 (en) 2007-09-24 2019-04-30 Apple Inc. Embedded authentication systems in an electronic device
US11468155B2 (en) 2007-09-24 2022-10-11 Apple Inc. Embedded authentication systems in an electronic device
US9519771B2 (en) 2007-09-24 2016-12-13 Apple Inc. Embedded authentication systems in an electronic device
US9495531B2 (en) 2007-09-24 2016-11-15 Apple Inc. Embedded authentication systems in an electronic device
US9953152B2 (en) 2007-09-24 2018-04-24 Apple Inc. Embedded authentication systems in an electronic device
US9304624B2 (en) 2007-09-24 2016-04-05 Apple Inc. Embedded authentication systems in an electronic device
US9274647B2 (en) 2007-09-24 2016-03-01 Apple Inc. Embedded authentication systems in an electronic device
US8782775B2 (en) * 2007-09-24 2014-07-15 Apple Inc. Embedded authentication systems in an electronic device
US8943580B2 (en) 2007-09-24 2015-01-27 Apple Inc. Embedded authentication systems in an electronic device
US9250795B2 (en) 2007-09-24 2016-02-02 Apple Inc. Embedded authentication systems in an electronic device
US10956550B2 (en) 2007-09-24 2021-03-23 Apple Inc. Embedded authentication systems in an electronic device
US9134896B2 (en) 2007-09-24 2015-09-15 Apple Inc. Embedded authentication systems in an electronic device
US9128601B2 (en) 2007-09-24 2015-09-08 Apple Inc. Embedded authentication systems in an electronic device
GB2454459A (en) * 2007-11-06 2009-05-13 Andrew Small Personal identification code entry device
US8453221B2 (en) 2007-12-19 2013-05-28 Microsoft International Holdings B.V. Method for improving security in login and single sign-on procedures
WO2009078730A1 (en) * 2007-12-19 2009-06-25 Fast Search & Transfer As A method for improving security in login and single sign-on procedures
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US8174503B2 (en) 2008-05-17 2012-05-08 David H. Cain Touch-based authentication of a mobile device through user generated pattern creation
WO2011044630A1 (en) 2009-10-16 2011-04-21 Armorlog Ltd System and method for improving security of user account access
EP2489149A4 (en) * 2009-10-16 2013-12-11 Armorlog Ltd System and method for improving security of user account access
CN102741851A (en) * 2009-10-16 2012-10-17 阿莫洛格有限公司 System and method for improving security of user account access
AU2010306408B2 (en) * 2009-10-16 2015-08-20 Armorlog International Pty Ltd System and method for improving security of user account access
EP2489149A1 (en) * 2009-10-16 2012-08-22 Armorlog Ltd System and method for improving security of user account access
JP2013507699A (en) * 2009-10-16 2013-03-04 アーマーログ リミテッド System and method for improving user account access security
US9390249B2 (en) 2009-10-16 2016-07-12 Armorlog Ltd System and method for improving security of user account access
US8528072B2 (en) 2010-07-23 2013-09-03 Apple Inc. Method, apparatus and system for access mode control of a device
US9740832B2 (en) 2010-07-23 2017-08-22 Apple Inc. Method, apparatus and system for access mode control of a device
US9146673B2 (en) 2010-11-05 2015-09-29 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
US9128614B2 (en) 2010-11-05 2015-09-08 Apple Inc. Device, method, and graphical user interface for manipulating soft keyboards
GB2486706A (en) * 2010-12-21 2012-06-27 Sharp Kk A touch screen device with a random element unlocking mechanism
GB2486706B (en) * 2010-12-21 2017-05-24 Sharp Kk Handset
US8953845B2 (en) 2011-03-21 2015-02-10 Blackberry Limited Login method based on direction of gaze
US8625847B2 (en) 2011-03-21 2014-01-07 Blackberry Limited Login method based on direction of gaze
EP2503479A1 (en) * 2011-03-21 2012-09-26 Research In Motion Limited Login method based on direction of gaze
WO2012146587A1 (en) * 2011-04-27 2012-11-01 Vance Burkill Improvements in or relating to password generation and recall
US9053294B2 (en) 2011-04-27 2015-06-09 Vance Burkill Password generation and recall
US11165963B2 (en) 2011-06-05 2021-11-02 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US10142835B2 (en) 2011-09-29 2018-11-27 Apple Inc. Authentication with secondary approver
US10419933B2 (en) 2011-09-29 2019-09-17 Apple Inc. Authentication with secondary approver
US10484384B2 (en) 2011-09-29 2019-11-19 Apple Inc. Indirect authentication
US10516997B2 (en) 2011-09-29 2019-12-24 Apple Inc. Authentication with secondary approver
US11200309B2 (en) 2011-09-29 2021-12-14 Apple Inc. Authentication with secondary approver
US11755712B2 (en) 2011-09-29 2023-09-12 Apple Inc. Authentication with secondary approver
US9372978B2 (en) 2012-01-20 2016-06-21 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US10007802B2 (en) 2012-01-20 2018-06-26 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US10867059B2 (en) 2012-01-20 2020-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9213822B2 (en) 2012-01-20 2015-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US10372963B2 (en) 2013-09-09 2019-08-06 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11494046B2 (en) 2013-09-09 2022-11-08 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10410035B2 (en) 2013-09-09 2019-09-10 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11768575B2 (en) 2013-09-09 2023-09-26 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10262182B2 (en) 2013-09-09 2019-04-16 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10803281B2 (en) 2013-09-09 2020-10-13 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10055634B2 (en) 2013-09-09 2018-08-21 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11287942B2 (en) 2013-09-09 2022-03-29 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces
US11836725B2 (en) 2014-05-29 2023-12-05 Apple Inc. User interface for payments
US10902424B2 (en) 2014-05-29 2021-01-26 Apple Inc. User interface for payments
US10796309B2 (en) 2014-05-29 2020-10-06 Apple Inc. User interface for payments
US10977651B2 (en) 2014-05-29 2021-04-13 Apple Inc. User interface for payments
US10748153B2 (en) 2014-05-29 2020-08-18 Apple Inc. User interface for payments
US10438205B2 (en) 2014-05-29 2019-10-08 Apple Inc. User interface for payments
US10749967B2 (en) 2016-05-19 2020-08-18 Apple Inc. User interface for remote authorization
US10334054B2 (en) 2016-05-19 2019-06-25 Apple Inc. User interface for a device requesting remote authorization
US9847999B2 (en) 2016-05-19 2017-12-19 Apple Inc. User interface for a device requesting remote authorization
US11206309B2 (en) 2016-05-19 2021-12-21 Apple Inc. User interface for remote authorization
US10872256B2 (en) 2017-09-09 2020-12-22 Apple Inc. Implementation of biometric authentication
US10410076B2 (en) 2017-09-09 2019-09-10 Apple Inc. Implementation of biometric authentication
US11393258B2 (en) 2017-09-09 2022-07-19 Apple Inc. Implementation of biometric authentication
US10395128B2 (en) 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication
US11386189B2 (en) 2017-09-09 2022-07-12 Apple Inc. Implementation of biometric authentication
US11765163B2 (en) 2017-09-09 2023-09-19 Apple Inc. Implementation of biometric authentication
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US10783227B2 (en) 2017-09-09 2020-09-22 Apple Inc. Implementation of biometric authentication
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11928200B2 (en) 2018-06-03 2024-03-12 Apple Inc. Implementation of biometric authentication
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11619991B2 (en) 2018-09-28 2023-04-04 Apple Inc. Device control using gaze information
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11809784B2 (en) 2018-09-28 2023-11-07 Apple Inc. Audio assisted enrollment

Also Published As

Publication number Publication date
GB9709891D0 (en) 1997-07-09
DE19620346A1 (en) 1997-11-27
JPH1097500A (en) 1998-04-14
GB2313460B (en) 1998-07-08

Similar Documents

Publication Publication Date Title
GB2313460A (en) Graphical password entry
EP2386974B1 (en) A method and a device for generating a secret value
US8010797B2 (en) Electronic apparatus and recording medium storing password input program
AU2006307996B2 (en) Method and system for secure password/PIN input via mouse scroll wheel
US5559961A (en) Graphical password
US6209102B1 (en) Method and apparatus for secure entry of access codes in a computer environment
US5736976A (en) Computer data entry apparatus with hand motion sensing and monitoring
CA2495445A1 (en) An arrangement and method of graphical password authentication
EP0593386A2 (en) Method and apparatus for accessing touch screen desktop objects via fingerprint recognition
AU594752B2 (en) Personal identification encryptor system and method
WO2003014887A2 (en) Method for supporting dynamic password
JP4734965B2 (en) PIN code input device
WO1996018139A1 (en) Security code input
EP1723608B1 (en) Method for protecting a character entered at a graphical interface
Ritter et al. Miba: Multitouch image-based authentication on smartphones
JP2007310515A (en) Password authentication system, password authentication server, password authentication method and program
CA2595304A1 (en) Method for safely logging onto a technical system
EP0397664B1 (en) Personal identification encryptor system with error-correcting code and method
JP2005250530A (en) Character input device
JP6614099B2 (en) Document file masking process, control program for the process, and computer system for implementing the control program
JP2007011927A (en) Password input device
KR20080011362A (en) Method for hacking protection of gotp
CA2495450A1 (en) A matrix based arrangement and method of graphical password authentication
GB2342749A (en) Identification system
KR20020071293A (en) User authentication method and system using colored pattern

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20110516