US20050246138A1 - Method and system for procssing password inputted by the matching of cells - Google Patents

Method and system for procssing password inputted by the matching of cells Download PDF

Info

Publication number
US20050246138A1
US20050246138A1 US10523797 US52379705A US2005246138A1 US 20050246138 A1 US20050246138 A1 US 20050246138A1 US 10523797 US10523797 US 10523797 US 52379705 A US52379705 A US 52379705A US 2005246138 A1 US2005246138 A1 US 2005246138A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
board
matching
password
cell
reference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10523797
Inventor
Seung-Bae Park
Original Assignee
Seung-Bae Park
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1033Details of the PIN pad
    • G07F7/1041PIN input keyboard gets new key allocation at each use

Abstract

A password system is disclosed. A method for authenticating a user in the disclosed password system is described. The password system of the present invention is an advanced password system implemented by a password input method capable of preventing a password from being revealed to others who directly watches a password input procedure. A user interface proper to the above method is provided. The user interface provides at least more than two boards. The cells aligned on two boards are matched through a matching unit provided to a user. At this time, the cells matched for the password input are concurrently matched with the cells adapted to disguise the same, so that a third party person cannot recognize whether which cell is used for a password input.

Description

    TECHNICAL FIELD
  • The present invention relates to a password system, and in particular to a method and system for processing a password inputted by the matching of cells that are capable of preventing a password from being revealed to the others in such a manner that a password inputted by a certain person is not known to others even when another person watches a password input procedure.
  • BACKGROUND ART
  • A user authentication system has been widely used in various industrial fields for checking a certain user. The user authentication system is directed to performing a user authentication process using information provided by a user and information stored in a system. As information used for a user authentication, there are information memorized by a user such as ID and password, information stored in a storing medium such as a RF card, magnetic card, etc., and a biological information implemented using a physical feature such as a fingerprint, an iris, face, etc.
  • Among the above methods, the password system is a user authentication system implemented using information memorized by a user. It is easy to use the same, and the cost is lower as compared to other user authentication systems. The password system is easily implemented. Therefore, the password system has been most widely used.
  • Generally, the password system is formed of a system related module for a user authentication process, and a user interface related module for inputting an ID or password. The modules having an encoding function are selectively used based on the system. A password system of a single user system like a desktop-alone, cellular phone, etc. does not include a password module or other security platform module.
  • A password system having a plurality of users like an Internet banking system and UNIX system includes a password module or other security platform module each implemented based on an open key structure.
  • The password system is one of user authentication system most commonly used based on the above-described advantages. However, the password system has a very big problem that an input procedure of password may be revealed to others. In order to prevent the above problems that the password is revealed to others while being inputted by a user, the following technologies are disclosed.
  • According to the Japanese patent laid-open No. Hei 5-334334 by Kijima Katshuiro made open Dec. 17, 1993, in a password input apparatus, a password input unit is changed in such a manner that a user selects a certain patch pattern with respect to a password input number row, and a number row is moved from a reference pattern. According to the Japanese patent laid-open No. 2000-339084 by Ono Kazuhiko made open Dec. 8, 2000, in a password system capable of changing an input pattern, when a user selects a certain cell, the selected cell is matched with a cell including a password symbol provided in a reference board based on a computation. According to the Japanese patent laid-open No. Hei 9-274531 by Kishimoto Takuya made open Oct. 21, 1997, in a password input system, a key input alignment is changed to prevent a reveal of password. According to the Japanese patent laid-open No. Hei 2000-214943 by Ariga Toshihiro made open Aug. 4, 2000, there is provided a method for changing a password input unit capable of preventing a reveal of password even when a password input procedure is open to others. In addition, according to the Japanese patent laid-open No. 2001-350590 by Hiromachi Akihisa made open Dec. 21, 2001, there is provided an input apparatus in which a key input cell is randomly changed so that others do not know a user password input procedure.
  • According to the above disclosed techniques, since a key alignment position of a key input apparatus is fixed, even when a third party person recognizes only the position of a key alignment inputted by a password input person, the inputted key value is easily known to others. In addition, since the randomly changed key alignments are opened to others positioned near a password input person, the password is directly revealed to others. In addition, there are further methods for providing many images on a user interface, and then the images are sequentially selected by the user. In the above method, it is impossible to memorize a long password. Therefore, the above methods cannot basically overcome the revealing problems of password.
  • DISCLOSURE OF INVENTION
  • Accordingly, it is an object of the present invention to provide a method and system for inputting a password based on a cell matching method capable of preventing a revealing of password by preventing others from knowing the inputted password even when a user's password input procedure is directly watched to others.
  • In order to achieve the above object, a password system according to the present invention includes a reference board and a matching board on a user interface. The reference board and matching board each are formed of at least more than two cells. The matching board reacts with respect to a user or a system computation. The reference board does not react with respect to a user and a system computation. The cell in the matching board and the cell in the reference board may be matched by a user or a system. The cell in the matching board and the cell in the reference board may be concurrently matched in multiple numbers. In a method of the present invention, the user selects a cell in the matching board, and the selected cell is matched with the cell having a password symbol in the reference board for thereby inputting a password. In another password input method of the present invention, the system selects a cell in the reference board matched with the cell including the password symbol in the matching board from the matched matching board and reference board for thereby inputting a password.
  • To achieve the above objects, there is provided a password system, comprising a display unit having a reference board in which a plurality of cells including one real reference cell that is a reference for matching, and a plurality of cells including a plurality of virtual reference cells for disguising the real reference cell are aligned and displayed, and a matching board in which a plurality of cells having one real matching cell matched with the real reference cell and a plurality of virtual matching cells for disguising the real matching cell are aligned and displayed; a cell generation unit for generating a group of cells displayed on the reference board and the matching board; a display control unit for receiving information concerning a group of the cells generated by the cell generation unit and aligning and displaying on the reference board and the matching board; a matching unit for matching a real reference cell and a real matching cell so that a user inputs a password; a matching cell process unit for generating a group of matched cells when the symbols aligned on the reference board and the matching board are matched by the matching unit and inputting into an authentication process unit; a memory for storing an authentication reference information; and an authentication process unit for performing an authentication process for judging whether a real matching cell is matched with a real reference cell included in the group of the matched cells based on an authentication reference information and permitting or denying an access to the main system by the user.
  • To achieve the above objects, there is provided a user authentication method of a password system, comprising the steps of a step for generating a first cell group including one real reference cell that is a reference for matching and a plurality of virtual reference cells for disguising the same, and a second cell group including one real matching cell matching with the real reference cell and a plurality of virtual matching cells for disguising the same; a step for displaying a reference board for displaying the first cell group and a matching board for displaying the second cell group on a display unit; a step for inputting a two-password for matching the real reference cell of the reference board and the real matching cell of the matching board by a matching unit; a step for generating a group of the matched cells when the symbols of the reference board and the matching boards are matched and inputting into an authentication process unit; and a step for performing an authentication process for allowing or denying an access to a main system by a user based on the authentication reference information for the authentication process and the inputted matched symbol group.
  • In the password system according to the present invention, even when others watch a password input procedure, the others do not know the cell matched with a cell including a password among a plurality of matched cells of the matching board and reference board, so that it is impossible to know the password even when others watch the password input procedure.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The present invention will become better understood with reference to the accompanying drawings which are given only by way of illustration and thus are not limitative of the present invention, wherein;
  • FIGS. 1 through 27 are views for describing a first embodiment of the present invention;
  • FIG. 1 is a view illustrating various expression types of a cell;
  • FIG. 2 is a view illustrating various expression types of a board;
  • FIG. 3 is a view illustrating an example of a method for mapping a certain board to a straight line shaped board;
  • FIG. 4 is a view illustrating an example of overlapped cells;
  • FIG. 5 is a view illustrating an example that two boards are overlapped;
  • FIG. 6 is a view illustrating an example that four boards are overlapped;
  • FIG. 7 is a view illustrating a condition that overlapped cells should satisfy;
  • FIG. 8 is a view illustrating an example that at least more than one board are moved in the same direction by the same distance;
  • FIG. 9 is a view illustrating an example that at least more than one board are concurrently not shown on the user interface;
  • FIG. 10 is a view illustrating an example that a board reacts with respect to a computation for a board, and a board does not react with respect to the computation;
  • FIG. 11 is a view illustrating an example for describing a reference board formed of at least more than two boards;
  • FIG. 12 is a view illustrating an example for describing that a cell in a matching board is matched with a cell in a reference board by performing a computing with respect to a matching board;
  • FIG. 13 is a view illustrating an example for describing a cell including a password symbol;
  • FIG. 14 is a flow chart of a procedure that the password symbols are sequentially matched with one cell in a matching board for thereby inputting a password;
  • FIG. 15 is a view illustrating an example that there is a cell in a matching board, which is not matched with a cell (cells) in a reference board when a computation is performed with respect to a matching board so that the cell in the matching board selected by a user is matched with the cell having the password symbols;
  • FIG. 16 is a view illustrating an example for describing a rotational movement using an imaginary reference board;
  • FIG. 17 is a view illustrating the construction that an imaginary reference board is a straight line;
  • FIG. 18 is a view illustrating an operation that a rotational movement is possible without an imaginary reference board;
  • FIG. 19 is a view illustrating the construction that an imaginary reference board and a reference board are combined and recognized as one reference board;
  • FIG. 20 is a flow chart of a method that a system recognizes the cell selected by the user in the case that the system knows the length of password;
  • FIG. 21 is a view illustrating the construction that a special symbol is shown in a reference board;
  • FIG. 22 is a flow chart of a method that a system is enabled to know a cell that the user selects in the case that the system does not know the length of password;
  • FIG. 23 is a flow chart illustrating a procedure that the system determines a password inputted by a user based on a method that the system knows the length of password in a method that the cell selected by a user in the matching board is matched with a password symbol in the reference board for thereby inputting a password;
  • FIG. 24 is a view illustrating a procedure that the cell selected by the user in the matching board is matched with a password symbol in the reference board for thereby inputting a password;
  • FIG. 25 is a view illustrating a procedure that a system determines one password;
  • FIGS. 26 and 27 are views illustrating another example of a first embodiment of the present invention;
  • FIG. 26 is a view illustrating an example that a reference board and a matching board are aligned in parallel, so that the reference board and the matching board are not overlapped;
  • FIG. 27 is a view illustrating an example that a straight line shaped matching board is overlapped with a matrix shaped reference board;
  • FIGS. 28 through 33 are views for describing a second embodiment of the present invention;
  • FIG. 28 is a flow chart of a procedure that a cell in the reference board matched with a password symbol in the matching board is selected for thereby inputting a password in the case that a system knows the length of password;
  • FIG. 29 is a flow chart of a procedure that a cell in the reference board matched with a password symbol in the matching board is selected for thereby inputting a password in the case that the system does not know the length of password;
  • FIG. 30 is a view illustrating an operation that a matching board is disappeared on a user interface;
  • FIG. 31 is a flow chart of an operation of a system in the case that a system knows the length of password;
  • FIG. 32 is a view illustrating an example for describing a method that a system determines one password symbol in the case that a system knows the length of password;
  • FIG. 33 is a view illustrating an example that a reference board and a matching board are aligned in parallel, so that they are not overlapped as another example of a second embodiment of the present invention;
  • FIGS. 34 through 36 are views for describing a third embodiment of the present invention;
  • FIGS. 34A and 34B are views for describing a password input method according to a third embodiment of the present invention, of which FIG. 34A illustrates a reference board and a matching board before matching, and FIG. 34B illustrates a reference board and a matching board after matching;
  • FIG. 35 is a view for describing a password input method according to a third embodiment of the present invention based on a set principle;
  • FIG. 36A is a view illustrating a real image reference cell and an imaginary reference cell and a real image matching cell and an imaginary matching cell used in the reference board and matching board of FIG. 34A;
  • FIG. 36B is a view illustrating a real image matched RRC and RMC and an imaginary image matched VRC, VMC and MCG in the pairs of matched cells of FIG. 34B;
  • FIGS. 37A through 37B are views of an example that two passwords are inputted by repeatedly performing a plurality of cell matching processes;
  • FIGS. 38A through 38D and FIGS. 39A and 39B are views of various examples for generating RMSG and RPSG from two passwords;
  • FIG. 40 is a block diagram illustrating a relationship between a password system and a main system adapting the same according to a preferred embodiment of the present invention;
  • FIG. 41 is a view illustrating the construction of a password system and a user interface according to the present invention;
  • FIG. 42 is a flow chart illustrating a user authentication process of a password system according to the present invention;
  • FIG. 43 is a view of a user interface in a main system according to an embodiment of the present invention;
  • FIGS. 44A through 44D are views illustrating various examples of a reference board and a matching board;
  • FIG. 45 is a view illustrating an example that a reference board is omitted;
  • FIG. 46 is a view illustrating another examples of a display type of a reference board and a matching board;
  • FIG. 47 is a view illustrating another example for displaying at least more than matching boards in parallel;
  • FIG. 48 is a view of an example of a graphic user interface capable of providing an input window for inputting a forward movement distance of a reference board for a symbol matching;
  • FIG. 49 is a view of an example of a graphic user interface having a plurality of input buttons for circulation-matching symbol rows;
  • FIG. 50 is a view illustrating an example of a graphic user interface in the case that a matching board is automatically circulated;
  • FIG. 51 is a view of an example of a user interface of a two-password system cooperating with an electronic circuit;
  • FIG. 52 is a view illustrating another example that only one reference board is shown;
  • FIG. 53 is a view of an example of a circuit construction of a user interface of FIG. 51;
  • FIG. 54 is a view of an example of a user interface of a password system cooperating with a mechanical mechanism;
  • FIG. 55 is a view of an example of a circuit construction of a user interface of FIG. 54;
  • FIG. 56 is a view of an example that cells are aligned for adjusting a revolution of matching board within a certain range;
  • FIGS. 57A through 57D are views for describing an example of a set of matched cells;
  • FIG. 58 is a view illustrating a table of a set of matched cells of FIGS. 57A through 57D;
  • FIG. 59 is a flow chart of a detailed process of a password authentication process;
  • FIG. 60 is a view illustrating the symbols of MCG matched with RMSG guided from a two-password;
  • FIGS. 61 and 62 are views of an example of authentication reference information stored in a memory;
  • FIG. 63 is a view illustrating an example that a password system according to the present invention is mounted on a standalone system;
  • FIG. 64 is a view illustrating an example that a password system according to the present invention is mounted on a main system based on a network; and
  • FIG. 65 is a view illustrating an example that a password system is mounted in a communication terminal based on a network.
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • The present invention provides a new password input method capable of preventing a revealing of password even when a password input procedure is shown to others and a user interface and a password system having a password authentication process for the above method.
  • 1. First Embodiment—Password System for Inputting Password by Matching a Certain Cell and a Specific Cell
  • 1) Definition of Cell and Board
  • The basic unit of information shown to a user on a user interface of a password system according to the present invention is called as a cell. FIG. 1 is a view showing various cells. (a) shows a cell of 3. (b) shows a cell having a solid line rim and a transparent rectangular shape interior. (c) is a gray color rectangular cell.
  • The set of cells is called as a board. Here, in the present invention the terminology “set” represents a common set. The board may be shown in various shapes on a user interface. FIG. 2 is a view illustrating various shapes of boards. As shown in FIG. 2, (a) shows a rectangular board having nine cells formed in a matrix shape. (b) shows a circular board formed of eight cells. (c) shows a board formed of six scattered cells. (d) shows a board formed of seven scattered number cells. As not shown in the drawings, a board may be formed of a plurality of cells in a straight line. The dotted lines in (c) and (d) are provided for simply figuring out a shape of a board. The dotted lines are not shown in an actual user interface.
  • The shape of the board may be commonly formed. Assuming that a board formed of an n-number of cells is X, and a board formed of a n number of straight line shaped cells is Y, a sequence is provided to the cells in X, and the cell having an i-th sequence in X may correspond with the i-th cell of Y (1≦l≦n). Therefore, in the present invention, when a board is mapped in a straight line shape, it is recognized as a board irrespective of the number and shape of the cells and a state that the same cells are overlapped or not. For example, FIG. 3B is a view showing the construction that a sequence is provided to the cells of the board, and FIG. 3C is a view showing the construction that the cell having i-th sequence of FIG. 3B corresponds to the i-th straight line shaped cell.
  • 2) Display of Cell and Board
  • At least more than two cells may be overlapped and shown on the user interface. For example, FIG. 4C is a view showing the construction that the cells of FIGS. 4A and 4B are overlapped. Since the cells may be overlapped and shown on user interface, the cells may be overlapped and shown on the board or user interface. For example, FIG. 5C is a view showing the construction that the board of number cells of FIG. 5A is overlapped with the board formed of rectangular cells of FIG. 5B. As shown in FIGS. 5A and 5C, the dotted lines surrounding the board formed of number cells are formed for only figuring out the shape of the board and are not actually shown on the user interface.
  • When the boards are overlapped, only two boards are not overlapped. Namely, at least more than three boards may be overlapped. For example, FIG. 6E is a view showing the construction that the boards of FIG. 6B are overlapped. FIG. 6F is a view showing the construction that the board of FIG. 6C is overlapped with the board of FIG. 6D. FIG. 6G is a view showing the construction that two overlapped boards of FIG. 6E are overlapped with two overlapped boards of FIG. 6F. The dotted lines of FIGS. 6A, B, C, D, and E are formed for only figuring out the shape of the board and are not actually shown in the user interface.
  • Assuming that overlapped two boards are A and B, each cell of the board A and each cell of the board B are overlapped, and the entire construction is visually seen. For example, as shown in FIG. 7E in which four cells of FIGS. 7A, B, C, and D are overlapped, the cell of FIG. 7A and the cell of FIG. 7C are fully seen at one cell, and the cell of FIG. 7B and the cell of FIG. 7D are partially seen.
  • In the present invention, it is assumed that at least more than two cells of B are not concurrently overlapped with one cell of A. For example, FIG. 6G is a view showing the construction that four boards are overlapped. Namely, at least more than two cells in another board are not overlapped with one cell of one board. At this time, when the rims of two cells are abutted, it is recognized that they are not overlapped.
  • 3) Computation of Boards
  • In the present invention, at least more than one board shown on the user interface can be concurrently moved in the same direction by the same distance. For example, FIG. 8D is a view showing a result that the boards of FIGS. 8A and 8B are moved in the same direction by the same distance in a state of FIG. 8C. As shown in FIG. 8D, the boards in the original position before the movement are not shown on the user interface after the boards are moved. For easier understanding, the above boards are shown. In addition, the dotted lines of FIGS. 8A, B, C, and D are shown for only figuring out the shape of the board and are not actually shown on the user interface.
  • At least more than one board may not be concurrently shown on the user interface. FIG. 9F is a view showing a state that the boards of FIGS. 9A and 9B are disappeared from the state of FIG. 9E in which the boards of FIG. 9A, B, C and D are overlapped. The dotted lines of FIG. 9A, B and C are formed for only figuring out the shape of the board and are not actually shown on the user interface.
  • In the present invention, the user or system computes with respect to the boards for inputting symbols belonging to the password. At this time, the computation means that the board is changed from the previous state to the next state. For example, when the boards are moved or disappeared, it is recognized as a result of the computation. At this time, it is recognized that the boards having the same states after or before the user or system performs a computation are not affected by the computation. For example, the arrows of FIG. 10F represent that the boards of FIGS. 10A and 10B are moved from the states of FIG. 10F in which the boards of FIG. 10A, B, C and D are overlapped. FIG. 10G is a view showing the construction that the boards of FIGS. 10A and 10B are moved. In the construction of FIG. 10G, the boards of FIG. 10C and 10D are not moved. Therefore, in this case, the boards of FIGS. 10A and 10B are not affected by the computation. The boards of FIG. 10A and 10B are not affected by the computation. The dotted lines of FIGS. 10A, 10B and 10C are formed for only figuring out the shape of the board and are not actually shown on the user interface.
  • 4) Definitions of Matching Board and Reference Board
  • When a computation is performed with respect to the boards for inputting the symbols belonging to the password, the set formed of boards reacting with respect to the computation in the same manner is called as a matching board, and the set formed of the boards not reacting with respect to the computation is called as a reference board. For example, in the example of FIG. 10G, the boards of FIG. 10A and FIG. 10B react with respect to the computation and are moved in the same distance by the same distance. Therefore, the set formed of the boards of FIG. 10A and FIG. 10B is called as a matching board, and since two boards of (c) and (d) of FIG. 10 do not react with respect to the computation, the set formed of two boards of FIG. 10C and 10D is called as a reference board.
  • The reference board is formed of at least more than one board, but it is recognized as one board. For example, assuming that the board of FIG. 10C is called as a reference board, even when the board of FIG. 11C is overlapped with the boards of FIG. 11A and FIG. 11B, the boards are recognized as one board. Therefore, in the case that the reference board is formed of at least more than two boards, and at least more than two cells in at least more than two boards are overlapped, the overlapped cells are set as one and are recognized as one cell in the reference board. Similarly, the matching board is formed of at least more than one board, but it is recognized as one board. In addition, in the case that the matching board is formed of at least more than two boards, and at least more than two cells in at least more than two boards are overlapped, the overlapped cells are set and recognized as one cell in the matching board.
  • 5) Movement of Board, and Matching of Cell
  • The user can overlap a certain cell in the matching board and a certain cell in the reference board by performing a computation with respect to the matching board. When the cell in the matching board is overlapped with the cell of the reference board, it is called that the cell of the matching board is matched with the cell of the reference board. For example, assuming that the board of FIG. 12A is called as a matching board, and the board of FIG. 12B is called as a reference board, FIG. 12D shows the case that a certain cell of the matching board is matched with a certain cell of the reference board in the state of FIG. 12C. The cell having a thick boundary line in FIG. 12C represents a certain cell in the reference board and a certain cell in the matching board that the user wants match.
  • Assuming that the user's password is P1 P 2 . . . Pn, P1 is cell but is called as a password symbol (1<l<n). In addition, the cell overlapped with the password symbol and the password symbol in the reference board or matching board are combined and called as a cell including the password symbol. For example, assuming that FIG. 13A shows the matching board, and password symbol is 1, FIG. 13B shows the cell including 1. At this time, if there is not a cell overlapped with the password symbol in the matching board or the reference board, the password symbol itself is called as the cell including the password symbol. For example, assuming that FIG. 13C shows the reference board, and the password symbol is 1, FIG. 13D shows the cell including 1.
  • FIG. 14 is a flow chart of a procedure that the password symbols in the reference board are sequentially matched with one cell in the matching board for thereby inputting a password.
  • As shown therein, assuming that the user's password is P1P2, . . . Pn (l<l<n), the system shows the matching board and the reference board on the user interface (S101). The user selects a certain cell in the matching board (S102). The user repeatedly performs the process for performing a computation with respect to the matching board so that the cell selected in the step S102 is matched with the cell included in Pl (S103 through S106). The user transfers a password input completion signal to the system (S107).
  • In the method of FIG. 14, it is not limited that the user selects a certain cell in the matching board one time, and the system is not limited to show the reference board and the matching board one time. For example, the user can repeatedly perform the process that the user selects a certain cell in the matching board, and the selected cell is matched with the cell including the password symbol. The system can show a new reference board and a matching board on the user interface whenever one cell selected by the user in the matching board is matched with one cell including the password symbol before the user completes inputting the password.
  • In the method of FIG. 14, the step S107 may be omitted in the case that the system knows the length of the password.
  • In the method of FIG. 14, when the cell in the matching board selected by the user is matched with the cell including the password symbol in the reference board, the cell in the matching board that the user did not select should be matched with the cell including the symbols, the password symbol. All cells in the matching board are matched with the cells in the reference board, so that others who do not know the cells in the matching board selected by the user cannot know the user's password symbols even when others see the input procedure of the password symbols.
  • In the method of claim 14, since the cell selected by the user should be matched with the cell including the password symbol in the reference board, there should be cells including at least password symbol in the reference board. For example, assuming that the password symbols are numbers from 0 to 9, the reference board should include the cells including at least numbers from 0 to 9.
  • In the method of FIG. 14, the password symbols in the matching board are preferably shown in a certain recovery extraction sequence. Even when they are not sequentially shown, there is no problem. Since the user select a certain cell in the matching board, it is not needed that all cells in the matching board should be different. However, in the case that all cells are same, the user may confuse with the selected cell, so that it is not preferred that all cells are same.
  • In the step S102 of FIG. 14, what the cell selected by the user is matched with the cell including the password symbol Pl in the reference board may be implemented using an input apparatus. For example, the matching lo board is recognized as a cursor, and the user drags the matching board and drops the same when the cell selected by the user is matched with the cell including P l in the reference cell.
  • In the method of claim 14, the step S107 may be omitted in the case that the system knows the length of the password. Namely, since the system knows the length of the password, when the user performs the step S104 by n-times, the system recognizes that the password input is completed. In the case that the system does not know the length of the password, the user transfers a signal that the password input is completed to the system using an input apparatus. For example, the user pushes a left button of the mouse for performing the step S104 and pushes a right button of the mouse for performing the step S107.
  • In the method of FIG. 14, when the cell selected by the user in the matching board is matched with the cell including the password symbol in the reference board, as it was described earlier, the cells, not the cells selected by the user, in the matching board should be matched with the cells including the symbols, not the password symbol, in the reference board. At this time, in the case that a computation is performed so that the cells in the matching board selected by the user are matched with the cells including the password symbol, there may be the cells of the matching board not matching with the cells in the reference board.
  • For example, assuming that FIG. 15A shows the matching board, and the matching board of FIG. 15B is moved in the direction of the arrow, FIG. 15C shows that there are the cells in the matching board not matching with the cells in the reference board.
  • The above problems may be overcome by rotating the cells in the matching board out of the range of the reference board when the matching board is moved.
  • The rotation and movement will be described.
  • Assuming that FIG. 15A shows the matching board, and the matching board is moved in the direction of the arrow of FIG. 15B, eight imaginary reference boards are placed on the surrounding portions of the reference board. FIG. 16A shows the positions on which eight imaginary reference boards are placed. In FIG. 16A, the rectangular shape means the reference board. FIG. 16B shows the moving direction of eight imaginary reference boards and the matching board. The cells indicated by the dotted lines in FIG. 16B are not actually shown on the user interface but are provided for describing the rotation and movement.
  • FIG. 16C shows a result after the matching board is moved. As shown in FIG. 16D, the cell in the imaginary reference board matched with the cell in the matching board in FIG. 16C is recognized as the cell in the reference board, and the cells in the reference board not matching with the cell in the matching board is recognized as the cell in the reference board.
  • FIG. 16E shows a result after the matching board is moved in the direction of the arrow. The movement of the matching board may be described using the imaginary reference board based on the shapes of the reference board and the matching board. The shape and number of the imaginary reference board may be different based on the computation with respect to the shape of the board and the matching board. For example, assuming that the rectangular cell indicated by the full line in FIG. 17 is the cell in the reference board, and the computation with respect to the matching board is performed for moving the matching board in the left and right directions, two imaginary reference boards indicated by the dotted line may be provided, and a result of computation will be described.
  • In a certain shaped board, it is possible to describe the computation with respect to the matching board without considering the imaginary reference board. For example, assuming that FIG. 18A shows the matching board, and FIG. 18B shows the reference board, in the case that FIG. 18C concurrently shows the matching board and the reference board, the user can enable the matching board to rotate. Assuming that when the matching board of FIG. 18A is rotated in the right direction 12 times, the same matching board as FIG. 18A is obtained, FIG. 18D shows a result that the matching board is rotated in the right direction one time. Therefore, FIG. 18D shows a result of the computation performed with respect to the matching board without using the imaginary reference board. The dotted lines of FIGS. 18A, B and D are provided for simply figuring out the shape of the board and are not actually shown on the user interface.
  • When the computation is performed with respect to the matching board, in the case that the cell in the matching board is rotate and moved out of the range of the reference board, the user may visually feel inconvenient based on the shape of the matching board. The above problem may be overcome by providing multiple reference boards. At this time, since multiple reference boards identically react with respect to the computation, the multiple reference boards are recognized as one reference board. For example, FIG. 19 shows the case that nine reference boards are shown on the user interface. At this time, since nine reference boards identically react with respect to the computation, they are recognized as one reference board.
  • Since it is impossible to describe all possible shapes of reference boards and matching boards and all computations and results of the same, it is recognized that the reference board and matching board and computation of the same and results of the same are within the ranges that a person skilled in the art can understand.
  • In the method of FIG. 14, when the user selects one cell in the matching board, the system does not know the user selected which cell. The method for overcoming the above problem will be described with reference to FIGS. 20 and 22.
  • FIG. 20 is a flow chart of a method for enabling the system to know a user's selection of a certain cell when the system knows the length of password. Referring to FIG. 20, assuming that the user's password is P1P2 . . . Pn. The user repeats a process of matching the cell selected in the step S202 with Pl (1<l<n)(S204). Since the system knows the length of password, when the user performs the step S204 n-times, at least more than one cell including the special symbol is transferred to the reference board (S207). FIG. 21 is a view illustrating an example that there are special symbols*in nine cells in the reference board. The user matches the cell selected in the step S202 with a cell including the special symbol in the reference board (S208).
  • In the step S207, when the cell selected by the user in the matching board is matched with the cell including the special symbol in the reference board, the other cells including the special symbol in the reference board are not preferably matched with ant cell in the matching board.
  • FIG. 22 is a flow chart of a method for enabling the system to know the user selects a certain cell in the case that the system does not know the length of password. Referring to FIG. 22, assuming that the user's password is P1P2 . . . Pn, the user repeats the process of matching the cell selected in the step S302 with Pl (1<l<n) (S307). The user transfers a signal that the step S304 is completed to the system (S307). The system shows at least more than one cell including a special symbol in the reference board (S308). The user matches the cell selected in the step S302 with the cell including a special symbol in the reference board (S309).
  • There may be various methods for recognizing that the system selects the cell for inputting the password. The method according to the present invention is a preferred embodiment among multiple embodiments.
  • FIG. 23 is a flow chart of a procedure that the system determined the password inputted by the user based on the method of FIG. 20 in a method for inputting the password in such a manner that the cell selected by the user is matched with the password symbol in the reference board.
  • It is assumed that the system shows the reference board and the matching board on the user interface like FIG. 24A, and the user selects the cell including the symbol of 8 in the matching board, and the system knows that the length of the password of the user is 4, and the user sequentially matches the cell including the symbol of 8 in the matching board with the cells including the symbols of 1, 5, 2, and 8 in the symbol board. FIG. 24B shows that the cell having the symbol of 8 in the matching board is matched with the cell including the symbol of 1 in the reference board. FIG. 24C shows that the cell including the symbol of 8 in the matching board is matched with the cell including the symbol of 5 in the reference board. FIG. 24D shows that the cell including the symbol of 8 in the matching board is matched with the cell including the symbol of 2 in the reference board, and FIG. 24E shows that the cell including the symbol of 8 in the matching board is matched with the symbol of 8 in the reference board.
  • It is assumed that the system shows the reference board formed of the cells including the special symbols of FIG. 24F on the user interface when the user completes matching the cell in the matching board with the cell including the password symbol in the reference board. Under the above assumption, the user matches the cell including the symbol of 8 in the matching board with the cell including the special symbol of the reference board. A result of the above operation is shown in FIG. 24A. Referring to FIG. 24F, the matching board is shown on the user interface, but the matching board is not shown for helping understanding.
  • The procedure that the system determines one password will be described with reference to FIGS. 24B, C, D, E and F.
  • The system stores the symbols in the cell of the matching board. At this time, the same two cells may appear in the matching board. The matching board may be mapped in a straight line shape. Since a certain sequence may be provided to the straight line board, the sequences provided to the cell may be recognized as the symbols. It is recognized that the cell of the matching board includes symbols.
  • FIG. 25A shows an example that the symbols in the cell of the matching board are stored in one dimensional alignment formed of nine rooms.
  • FIG. 25B shows a result that t he symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in FIG. 24B is stored in the place in which the symbol included in the cell of the matching board is stored. It is recognized that the symbol in the same row as the symbol included in the cell in the reference board matched in FIGS. 25B, C, D, E and F is stored in the place in which the symbol included in the cell of the matching board is stored.
  • FIG. 25C shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in FIG. 24C is stored in the place in which the symbol included in the cell of the matching board is stored. Here, the sequence of the symbols stored in one row is a matched sequence.
  • FIG. 25D shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in FIG. 24D is stored in the place in which the symbol included in the cell of the matching board is stored.
  • FIG. 25E shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in FIG. 24E is stored in the place in which the symbol included in the cell of the matching board is stored.
  • FIG. 25F shows a result that the symbol included in the cell in the reference board matched with each symbol included in the cell of the matching board in FIG. 24G is stored in the place in which the symbol included in the cell of the matching board is stored.
  • The last row of FIG. 25F includes the special symbols in one row. When the remaining symbols are sequentially aligned except for the first symbol in the row including the special symbol, the system recognizes “1528” as the password inputted by the user. At this time, the first symbol in the row including the special symbol is the symbol included in the password. For example, when selecting the cell include din the matching board, there is an engagement between the user and the system for selecting the cell including the first symbol in the password, the system may recognizes the sequence of the remaining symbols including the first symbol in the row including the special symbol as a password.
  • In the method for inputting the password by matching the cell selected by the user in the matching board with the password symbol, the method that the system determines the password inputted by the user not by the method of FIG. 20 is included in the scopes of the known art that a person skilled in the art well understands.
  • 6) Modified Examples
  • FIGS. 26 and 27 show the modified examples of the first embodiment of the present invention. FIG. 26 shows an example that the reference board and the matching board are overlapped in a straight line shape in parallel, and FIG. 27 shows an alignment in which the straight line shaped matching board is overlapped with the matrix shaped reference board.
  • As shown in FIG. 26A, it is possible to align the reference board and the matching board in parallel in such a manner there are not overlapped with each other. Here, matching the cell of the reference board and the cell of the matching board are performed in the same row.
  • The matching method for inputting the password is implemented in the same method as the above method. In the case that the password is “1528”, the user selects a certain cell, for example, 8 in the matching board and sequentially matches the cells including the password of the reference board as shown in FIGS. 26B through 26E using the selected cell. 8 of the matching board is last matched with the special symbol * displayed in the reference board.
  • As shown in FIG. 27A, the circulating rows are aligned in multiple, and the straight line shaped matching boards are overlapped with the reference board having the matrix shape based on the widths of the reference board.
  • The matching method for inputting the password is similar with the above method. In the case that the password is “1528”, the user selects a certain cell, for example, the first cell in the matching board, and the cells including the password of the reference board are sequentially matched using the selected cell as shown in FIGS. 27B through 27E, and the first cell of the matching board is last matched with the special symbol * displayed in the reference board.
  • As described above, in the password system according to a first embodiment of the present invention, the reference board and the matching board are overlapped or separated and are shown on the user interface. The reference board and the matching board each are formed of at least more than two cells. The matching board reacts with respect to the computation of the user, and the reference board reacts with respect to the computation of the user. The user selects a certain cell in the matching board, and inputs the password in such a manner that the selected cell is matched with the cell including the password symbol in the reference board. At this time, the other cells of the matching board and the other cells of the reference board are concurrently matched in multiple numbers. Therefore, others do not know the cells matched with the cells including the password symbols among a plurality of matched pairs of cells of the matching board and reference board, so that it is impossible to know the password even when the others see the input procedure of the password.
  • In the above description of the first embodiment of the present invention, the matching board reacts with respect to the computation of the user, and the reference board does not react with respect to the computation of the user. However, in another embodiment of the present invention, the reversed cases may be possible. The user selects a certain cell in the matching board, and the selected cell is matched with the cell including the password symbol in the reference board for thereby inputting the password. The reversed cases may be possible. Various modifications from the first embodiment of the present invention are possible, but are obvious to a person skilled in the art, so that the detailed examples are omitted.
  • 2. Second Embodiment—Password System for Inputting Password by Selecting Certain Matched Cell
  • FIGS. 28 and 29 are flow charts of a procedure of selecting a cell in the reference board matched with the password symbol in the matching board and inputting the password.
  • FIG. 28 is a flow chart of a procedure for selecting a cell in the reference board matched with the password symbol in the matching board and inputting the password in the case that the system knows the length of password. Referring to FIG. 28, assuming that the password of the user is P1 P2 . . . Pn, the system shows the matching board and the reference board on the user interface (S502). The system enables the matching board to disappear from the user interface (S503). The user repeats the procedure for selecting the cell in the reference board matched with the cell including the password symbol Pi in the matching board in the step S502 in a state that the matching board is disappeared from the user interface (1<l<n) (S504).
  • FIG. 29 is a flow chart of the procedure for inputting the password by selecting the cell in the reference board matched with the password symbol in the matching board in the case that the system does not know the length of password. Referring to FIG. 27, it is assumed that the password of the user is P1P2 . . . Pn. The system shows the matching board and the reference board on the user interface (S602). The system enables the matching board to disappear from the user interface (S603). The user repeats the procedure for selecting the cell in the reference board matched with the cell including the password symbol Pl in the matching board in the step S502 in a state that the matching board is disappeared from the user interface (1<l<n) (S604). The user informs the system that the password input is completed (S607).
  • In the method of FIGS. 28 and 29, it is not needed that the system shows the matching board and the reference board on the user interface n-times. For example, it is assumed that the user's password is P1P2 . . . Pn, and n represents the even number. When the system meets the j-th matching board and the reference board on the user interface (1<j<n/2), the user sequentially selects the cells in the reference board matched with the password symbols P2j-1 and P2j in the j-th matching board. Two passwords are inputted when the matching board meets with the reference board one time. Therefore, in the method for inputting the password by selecting the cell in the reference board matched with the password symbol in the matching board, when the matching board and the reference board are shown in the user interface, it is recognized that the number of the password symbols inputted by the user is promised between the user and the system.
  • In the method of FIGS. 28 and 29, when the system shows the matching board and the reference board on the user interface, it is preferred that the cell in the matching board is matched with the cell in the reference board based on a 1:1 matching method. Therefore, all cells of the matching board are matched with all cells of the reference board, so that the others who do not know the password symbols do known know the cells including the password symbols in the matching board matched with the cell selected by the user in the reference board even when the others see the procedure of inputting the password by the user.
  • In the method of FIGS. 26 sand 27, it is preferred that the password symbols in the matching board are shown in a certain non-recovering extraction sequence. Even when they are not shown in the sequence, it does not matter. The user selects the cell in the reference board matched with the cell including the password symbol in the matching board, it is not needed that all cells in the reference board are different. In the case that they are all same, the user may confuse for selecting a certain cell, so that it is not preferred that all cells are same.
  • In the method of FIGS. 27 sand 28, selecting the cell in the reference board matching with the cell including the password symbol in the matching board is performed using the input apparatus.
  • In the method of FIG. 29 wherein the system does not know the length of password, the user may transfer a signal that the password input is completed using the input apparatus to the system. For example, the user may use t he left button of the mouse for selecting the cell in the reference board matching with the cell including the password symbol in the matching board, and the user may use a right button of the mouse for informing the completion of the password input to the system.
  • In the method of FIGS. 28 and 29, since the user selects the cell in the reference board matched with the cell including the password in the matching board, the cell including a certain password symbol must be provided in the matching board. For example, assuming that the password symbol is a number between 0 and 9, there should be a cell including a certain number between 0 and 9 in the matching board.
  • In the method of FIGS. 28 and 29, as an example for disappearing the matching board from the user interface, it is needed to inform the position of the cell including the password symbol in the matching board to the system or it is possible when the time set in the system is passed. Assuming that FIG. 30A shows the matching board, and FIG. 30B shows the reference board, FIG. 30D shows that the matching board is disappeared from the state of FIG. 30C in which the matching board and the reference board are shown on the user interface.
  • FIG. 31 is a flow chart of the operation of the system based on the operation of FIG. 28. Referring to FIG. 28, the system shows the matching board and the reference on the user interface (S701). The system disappears the matching board from the user interface (S702). When the user selects the cell in the reference cell, the symbol included in the cell in the matching board matching with the cell selected in the step S701 is recognized as the password symbol.
  • FIG. 32 shows a procedure for determining the password symbol. It is assumed that the system shows the matching board and the reference board on the user interface as shown in FIG. 32A, and FIG. 32B shows a state that the matching board is disappeared from the user interface. In addition, it is further assumed that the password symbol that the user wants to input is 6. The user selects the cell in the reference board shown in FIG. 32B matching with the cell including the symbol 6 in the matching board in FIG. 32A. Here, the user selects the cell including the symbol 2 of FIG. 32B, and the system determines the password symbol that the user wants to input the symbol 6 in the cell including the symbol 6 matching with the cell including the symbol 2 in the reference board in FIG. 32A.
  • FIG. 33 shows a modified example of the second embodiment of the present invention and is an example that the reference board and the matching board are not overlapped and are aligned in parallel. In the case that the reference board and the matching board are not overlapped and are aligned in the straight line shape, it is known that it is possible to input the password in the same manner as the above method.
  • 3. Third Embodiment—Password System for Inputting Password Based on Matching with Certain Cell
  • In the description of the third embodiment of the present invention, the method for inputting the password by matching a certain cell will be first described. Second, an actual image reference symbol set and an actual image matching symbol set forming the two-password will be described. Third, the user interface proper to the two-password input method will be described. Fourth, the password system adapting the above password input method and the password authentication process will be described.
  • 1) Password Input Method by Matching of Cells
  • In the third embodiment of the present invention, the user matches a certain cell of the reference board and the matching board based on a certain matching rule, and the password input is performed by repeating the matching process at least more than one time. At this time, in order to disguise the specific pairs of the cells matched for the password input, a false matching of each pair of cells are performed. Therefore, a plurality of cells are mixed and matched, so that even when the password input procedure is seen by others. It is impossible to recognize the actual cell matching for inputting the password, so that others cannot know the password.
  • FIGS. 34A and 34B are views for describing the password input method according to a third embodiment of the present invention. FIG. 34A shows the reference board and the matching board before the matching, and FIG. 34B shows the reference board and the matching board after the matching.
  • As shown therein, there are provided a reference board 1 formed of a plurality of cells on the upper side of the same, and a matching board 2 formed of a plurality of cells in a lower side of the same. Here, the numbers of the cells aligned in the reference board 1 are sequential, and the numbers of the cells aligned in the matching board 3 are non-sequential. The symbol board 1 and the matching board 3 may be displayed on type of the graphic user interface on a display apparatus.
  • The user inputs a password in such a manner that a specific cell in the symbol board 1 is matched with a specific cell in the matching board 3 based on a certain matching rule. The matching rule is directed to aligning the cells of the symbol board 1 and the matching board 3 in the same vertical row.
  • Assuming that the cells to be matched for the password input are 3 of the symbol board 1 and 5 of the patching board 3, as shown in FIG. 34A, 3 of the symbol board 1 and 5 of the matching board 3 are not aligned vertically to each other before the matching is performed. In the drawings, 3 of the symbol board 1 and 5 of the matching board 3 are specially hatched for an easier understanding. In the actual case, there are shown in the same type as the other cells on the user interface.
  • The user circulates the matching board 3 four times (or five times in the left circulation direction) in the right direction for the password input, and as shown in FIG. 34B, 3 of the symbol board 1 and 5 of the matching board 3 are aligned in the same vertical row. At this time, the pairs of the cells 5 matched in the vertical row in the symbol board 1 and the matching board 3 are formed (1,2), (2,9), (3,5), (4,7), (5,6), (6,1), (7,3), (8,4), and (9,8). The total number of the same is 9. The above pairs are all number pairs obtained when moving the matching board 3 four times in the right circulation direction. However, the actually matched pairs of cells are (3,5) for the password input, and the remaining eight pairs of the cells are used for disguising the actually matched pairs of the cells (3,5).
  • The above matching is performed at least more than one time during one time password authentication. Therefore, even when the password input procedure is exposed to the others, the others cannot recognize the password inputted. The authentication process of the password inputted in the above manner will be described.
  • FIG. 35 is a view for describing the password input method according to a third embodiment of the present invention implemented based on the common set concept. Referring to the drawings, assuming that there are the sets having an number of numbers (n is natural number) as the elements of the set, the user selects one element of the set A and one element of the set B for the password input and matches the selected two elements. In addition, at this time, the other elements of the sets A and B are matched with each other based on a certain matching rule.
  • As a method for matching two cells of two sets A and B, there is a method for changing the aligned sequences of the elements belonging to a certain set. For example, the aligning sequence of the elements of the set B is changed. Therefore, a set C of the matched elements is generated based on a certain matching rule between the set B having the changed aligning sequence and the set A.
  • The matching method of the above elements will be described based on a password input process. First, in a step S1, each element of the sets A and B is provided. In a step S2, the aligned sequence of the elements of the set B is changed. In a step S3, a set C formed of a pair of matched elements is generated based on a matching sequence of the elements of the set A and the set B′. An authentication is achieved based on the generated set C.
  • Here, a certain element of the set A that is a reference for the matching is called as a real reference cell (RRC), and the remaining elements for disguising the RRC is called as a virtual reference cell (VRC). A certain element of the set B for matching to the RRC is called as a real matching cell (RMC). The remaining elements for disguising the RMC are called as a virtual matching cell (VMC). For example, as shown in FIGS. 36A and 34A, there are provided a real reference cell and a virtual reference cell, and a real matching cell and a virtual matching cell used in the reference board and the matching board, respectively.
  • When the RRC of the set A and the RMC of the set B are matched, the VRC of the set A and the VMC the set B are matched. The pairs of the sets C that the set A and the set B are matched based on a certain matching rule are called as a matched cells group (MCG). For example, as shown in FIGS. 36B and 34B, there are shown the real matched RRC and RMC, and the virtual matched VRC and VMC, and the MCG in the pairs of the matched cells.
  • In addition, the matching of the RRC and the RMC is performed by at least more than one time. As shown in FIGS. 37A through 37D, a plurality of cell matching procedures are repeatedly performed for thereby inputting a password. As shown therein, the hatched symbols are provided for helping a better understanding of the descriptions. They are shown on the user interface in the same shape as the other symbols.
  • In each drawing, the contents in the upper sides are the reference board 7 and the matching board 9 for showing the after-matching state with respect to the before-matching contents of the lower side. In the matching rule, the RRC of the symbol board 7 and the RMC of the matching board 9 are aligned in the same vertical row. For example, assuming that the RRC is 3, 7, 2, 9 and the RMC is 5, 1, 6, 6, in order to match with the RRC and RMC, as shown in FIGS. 37A through 37D,3 and 5, 7 and 1, 2 and 6, and 9 and 6 are sequentially matched using the symbol board 6 and the matching board 9.
  • Here, the group of the symbols formed of a plurality of RRC is called as s a real reference cell group (RRCG), and the group formed of a plurality of RMC is called as a real matching cell group (RMCG). Here, the RRCG is 3729, and the RMCG is 5166.
  • In the password input method according to a third embodiment of the present invention, when one RRC and RMC are matched, a plurality of VRC and VMC are matched. Therefore, a third party person who watches the input procedure of the password cannot recognize which symbol matching corresponds to the RRC and RMC for thereby preventing a leakage of the password.
  • In the above examples, the number of the cells including the RRC and VRC is the same as the number of the cells including the RMC and VMC (in the embodiment, the number of the same is 9), but they are not needed to be same. Namely, they may be different in another embodiment of the present invention. For example, the number of the symbol rows aliened in the upper side may be 9, and the number of the symbol rows aligned in the lower side may be 7.
  • 2) Generation of Two Passwords, and RRCG and RMCG
  • Since the password used in a password input method of a third embodiment of the present invention is different from a password used in the common password system, the password used in the third embodiment of the present invention is called as a two-password.
  • The password used in the common password system is a symbol group in which symbols are sequentially aligned. Therefore, it is needed to sequentially input the password in a determined sequence based on the symbol group designed as a password into the password system. For example, in the case that the password of a credit card is set as 2976, when it is intended to use the credit card in an automatic teller machine (ATM), the user should sequentially input 2, 9, 7 and 6 using the number keypad provided in the ATM.
  • However, the two-password has different from the conventional password of the above input method. The two-password may be formed of RRCG and RMCG. The two-password may be either RRCG or RMCG or may be induced from the same. Therefore, what the symbol group formed of RRCG and RMCG is called as the two-password. In detail, various methods for determining the RRCG and RMCG from the two-password will be described with reference to FIGS. 38A through 38D and FIGS. 39A and 39B. First, an example that the two-password is formed of RRCG and RMCG will be described. For example, when the two-password is 37295166, the front side four numbers of 3729 are defined as RRCG, and the rear side four numbers of 5166 are defined as RMCG. In this case, the sequential pairs of the real matched RRC and RMC are (3,5), (7,1), (2,6), and (9,6). The method for generating the RRCG and RMCG from the two-password may be implemented follows. As shown in FIG. 38A, in the case that the two-password is defined, the RRCG and RMCG are as follows. The sequential pairs of the RRC and RMC are implemented as follows.
  • Two-password: X1 X2 X3 . . . Xn−2 Xn−1 X1 X1 X2 X3 . . . Xn−2 Xn−1 Xn (n is natural number)
  • RRCG: X1 X2 X3 . . . Xn−2 Xn−1 Xn
  • RMCG: Y1 Y2 Y3 . . . Yn−2 Yn−1 Yn
  • The sequence pairs (RRCi, RMCi) of RRC and RMC: (Xi, Yi) (1≦l≦n)
  • Second, an example that the two-password is formed of RRCG and RMCG will be described.
  • The RRCG and RMCG are formed using the groups of the numbers alternately selected from the two-password. For example, when the two-password is 37295166, the RRCG and RMCG are 3256 and 7916, respectively. In this case, the sequence pairs of the RRC and RMC real-matched for the input of the password is (3,7), (2,9), (5,1), (6,6). The method for generating the RRCG and RMCG from the two-password may be implemented as follows. As shown in FIG. 38B, in the case that the two-password is defined, the RRCG and RMCG are as follows. At this time, the sequence pairs of the RRC and the RMC may be expressed as follows.
  • Two-password: X1 Y1 X2 Y2 X3 Y3 . . . Xn−2 Yn−2 Xn−1 Yn−1 XnYn (n is natural number)
  • RRCG: X1 X2 X3 . . . Xn−2 Xn−1 Xn
  • RMCG: Y1 Y2 Y3 . . . Yn−2 Yn−1 Yn
  • The sequence pairs of the RRC and RMC (RRCi, RMCi):(Xi, Yi) (1≦i≦n)
  • Third, in the case that the two-password is RRCG, the RMCG is induced from the above two-password. For example, when the two-password is 37295166, the entire number group of the same is used as the RRCG, and the RMCG is induced therefrom. For example, the inducing rule is to use the number group obtained by rotating the RRCG one time. In this case, the RMCG becomes 72951663. The sequence pairs of the real-matched RRC and RMC for the input of the password is (3,7), (7,2), (2,9), (9,5), (5,1), (1,6), (6,6), (6,3). The method for generating the RRCG and RMCG from the two-password will be implemented as follows. As shown in FIG. 38C, in the case that the two-password is defined, the RRCG and RMCG are as follows. At this time, the sequence pairs of the RRC and RMC are implemented and expressed as follows.
  • Two-password: X1 X2 X3 . . . Xn−2 Xn−1 Xn (n is natural number)
  • RRCG: X1 X2 X3 . . . Xn−2 Xn−1 Xn
  • RMCG: X2 X3 . . . Xn−2 Xn−1 Xn X1
  • The sequence pairs of the RRC and RMC (RRCi, RMCi):(Xi, Xi+1) (1≦i≦n−1), (Xi, X1) (i=n)
  • Fourth, a part of the two-password is RRCG. Another part including a part of the RRCG is RMCG. For example, when the two-password is 37295166, the remaining group 3729516 except for the last number is used as RRCG. The remaining group 7295166 except for the first number is used as RMCG. The sequence pairs of the real matched RRC and RMC for the input of the password is (3,7), (7,2), (2,9), (9,5), (5,1), (1,6), (6,6). The method for generating the RRCG and RMCG from the two-password may be implemented as follows. As shown in FIG. 38D, the two-password may be defined, and the RRCG and RMCG may be defined as follows. At this time, the sequence pairs of the RRC and RMC may be implemented as follows.
  • Two-password: X1X2X3 . . . Xn−2 Xn−1 Xn (n is natural number)
  • RRCG: X1 X2 X3 . . . Xn−2 Xn−1
  • RMCG: X2 X3 . . . Xn−2 Xn−1 Xn
  • The sequence pairs of the RRC and RMC (RRCi, RMCi):(Xi, Xi+1) (1≦i≦n−1)
  • As described above, there are various methods for generating RRCG and RMCG from the two-password. The RRCG and RMCG generated from the two-password have a relationship of 1:1. They may have a relationship of 1:n or n:1. For example, as shown in FIGS. 39A and 39B, only one RRC is generated as RRCG from the two-password, and the remaining symbol group is generated as RMCG. In addition, the reverse generation is also possible. At this time, the sequence pairs of the RRC and RMC may be expressed as follows.
  • The sequence pairs of RRC and RMC (RRCi, RMCi):(X1, Xi+1) (1≦i≦n−1)
  • The sequence pairs of RRC and RMC (RRCi, RMCi):(Xi, Xn) (1≦i≦n−1)
  • The method for generating RRCG and RMCG from the two-password, and the method for forming a sequence pair of RRC and RMC may be modified and applied in various methods. The above various modifications and applications are obvious to a person skilled in the art. The other modification and applications described in the present description may be included in the concept of the present invention. In addition, in the basic application of the two-password, the three-password is also possible, and the four-password or the more passwords are also possible. The above applications and extensions should be implemented in considered with the users. Namely, memorizing the two-password should be easy to the users, and the procedure for matching the symbols for inputting the two-password should be easy.
  • 3) User Interface and Password System for Two-password Input
  • The password input method based on the matching of cells may be implemented based on a password system having a user interface and a password authentication process.
  • FIG. 40 is a block diagram showing a relationship between the password system and a main system adapting the same according to a preferred embodiment of the present invention. The password system 30 provides a user interface 20 so that a user 10 can input a two-password. The user interface 20 includes interface members for inputting the two-password by the matching of cells by the user. The password system 30 receives the two-password inputted from the user through the user interface 20 and performs an authentication and enables the authenticated person to access the main system 40.
  • The user interface 20 is not limited to a few embodiments to be described later. The detained embodiments of the user interface 20 that will be described later are provided for only easier understanding of the present invention. Various modifications and applications of the detailed constructions of the user interface 20 based on the characteristics of the main system 40 adapting the password system 30 are obvious to a person skilled in the art. For example, in the case that the password system 30 is mounted on a personal computer system, the user interface 20 may include a graphic user interface. In the case that it is mounted on an electrical door lock system, the user interface 20 may include a mechanical system and an electronic circuit.
  • In detail, the constructions of the user interface 20 and the password system 30 will be described. FIG. 41 is a view illustrating the basic construction of the user interface for the password system according to the present invention, and FIG. 42 is a flow chart illustrating a user authentication process of the password system of the present invention.
  • The two-password system 30 according to the present invention includes a display control unit 31, a cell generation unit 32, a matching cell process unit 33, an authentication process unit 34, and a memory 35. The user interface 20 for the two-password input includes a display unit 22 and a matching unit 24.
  • As shown in FIGS. 41 and 42, in a step S10, the cell generation unit 32 generates a group of cells included in each cell of the reference board and the matching board displayed on the display unit 22 and provides the group to the display control unit 31. In a step S20, the display control unit 31 includes the provided symbol group into the cells of the reference board and the matching board and outputs to the display unit 22, so that the reference board and the matching board are displayed on the display unit 22.
  • In a step S30, the user 10 matches the cells of the reference board and the matching board displayed on the display unit 22 using the matching unit 24. In a step S40, the matching cell process unit 33 generates a matched cell group MCG based on the input of the user through the matching unit 24. In a step S50, the generated group is inputted into the authentication process unit 34. In a step S60, the authentication process unit 34 performs a password authentication process based on the authentication reference information 36 stored in the memory 35. The detailed process thereon will be described later.
  • In the password system, the group of the cells for inputting the two-password is generated and displayed to the user differently from the conventional password system. In addition, the authentication process based on the matched cell group MCG is different t from the conventional password system in their characteristics. The detailed descriptions thereon will be provided later.
  • The detailed embodiments of the user interface 20 based on the main system 40 will be described with reference to FIGS. 43 through 55.
  • FIG. 43 is a view illustrating an embodiment of the user interface based on the main system according to the present invention. The password system 30 may be mounted on the main system 40 such as a system having a graphic user interface, for example, a personal computer system, PDA, ATM financial terminal, etc. At this time, the user interface 20 includes the display apparatus 50 as a display unit 22 such as a CRT display apparatus, a LCD apparatus, etc., and the graphic user interface 60. In addition, there is further provided an input apparatus 54 as a matching unit 24 such as a keyboard apparatus, a pointing apparatus, etc.
  • The graphic user interface 60 displayed on the screen 52 of the display apparatus 50 includes a reference board 61 and a matching board 62. The user 10 uses an input apparatus 54 for inputting the two-password. The cells aligned on the reference board 61 and/or the matching board 62 are circulation-moved in accordance with a control of the user 10.
  • In the circulation display method, the reference board 61 may be fixedly displayed, and the matching board 62 may be circulated in the right or left direction. In addition, since the symbol row aligned on the reference board 61 is a reference for the matching, it is preferred that a display sequence is sequentially displayed so that the RRC is quickly recognized. However, there is a certain complexity so that the user can easily recognize the RRC, the aligning sequence of the reference board 61 may be randomly displayed in a non-sequence. It is preferred that the symbols aligned on the matching board 62 are randomly displayed based on a non-recovering method.
  • In another method of the circulation display, the reference board 61 and the matching board 62 may be circulated and displayed in different directions. However, in the case that there is a certain complexity so that the user can easily recognize the RRC, the aligning sequence of the reference board 61 may be randomly displayed based on the non-sequential method. It is preferred that the symbols aligned on the matching board 62 are randomly displayed.
  • In another circulation display method, the reference board 61 and the matching board 62 may be circulated and displayed in different directions. The reference board 61 may be fixedly displayed, and each cell of the matching board 62 may be circulated and displayed, being moved from its original place to the upward side or downward side. The above circulation display method may be modified and applied in various methods in addition to the above-described method. The above applications and modifications are obvious to a person skilled in the art.
  • In the display type of the cells, the reference board 61 and the matching board 62 may be displayed in a straight line shape and may be displayed in various shapes. For example, as shown in FIGS. 44A through 44D, it may have a circular shape or a matrix shape. In addition, the aligned cells may be formed in numbers, characters, graphics, pictures, and a combination of the same. In addition, the aligned cells may be displayed with a color so that a user can easily recognize. For example, the cells of the matching board 62 may have different colors in a circle having numbers. The method for selecting colors is determined so that the user can quickly recognize the symbols. There may be various applications in the display method of the cells. It is also obvious to a person skilled in the art. As it is not shown in the drawings, even when the cells are aligned randomly, when there is a certain rule in the circulation, the cells may be formed in a board.
  • In the case that either the reference board 61 or the matching board 62 is fixedly displayed for recognition, the display of the same may be omitted. For example, in the case that the numbers 1˜9 are sequentially displayed on the reference board 61, the user can easily recognize the reference board 61, so that the display of the same may be omitted as shown in FIG. 45.
  • In another embodiment of the present invention, as shown in FIG. 46, the reference board 61 and the matching board 62 may have switched display shapes. For example, the symbols aligned on the matching board 62 may be sequentially aligned, and the sequences of the symbols aligned on the reference board 61 may be aligned randomly based on the non-recovery method. In addition, the matching board 62 may be fixed, and the reference board 61 may be circulated and displayed in accordance with a control of the user. The above modification is obvious to a person skilled in the art.
  • In another embodiment of the present invention, as shown in FIG. 47, at least more than two matching boards 62 may be concurrently displayed in parallel. The user inputs the two-password by sequentially performing the symbol matching with the reference board 61 using each cell. The number of the cells displayed on the matching board 62 is determined by the number of the RMCG. It may be smaller than the number of the RMCG. The cells not displayed when the cells are circulated and moved may appear and may be displayed.
  • In the above description of the present invention, the symbol row is circulated for the symbol matching. In another embodiment of the present invention, the circulation moving distance of the symbol row may be directly inputted. As shown in FIG. 48, an additional input window 63 may be provided on the graphic user interface 60, so that the circulation moving distance of the matching board 62 may be directly inputted by the user. For example, in the case that the RPCG is 3 as one RRC, and the RMCG is 5618, the numbers 5, 6, 1 and 8 of the matching board 62 are circulated in the right direction and are matched with respect to the cell 3 of the reference board 61. At this time, the circulation moving distance is 4 times, 2 times, 1 time, and 7 times. Therefore, 4217 are inputted on the input window 63.
  • As shown in FIG. 49, a plurality of matching control buttons 64 may be provided on the graphic user interface 60 for circulating and matching the symbol row. The matching control button 64 includes a left, right circulation movement button, a start/reset button, a matching button and an input completion button.
  • In another embodiment of the present invention, the reference board 61 or the matching board 62 may be automatically circulated, and the user performs an input operation when the RRC of the reference board 61 and the RMC of the matching board 62 are matched. For example, as shown in FIG. 50, when the matching board 62 is automatically circulated, the user may input the enter button 65 displayed on the graphic user interface 60 and informs that the symbols are matched or may input the enter key of the input apparatus 54. In the drawings, the arrow indicated by the dotted line of the matching board 62 represents a rotation direction, but is not actually displayed.
  • The graphic user interface is not limited to the above descriptions. At least more than two above-described embodiments may be combined. In addition, the number of the cells aligned on the reference board 61 and the matching board 62 may be limited to a certain number in consideration with the user's state and security. For example, in the case that it is intended to increase the security, it is needed to increase the number of the cells aligned, and in the case that a fast password input and process is needed, the number of the cells aligned may be decreased.
  • The two-password system according to the present invention may be mounted on a mechanical system and a system having an electronic circuit, for example, a locking system such as an electrical door lock, and an entrance control system. The two-password system may be cooperate with the mechanical system and electronic circuit mounted on the main system. In this case, the user interface may be constituted as follows.
  • FIG. 51 is a view illustrating an example of a user interface of the two-password system cooperating with the electronic circuit. FIG. 52 is a view illustrating an example of displaying one matching board, and FIG. 53 is a view illustrating the construction of a circuit of a user interface of FIG. 51.
  • Referring to the drawings, the password input panel 70 is provided as a user interface for inputting the two-password in the main system 40 like the electronic door lock or entrance control system. The password input panel 70 includes a LCD 71 as a display unit for displaying the symbol group. In the LCD 71, the images of the reference board 72 for displaying the RRC and VRC and the matching board 73 for displaying the RMC and VMC are displayed. As shown in FIG. 52, only the matching board 73 may be displayed on the LCD 71, and the reference board display region 72 a may be provided on an upper side of the front surface of the password input panel 70 for thereby printing and displaying a corresponding cell. In addition, as a matching unit, there are provided a plurality of the matching control buttons 74 on the front surface of the password input panel 70. As the matching control button 74, there are a left and right circulation movement button, a start/reset button, a matching button, and an input completion button.
  • The password input panel 70 includes the LCD control circuit and the button input process circuit 75 and displays the reference board 72 and the matching board 73 on the LCD 71 in response to a display control signal provided from the password system 30. The user inputs the two-password using the matching control button 74. The LCD control circuit and the button input detection circuit 75 receive an input of the matching control button 74 and provides to the two-password system 30.
  • FIG. 54 is a view illustrating an example of the user interface of the password system cooperating with the mechanical system. FIG. 55 is a view illustrating an example of the circuit construction of the user interface of FIG. 54.
  • As shown in the drawings, the password input panel 80 includes a reference board display region 81 in an upper side of the front surface, and the symbols displaying the RRC and VRC are printed and displayed. The matching board for displaying the RMC and VMC includes a wheel mechanism 82 coupled with a plurality of wheels 83. A plurality of symbols are circulated and printed on each wheel 83.
  • The password input panel 80 includes a wheel driving and rotation degree detection circuit 85 for thereby driving the wheel mechanism 82 in response to a display control signal from the two-password system 30. The user inputs a two-password using the wheel control button 74. The wheel control button 74 is constituted in such a manner that a wheel adapted to rotate the wheel-mechanism 82 in upward and downward directions and a button adapted to generate a matching input signal are combined. The wheel driving and rotation degree detection circuit 85 receives an input of the wheel control button 84 and provides to the two-password system 30.
  • The user interface of the two-password system using the wheel mechanism 82 may be implemented using the above-described graphic user interface. Namely, the reference board and/or matching board may be displayed using the graphic user interface and may be implemented based on the up and down movement method. At this time, the control of the up and down circulation movement is implemented by providing an additional input apparatus or by displaying a wheel control button on the screen.
  • When circulating and moving the matching board, it is possible to perform a matching input using the left or right (up or down) direction key. For example, when a certain cell of the designated matching board is matched with a certain cell of the reference board by circulating the cells in one direction, the direction conversion is performed. When the time when the conversion of the circulation direction is judged to be a matching state, it is not needed to additionally provide a button for the matching input.
  • As described above, the user interface for the two-password input of the two-password system according to the present invention may be implemented in various manners based on the characteristics of the main system 30. In the user interface method not descried in the above embodiments of the present invention, the password input method based on the symbol matching may be adapted by a user skilled in the art.
  • 4) Authentication Process of Password System Adapting the Two-password
  • Referring to FIGS. 41 and 42, the authentication process of the two-password system will be described in detail by a step-by-step method.
  • As shown in FIGS. 421 and 42, in a step S10 of the two-password authentication process, a cell generation unit 32 generates a group of the cells displayed on the display unit 22. When the cell generation unit 32 generates the cells a ligned on the reference board and the matching board, the generation sequence of the cells is randomly performed based on the non-recovery method or the generation may be performed based on a determined sequence or may be performed in a combined method.
  • For example, the cells aligned in the matching board may be randomly generated based on the non-recovery method in a determined sequence in the case of the cells aligned in the reference board. The cells aligned in both the reference board and the matching board may be randomly generated based on the non-recovery method. The cells aligned in the matching board may be randomly generated based on the non-recovery method. The cells a ligned in the reference board may be generated by rotating the sequence of the cells aligned in the matching board.
  • As another example, the RRCG and RMCG are extracted based on the authentication reference information 36 stored in the memory 35, and the aligning sequence of the symbols is determined based on the extracted information. An aligning sequence of the symbols may be determined in a sequence that the user feels easy for inputting the two-password. For example, the aligning sequence of the symbols may be determined in such a manner that the rotation number of the matching board is within a certain range.
  • FIGS. 5 and 6 show an example that the cells are aligned in such a manner that the rotation number of the matching board is within a certain range. In the case that the matching board 62 is automatically rotated in the right direction, when the two-password is 134672, and the RRCG is 147, and the RMCG is 362, the group of the cells aligned in the matching board 62 is generated with 378612954.
  • At the initial display state, since the numbers 1 and 3, and 4 and 6 are previously matched and displayed, the numbers 1 and 3, and 4 and 6 are matched by pressing the enter button 65 by two times. When the matching board 65 is moved in the right direction by one field, the numbers 7 and 2 are matched, and then the enter button 65 is inputted. Namely, the aligning sequence of the symbols may be determined based on the user's convenience.
  • However, what there is not a circulation and movement of the cells in all cell matching should be excluded. In the case of all cell matching, only when the enter button 65 is inputted, a security may be weakened. Namely, at least more than one time cell movement should be performed for obtaining a desired security. Namely, the aligning of the cells should be performed in such a manner that over circulation and movement do not occur, and a desired security is obtained. Here, the important thing is to provide a convenience in maximum when the user inputs the two-password.
  • In addition, in the authentication process of the two-password system, there may be provided a step for inputting a two-password and inputting an inherent ID provided to the user. For example, in the case that the main system 40 is a system having a plurality of users, it is needed to separately input the user's ID. The detailed description thereon will be provided later. In the authentication process that the user inputs an additional ID, a step may be further provided for extracting authentication reference information 36 from the memory 35 using the ID inputted.
  • The process for determining the symbol aligning sequence and generating a symbol group may be performed one time during the input process of the two-password or may be repeatedly performed during every cell matching.
  • The group of the cells generated is provided to the display control unit 31. In a step S20, the display control unit 31 outputs the group of the generated cells to the display unit 22. The display unit 20 displays the group of the cells in accordance with a control of the display control unit 31. The method for displaying the group of the cells is implemented based on one among the various embodiments of the user interface for the input of the two-password.
  • In a step S30, the user 10 matches the symbols displayed on the display unit 22 using the matching unit 24. In a step S40, the matching cell process unit 33 generates the matched cell group MCG based on the input by the user through the matching means 24. The example of the generation of the MCG will be described with reference to FIGS. 24A through 24D.
  • As shown in the drawings, the symbols hatched in the reference board 90 and the matching board 91 are provided to an easier understanding. When they are shown on the user interface, they are displayed in the same manner as other symbols.
  • In the case that the RRC is 3, 7, 2, and 9, and the RMC is 5, 1, 6 and 6, the user sequentially matches 3 and 5, 7 and 1, 2 and 6, and 9 and 6 of the reference board 90 and the matching board 91 based on the step of the matching. At this time, the generated MCG is shown in FIG. 58. The MCG (MCG_1˜MCG_4) generated in every step are inputted into the authentication process means 34 in a step S50.
  • In the case that the sequences of the symbols aligned in the reference board 90 are determined, only the symbols aligned in the matching board 91 may be transferred to the authentication process unit 34 at the time of the matching. Here, all information of the symbols aligned in the matching board 91 with respect to only the first match are transferred, and the information concerning the rotation number of the matching board 91 is transferred from the time of the second matching. In addition, in the case that the sequences of the symbols are not determined in the reference board 90, all symbols in the reference board 90 and the matching board 91 may be transferred in a sequence at the time of the matching.
  • The information transferred to the authentication process unit 34 may be modified or applied in various forms based on the characteristic of the user interface. The above modification and application are obvious to a person skilled to the art. In addition, the transfer to the authentication process unit 34 may be performed one time at the time of the completion of the password input. Whenever one time patching is performed, the transfer may be implemented.
  • In a step S60, the authentication process unit 34 performs a password authentication process based on the authentication reference information 36 stored in the memory 35. The flow chart showing the detailed process of the password authentication process is shown in FIG. 59.
  • As shown in FIG. 59, the authentication process means 34 received the MCG from a step S61. The authentication reference information 36 is patched from the memory 35 in a step S62. In this embodiment of the present invention, the authentication reference information is a two-password. In a step S63, the RRCG and RMCG are induced from the two-password. In a step S64, the cells matched with the RRCG induced from the two-password are determined by the MCG. For example, as shown in FIG. 60, in the case that the RRCG is 3729, the symbols of the MCG matched are 5,1, 6, and 6.
  • In a step S65, the symbol group determined in the MCG and the RMCG induced by the two-password are compared. In a S66, it is judged whether two symbols are matched. In the case that they are matched, in a step S67, the system access is allowed, and in the case that they are not matched, the system access is denied in a step S68.
  • Here, the authentication reference information stored in the memory 35 may be a two-password or may be separated into the RRCG and MMCG and stored or one of the RRCG and MMCG may be stored. For example, as shown in FIG. 5C, when forming the RRCG and RMCG, the RRCG is stored, and the RMCG is induced and used. In the case that the user ID is inputted in the authentication process, the authentication reference information 36 may be patched from the memory 35 based on the ID inputted.
  • The authentication process of the two-password system may be adapted to a single user system. In the case of a plurality of user systems, there is further provided a step for inputting the two-password and the user ID. As shown in FIG. 61, the authentication process unit 34 patches a corresponding authentication reference information 37 stored in the memory 35 based on the user ID.
  • In the case of a plurality of user systems, the authentication process may be performed without an additional user ID input. For example, as shown in FIG. 62, the inputted MCG may be applied as an index. Here, the cell generation unit 32 patches the authentication reference information using the MCG. The method for inputting a user ID may be implemented using an input apparatus or a button in the graphic user interface. In addition, the single user system may include a process for inputting a user ID.
  • 5) Application of Password System Adapting Two-password
  • The password system according to the present invention may be adapted to any type of system requiring the password input. For example, the present invention may be well adapted to a personal computer system, a locking system, an ATM financial terminal, a PDA, a cellular phone, an internet banking system, a cyber trading system, etc.
  • The case that the password system 30 of the present invention is mounted on the standalone system 100 is shown in FIG. 63. The user interface 20 of the two-password system 30 mounted on the standalone system 100 may be installed in an internal type or an external type. For example, in the case of the personal computer system, the user interface 20 may be formed of the graphic unit interface or the input apparatus or a combination of the same.
  • FIG. 64 is a view illustrating an example that the two-password system of the present invention is mounted on the main system under the network environment, and FIG. 65 is a view illustrating an example that the password system is mounted on the communication terminal under the network environment.
  • The password system of the present invention may be used under the network environment. As shown in FIG. 64, the password system 30 may be mounted on the main system 40 connected through a communication network 120. The communication terminal 110 receives a group information of the cells from the main system 40 through the communication network 120 and displays using the user interface 20, and the user inputs a two-password using the user interface 20. The information occurring by the input of the two-password, for example, the matched cell group MCG is inputted into the two-password system 30 mounted on the main system 40 through the communication network 120 by the communication terminal 110. The information transferred from the communication terminal 110 to the main system 40 may be transferred by a certain amount as much as the circulation movement distance of the cell during the cell matching.
  • The transferring information may be encrypted or may be coupled with a security platform. Here, the information transferred may include a user ID information. In the case that the MCG has the functions of the index, for example, in the case that only the user ID is shown, only the MCG is transferred. Various other modifications are possible.
  • In the case that the user ID is stored in the communication terminal 110, the user inputs only the two-password, and an additional ID input process may be omitted. At this time, the two-password system 30 mounted on the main system 40 may perform the patching of the two-password, real reference cell group and real matched cell group in the memory using the user ID provided from the communication terminal 110.
  • In another embodiment of the present invention, as shown in FIG. 65, the two-password system 30 may be mounted on the communication terminal 110. In this case, the authentication process is performed by the communication terminal 110.
  • As described above, in the two-password system 30 according to the present invention, the user interface 20 and the other elements a s shown in FIG. 41 may be mounted on the standalone system 200 or the communication terminal 110 connected with the communication network by a wired or wireless or computer network method or may be mounted on the main system 40. A part of the elements may be separated and separately constituted. For example, the memory 35 adapted to store the authentication reference information 36 may be provided in the communication terminal 110 or the main system 40.
  • In the above embodiments of the present invention, only the matching of the symbols is adapted as examples. In the matching method of the present invention, one picture may be assembled like a picture puzzle or a special number may be assembled based on a two-password input method.
  • Industrial Applicability
  • In the password input method and system based on the matching of cells of the present invention, even when the password input procedure is directly exposed to others, the other cannot recognize the cells matched for the password input among a plurality of matched cell pairs provided in the matching board and the reference board. Therefore, in the present invention, it is possible to prevent the password from being revealed to others who watched the password input procedure. In addition, it is possible to overcome a user's uneasiness during a password input and to enhance a security of the system.
  • As the present invention may be embodied in several forms without departing from the spirit or essential characteristics thereof, it should also be understood that the above-described examples are not limited by any of the details of the foregoing description, unless otherwise specified, but rather should be construed broadly within its spirit and scope as defined in the appended claims, and therefore all changes and modifications that fall within the meets and bounds of the claims, or equivalences of such meets and bounds are therefore intended to be embraced by the appended claims.

Claims (21)

  1. 1. A password input method by the matching of cells, comprising the steps of:
    a step in which a matching board and a reference board are displayed on a user interface;
    a step in which a user selects a certain cell on the matching board; and
    a step in which a certain cell of the matching board selected by the user through a computation is matched with a cell including a password symbol of the reference board.
  2. 2. The method of claim 1, wherein a cell of the matching board selected by the user is matched with a cell including a password symbol of the reference board, the cell of the matching board that the user does not select is concurrently matched with the cell having the symbol that is not the password symbol of the reference board.
  3. 3. The method of claim 1, wherein in order to match a certain cell of the matching board with the cell including the password of the reference board, a computation is performed with respect to the matching board.
  4. 4. The method of claim 3, wherein said computation performed with respect to the matching board is a movement of the matching board.
  5. 5. The method of claim 1, wherein the symbols included in the cells of the reference board are displayed in a recovery extraction sequence or a sequence of their sizes.
  6. 6. The method of claim 1, wherein the cells of the matching board are all different from each other or are all same or a part of the same is different.
  7. 7. The method of claim 1, wherein the cell of the matching board is matched with the cell of the reference board using an input apparatus.
  8. 8. The method of claim 1, wherein when a computation is performed with respect to the matching board, a cell of the matching board being out of a range of the reference board is rotated and moved.
  9. 9. The method of claim 1, wherein a completion of the matching between a cell that a user selects from the matching board and a cell including a password symbol of the reference board is informed to a system.
  10. 10. The method of claim 1, wherein when a procedure for matching a cell that a user selects from the matching board and a password symbol of the reference board is completed, the cell that the user selects from the matching board is informed to the system.
  11. 11. The method of claim 10, wherein said step for informing the cell that the user selects from the matching board to the system includes:
    a step in which at least more than one cell including the special symbol is displayed on the reference board; and
    a step in which the cell that the user selects from the matching board is matched with the cell including the special symbol of the reference board.
  12. 12. The method of claim 11, wherein when a cell that the user selected from the matching board is matched with a cell including a special symbol of the reference board, the other cells including the special symbols of the reference board do not match with any cell of the matching board.
  13. 13. The method of claim 1, wherein a plurality of reference boards are not overlapped from each other, and at the same time, are displayed on a user interface.
  14. 14. The method of claim 1, wherein the symbols of the reference board sequentially matched with each cell of the matching board are the candidates of the password for thereby performing a user authentication process.
  15. 15. The method of claim 12, wherein the symbols of the reference board sequentially matched with the cells of the matching board matched with the cells including the special symbols are grouped and processed as the password.
  16. 16. The method of claim 1, wherein when a user selects a cell of the matching symbol, the user selects a certain cell including one password symbol being in his password.
  17. 17. A method for inputting a password by the matching of cells, comprising the steps of:
    a step in which a matching board and a reference board are displayed on a user interface;
    a step in which a computation is performed with respect to the matching board; and
    a step in which a user selects a cell of the reference board matching with a cell including a password symbol of the matching board.
  18. 18. The method of claim 17, wherein a computation performed with respect to the matching board is not shown on a user interface.
  19. 19. The method of claim 18, wherein a user transfers a certain signal so that the matching board is not shown on the user interface.
  20. 20. The method of claim 18, wherein the matching board is disappeared after a certain time is passed after the matching board is shown on the user interface.
  21. 21-64. (canceled)
US10523797 2002-08-09 2003-08-09 Method and system for procssing password inputted by the matching of cells Abandoned US20050246138A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
KR20020047012A KR20020077838A (en) 2002-08-09 2002-08-09 Password system solving the controversial point of the password-exposure by the observation of other people
KR10-2002-0047012 2002-08-09
KR10/2002-0086889 2002-12-30
KR20020086889A KR20040014129A (en) 2002-08-09 2002-12-30 User interface and method for inputting password and password system using the same
KR20030028103 2003-05-02
KR10/2003-0028103 2003-05-02
KR20030029764A KR20030064665A (en) 2002-08-09 2003-05-12 The Password System processing the Password inputted by the Matching of Cells
KR10-2003-0029764 2003-05-12
PCT/KR2003/001617 WO2004027632A1 (en) 2002-08-09 2003-08-09 Method and system for processing password inputted by the matching of cells

Publications (1)

Publication Number Publication Date
US20050246138A1 true true US20050246138A1 (en) 2005-11-03

Family

ID=32034351

Family Applications (2)

Application Number Title Priority Date Filing Date
US10389924 Expired - Fee Related US7240367B2 (en) 2002-08-09 2003-03-18 User interface and method for inputting password and password system using the same
US10523797 Abandoned US20050246138A1 (en) 2002-08-09 2003-08-09 Method and system for procssing password inputted by the matching of cells

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10389924 Expired - Fee Related US7240367B2 (en) 2002-08-09 2003-03-18 User interface and method for inputting password and password system using the same

Country Status (6)

Country Link
US (2) US7240367B2 (en)
EP (1) EP1540489A4 (en)
JP (1) JP2005535990A (en)
KR (4) KR20020077838A (en)
CN (1) CN100361115C (en)
WO (1) WO2004027632A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070124598A1 (en) * 2005-11-08 2007-05-31 Schneider John K System And Method For Providing Security
US20080098222A1 (en) * 2004-09-22 2008-04-24 Zilberman Arkady G Device with built-in user authentication and method for user authentication and identity theft protection
WO2008051905A3 (en) * 2006-10-25 2008-08-21 George Kelly Flanagin User authentication system and method
US8607331B2 (en) * 2011-07-15 2013-12-10 Industrial Technology Research Institute Captcha image authentication method and system
US20140359726A1 (en) * 2013-06-04 2014-12-04 Mark Rodney Anson Login Process for Mobile Phones, Tablets and Other Types of Touch Screen Devices or Computers
US20150033329A1 (en) * 2010-12-16 2015-01-29 Blackberry Limited Password entry using 3d image with spatial alignment
US9111073B1 (en) 2012-11-19 2015-08-18 Trend Micro Inc. Password protection using pattern
US9117068B1 (en) * 2013-09-25 2015-08-25 Trend Micro Inc. Password protection using pattern
US20150248547A1 (en) * 2009-06-18 2015-09-03 Blackberry Limited Graphical authentication
US20160241556A1 (en) * 2015-02-17 2016-08-18 Qualcomm Incorporated Mutual authentication with integrated user muscle memory

Families Citing this family (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040034801A1 (en) * 2001-02-15 2004-02-19 Denny Jaeger Method for creating and using computer passwords
CA2540193A1 (en) * 2003-09-25 2005-03-31 Solmaze Co., Ltd. The method of safe certification service
US9191215B2 (en) * 2003-12-30 2015-11-17 Entrust, Inc. Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US20080295165A1 (en) * 2004-03-31 2008-11-27 Merlinnovations & Consulting Gmbh Method for Safely Logging Onto a Technical System
WO2005101159A1 (en) * 2004-04-15 2005-10-27 Helmut Schluderbacher Safe log-on process in a technical system
KR100743854B1 (en) * 2004-05-31 2007-08-03 박승배 A method for preventing input information from exposing to observers
US7616764B2 (en) * 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7596701B2 (en) * 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US8239937B2 (en) * 2004-12-16 2012-08-07 Pinoptic Limited User validation using images
US8145912B2 (en) 2005-03-01 2012-03-27 Qualcomm Incorporated System and method for using a visual password scheme
JP4954979B2 (en) * 2005-04-29 2012-06-20 オラクル・インターナショナル・コーポレイション Fraud monitoring, detection, and system and method for hierarchical user authentication
US8739278B2 (en) * 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
KR100718984B1 (en) * 2005-09-09 2007-05-16 주식회사 비티웍스 Virtual Keyboard Displaying Apparatus and Method for Preventing Exposure of Input Contents
KR100877593B1 (en) * 2006-05-09 2009-01-07 (주)씽크에이티 The Security Method for Authentication which using of Random Password
US9189603B2 (en) 2006-05-24 2015-11-17 Confident Technologies, Inc. Kill switch security method and system
US20070277224A1 (en) 2006-05-24 2007-11-29 Osborn Steven L Methods and Systems for Graphical Image Authentication
CN101455026A (en) 2006-05-24 2009-06-10 维杜普有限责任公司 Graphical image authentication and security system
US8117458B2 (en) * 2006-05-24 2012-02-14 Vidoop Llc Methods and systems for graphical image authentication
US9106422B2 (en) * 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US20110029436A1 (en) * 2007-02-05 2011-02-03 Vidoop, Llc Methods And Systems For Delivering Sponsored Out-Of-Band Passwords
WO2008098029A1 (en) * 2007-02-06 2008-08-14 Vidoop, Llc. System and method for authenticating a user to a computer system
US20100250937A1 (en) * 2007-03-05 2010-09-30 Vidoop, Llc Method And System For Securely Caching Authentication Elements
US7941834B2 (en) * 2007-04-05 2011-05-10 Microsoft Corporation Secure web-based user authentication
JP5056212B2 (en) * 2007-06-29 2012-10-24 船井電機株式会社 Password input device
US20090038006A1 (en) * 2007-08-02 2009-02-05 Traenkenschuh John L User authentication with image password
US20100043062A1 (en) * 2007-09-17 2010-02-18 Samuel Wayne Alexander Methods and Systems for Management of Image-Based Password Accounts
US8024775B2 (en) * 2008-02-20 2011-09-20 Microsoft Corporation Sketch-based password authentication
US20090240578A1 (en) * 2008-03-18 2009-09-24 Christopher James Lee Methods and systems for graphical security authentication and advertising
US8117652B1 (en) * 2008-04-30 2012-02-14 Trend Micro, Inc. Password input using mouse clicking
US20100037319A1 (en) * 2008-08-08 2010-02-11 Microsoft Corporation Two stage access control for intelligent storage device
US8516561B2 (en) * 2008-09-29 2013-08-20 At&T Intellectual Property I, L.P. Methods and apparatus for determining user authorization from motion of a gesture-based control unit
US8621578B1 (en) 2008-12-10 2013-12-31 Confident Technologies, Inc. Methods and systems for protecting website forms from automated access
WO2010085020A1 (en) * 2009-01-23 2010-07-29 인하대학교 산학협력단 Method and apparatus for secure personal identification
WO2010085021A1 (en) * 2009-01-23 2010-07-29 인하대학교 산학협력단 Method and apparatus for personal identification using a symbol array
US8458485B2 (en) 2009-06-17 2013-06-04 Microsoft Corporation Image-based unlock functionality on a computing device
KR101059798B1 (en) 2009-07-03 2011-08-26 한국인터넷진흥원 Password input system and method using a new chimeric matrix-two alpha
KR101155532B1 (en) * 2009-07-30 2012-06-19 신화식 Method for processing security number and system using the same
KR101644164B1 (en) 2009-09-15 2016-07-29 삼성전자 주식회사 Image processing apparatus and method of peocessing image
KR101051037B1 (en) * 2009-10-13 2011-07-21 인하대학교 산학협력단 User Authentication Method
CN102207809A (en) * 2010-03-30 2011-10-05 国基电子(上海)有限公司 Handheld device and unlocking method thereof
KR101039909B1 (en) * 2010-04-19 2011-06-09 인하대학교 산학협력단 User authentication system and method for immunizing from hacking
US20120082306A1 (en) * 2010-10-05 2012-04-05 Andrew William Hulse Data Encryption and Input System
US20140304834A1 (en) * 2011-10-04 2014-10-09 Andrew Hulse Personalized Secure Data Access Techniques
US8661530B2 (en) 2010-12-16 2014-02-25 Blackberry Limited Multi-layer orientation-changing password
US8635676B2 (en) 2010-12-16 2014-01-21 Blackberry Limited Visual or touchscreen password entry
US9258123B2 (en) 2010-12-16 2016-02-09 Blackberry Limited Multi-layered color-sensitive passwords
US8769641B2 (en) 2010-12-16 2014-07-01 Blackberry Limited Multi-layer multi-point or pathway-based passwords
US9135426B2 (en) 2010-12-16 2015-09-15 Blackberry Limited Password entry using moving images
US8631487B2 (en) 2010-12-16 2014-01-14 Research In Motion Limited Simple algebraic and multi-layer passwords
US8745694B2 (en) 2010-12-16 2014-06-03 Research In Motion Limited Adjusting the position of an endpoint reference for increasing security during device log-on
US8650624B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Obscuring visual login
US8650635B2 (en) 2010-12-16 2014-02-11 Blackberry Limited Pressure sensitive multi-layer passwords
US8931083B2 (en) 2010-12-16 2015-01-06 Blackberry Limited Multi-layer multi-point or randomized passwords
US9576122B2 (en) * 2011-04-25 2017-02-21 Softlayer Technologies, Inc. System and method for secure data entry
US8769668B2 (en) 2011-05-09 2014-07-01 Blackberry Limited Touchscreen password entry
US8650636B2 (en) 2011-05-24 2014-02-11 Microsoft Corporation Picture gesture authentication
US8990726B2 (en) 2011-09-12 2015-03-24 Microsoft Technology Licensing, Llc Text box clearing selector
US9588595B2 (en) 2011-09-12 2017-03-07 Microsoft Technology Licensing, Llc Password reveal selector
US9223948B2 (en) 2011-11-01 2015-12-29 Blackberry Limited Combined passcode and activity launch modifier
KR101841039B1 (en) * 2011-11-28 2018-03-28 삼성전자주식회사 Method for authenticating password and Portable Device thereof
KR101290850B1 (en) * 2011-12-02 2013-07-30 비씨카드(주) Method and apparatus for authenticating password using scroll wheel of user device
KR101269419B1 (en) 2011-12-05 2013-06-04 (주)네오위즈게임즈 Method, server, terminal and recording medium for serving authentication process
EP2605166A1 (en) * 2011-12-16 2013-06-19 Gemalto SA Method for entering a personal identification code in a device
KR101416537B1 (en) * 2012-04-18 2014-07-09 주식회사 로웸 User authentication method using icon combined with input pattern password input apparatus
US8881251B1 (en) * 2012-05-30 2014-11-04 RememberIN, Inc. Electronic authentication using pictures and images
CN103853992B (en) * 2012-11-30 2017-06-16 国际商业机器公司 The method of receiving secret information input means and
US20140157382A1 (en) * 2012-11-30 2014-06-05 SunStone Information Defense, Inc. Observable authentication methods and apparatus
KR101425005B1 (en) * 2012-12-31 2014-08-01 세종대학교산학협력단 Device and method for inputting secure pin
GB201300923D0 (en) * 2013-01-18 2013-03-06 Licentia Group Ltd Verification method and system
US9135427B2 (en) 2013-01-30 2015-09-15 Arris Technology, Inc. Authentication using a subset of a user-known code sequence
JP5796725B2 (en) * 2013-03-22 2015-10-21 カシオ計算機株式会社 Authentication processing apparatus, authentication method and program
CN103324303A (en) * 2013-07-16 2013-09-25 褚万青 Random code input method and random code unlocking method
US9596231B1 (en) * 2015-08-21 2017-03-14 Ca, Inc. Grid-based authentication on touch-aware devices
US20170154173A1 (en) * 2015-11-27 2017-06-01 Chao-Hung Wang Array password authentication system and method thereof

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276314A (en) * 1992-04-03 1994-01-04 International Business Machines Corporation Identity verification system resistant to compromise by observation of its use
US5428349A (en) * 1992-10-01 1995-06-27 Baker; Daniel G. Nondisclosing password entry system
US5623546A (en) * 1995-06-23 1997-04-22 Motorola, Inc. Encryption method and system for portable data
US5815083A (en) * 1993-07-01 1998-09-29 Bull Cp8 Process for entry of a confidential piece of information and associated terminal
US6021653A (en) * 1999-02-12 2000-02-08 Pimpo; William Variable combination alphabetic indicia padlock
US6209102B1 (en) * 1999-02-12 2001-03-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
US6332192B1 (en) * 1997-05-13 2001-12-18 Passlogix, Inc. Generalized user identification and authentication system
US6367015B1 (en) * 1997-09-10 2002-04-02 Fujitsu Limited User authentication using member with either holes or projections
US20020129269A1 (en) * 2000-06-03 2002-09-12 Eon Cheol-Shin Method and apparatus for inputting secret information
US20030005329A1 (en) * 2001-06-29 2003-01-02 Ari Ikonen System and method for transmitting data via wireless connection in a secure manner
US6571336B1 (en) * 1998-02-12 2003-05-27 A. James Smith, Jr. Method and apparatus for securing a list of passwords and personal identification numbers
US7036091B1 (en) * 2001-09-24 2006-04-25 Digeo, Inc. Concentric curvilinear menus for a graphical user interface

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2654238B1 (en) * 1989-11-07 1992-01-17 Lefevre Jean Pierre Method for authenticating the identity of an individual and process óoeuvre layout authenticator device.
US5465084A (en) * 1990-03-27 1995-11-07 Cottrell; Stephen R. Method to provide security for a computer and a device therefor
GB9125540D0 (en) * 1991-11-30 1992-01-29 Davies John H E Access control systems
EP0677801A1 (en) * 1994-04-04 1995-10-18 AT&amp;T Corp. Graphical password
JPH08249284A (en) * 1995-03-10 1996-09-27 Toshiba Corp System and method for processing password
US5821933A (en) * 1995-09-14 1998-10-13 International Business Machines Corporation Visual access to restricted functions represented on a graphical user interface
JPH09190237A (en) * 1996-01-10 1997-07-22 Sharp Corp Password input device
JP3601013B2 (en) * 1996-09-10 2004-12-15 達司 溝部 How to set the access code or security code
US6192478B1 (en) * 1998-03-02 2001-02-20 Micron Electronics, Inc. Securing restricted operations of a computer program using a visual key feature
JP2000066791A (en) * 1998-08-20 2000-03-03 Toshiba Corp Information processor and password input method applied to the same
JP2000172644A (en) * 1998-12-03 2000-06-23 Fujitsu Ltd Method and device for identification
US7363503B2 (en) * 2000-01-17 2008-04-22 Savernova A.G. Method for producing a data structure for use in password identification
JP2001306174A (en) * 2000-04-25 2001-11-02 Sony Corp Password input method and device
US6720860B1 (en) * 2000-06-30 2004-04-13 International Business Machines Corporation Password protection using spatial and temporal variation in a high-resolution touch sensitive display
US20040030934A1 (en) * 2001-10-19 2004-02-12 Fumio Mizoguchi User selectable authentication interface and universal password oracle
WO2003079204A1 (en) * 2002-03-19 2003-09-25 Fujitsu Limited Password input unit, password inputting method and program for executing that method on computer
FI20030920A0 (en) * 2003-06-19 2003-06-19 Nokia Corp A method and system for generating graphic password, and the terminal
CA2495445A1 (en) * 2005-01-29 2005-07-13 Hai Tao An arrangement and method of graphical password authentication

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276314A (en) * 1992-04-03 1994-01-04 International Business Machines Corporation Identity verification system resistant to compromise by observation of its use
US5428349A (en) * 1992-10-01 1995-06-27 Baker; Daniel G. Nondisclosing password entry system
US5815083A (en) * 1993-07-01 1998-09-29 Bull Cp8 Process for entry of a confidential piece of information and associated terminal
US5623546A (en) * 1995-06-23 1997-04-22 Motorola, Inc. Encryption method and system for portable data
US6209104B1 (en) * 1996-12-10 2001-03-27 Reza Jalili Secure data entry and visual authentication system and method
US6332192B1 (en) * 1997-05-13 2001-12-18 Passlogix, Inc. Generalized user identification and authentication system
US6367015B1 (en) * 1997-09-10 2002-04-02 Fujitsu Limited User authentication using member with either holes or projections
US6571336B1 (en) * 1998-02-12 2003-05-27 A. James Smith, Jr. Method and apparatus for securing a list of passwords and personal identification numbers
US6021653A (en) * 1999-02-12 2000-02-08 Pimpo; William Variable combination alphabetic indicia padlock
US6209102B1 (en) * 1999-02-12 2001-03-27 Arcot Systems, Inc. Method and apparatus for secure entry of access codes in a computer environment
US20020129269A1 (en) * 2000-06-03 2002-09-12 Eon Cheol-Shin Method and apparatus for inputting secret information
US20030005329A1 (en) * 2001-06-29 2003-01-02 Ari Ikonen System and method for transmitting data via wireless connection in a secure manner
US7036091B1 (en) * 2001-09-24 2006-04-25 Digeo, Inc. Concentric curvilinear menus for a graphical user interface

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8065525B2 (en) * 2004-09-22 2011-11-22 Bekad Mgmt. Ii, Llc Device with built-in user authentication and method for user authentication and identity theft protection
US20080098222A1 (en) * 2004-09-22 2008-04-24 Zilberman Arkady G Device with built-in user authentication and method for user authentication and identity theft protection
US8766823B2 (en) 2004-09-22 2014-07-01 Bekad Mgmt. Ii, Llc. Keyboard configurations
US7701364B1 (en) 2004-09-22 2010-04-20 Zilberman Arkady G User input authentication and identity protection
US20100302157A1 (en) * 2004-09-22 2010-12-02 Zilberman Arkady G Keyboard Configurations
US20070124598A1 (en) * 2005-11-08 2007-05-31 Schneider John K System And Method For Providing Security
WO2008051905A3 (en) * 2006-10-25 2008-08-21 George Kelly Flanagin User authentication system and method
US20150248547A1 (en) * 2009-06-18 2015-09-03 Blackberry Limited Graphical authentication
US20150033329A1 (en) * 2010-12-16 2015-01-29 Blackberry Limited Password entry using 3d image with spatial alignment
US8607331B2 (en) * 2011-07-15 2013-12-10 Industrial Technology Research Institute Captcha image authentication method and system
US9111073B1 (en) 2012-11-19 2015-08-18 Trend Micro Inc. Password protection using pattern
US20140359726A1 (en) * 2013-06-04 2014-12-04 Mark Rodney Anson Login Process for Mobile Phones, Tablets and Other Types of Touch Screen Devices or Computers
US9117068B1 (en) * 2013-09-25 2015-08-25 Trend Micro Inc. Password protection using pattern
US20160241556A1 (en) * 2015-02-17 2016-08-18 Qualcomm Incorporated Mutual authentication with integrated user muscle memory

Also Published As

Publication number Publication date Type
KR20030064665A (en) 2003-08-02 application
EP1540489A1 (en) 2005-06-15 application
KR20040014129A (en) 2004-02-14 application
KR100806521B1 (en) 2008-02-21 grant
US7240367B2 (en) 2007-07-03 grant
CN100361115C (en) 2008-01-09 grant
CN1675629A (en) 2005-09-28 application
JP2005535990A (en) 2005-11-24 application
KR20020077838A (en) 2002-10-14 application
WO2004027632A1 (en) 2004-04-01 application
EP1540489A4 (en) 2008-02-27 application
US20040030933A1 (en) 2004-02-12 application
KR20050074434A (en) 2005-07-18 application

Similar Documents

Publication Publication Date Title
Suo et al. Graphical passwords: A survey
Kim et al. Multi-touch authentication on tabletops
Chiasson et al. Influencing users towards better passwords: persuasive cued click-points
Chiasson et al. Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
US20100180336A1 (en) System and Method for Authenticating a User Using a Graphical Password
US20050144484A1 (en) Authenticating method
US20060156385A1 (en) Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US20090113294A1 (en) Progressive captcha
US7188314B2 (en) System and method for user authentication interface
US7756292B2 (en) System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
US5815083A (en) Process for entry of a confidential piece of information and associated terminal
EP1004980A2 (en) Smart card PIN system, card, and reader
US8117458B2 (en) Methods and systems for graphical image authentication
US20080141362A1 (en) Method and apparatus of providing pattern based user password access
US20080201578A1 (en) Computer security using visual authentication
US20070277224A1 (en) Methods and Systems for Graphical Image Authentication
US20040257238A1 (en) Virtual keyboard
US20040225880A1 (en) Strong authentication systems built on combinations of &#34;what user knows&#34; authentication factors
US20050193208A1 (en) User authentication
US20020124180A1 (en) Security animation for display on portable electronic device
US20060031174A1 (en) Method of authentication and indentification for computerized and networked systems
WO2002017556A1 (en) Validation of transactions
US20090037986A1 (en) Non-disclosing password entry method
US20080229397A1 (en) Website log in system with user friendly combination lock
WO2006064241A2 (en) User validation using images