[go: up one dir, main page]

WO1996018139A1 - Entree de code de securite - Google Patents

Entree de code de securite Download PDF

Info

Publication number
WO1996018139A1
WO1996018139A1 PCT/IB1995/001035 IB9501035W WO9618139A1 WO 1996018139 A1 WO1996018139 A1 WO 1996018139A1 IB 9501035 W IB9501035 W IB 9501035W WO 9618139 A1 WO9618139 A1 WO 9618139A1
Authority
WO
WIPO (PCT)
Prior art keywords
pattern
target
target points
indicator
sequence
Prior art date
Application number
PCT/IB1995/001035
Other languages
English (en)
Inventor
Philip Raymond Lloyd
David Paul Walker
Original Assignee
Philips Electronics N.V.
Philips Norden Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Electronics N.V., Philips Norden Ab filed Critical Philips Electronics N.V.
Publication of WO1996018139A1 publication Critical patent/WO1996018139A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Definitions

  • the present invention relates to methods for security coding and in particular to a method for restricting access to a computer-based system having a processor, a display, and user input means arranged to move an indicator about the display under user control, the method requiring correct entry by the user of a predetermined security code as a prerequisite to access.
  • the invention also relates to an apparatus having such restricted access.
  • PIN personal identification number
  • account code or a credit card number for a home shopping service
  • password or other conditional access code for on-line information.
  • PINs keyed into cash machines via keypads
  • user passwords typed into computer systems via keyboards. These methods require a set of physical numeric or alphanumeric keys which can be operated in a secure manner, without revealing the PIN or password to other people in the vicinity.
  • the user input may comprise a simple XY pointing device with a small number of buttons (maybe only two) .
  • An example of this would be a CD-i (Compact Disc - Interactive) player connected to a public data network with a remote control being used to purchase films offered by a Video on Demand service through the network.
  • a method for restricting access as set forth in the opening paragraph, characterised in that; - the user is presented, via the display, with a first pattern comprising a start point and a plurality of target points arranged related thereto, and the security code comprises a predetermined sequence of the target points; the user is required to move the indicator through the predetermined sequence of target points whilst display of the indicator is inhibited; and on determining that the indicator has been moved through a sequence of target points, an indication is provided to the user if that sequence does not correspond to the predetermined sequence.
  • the first pattern (which may simply comprise a grid arrangement of alphanumeric and/or graphical symbols arranged around the start point) further comprises an end point, with the determination that the indicator has been moved through a sequence of target points occurring when the indicator is moved by the user to the end point.
  • correct entry of the security code may further require selection of a predetermined one or ones of the target points in the predetermined sequence.
  • selection of (or placing the indicator on) that target point may be specified to cause the first pattern to be changed to a second pattern of target points: this may be extended to bring a change to a third pattern from the second, a fourth from the third and so on with, in the extreme, the pattern being changed for each indicated or selected target point of the sequence, and with only one correct target point in each pattern.
  • the changed pattern may comprise the respective target points of the preceding pattern rearranged on the display, or it may include one or more target points not included in the preceding pattern.
  • each pattern preferably includes a start point and, on changing from the preceding pattern, the indicator is preferably positioned at the start point of the new pattern.
  • the target points of the first pattern may be repositioned for each successive attempt to enter the correct sequence.
  • an escape point is preferably provided, the selection (or indication) of which restarts the users sequence input.
  • the selection (or indication) of which restarts the users sequence input may be provided by returning the indicator to the start point after commencing the sequence.
  • a computer-based apparatus having access restricted by the method of the present invention, the apparatus including a target point store holding data specifying the respective locations of the target points on the display; a security code store holding at least one security code; first comparator means arranged to receive an identification of current indicator position, compare this with the target point location data from the target store, and output an identification of a currently indicated target point; and second comparator means arranged to receive a sequence of the identifications from the first comparator means, compare that sequence with the code in the security code store, and output one or more signals indicating whether or not there is a match.
  • the target point store holds a plurality of target point arrangements and the apparatus may further include a pseudo-random selector arranged to select which target point arrangement is displayed.
  • FIG. 1 is a block schematic diagram of a networked CD-i system embodying the invention
  • FIG. 2 is a block schematic diagram of a games system console embodying the invention
  • Figure 3 schematically represents a code storage and comparison stage embodying the invention
  • Figure 4 shows a first arrangement of screen targets
  • Figure 5 shows a modified version of the arrangement of Figure 4.
  • Figure 6 shows a sequence of target arrangements according to an alternative embodiment of the present invention.
  • a first arrangement of apparatus in which the security scheme of the invention may be employed is shown in Figure 1 .
  • a CD-i player 10 connected to display on a television screen 12, is coupled (via link 14) to a consumer data network under control of network server 1 6.
  • the network server 1 6 is configured to provide services to users such as Video on Demand, in which the user may select from a menu of available feature films which are then downloaded to the CD-i 1 0 over the data link 14. Selection from an on-screen menu of available films is made using a remote controller 1 8 of the CD-i which enables the user to control the movement (by up/down/left/right controls 20) of a cursor or select bar 22.
  • a select button 24 is used to indicate that the choice currently marked by the cursor is the desired option.
  • the network server 1 6 requests the user to enter a security code via a displayed grid of targets 26 to confirm that the user is a registered subscriber to the service.
  • FIG. 2 An alternative system employing the target-based security code scheme is shown in Figure 2 comprising a computer games console 30 with a display screen 32.
  • the games console may suitably be of the type which accepts different games loaded as cartridges 34. Movement of a cursor 38 may be achieved by use of a joystick 36 or trackerball (not shown) and selection of a target from the displayed grid 26A is achieved by pressing the joystick "fire" button 40.
  • the coding scheme may be used to restrict access by minors to certain games, such as games having a highly violent content.
  • the XY pointing device will be used to move around a sequence of these targets already known to the user and corresponding to the access code. While this is happening, there is no visible counterpart (such as the cursor) on the display - the display is simply an aide-memoire for the user.
  • the cursor may remain visible until such time as the user has moved it from outside the pattern of targets to the start point but preferably the cursor would be automatically relocated to the start point and blanked simultaneously with the appearance of the target pattern.
  • the user may need to press a button on the controller (for example the "fire” button 40, Fig.2), or the display may change spontaneously as the XY control is moved, as will be described below.
  • a button on the controller for example the "fire” button 40, Fig.2
  • the display may change spontaneously as the XY control is moved, as will be described below.
  • an accept or reject response will be generated by the service. This may comprise a visual or audio indication or (for successful entry) this may simply be indicated by the granting of access.
  • a storage and comparison stage for the code input technique is shown in Figure 3. This may comprise a dedicated hardware arrangement or the respective functions may be assigned to existing storage and processor devices of, for example, the CD-i player 10 or games console 30 of Figures 1 and 2 respectively.
  • a target point store 42 holds display data and screen positions for a number of target point arrangements, with the particular arrangement displayed being selected by a pseudo-random selector 44.
  • a first comparator 46 receives the x,y screen position of the cursor and compares this with the target point positioning data for the selected arrangement from the store 42 to determine which target point is current being indicated (which target the non-displayed cursor currently lies on) . Where the operation requires selection (as in 3. above) the comparator may only carry out the current target point determination on receiving a "select" command from the user input device.
  • the sequence of target points identified by the first comparator 46 is passed to a second comparator 48 which compares the sequence with a security code or one of a number of security codes in the form of target point sequences and held in a further store 50. When compared, the comparator outputs a match/no-match signal to indicate whether the user-entered code is accepted or rejected.
  • a helpful technique for the user is to provide pictorial symbols which the user could relate to a remembered - and fictitious - story. This could improve the probability of accurate recall by exploiting the power of visual memory, a technique used by memory "experts" is to convert names, numbers etc into pictures and sequences of pictures forming a storyline.
  • the display consists of a 2-dimensional array of numeric keys, with a "START” key and “END” key, as shown in Figure 4.
  • the user "jogs” the XY control to move off the "START” key onto the first number of the code; this could take several movements, for example getting to the "9" target from the "START” .
  • the design would allow movement in the four main directions UP, RIGHT, DOWN and LEFT, or might also allow diagonal movements as well to give eight in all.
  • the grid size and spacing is determined as integer numbers of "clicks" (depressions of the movement control) to give the user an accurate idea of where the cursor lies: where movement control is by continuous movement means such as a mouse, the size of the targets should be greater to give a greater probability of the cursor being in the space where the user intends it to be.
  • a button on the controller is pressed to select that digit as a part of the code. Completion is indicated by clicking on the "END” key or, if no specific "END” key is provided, on the last target of the sequence. If the user was conscious of making an error, clicking on the "START" key could clear the code and re-start.
  • the system may be set up to rearrange some or all of the targets for each attempt to enter the code, as shown by Figure 5.
  • a third party would then only be able to learn a users security code by observing both the movement instructions input by the user and the arrangement and identity of targets at that time.
  • the idea of changing target arrangements is extended to an interaction using a sequence of choice patterns A, B and C, one for each symbol in the code as shown in Figure 6 for a three-target code.
  • the user moves from the origin (start point) of the first arrangement A presented, to one of the eight surrounding pictures (targets).
  • the choice pattern is replaced by another B, and the user is re-positioned at the origin.
  • the existing targets may simply be rearranged (as with Figures 4 and 5), they may be partially replaced (transition from A to B), or they may be completely replaced (transition from B to C).
  • PCMB95/01035 PCMB95/01035
  • any suitable layout of targets could be used, and the number of targets could be varied, as shown in Figures 1 and 2. It may even be desirable to repeat some of the targets within the layout, but if the selection of a particular one from a number of repeated targets is important, care must be taken when specifying rearrangement of the pattern (for example with two targets the same, it might be specified that the required one will always appear somewhere in the top row of a grid and the other somewhere in the bottom row). If the controller has two or more buttons which may be used to select, then the use of one or another button may be specified as a conditional feature when entering the code. Audio feedback could be provided so that the user knows they have made a valid movement; the important thing is that no visual effect should occur which could reveal the code the user is entering.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un procédé d'entrée de code de sécurité destiné à limiter l'accès à un système informatique doté d'un processeur (30), d'une unité d'affichage (32) et d'un moyen d'entrée utilisateur (34, 36) conçu pour déplacer un curseur (38) sur l'unité d'affichage, sous le contrôle de l'utilisateur. Lorsque l'accès est demandé, l'utilisateur voit apparaître, par l'intermédiaire de l'unité d'affichage, un motif d'affichage (26A) comprenant un point de départ (S) et un certain nombre de points cibles, le code de sécurité comprenant une séquence prédéterminée de point cibles. Pour entrer le code, l'utilisateur doit modifier la position apparente du curseur (dont l'affichage est inhibé) dans la séquence prédéterminée de points cibles. La disposition des points cibles (26A) peut être modifiée après chaque tentative d'entrée du code, le code pouvant être acheminé dans une séquence de dispositions des points cibles.
PCT/IB1995/001035 1994-12-08 1995-11-21 Entree de code de securite WO1996018139A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB9424791.3 1994-12-08
GBGB9424791.3A GB9424791D0 (en) 1994-12-08 1994-12-08 Security code input

Publications (1)

Publication Number Publication Date
WO1996018139A1 true WO1996018139A1 (fr) 1996-06-13

Family

ID=10765618

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB1995/001035 WO1996018139A1 (fr) 1994-12-08 1995-11-21 Entree de code de securite

Country Status (2)

Country Link
GB (1) GB9424791D0 (fr)
WO (1) WO1996018139A1 (fr)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2313460A (en) * 1996-05-21 1997-11-26 Bosch Gmbh Robert Graphical password entry
FR2808340A1 (fr) * 2000-04-26 2001-11-02 Scm Schneider Microsysteme Procede et dispositif de saisie securisee de donnees exploitables par un peripherique
WO2002054199A1 (fr) * 2001-01-05 2002-07-11 Schlumberger Systemes Procede d'acces a un systeme securise
EP0901060A3 (fr) * 1997-09-05 2002-08-21 Fujitsu Limited Dispositif et procédé de commande de données sécurisée
WO2002027442A3 (fr) * 2000-09-29 2002-09-19 Reinhold Rohrbach Procede et dispositif de determination d'un code d'acces
WO2001077792A3 (fr) * 2000-04-07 2003-01-30 Rsa Security Inc Systeme et procede d'authentification d'un utilisateur
WO2002071177A3 (fr) * 2001-03-03 2005-03-10 Moneyhive Com Pte Ltd Procede et systeme de transactions electroniques sensiblement securisees
AT413775B (de) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher Verfahren zur sicheren anmeldung an ein technisches system
WO2006010058A3 (fr) * 2004-07-07 2006-07-13 Bharosa Inc Cryptage et decryptage de donnees en ligne
AT413894B (de) * 2004-04-15 2006-07-15 Helmut Dipl Ing Schluderbacher Nicht personenabhängiger zugangscode
WO2007000845A1 (fr) * 2005-06-27 2007-01-04 Kabushiki Kaisha Toshiba Dispositif serveur, procede et programme
US7219368B2 (en) 1999-02-11 2007-05-15 Rsa Security Inc. Robust visual passwords
WO2007098569A1 (fr) * 2006-03-01 2007-09-07 Norman Frank Goertzen Procédé et système de sécurisation d'accès interface via des chemins d'ensembles visuels associés à des opérateurs cachés
WO2008105602A1 (fr) * 2007-02-28 2008-09-04 Mininfo Co., Ltd. Procédé et système d'authentification d'utilisateur mettant en œuvre un mot de passe graphique à usage unique
EP1574931A3 (fr) * 2004-03-11 2008-09-24 Wincor Nixdorf International GmbH Dispositif self-service ayant un dispositif de saisie de données et méthode pour interroger le PIN
US7543154B2 (en) 2000-09-29 2009-06-02 Patev Gmbh & Co., Kg Method and device for determining an access code
US7596701B2 (en) 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US7689831B2 (en) 2004-08-30 2010-03-30 Passrules Canadian Security Inc. Method and system for securing interface access via visual array paths in combination with hidden operators
US7908645B2 (en) 2005-04-29 2011-03-15 Oracle International Corporation System and method for fraud monitoring, detection, and tiered user authentication
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
WO2015003672A1 (fr) * 2013-07-12 2015-01-15 Anect A.S. Procédé de saisie d'informations secrètes dans des dispositifs électroniques numériques
US9106422B2 (en) 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
EP1956813B1 (fr) 2000-06-30 2016-04-13 III Holdings 3, LLC Verrouillage de clavier avec une manette

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993011511A2 (fr) * 1991-11-30 1993-06-10 John Hugh Evans Davies Dispositifs d'identification de personnes et systemes de commande d'acces
EP0677801A1 (fr) * 1994-04-04 1995-10-18 AT&T Corp. Mot de passe graphique

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993011511A2 (fr) * 1991-11-30 1993-06-10 John Hugh Evans Davies Dispositifs d'identification de personnes et systemes de commande d'acces
EP0677801A1 (fr) * 1994-04-04 1995-10-18 AT&T Corp. Mot de passe graphique

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
IBM TECHNICAL DISCLOSURE BULLETIN, Volume 32, No. 10B, March 1990, "Menu Icon With Hidden Geometrical Password", pages 463-464. *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2313460B (en) * 1996-05-21 1998-07-08 Bosch Gmbh Robert Graphical password entry
GB2313460A (en) * 1996-05-21 1997-11-26 Bosch Gmbh Robert Graphical password entry
EP0901060A3 (fr) * 1997-09-05 2002-08-21 Fujitsu Limited Dispositif et procédé de commande de données sécurisée
US7219368B2 (en) 1999-02-11 2007-05-15 Rsa Security Inc. Robust visual passwords
WO2001077792A3 (fr) * 2000-04-07 2003-01-30 Rsa Security Inc Systeme et procede d'authentification d'un utilisateur
FR2808340A1 (fr) * 2000-04-26 2001-11-02 Scm Schneider Microsysteme Procede et dispositif de saisie securisee de donnees exploitables par un peripherique
EP1956813B1 (fr) 2000-06-30 2016-04-13 III Holdings 3, LLC Verrouillage de clavier avec une manette
US7543154B2 (en) 2000-09-29 2009-06-02 Patev Gmbh & Co., Kg Method and device for determining an access code
WO2002027442A3 (fr) * 2000-09-29 2002-09-19 Reinhold Rohrbach Procede et dispositif de determination d'un code d'acces
WO2002054199A1 (fr) * 2001-01-05 2002-07-11 Schlumberger Systemes Procede d'acces a un systeme securise
FR2819323A1 (fr) * 2001-01-05 2002-07-12 Schlumberger Systems & Service Procede d'acces a un systeme securise
WO2002071177A3 (fr) * 2001-03-03 2005-03-10 Moneyhive Com Pte Ltd Procede et systeme de transactions electroniques sensiblement securisees
EP1574931A3 (fr) * 2004-03-11 2008-09-24 Wincor Nixdorf International GmbH Dispositif self-service ayant un dispositif de saisie de données et méthode pour interroger le PIN
AT413775B (de) * 2004-03-31 2006-05-15 Helmut Dipl Ing Schluderbacher Verfahren zur sicheren anmeldung an ein technisches system
AT413894B (de) * 2004-04-15 2006-07-15 Helmut Dipl Ing Schluderbacher Nicht personenabhängiger zugangscode
US7822990B2 (en) 2004-07-07 2010-10-26 Oracle International Corporation Online data encryption and decryption
US8484455B2 (en) 2004-07-07 2013-07-09 Oracle International Corporation Online data encryption and decryption
WO2006010058A3 (fr) * 2004-07-07 2006-07-13 Bharosa Inc Cryptage et decryptage de donnees en ligne
US7596701B2 (en) 2004-07-07 2009-09-29 Oracle International Corporation Online data encryption and decryption
US7616764B2 (en) 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7689831B2 (en) 2004-08-30 2010-03-30 Passrules Canadian Security Inc. Method and system for securing interface access via visual array paths in combination with hidden operators
US7908645B2 (en) 2005-04-29 2011-03-15 Oracle International Corporation System and method for fraud monitoring, detection, and tiered user authentication
WO2007000845A1 (fr) * 2005-06-27 2007-01-04 Kabushiki Kaisha Toshiba Dispositif serveur, procede et programme
WO2007098569A1 (fr) * 2006-03-01 2007-09-07 Norman Frank Goertzen Procédé et système de sécurisation d'accès interface via des chemins d'ensembles visuels associés à des opérateurs cachés
US8739278B2 (en) 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
US9106422B2 (en) 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
WO2008105602A1 (fr) * 2007-02-28 2008-09-04 Mininfo Co., Ltd. Procédé et système d'authentification d'utilisateur mettant en œuvre un mot de passe graphique à usage unique
WO2015003672A1 (fr) * 2013-07-12 2015-01-15 Anect A.S. Procédé de saisie d'informations secrètes dans des dispositifs électroniques numériques
US10192075B2 (en) 2013-07-12 2019-01-29 Aducid S.R.O. Method of secret information entering into electronic digital devices
CZ309308B6 (cs) * 2013-07-12 2022-08-17 Aducid S.R.O. Způsob zadávání tajné informace do elektronických digitálních zařízení

Also Published As

Publication number Publication date
GB9424791D0 (en) 1995-02-08

Similar Documents

Publication Publication Date Title
WO1996018139A1 (fr) Entree de code de securite
US5815083A (en) Process for entry of a confidential piece of information and associated terminal
US5428349A (en) Nondisclosing password entry system
US7240367B2 (en) User interface and method for inputting password and password system using the same
US8010797B2 (en) Electronic apparatus and recording medium storing password input program
EP1181643B1 (fr) Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique
US5276314A (en) Identity verification system resistant to compromise by observation of its use
US8239937B2 (en) User validation using images
US6658574B1 (en) Method for non-disclosing password entry
US6209104B1 (en) Secure data entry and visual authentication system and method
JP2007264929A (ja) ユーザ認証システム、ユーザ認証方法、操作端末及びサーバ等
US20020129269A1 (en) Method and apparatus for inputting secret information
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
US20040178881A1 (en) Information service terminal
US20100043079A1 (en) Code securing for a personal entity
US11354395B2 (en) Authentication method for a computing device using interactive game board and game piece images
JP2891206B2 (ja) パスワード照合方式
KR102246446B1 (ko) 문자와 패턴을 조합한 인증암호의 인증방법 및 인증장치
KR20210027317A (ko) 숫자와 패턴 혼용 입력부를 이용한 숫자와 패턴을 조합한 인증암호의 인증방법 및 인증장치
US20060179471A1 (en) System and method for providing secure disclosure of a secret
JPH05334334A (ja) 暗証番号入力装置
KR20210049069A (ko) 문자와 패턴을 조합한 인증암호의 인증방법 및 인증장치
WO2002069240A2 (fr) Appareil et procede de selection de donnees
JPH05224802A (ja) ランダムキー装置
WO2014009725A1 (fr) Sécurisation de saisie d'informations sensibles

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP KR

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase