DE19620346A1 - Graphical password log-in procedure for user of data terminal in computer system - Google Patents
Graphical password log-in procedure for user of data terminal in computer systemInfo
- Publication number
- DE19620346A1 DE19620346A1 DE1996120346 DE19620346A DE19620346A1 DE 19620346 A1 DE19620346 A1 DE 19620346A1 DE 1996120346 DE1996120346 DE 1996120346 DE 19620346 A DE19620346 A DE 19620346A DE 19620346 A1 DE19620346 A1 DE 19620346A1
- Authority
- DE
- Germany
- Prior art keywords
- symbols
- registration process
- process according
- password
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Die Erfindung geht aus von einem Anmeldeverfahren an einem Rechnersystem mit Hilfe einer graphischen Paßworteingabe nach der Gattung des Hauptanspruchs.The invention is based on a registration process on a Computer system using a graphical password entry according to the genus of the main claim.
Die Anmeldung an einem Rechnersystem erfordert normalerweise die Eingabe von Benutzername und einem benutzerspezifischen Paßwort über eine Tastatur. Dieser Paßwortschutz ist allerdings unzureichend. Paßwörter können in der Praxis mit Hilfe von Paßwortgeneratoren in kurzer Zeit entschlüsselt werden. Der Grund dafür ist das menschliche Gedächtnis, das sich nur an gut strukturierte Sequenzen, also an sinnvolle Wörter erinnern kann. Indem man die Lexikainhalte verschiedener Sprachen abarbeitet, ist eine Entschlüsselung sehr wahrscheinlich. Die Paßwortabfrage ist in der Praxis die einzige Hürde zum Zugang eines modernen Computernetzes. Eine sichere Paßwortabfrage ist zum Schutz des Systems unbedingt erforderlich. Dafür darf das Paßwort natürlich nirgends notiert werden und muß trotzdem eine so einfache Struktur haben, daß es auch nach einer langen Zeit wieder anwendbar ist. Die Systemsicherheit setzt voraus, daß das ideale Paßwort jedoch eine willkürliche Buchstaben und/oder Zifferkombination sein soll. Genau eine solche Sequenz kann sich der Mensch aber nicht im Gedächtnis behalten. Logging on to a computer system usually requires entering a user name and a user-specific one Password using a keyboard. This password protection is however insufficient. Passwords can be used in practice Decrypted with the help of password generators in a short time will. The reason for this is human memory, the only well-structured sequences, meaning meaningful ones Words can remember. By looking at the lexicon content processing different languages is a decryption most likely. The password query is in practice the only hurdle to access a modern computer network. A secure password request is to protect the system absolutely necessary. Of course, the password is allowed nowhere to be noted and still has to be so simple Have structure that it will come back even after a long time is applicable. System security requires that ideal password however an arbitrary letter and / or Digit combination. Exactly such a sequence can but people do not keep in mind.
Sequenz kann sich der Mensch aber nicht im Gedächtnis behalten.But humans cannot remember the sequence to keep.
Bekannt ist auch eine Form der Paßworteingabe, wobei auf einem Bildschirm alphanumerische Zeichen dargestellt werden. Das eigentliche Paßwort wird durch Anklicken der alphanumerischen Zeichen in der richtigen Reihenfolge über einen Maus gewonnen. Bei diesem System ist es allerdings noch möglich, daß ein unberechtigter Benutzer durch Beobachtung der Bildschirmaktionen das Paßwort entschlüsselt.A form of password entry is also known, on alphanumeric characters are displayed on a screen. The actual password is clicked on the alphanumeric characters in the correct order won a mouse. With this system, however, it is still possible that an unauthorized user by Watching the screen actions the password decrypted.
Das erfindungsgemäße Anmeldeverfahren mit den kennzeichnenden Merkmalen des Hauptanspruchs hat demgegenüber den Vorteil, daß die auf dem Bildschirm angezeigten Symbole ihre Position von einem Anmeldevorgang zum nächsten verändern. Das hat den Vorteil, daß ein unberechtigter Benutzer nicht durch Beobachtung des Anmeldevorgangs das Paßwort entschlüsseln kann.The registration process according to the invention with the has characteristic features of the main claim on the other hand the advantage that the on the screen displayed symbols indicate their position from a login process change to the next. This has the advantage that a unauthorized user not by watching the Login process can decrypt the password.
Durch die in den Unteransprüchen aufgeführten Maßnahmen ist eine vorteilhafte Weiterbildung und Verbesserung des im Hauptanspruchs angegebenen Anmeldeverfahrens möglich.By the measures listed in the subclaims advantageous training and improvement of the Main claim specified registration process possible.
Ein weiterer Vorteil ist es, daß das Rechnersystem den Bildschirmpositionen beliebig lange Code folgen zuordnen kann. Besonders vorteilhaft ist dabei, daß das Paßwort nicht an alphanumerische Zeichen gebunden ist, sondern daß graphische Bilder angezeigt werden können, so daß das System unabhängig vom Sprachraum arbeitet. Es ist mit diesem Anmeldeverfahren auch möglich, chinesische oder japanische Schriftzeichen darzustellen, oder auch ein Grafikbild, das für Kinder besonders geeignet ist. Ein weiterer Vorteil ist es, daß man das Mitlesen der Paßwortsequenz erschweren kann, indem man das eigentliche Anklicken des gesuchten Symbols durch eine Überlagerung von vom Rechner erzeugten Klickgeräuschen verschleiert. Die Länge des Paßwortes, d. h. die Anzahl der angeklickten grafischen Symbole wird vom System festgelegt. Die diesen grafischen Symbolen bzw. deren Positionen auf dem Bildschirm zugeordneten Codereihen können beliebig lang sein.Another advantage is that the computer system Assign code positions of any length to follow the screen positions can. It is particularly advantageous that the password is not is bound to alphanumeric characters, but that graphic images can be displayed so that the System works independently of the language area. It is with this Registration process also possible, Chinese or Japanese To represent characters, or a graphic image that is particularly suitable for children. Another advantage is that it can be difficult to read the password sequence, by actually clicking on the symbol you are looking for by overlaying computer generated Click noises obscured. The length of the password, i.e. H. the number of graphic symbols clicked is determined by the System set. The graphical symbols or their Code rows assigned to positions on the screen be any length.
Eine vorteilhafte Ausführung ist es, statt einzelnen grafischen Symbolen eine Bilddarstellung auf den Bildschirm zu projizieren.It is an advantageous embodiment instead of individual graphic symbols display an image on the screen to project.
Ein Ausführungsbeispiel der Erfindung ist in den Zeichnungen dargestellt und in der nachfolgenden Beschreibung näher erläutert. Es zeigt Fig. 1 einen Bildschirm für die grafische Paßworteingabe, Fig. 2 eine Reihenfolge von korrekten grafischen Symbolen.An embodiment of the invention is shown in the drawings and explained in more detail in the following description. It shows Fig. 1 is a screen for the graphical password input, Fig. 2 is a sequence of correct graphic symbols.
Die Anmeldung an einem Rechnersystem durch die Eingabe eines Benutzernamens an einem Datenendgerät gestartet. Das System projiziert auf dem Bildschirm des Terminals eine zweidimensionale Anordnung von Fenstern, in denen sich Symbole, Bilder oder auch alphanumerische Zeichen befinden. Das System fordert den Benutzer zur Eingabe seines Paßwortes auf. Das auf dem Bildschirm dargestellte Bild kann je nach Auflösung und Größe des Bildschirms bis zu 100 verschiedenen Symbolen enthalten, wobei die Voraussetzung die ist, daß die Bilder noch gut erkennbar sind und genügend Unterscheidungsmerkmale aufweisen. Das graphische Paßwort besteht beispielsweise aus einer Reihe von acht Symbolen, die bei der Eingabe der Reihe nach vom Benutzer angewählt werden müssen. Die Anwahl der Symbole geschieht z. B. durch das Anklicken mit einer Maus. Bei der Verwendung von Touch-Bildschirmen wird das Symbol durch Berührung des Schirms ausgewählt. Beim Anwählen eines Symbols wird als Quittung lediglich ein Klickton übertragen und es wird die aktuelle Anzahl der angewählten Symbole angezeigt. Das eigentliche grafische Fenster mit den Symbolen ändert sich dabei nicht. Über die Verbindungsleitung zwischen Datenendgerät und Rechner werden lediglich die xy-Positionen der Mausklicks übertragen. Erst im Rechner selbst wird den Position über einen Tabelle der dazugehörigen Kennung zugeordnet. Diese Kennung bildet das eigentliche Paßwort, daß auf dem üblichen Weg im Rechner geprüft wird, z. B. kann die Anzahl der Fehlversuche, oder ein Sperrung der Paßworteingabe nach drei Fehlversuchen festgelegt sein. Dadurch daß die Paßwortsequenz lediglich durch xy-Daten festgelegt und über die Leitung übertragen wird, ist es nicht mehr möglich, das Paßwort durch Abhören der Datenübertragungsleitung zu entschlüsseln.Logging on to a computer system by entering a User name started on a data terminal. The system projects one on the screen of the terminal two-dimensional arrangement of windows in which There are symbols, pictures or even alphanumeric characters. The system prompts the user to enter their password on. The image shown on the screen may vary Resolution and size of the screen up to 100 different Contain symbols, provided that the Images are still clearly recognizable and sufficient Have differentiators. The graphical password for example, consists of a series of eight symbols, the one selected by the user when entering Need to become. The selection of the symbols happens z. B. by clicking with a mouse. When using Touch screens become the icon by touching the screen selected. When a symbol is selected, it is used as a receipt just transmit a click sound and it becomes the current one Number of selected symbols is displayed. The real thing graphic windows with the symbols do not change. Via the connecting line between the data terminal and The calculator only becomes the xy positions of the mouse clicks transfer. The position is only in the computer itself assigned a table of the associated identifier. This Identifier forms the actual password that on the usual Way is checked in the computer, e.g. B. can the number of Failed attempts, or a lock of password entry after three Failed attempts must be specified. Because the Password sequence determined only by xy data and over the line is transmitted, it is no longer possible that Password by listening to the data transmission line decrypt.
Möchte sich der Benutzer ein nächstes Mal im Rechnersystem anmelden, wird ihm wieder ein Bildschirm mit grafischen Symbolen zur Verfügung gestellt. Dabei bleibt die Anzahl der Symbole erhalten, allerdings werden diese Symbole vom Rechner in einer anderen Reihenfolge auf dem Bildschirm angeordnet. Werden die Positionen von Anmeldevorgang zu Anmeldevorgang verändert, muß jeweils im Rechner eine Liste der Symbole, der xy-Positionen und der Kennungen mitverändert werden. Eine mögliche Paßworteingabe ist in Fig. 2 dargestellt, wobei in diesem Beispiel keine unterschiedlichen Symbole gewählt wurden. In diesem Fall besteht die Paßwortsequenz aus acht Symbolen, nämlich 4 "Kinderwagen", 2 "Kinderfahrrädern" und 2 "Fahrräder". Eine solche Paßwortsequenz ist für das menschliche Gedächtnis leichter zu behalten, da man sich eine Geschichte zu der Bilderfolge merken kann. Das menschliche Gedächtnis kann sich zudem an Bilder besser als an alphanumerische Zeichen erinnern. Ein mögliches Paßwort muß vom Benutzer festlegbar sein, damit die Vorteile der grafischen Speicherung im Gedächtnis genützt werden können.If the user wants to log on to the computer system the next time, a screen with graphical symbols is made available again. The number of symbols is retained, but these symbols are arranged on the screen in a different order by the computer. If the positions are changed from one registration process to the next, a list of symbols, xy positions and identifiers must be changed on the computer. A possible password entry is shown in FIG. 2, with no different symbols being selected in this example. In this case, the password sequence consists of eight symbols, namely 4 "strollers", 2 "children's bicycles" and 2 "bicycles". Such a password sequence is easier for human memory to remember, since one can remember a story about the sequence of images. Human memory can also remember images better than alphanumeric characters. A possible password must be set by the user so that the advantages of graphical storage in memory can be used.
Die Auswahl bei Festlegung der Paßwortsequenz geschieht ebenfalls durch das Anklicken der möglichen Symbole, die insgesamt auf dem Bildschirm dargestellt sind. Als Quittung für das Anklicken eines Symbols wird ein Klickton erzeugt und die aktuelle Anzahl der angewählten Symbole angezeigt.The selection is made when the password sequence is specified also by clicking on the possible symbols that are shown overall on the screen. As a receipt a click sound is generated when a symbol is clicked and the current number of selected symbols is displayed.
Eine weitere Schutzmaßnahme kann für das Anmelden an Rechnersystemen eingebaut werden. Bei dieser Schutzmaßnahme wird zusätzlich zu dem Klickton beim Anklicken des richtigen Symbols vom System selbst eine Folge von Tönen erzeugt, die den eigentlichen Anmeldeprozeß überlagern. Auf diese Art und Weise ist es zusätzlich erschwert, durch Mithören die Positionen der grafischen Symbole abzuleiten.Another protective measure can be used for logging on Computer systems are installed. With this protective measure becomes in addition to the click sound when clicking the right one Symbols generated by the system itself a sequence of tones that overlay the actual registration process. This way and It is even more difficult by listening to the Derive positions of the graphic symbols.
Claims (9)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1996120346 DE19620346A1 (en) | 1996-05-21 | 1996-05-21 | Graphical password log-in procedure for user of data terminal in computer system |
GB9709891A GB2313460B (en) | 1996-05-21 | 1997-05-16 | Graphical password entry |
JP12772297A JPH1097500A (en) | 1996-05-21 | 1997-05-19 | Method for logging on computer system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE1996120346 DE19620346A1 (en) | 1996-05-21 | 1996-05-21 | Graphical password log-in procedure for user of data terminal in computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
DE19620346A1 true DE19620346A1 (en) | 1997-11-27 |
Family
ID=7794845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE1996120346 Ceased DE19620346A1 (en) | 1996-05-21 | 1996-05-21 | Graphical password log-in procedure for user of data terminal in computer system |
Country Status (3)
Country | Link |
---|---|
JP (1) | JPH1097500A (en) |
DE (1) | DE19620346A1 (en) |
GB (1) | GB2313460B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19848501A1 (en) * | 1998-10-21 | 2000-05-04 | Sfr Ges Fuer Datenverarbeitung | Identity check method for computer users, involves comparing characters allocated to regions of displayed image by user using different entries, establishing identity of characters coincide |
EP1181643A1 (en) * | 1999-02-12 | 2002-02-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
WO2002073377A2 (en) * | 2001-03-14 | 2002-09-19 | Jaloveczki Laszlo | Authorisation method for a user of a limited access system having an authorisation centre |
DE10118209A1 (en) * | 2001-04-11 | 2002-10-24 | Siemens Ag | Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation |
FR2824208A1 (en) * | 2001-04-26 | 2002-10-31 | Schlumberger Systems & Service | METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE |
DE10153404A1 (en) * | 2001-11-01 | 2003-05-15 | Rene Baltus | Writer for normal pens |
WO2003049001A2 (en) * | 2001-10-30 | 2003-06-12 | Thomas Gebel | Method for graphical authentication |
WO2004081767A1 (en) * | 2003-03-11 | 2004-09-23 | Koninklijke Philips Electronics N.V. | Method and system for enabling remote message composition |
WO2007000845A1 (en) * | 2005-06-27 | 2007-01-04 | Kabushiki Kaisha Toshiba | Server device, method and program |
EP1845469A1 (en) * | 2006-04-12 | 2007-10-17 | Siemens Aktiengesellschaft | Authentification method and system |
DE102006050315A1 (en) * | 2006-10-25 | 2008-04-30 | Carl Zeiss Ag | Head mounted display-system, has clearing unit controlling clearing code on availability, and display module presenting image to user carrying display module on head based on image data transmitted when effective clearing code is existing |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1214658A1 (en) * | 1999-08-13 | 2002-06-19 | Joseph Elie Tefaye | User authentication system |
KR20000024087A (en) * | 2000-01-19 | 2000-05-06 | 김한성 | A password preparing method using image associable words |
AU2001266319A1 (en) * | 2000-06-22 | 2002-01-02 | Mnemonic Security Limited | Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information |
US6720860B1 (en) * | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
JP4868643B2 (en) * | 2000-12-27 | 2012-02-01 | 株式会社ニーモニックセキュリティ | Authentication system for input operation of personal authentication data recording medium |
CN101025778A (en) * | 2000-07-25 | 2007-08-29 | 有限会社信息安全 | Secret information record medium, protection method, protective storing method, and system for reporting emergency when information is accessed |
US7373510B2 (en) * | 2000-09-12 | 2008-05-13 | International Business Machines Corporation | System and method for implementing a robot proof Web site |
DE10050734A1 (en) * | 2000-09-29 | 2002-04-11 | Reinhold Rohrbach | Method and device for determining the access code |
FR2819323B1 (en) * | 2001-01-05 | 2003-04-25 | Schlumberger Systems & Service | METHOD FOR ACCESSING A SECURE SYSTEM |
WO2002071177A2 (en) * | 2001-03-03 | 2002-09-12 | Moneyhive.Com Pte Ltd | Method and system for substantially secure electronic transactions |
FR2825489B1 (en) * | 2001-06-05 | 2003-09-05 | Marguerite Paolucci | SECURE INDIVIDUAL AUTHENTICATION METHOD FOR CONNECTION TO AN INTERNET / INTRANET SERVER BY REMOTE FURENT ACCESS |
KR20030002280A (en) * | 2001-06-30 | 2003-01-08 | 주식회사 비즈모델라인 | System and Method for providing the password related to client's behavior pattern |
WO2003010641A1 (en) * | 2001-07-27 | 2003-02-06 | Martyn Sergeevich Nunuparov | Method and device for entering a computer database password |
KR100515683B1 (en) * | 2002-10-16 | 2005-09-23 | 정욱진 | System and method for registrating and identifiying a person by clicking password points in a image |
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
FI20030920A0 (en) | 2003-06-19 | 2003-06-19 | Nokia Corp | A method and system for generating a graphical password and a terminal |
US7337466B2 (en) * | 2003-07-08 | 2008-02-26 | Intel Corporation | Information hiding through time synchronization |
CN1856782B (en) * | 2003-09-25 | 2011-05-18 | 索尔玛泽株式会社 | The method of safe certification service |
US7882361B2 (en) * | 2004-02-05 | 2011-02-01 | Oracle America, Inc. | Method and system for accepting a pass code |
EP1574931A3 (en) * | 2004-03-11 | 2008-09-24 | Wincor Nixdorf International GmbH | Self-service device with a data imput device and method for inquiring the PIN |
AT413775B (en) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | PROCESS FOR SAFE REGISTRATION TO A TECHNICAL SYSTEM |
AT413894B (en) * | 2004-04-15 | 2006-07-15 | Helmut Dipl Ing Schluderbacher | NOT PERSONALIZED ACCESS CODE |
US7596701B2 (en) | 2004-07-07 | 2009-09-29 | Oracle International Corporation | Online data encryption and decryption |
US7616764B2 (en) * | 2004-07-07 | 2009-11-10 | Oracle International Corporation | Online data encryption and decryption |
KR100716975B1 (en) * | 2004-07-10 | 2007-05-10 | 삼성전자주식회사 | User Authentication Device and User Authentication Method |
AU2006242555A1 (en) | 2005-04-29 | 2006-11-09 | Oracle International Corporation | System and method for fraud monitoring, detection, and tiered user authentication |
JP4422088B2 (en) * | 2005-09-27 | 2010-02-24 | Necネクサソリューションズ株式会社 | Image array type authentication system |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7480870B2 (en) | 2005-12-23 | 2009-01-20 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
KR100884376B1 (en) * | 2006-02-09 | 2009-02-17 | (주)솔메이즈 | Disposable password system and method using interrogator |
US8739278B2 (en) | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US7849321B2 (en) | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
US9106422B2 (en) | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
KR100844195B1 (en) | 2007-02-28 | 2008-07-04 | (주)민인포 | User Authentication Using Graphical OTP |
KR20200090943A (en) | 2007-09-24 | 2020-07-29 | 애플 인크. | Embedded authentication systems in an electronic device |
GB2454459A (en) * | 2007-11-06 | 2009-05-13 | Andrew Small | Personal identification code entry device |
NO327152B1 (en) | 2007-12-19 | 2009-05-04 | Fast Search & Transfer Asa | Procedure to improve security in login and service access procedures |
US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
JP5400301B2 (en) * | 2008-01-23 | 2014-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Authentication server device, authentication method, and authentication program |
US8174503B2 (en) | 2008-05-17 | 2012-05-08 | David H. Cain | Touch-based authentication of a mobile device through user generated pattern creation |
JP5198951B2 (en) * | 2008-06-30 | 2013-05-15 | トッパン・フォームズ株式会社 | Identification system |
US8638939B1 (en) | 2009-08-20 | 2014-01-28 | Apple Inc. | User authentication on an electronic device |
CN102741851A (en) * | 2009-10-16 | 2012-10-17 | 阿莫洛格有限公司 | System and method for improving security of user account access |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US8587547B2 (en) | 2010-11-05 | 2013-11-19 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9141285B2 (en) | 2010-11-05 | 2015-09-22 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
GB2486706B (en) * | 2010-12-21 | 2017-05-24 | Sharp Kk | Handset |
EP2503479B1 (en) * | 2011-03-21 | 2015-08-05 | BlackBerry Limited | Login method based on direction of gaze |
US8625847B2 (en) | 2011-03-21 | 2014-01-07 | Blackberry Limited | Login method based on direction of gaze |
GB201106943D0 (en) * | 2011-04-27 | 2011-06-01 | Burkill Vance | Improvements in or relating to password generation, recall and protection |
US8638385B2 (en) | 2011-06-05 | 2014-01-28 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
JP5143258B2 (en) | 2011-06-17 | 2013-02-13 | 株式会社東芝 | Information processing apparatus, information processing method, and control program |
KR101741264B1 (en) * | 2011-08-05 | 2017-06-09 | 주식회사 네오플 | Method and apparatus for input password in using game |
US9002322B2 (en) | 2011-09-29 | 2015-04-07 | Apple Inc. | Authentication with secondary approver |
US8769624B2 (en) | 2011-09-29 | 2014-07-01 | Apple Inc. | Access control utilizing indirect authentication |
US9213822B2 (en) | 2012-01-20 | 2015-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9324067B2 (en) | 2014-05-29 | 2016-04-26 | Apple Inc. | User interface for payments |
DK179186B1 (en) | 2016-05-19 | 2018-01-15 | Apple Inc | REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION |
DK179471B1 (en) | 2016-09-23 | 2018-11-26 | Apple Inc. | Image data for enhanced user interactions |
JP6736686B1 (en) | 2017-09-09 | 2020-08-05 | アップル インコーポレイテッドApple Inc. | Implementation of biometrics |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
EP4264460A1 (en) | 2021-01-25 | 2023-10-25 | Apple Inc. | Implementation of biometric authentication |
US12210603B2 (en) | 2021-03-04 | 2025-01-28 | Apple Inc. | User interface for enrolling a biometric feature |
US12216754B2 (en) | 2021-05-10 | 2025-02-04 | Apple Inc. | User interfaces for authenticating to perform secure operations |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3940104A1 (en) * | 1989-12-05 | 1991-06-06 | Kromer Theodor Gmbh & Co Kg | INPUT DEVICE WITH KEYPAD FOR CODE LOCKS OR THE LIKE |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4333090A (en) * | 1980-05-05 | 1982-06-01 | Hirsch Steven B | Secure keyboard input terminal |
JPS60134377A (en) * | 1983-12-21 | 1985-07-17 | Omron Tateisi Electronics Co | Password number input device |
US5276314A (en) * | 1992-04-03 | 1994-01-04 | International Business Machines Corporation | Identity verification system resistant to compromise by observation of its use |
FR2708358B1 (en) * | 1993-07-01 | 1995-09-01 | Bull Cp8 | Method for entering confidential information, terminal and associated verification system. |
GB9424791D0 (en) * | 1994-12-08 | 1995-02-08 | Philips Electronics Uk Ltd | Security code input |
-
1996
- 1996-05-21 DE DE1996120346 patent/DE19620346A1/en not_active Ceased
-
1997
- 1997-05-16 GB GB9709891A patent/GB2313460B/en not_active Expired - Fee Related
- 1997-05-19 JP JP12772297A patent/JPH1097500A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3940104A1 (en) * | 1989-12-05 | 1991-06-06 | Kromer Theodor Gmbh & Co Kg | INPUT DEVICE WITH KEYPAD FOR CODE LOCKS OR THE LIKE |
Non-Patent Citations (2)
Title |
---|
Datenbank: WPIDS auf STN. London: Derwent, AN 92-055712, benutzt am 28.11.96, AB. TP 19205 A * |
Patent Abstracts of Japan, P-1192, 1991, Vol. 15, No. 156, JP 3-25569 A * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19848501C2 (en) * | 1998-10-21 | 2001-03-22 | Sfr Ges Fuer Datenverarbeitung | Identity verification procedures |
DE19848501A1 (en) * | 1998-10-21 | 2000-05-04 | Sfr Ges Fuer Datenverarbeitung | Identity check method for computer users, involves comparing characters allocated to regions of displayed image by user using different entries, establishing identity of characters coincide |
EP1181643A1 (en) * | 1999-02-12 | 2002-02-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
EP1181643A4 (en) * | 1999-02-12 | 2004-10-13 | Arcot Systems Inc | Method and apparatus for secure entry of access codes in a computer environment |
WO2002073377A3 (en) * | 2001-03-14 | 2003-10-23 | Laszlo Jaloveczki | Authorisation method for a user of a limited access system having an authorisation centre |
WO2002073377A2 (en) * | 2001-03-14 | 2002-09-19 | Jaloveczki Laszlo | Authorisation method for a user of a limited access system having an authorisation centre |
DE10118209A1 (en) * | 2001-04-11 | 2002-10-24 | Siemens Ag | Input of an authentication code such as a PIN or password by selection of a sequence of images or parts of images displayed on a screen with each image or partial image representing a number or letter with a secret correlation |
WO2002089079A1 (en) * | 2001-04-26 | 2002-11-07 | Schlumberger Systemes | Method and device for assigning an authentication code |
FR2824208A1 (en) * | 2001-04-26 | 2002-10-31 | Schlumberger Systems & Service | METHOD AND DEVICE FOR ASSIGNING AN AUTHENTICATION CODE |
WO2003049001A2 (en) * | 2001-10-30 | 2003-06-12 | Thomas Gebel | Method for graphical authentication |
WO2003049001A3 (en) * | 2001-10-30 | 2003-10-30 | Thomas Gebel | Method for graphical authentication |
DE10153404A1 (en) * | 2001-11-01 | 2003-05-15 | Rene Baltus | Writer for normal pens |
WO2004081767A1 (en) * | 2003-03-11 | 2004-09-23 | Koninklijke Philips Electronics N.V. | Method and system for enabling remote message composition |
WO2007000845A1 (en) * | 2005-06-27 | 2007-01-04 | Kabushiki Kaisha Toshiba | Server device, method and program |
EP1845469A1 (en) * | 2006-04-12 | 2007-10-17 | Siemens Aktiengesellschaft | Authentification method and system |
DE102006050315A1 (en) * | 2006-10-25 | 2008-04-30 | Carl Zeiss Ag | Head mounted display-system, has clearing unit controlling clearing code on availability, and display module presenting image to user carrying display module on head based on image data transmitted when effective clearing code is existing |
DE102006050315B4 (en) | 2006-10-25 | 2019-12-24 | Carl Zeiss Ag | Head mounted display system and display method for a head mounted display system |
Also Published As
Publication number | Publication date |
---|---|
GB2313460A (en) | 1997-11-26 |
JPH1097500A (en) | 1998-04-14 |
GB2313460B (en) | 1998-07-08 |
GB9709891D0 (en) | 1997-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19620346A1 (en) | Graphical password log-in procedure for user of data terminal in computer system | |
DE60121517T2 (en) | A method for generating a logon certificate from a foreign PKI system using an existing strong PKI authentication system | |
DE60311757T2 (en) | System and method for authentication based on random partial pattern recognition | |
US7690025B2 (en) | Methods and systems for accessing a network-based computer system | |
EP2137664B1 (en) | Method for producing acknowledged transaction data and corresponding device | |
DE102007034413B4 (en) | Method and device for authenticating a user | |
CA2569634C (en) | Method and system to generate an image for monitoring user interaction with a computer | |
DE102017113529A1 (en) | Method and system for checking the authenticity of a trusted user interface | |
WO2007051842A1 (en) | Method and system for transmitting data from a first data processing device to a second data processing device | |
DE112014001975T5 (en) | Method and system for secure data entry into a unit | |
US20080235784A1 (en) | Gateway log in system with user friendly combination lock | |
DE2939458A1 (en) | SYSTEM FOR LOCALIZING AREAS WITH MIXED TEXT / IMAGE EDITING ON THE SCREEN | |
EP2043021A1 (en) | Online banking system and method for electronic communication that keeps data secure | |
DE10050734A1 (en) | Method and device for determining the access code | |
DE19803339B4 (en) | Method and device for checking the access authorization of a user for a particularly protected facility | |
DE10359680A1 (en) | Method for enabling access to a computer system or to a program | |
WO2009121437A1 (en) | Dynamic authentication method | |
WO2001046785A2 (en) | Method and device for verifying a file | |
EP1245094A2 (en) | Device for the password-protected handling of an electronic document | |
DE102017127280B4 (en) | PROTECTION AGAINST REALTIME PHISHING AND OTHER ATTACKS DURING A LOGIN PROCESS ON A SERVER | |
EP2512090A1 (en) | Method for authenticating a subscriber | |
DE60115541T2 (en) | Method for authenticating a portable terminal | |
EP1785900A1 (en) | Method and device for transferring data from a first data processing unit to a second data processing unit | |
DE60204776T2 (en) | Method and device for secure access to data or functionality of a device | |
DE202013100910U1 (en) | CAPTCHA for distinguishing computers and people in the interaction of computers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
OP8 | Request for examination as to paragraph 44 patent law | ||
8131 | Rejection |