Authentication method

Communications: electrical – Continuously variable indicating – With meter reading

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

34082531, 235382, G07D 700

Patent

active

058218718

DESCRIPTION:

BRIEF SUMMARY
BACKGROUND OF THE INVENTION

1. Field of the Invention
The purpose of this invention is to provide an easily implementable method for authenticating a person's identity, which method is viable, falsification-proof and easy to apply.
2. State of the Art
There are essentially two known types of authentication method: the first type consists of equipping the person to be authenticated with a characteristic not specific to that person, for instance with a password, a microchip-card or a coded key. This characteristic is verified for authenticity by comparison with an identical or matching counterpart, checking for identity or for matching quality (lock and key system). For instance, anti-theft devices on cars can be disabled with a key containing a microchip, which exchanges a modified code with the motor control device after each use, as soon as the key is introduced into the ignition. only if the key and car ignition match, can the car be started. The disadvantage of this first type of authentication method is that third parties may acquire the person non-specific characteristic illicitly in order to take on a false identity without being detected. The need to memorize numbers or passwords as a characteristic is often not convenient because of human forgetfulness. Furthermore, third parties could get knowledge of these numbers and passwords during an authentication process.
The second type of authentication method relies on the principle of storing certain person-specific characteristics at a place remote from the person concerned. The proof of authenticity is made by comparison of the original characteristic with the stored counterpart. In the case of biometrical authentication methods, certain physical features, such as hand-geometry, finger-prints, photographs or physiological features (for example speech samples), may be used as person-specific characteristics. Biometrical methods are complicated, partially susceptible to falsification, and are often perceived as embarrassing by the persons concerned.
In the case of psychometrical authentication methods, certain psychological features, such as mental reactions or capacities, have been proposed as person-specific characteristics. For instance: character-traits, business and private projects, interests and opinions; a list of questions and answers; solution of one or more dexterity tasks; pattern recognition; or word association tests. These proposals are not practical or would suffer most of the drawbacks of password protocol: risk of mistaken responses, need for cryptographical protection of responses, repetitive guessing of responses by a persistent intruder.
The present state of the art is described in the following patent applications, patents or other documents: questions stored on a card are displayed to a computer user. The user's responses are saved and compared with the correct answers stored on a card. Computer access is allowed if at least one user response matches a corresponding correct answer. firstly of a portable device, which is activated after entering a password, possibly in connection with the number of a car licence plate, an account or identity card number, and secondly of an automatically responding control station. For the purpose of user authentication or for creating a certain physical effect, signals and data trains which are verified in both units are exchanged by wireless transmission. In one arrangement, the input device is equipped with only four buttons, two of which serve for scrolling forwards or backwards through characters appearing on a display, a third one for marking certain characters, and a fourth one for correcting wrong markings. person is photographically registered, transformed electronically and stored, and used as an identification characteristic. tooth in the form of an active medium, so that these data can be recognized in a non-destructive way at a later check-up. implantation of information-carriers by which the living creature can be identified. instance the electrical activity of brain or muscle--are re

REFERENCES:
patent: 4432567 (1984-02-01), Stockburger et al.
patent: 4449189 (1984-05-01), Feix et al.
patent: 5037301 (1991-08-01), Michnick et al.
patent: 5109427 (1992-04-01), Yang
patent: 5150409 (1992-09-01), Elsner
patent: 5317637 (1994-05-01), Pichlmaier et al.
patent: 5323146 (1994-06-01), Glaschick
patent: 5395319 (1995-03-01), Hirsch et al.
Smith, "Authenticating users by word association," Computers & Security, . 6, No. 6, 1987, Amsterdam, NL, pp. 464-470, XP 000050578.
Zviran, "Cognitive passwords: the key to easy access control," Computers & Security, vol. 9, No. 8, 1990, Amsterdam, NL, pp. 723-736, XP 000176620.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-317121

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.