Method and apparatus for securing a list of passwords and...

Electrical computers and digital processing systems: support – System access control based on user identification by... – Pin/password generator device

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C380S044000, C380S051000, C380S054000, C380S055000, C380S056000

Reexamination Certificate

active

06571336

ABSTRACT:

FIELD OF THE INVENTION
This invention relates to secured systems using pattern recognition as a method for protecting access, and more particularly to secured lists of passwords and personal identification numbers and graphical patterns.
BACKGROUND OF THE INVENTION
Systems that are secured for use only by authorized individuals frequently rely upon a password or personal identification number (PIN). Examples of systems which utilize PINs include college registration, employee access to information, cellular phones and other communication devices in addition to savings and checking accounts, ATM transactions, telephone calling cards, debit cards, credit cards and numerous other systems.
While some individuals are able to remember random sequences of numbers and letters, most passwords and PINs that are selected by the individual have some personal relevance so that they can be easily remembered; and thereby, vulnerable to unauthorized access. When random words and numbers are used or assigned (often in combination), they are frequently written in a list that is kept handy. The list of passwords and PINs is often difficult to secure, which also facilitates unauthorized access.
Thus, individuals are faced with the dilemma of either having a password or PIN that is easy to remember and consequently facilitates unauthorized access or having a password or PIN that is so difficult to remember that it has to be written down, also facilitating unauthorized access. Therefore, there is a need for a system to secure a list of passwords and PINs from unauthorized access, but which are easily accessed.
SUMMARY OF THE INVENTION
The present invention concerns a method and system for using pattern recognition as a method for providing access as well as protecting access to a list of passwords, personal identification numbers or patterns. A grid is used for tracing a user-defined path through it to identify a set of unique characters positioned on the path. The set itself is one of a subset of a much larger set which is determined by the size of a rectilinear grid. Each character of the full set appears once and only once on the grid in individualized order and each user describes a unique sub-set of characters.
A path of 10 locations in the grid facilitates an embodiment in which the characters to be encoded are primarily numeric so that each location represents, one of the nine digits plus zero. A master code (MasterCode) of 10 natural language characterizes is generated with each letter assigned to one of the digits. To encode a numeric password (PIN) a word list is searched to identify natural language words which meet 3 conditions: (1) they contain the letters assigned to the pin; (2) the assigned letters occur only in the same order as in the pin; and (3) the unused letters in the MasterCode do not occur.
In another embodiment the characters from which a MasterCode can be drawn include numbers, symbols and upper and lower case letters. The identification of the step in the path by numeric sequence creates a SecureNumber. A typical use would be where 81 keyboard symbols, numbers and letters comprise the larger set; a randomly selected 15 to 20 unique characters comprise the MasterCode group for a given individual; each of the assigned passwords of 4 to 8 characters is randomly generated to from the MasterCode.
In another embodiment, a “master” computer generates a series of grids with characters or picto grams in different arrangements and provides them to a “slave” computer. The slave computer chooses any one of the grids as the first step. Next, it selects a path through the chosen grid. To retrieve the PIN the slave computer first selects the unique grid it provided previously, and next the unique path in the grid is traced. Either step can be controlled by the keyboard, mouse, stylus, pointing devices, orally or, a combination of these. The Oral control provides an additional level of security beyond the security provided with the encrypted password alone. If the proper pictogram and path are chosen, valid access is enabled.


REFERENCES:
patent: 312665 (1885-02-01), Smith
patent: 4184148 (1980-01-01), Smagala-Romanoff
patent: 4734040 (1988-03-01), North et al.
patent: 4857914 (1989-08-01), Thrower
patent: 5056141 (1991-10-01), Dyke
patent: 5177789 (1993-01-01), Covert
patent: 5251259 (1993-10-01), Mosley
patent: 5265162 (1993-11-01), Bush et al.
patent: 5276314 (1994-01-01), Martino et al.
patent: 5363449 (1994-11-01), Bestock
patent: 5377270 (1994-12-01), Koopman, Jr. et al.
patent: 5428349 (1995-06-01), Baker
patent: 5793871 (1998-08-01), Jackson
patent: 5812278 (1998-09-01), Toyoda et al.
patent: 5946414 (1999-08-01), Cass et al.
patent: 6253328 (2001-06-01), Smith, Jr.
patent: WO 9705578 (1997-02-01), None
Kak, Subhash, “The Aryabhata Cipher,” Cryptologia, vol. XII, No. 2, Apr. 1988, pp. 113-117.
Millikin, D.D., “Elementary Cryptography and Cryptanaly-sis,” Aegean Park Press, 1943, pp. 4-13 and 70-82.
James Raymond Wolfe, Secret Writing-The Craft of the Cryptographer, 1970.
Walt Babson, All Kinds of Codes, 1976.
Kenneth L. Higbee, Ph.D., Your Memory-How it Works and How to Improve it, 1977.
Francis Fauvel-Gouraud, D.E.S., The Art of Memory, 1845.
BYTE Magazine, The McGraw-Hill Co., Some Assembly Required, 1990.
Tony Buzan, Use Your Perfect Memory, 1984.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securing a list of passwords and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securing a list of passwords and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securing a list of passwords and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3086208

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.