WO2002033882A1 - Interface d'authentication selectionnable par l'utilisateur et oracle mot de passe universel - Google Patents
Interface d'authentication selectionnable par l'utilisateur et oracle mot de passe universel Download PDFInfo
- Publication number
- WO2002033882A1 WO2002033882A1 PCT/US2001/032604 US0132604W WO0233882A1 WO 2002033882 A1 WO2002033882 A1 WO 2002033882A1 US 0132604 W US0132604 W US 0132604W WO 0233882 A1 WO0233882 A1 WO 0233882A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- arrays
- images
- user
- interface application
- Prior art date
Links
- 238000003491 array Methods 0.000 claims abstract description 37
- 230000001953 sensory effect Effects 0.000 claims abstract description 18
- 238000000034 method Methods 0.000 claims abstract description 12
- 238000013507 mapping Methods 0.000 claims description 16
- 230000010365 information processing Effects 0.000 claims description 9
- 230000001413 cellular effect Effects 0.000 claims description 3
- 238000003780 insertion Methods 0.000 claims description 2
- 230000037431 insertion Effects 0.000 claims description 2
- 238000012986 modification Methods 0.000 abstract 1
- 230000004048 modification Effects 0.000 abstract 1
- 229920001690 polydopamine Polymers 0.000 description 18
- 230000000007 visual effect Effects 0.000 description 7
- 230000001010 compromised effect Effects 0.000 description 3
- 210000000887 face Anatomy 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 241000282472 Canis lupus familiaris Species 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 210000003128 head Anatomy 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 241000282465 Canis Species 0.000 description 1
- 206010012177 Deja vu Diseases 0.000 description 1
- 241000282412 Homo Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 210000005069 ears Anatomy 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003313 weakening effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- the present invention relates to user authentication schemes for permitting access to secure data environments on the Internet or for gaining access to networked environments using computers, PDAs, Pocket PCs, and other communication devices such as cellular phones and the like.
- the invention also concerns visual, auditory or other sensory based memory aids for recalling passwords, or more precisely, for eliminating the need to remember passwords altogether. Description of the Related Art :
- Many computer systems currently require input of a password or username/password pair to enable access to data and information handled by the computer system.
- a password typically the username is already displayed
- a password typically the username is already displayed
- various websites accessible through Internet browsers require passwords in order to gain access to services, information and data offered through secure websites.
- Such websites provide services ranging from online email accounts, online auctions, as well as access to online banking services including the ability to access account information, make payments, online stock trades and so forth.
- Other services for example ATM machines or telephone banking, enable access to account information and transactions by inputting a personal identification number or PIN.
- 5,559,961 to Blonder discloses a graphical password in which several features taken from a single image, such as the eyes and ears of a horse's head, are selected as "tap regions" and used to record information specific to a particular user for providing access to a protected resource.
- Other known authentication systems, as alternatives to alphanumeric strings, have been discussed in the cross-referenced Provisional Application referred to above.
- the present invention is based on the extraordinary ability of humans to recognize and recall objects such as images, faces and sounds almost effortlessly, and in particular, offers an object-based password entry system which replaces the need for a user to memorize passwords.
- the invention provides a password mapping interface application which produces successive arrays of images for display on a client device.
- the user selects one image from each of the successively displayed arrays, wherein selecting one recognized image from within an array prompts the display of a subsequent array, until all of the successive arrays of images needed for defining the password have been displayed.
- the selected images are mapped to an alphanumeric password or username/password pair, wherein the alphanumeric form of the password need not be remembered or even known to the user.
- the alphanumeric data which is derived from the user-selected images, is supplied to a password-enabled information processing environment, as a secure destination, to enable access to the secure environment .
- a further embodiment of the invention is directed to a handheld device, called a password oracle, which stores and executes a program based on the same principles described above, and which consists of a display images in consecutively displayed arrays, each image being displayed along with a numeric or alphabetical tag.
- the user can thereby recall a PIN number or password by recognizing the object and finding the number or alphabetical character tagged to the object, thereby recalling a PIN number or password as needed.
- the password oracle though not intended for direct connection to a networked environment, serves as a memory jogger so that a user's passwords need not be consciously remembered.
- the oracle is useless to anyone but its owner who is familiar with the images that define the PIN or password, so that even if the oracle falls into the wrong hands, security is not compromised.
- FIG. 1 illustrates a basic and overall system architecture under which the present invention is implemented
- FIGS. 2(A) to 2(D) illustrate a concrete example of how the password mapping interface application of FIG. 1 is used in practice
- FIGS. 3(A) to 3(C) illustrate variations on the embodiment of the password mapping interface shown in FIGS .
- FIG. 4 shows a typical browser environment and the password mapping interface application, illustrating one way in which the present invention may be used to provide access to a secure destination site;
- FIG. 5 illustrates a further use of the graphical password application installed on a PDA device, for explaining the features of a password oracle device used for recalling user passwords .
- FIG. 1 illustrates a basic and overall system architecture under which the present invention is implemented.
- the invention is explained in the context of user- selected visual images, which are presented as choices in sequence for the user to select, as shall be explained later in FIGS 2(A) to 2 (D) .
- the invention may also be applicable to the selection of non-visual cues, such as selecting sounds from a plurality of sets of auditory cues presented in sequence, for example.
- the term "array" as it is used in the claims is intended to encompass any ordered arrangement and the term is applicable to sensory cues apart from visual images.
- the client-based software of the present invention is a password mapping interface application 1 which can be implemented in numerous different forms independent of any given hardware.
- the interface application 1 enables user selection of images from image frames 4a, 4b, 4c and 4d that are displayed sequentially on a display 4, as well as mapping information of the selected images to a password or username/password pair.
- One exemplary implementation is on a client machine, such as a personal computer, wherein the interface application 1 is provided on the machine as loaded software 1-1 in a Java application or the like.
- a second example is to use the application in conjunction with a server key-store 1-2 which stores user passwords, wherein the interface application 1 accesses the server key-store 1-2 for fetching passwords or username/password pairs to be transferred to a secure destination 3 through the interface application 1.
- a third example is to embody the interface application 1 on a smart card, wherein the smart card can include both the application software (the interface application 1 may be flashed onto the smart card in a known manner) and the password or username/password pairs necessary for enabling access at the secure destination 3.
- a fourth example is to use a specialized chip 1-4 which can be embodied in the client machine and which, likewise, includes both the interface application software 1 (the application can be hard coded into the chip in a known manner) and the password or username/password pairs necessary for enabling access to the secure destination 3.
- the interface application software 1 the application can be hard coded into the chip in a known manner
- the password or username/password pairs necessary for enabling access to the secure destination 3.
- the machine or device executing the password interface application 1 stores or accesses from a non-credential storage means 5 only non- credential (i.e. non-sensitive) information and thus, for example, the client machine or device should contain no stored information such as credit card numbers, bank account numbers, banking balances or the like.
- the interface application 1 utilizes only minimal data necessary to map information of the images selected from successive displays 4a-4d to the alphanumeric based password or username/password pair, which is then transmitted to the secure destination 3 using any of various access devices 2 through which access to a desired secure destination 3 is enabled.
- the password mapping interface application 1 enables access to a secure destination 3 though an access device 2.
- the access device 2 is not limited to any particular device but may comprise any of several well known devices in use today.
- the invention works by launching the interface application 1 on the access device 2.
- the access device 2 may comprise a browser application 2-1, such as the Microsoft Internet Explorer, loaded on the user's personal computer.
- a browser application 2-1 such as the Microsoft Internet Explorer
- the interface application also loaded on the client machine to initiate popping up of the display 4.
- the alphanumeric password or username/password pair also is passed to the online email service through the password interface 1, for example, via generated HTTP request headers.
- the access device 2 comprises an internet-enabled cell phone 2-2
- a specialized chip containing the interface application can be embedded in the cell phone circuitry.
- the password interface will be initiated on the cell phone LCD display, whereby the user can enter a graphical password via the display 4.
- the password mapping interface application 1 may be embodied on a smart card 1-3 or PCMCIA card which is inserted into a PC 2-3 for enabling access to a network or LAN to which the PC is connected and to which access is desired.
- the interface application 1 is launched, so that the first activity the user must perform for gaining access to the LAN is to input his graphical password.
- withdrawing the smart card 1-3 from the PC 2-3 will immediately cut off access to the LAN, disabling the PC 2-3 until the card is reinserted and the visual password reentered.
- Another example to implement the interface application is to execute it through any of well known PDA or Pocket PC devices 2-4, either by means of loaded software, a specialized chip, or by connection of another auxiliary device, such as a card or module, to the PDA 2-4.
- the password interface application 1 is launched.
- a last example of an access device 2 is a smart card enabled ATM machine 2-5.
- the password interface application 1 is embodied on the smart card 1-3 which serves as the user's banking card, and when the card is inserted into the ATM machine 2-5, the interface application 1 is launched so that, instead of entering a PIN number numerically, the visual interface is used instead.
- Examples of various secure destinations are shown at reference numeral 3.
- One example is a network LAN environment 3-1, wherein the interface application 1 is used for gaining access to a LAN.
- Another example is a secure website 3-2, which shall be discussed in greater detail later in connection with FIG. 4.
- Examples of secure websites are online email systems, such as Yahoo Mail and Hotmail, online banking or stock trading services, online auctions, etc., most of which use the SSL (secure socket layer) and require a username and password for access.
- Another example is to provide cell phone or PDA password access 3-3. Such handheld devices can require a password for using the device itself, or in the case of Internet enabled applications, may require passwords for access to certain websites, essentially in the same manner as the browser environment.
- Another example is a remote operated home alarm or surveillance system 3-4 which can be accessed through a PC or handheld device using a password.
- a final example is ATM access 3-5 which requires a PIN number for activation and access to account information.
- FIGS. 2(A) to 2(D) illustrate a concrete example of how the password mapping interface application 1 of FIG. 1 is used.
- a desired secure destination 3 such as an online email service 3-2, wherein the access device 2 through which one gains access to the email service is a web browser 2-1.
- FIGS. 2(A) to 2(D) A sequence of four consecutively displayed image pads is shown in FIGS. 2(A) to 2(D).
- the four image pads 4a-4d, each made up of nine images in a 3X3 array, are displayed consecutively on a computer display for the user to see.
- the computer display may be a computer monitor or an LCD display on a handheld device such as a PDA, cell phone or the like.
- Each of the consecutively displayed arrays consists of nine images, wherein a user recognizes (as a result of some initial training) only one of the images out of the nine displayed in each array. Therefore, when the array 4a shown in FIG. 2(A) is displayed, the user may recognize the image above the number 4, for example. When the user selects this image, for example by moving a cursor over the image and clicking on it using a mouse, a subsequent image array 4b as shown FIG. 2(B) is displayed which consists of an array of faces, for example. In this array, the user may recognize the face shown above the number 2, for example. When the user selects this image, a subsequent image array 4c as shown in FIG.
- FIG. 2(C) is displayed, which consists of an array of canine heads, for example.
- the user may recognize the dog shown above the number 7, for example.
- a subsequent image array 4c shown in FIG. 2 (D) is displayed which consists of an array of abstract graphic images, for example.
- the user may recognize the image shown above the number 7 again, for example, and selects this image which completes user entry of the password.
- the user is able to recall his password as 4277.
- the numbers preferably need not be displayed along with the images. Rather, the user simply selects with the mouse the recognized image from each consecutive array.
- the underlying interface program maps the user's selections to an alphanumeric password, without the user even having to see or recall the numbers or letters making up the password, wherein the program silently and automatically transfers the alphanumeric password information to the secure destination 3 for which access is desired.
- An example of such automated operation for providing access to an online email service, shall be explained later in connection with FIG. 4.
- FIGS. 2(A) to 2(D) first, variations on the embodiment shown in FIGS. 2(A) to 2(D) shall be explained with reference to FIGS. 3 (A) to 3 (C) .
- consecutively displayed image arrays 4a-4d comprise different types of images, like abstract art, faces, dogs, abstract graphics, etc., as shown in FIGS. 2(A) to 2(D). Rather, the consecutive arrays 4a-4d can all be made up of the same types of images . As shown in FIGS. 3(A) to 3(D), each of the consecutive arrays 4a-4d can all comprise abstract graphic images. In this case, the user is aware of four images out of the nine that are displayed, but is also aware of the order of the images making up his graphical password. For example, in the first displayed array 4a shown in FIG.
- the user may be aware that the image above number 4 makes up the first image, the image above number 2 makes up the second image, the image above number 7 makes up the third image, and so forth, of his graphical password.
- the interface program is executed, when the first array 4a is displayed as shown in FIG. 3(A), the user selects the image above number 4 by clicking on it using a mouse, for example, and this action prompts the display of the second array 4b shown in FIG. 3(B) and so on.
- the images are shuffled each time in a random manner. Such random shuffling makes it much less likely for a malicious onlooker to grasp or remember the images that are being selected by the user.
- the set of all images can be much larger than the nine images shown in FIGS. 3 (A) to 3 (D) .
- the only requirement is that at least one user-recognizable image must be displayed in each of the consecutively displayed arrays.
- a 3X3 array is shown in the exemplary embodiments, larger or smaller arrays are possible.
- array should be understood to refer not only to a grid-type array as shown in the embodiments, but any ordered arrangement of images presented as consecutively displayed sets, from which the user selects one image per set.
- FIG. 4 shows a typical browser environment 12 which is one way in which the present invention is used.
- a secure area such as an online email or so called "webmail" account
- the image pad 4a is displayed.
- the user selects one of the images which he recognizes from the image pad 4a.
- consecutive image pads 4b-4d are displayed in the same manner discussed in FIGS. 2(A) to 2(D) and FIGS. 3(A) to 3(D), and the user selects the recognized image from the next image pad 4b, and so forth, consecutive image pads being displayed until the user has selected a pre-learned sequence of images from the consecutively displayed image pads.
- the selected images are then mapped to the user's username ID and password pair which would ordinarily have been entered in the text input areas 10 provided in the browser window 12.
- the username/password pair is passed to the secure site through the socket layer as HTTP request headers, just as if the user had entered them into the provided text areas 10 and clicked on the "Sign In” button.
- the HTTP request headers and encoded data encoded and transmitted to the server using, e.g., GET or POST methods
- the interface application 1 has been pre-configured to send the necessary HTTP request headers and encoded data to the secure server when the correct sequence of images is selected by the user.
- the server When the expected request headers and data are received by the secure server, the server returns the next HTML page to the browser 12 which enables access to the user's email account, just as if the information had been sent by the text areas 10 and clicking of the "Sign In" button. All functions on the server side which provide webmail access operate as usual and independently of the password interface application. In fact, the server perceives no difference whether the username and password are entered via the text areas or via the graphical interface.
- another potential implementation of the invention uses sounds, for example short musical pieces or tones, as opposed to images.
- sounds for example short musical pieces or tones
- One such implementation could be used for sight-impaired individuals over the telephone.
- consecutive sets of nine sounds each are played corresponding to numbers on the telephone keypad.
- a next set of sounds are played, and so forth, until the entire "auditory" password has been entered.
- the same basic concept could be implemented using a sound-generating computer or PDA device and a numeric keypad, for example. Because mapping of the selected sounds is handled the same as mapping of selected images in the graphical embodiments discussed above, the other features of the invention, for providing access to a secure destination 3, are the same .
- FIG. 5 shows essentially the same password interface application described in connection with FIGS. 2(A) to 2(D) and FIGS. 3(A) to 3(D) installed on a PDA device 14, which may be a device running the PalmOS operating system, or a WindowsCE device such as Pocket PC, or any similar portable handheld computing device, including a cellular phone.
- a PDA device 14 may be a device running the PalmOS operating system, or a WindowsCE device such as Pocket PC, or any similar portable handheld computing device, including a cellular phone.
- the program could be provided on a small LCD display device with minimal processing functions necessary to support the program, attached to a key-ring or the like.
- the password interface can be used essentially in the same manner as a PC, that is, wherein the interface is used for permitting access to secure sites through a browser running on the PDA 14.
- the password interface can also be used as an initial logon means to permit use of the PDA device, cell phone, etc. as well.
- FIG. 5 another use of the implementation shown in FIG. 5 is as a memory aiding device called a password oracle, which is particularly useful for recalling a PIN number to be entered manually at an ATM machine or via a telephone keypad.
- the PDA device 14 per se is not used for establishing a connection with a destination site, but rather serves to remind the user of a password or PIN so that he can enter it manually.
- operation of the password interface application is basically the same as shown in FIGS. 2(A) to 2(D) and FIGS. 3(A) to 3(D), except that the display of numeric and/or alphabetic tags along with the images is now essential, and no information is generated or transmitted from the password interface to a secure destination. Further, the user is not required to physically select an image by clicking or tapping on it, but simply by flipping through the consecutively displayed image arrays, the user is able to recall a forgotten PIN number. In other words, the selection of images can take place mentally.
- the image which the user recognizes may occupy a position above a tag showing the number 4 and therefor triggers in the user's mind that the first number of his PIN is 4.
- the second frame 4b is then displayed, which may be done without actually clicking on a selected image but by pushing any of buttons 16, tapping anywhere on the display 20 with the PDA stylus, or by simply waiting until the next frame appears.
- the image that the user recognizes is at a position above a tag showing the number 2, triggering recall in the user's mind that the second number of his PIN is two.
- the third frame 4c appears next and the image the user recognizes is at a position above a tag showing the number 7, triggering recall in the user's mind that the third number of his PIN is seven.
- the fourth frame appears next and the image the user recognizes is also at a position above a tag showing the number 7, triggering recall in the user's mind that the last number of his PIN is sever.
- the user is able to refresh his memory and recall that his PIN number is 4277. All of the recalling takes place solely within the user's mind, so that even if an imposter is watching, the imposter will still have no way of knowing which images the user has recognized. As indicated in FIGS.
- the tag numbers and images may be randomly ordered, and the random ordering (reshuffling) may be different in each consecutively displayed frame.
- the random ordering may be different in each consecutively displayed frame.
- letters or other alphanumeric characters, or any combination of numbers and alphabetic characters in addition to numbers alone.
- the password oracle of the present invention serves a memory jogging function for permitting a user to recall a forgotten password through the aid of images which the user is capable of recalling far more easily than an abstract sequence of numbers or letters.
- the invention is based on the assumption that it is potentially dangerous for a user even to attempt to remember his password. Rather, using the password oracle, the user is able to "recognize" the password using visual or other sensory cues without actually knowing it .
- the above-described password oracle consists of a display of image portfolios and decoy images on any device that is capable of doing such, and the oracle can be programmed to display the set of images the user chooses.
- the oracle can also be based on sounds or other sensory outputs, provided that the appropriate devices for accessing such outputs are provided.
- a telephone can be used to provide a set of sequences of auditory cues, wherein from within each sequence, the user must select a recognized sound.
- the present invention is not hardware dependent, and any PDA, cell phone, computer screen, kiosks, etc., can be used to host the system.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Application (1) d'interface mot de passe permettant l'affichage ou la reproduction de groupes successifs d'images ou d'autres signaux sensoriels (4) sur un dispositif client. Un utilisateur sélectionne, ou reconnaît simplement, un objet dans chacun des groupes successivement présentés, des groupes subséquents étant affichés pour définir un mot de passe complet lorsque l'objet est reconnu. Contrairement à un système d'authentification basé sur l'image, dans lequel un procédé graphique remplace simplement l'authentification originale du couple nom de l'utilisateur/mot de passe, un système client aide un utilisateur à se rappeler d'un mot de passe oublié, sans nécessiter la modification du logiciel serveur, tel qu'un serveur web sécurisé (3). Ainsi, les ATM (2) existants, les services bancaires téléphoniques ou en ligne et autres, peuvent fonctionner en tant que tels. Le système apporte une sécurité renforcée, car, bien que des regards indiscrets peuvent se poser sur les images ou les signaux sensoriels sélectionnés, ils ne peuvent pas lire la pensée de l'utilisateur pour intercepter le mot de passe que ce dernier reconnaît.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/398,774 US20040030934A1 (en) | 2001-10-19 | 2001-10-19 | User selectable authentication interface and universal password oracle |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24132900P | 2000-10-19 | 2000-10-19 | |
US60/241,329 | 2000-10-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002033882A1 true WO2002033882A1 (fr) | 2002-04-25 |
Family
ID=22910261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/032604 WO2002033882A1 (fr) | 2000-10-19 | 2001-10-19 | Interface d'authentication selectionnable par l'utilisateur et oracle mot de passe universel |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2002033882A1 (fr) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AT413775B (de) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | Verfahren zur sicheren anmeldung an ein technisches system |
US7174462B2 (en) * | 2002-11-12 | 2007-02-06 | Intel Corporation | Method of authentication using familiar photographs |
WO2010005665A1 (fr) * | 2008-06-16 | 2010-01-14 | Qualcomm Incorporated | Procédé et appareil de génération de mnémoniques de hachage |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7793225B2 (en) | 2005-12-23 | 2010-09-07 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
US7836492B2 (en) * | 2005-10-20 | 2010-11-16 | Sudharshan Srinivasan | User authentication system leveraging human ability to recognize transformed images |
WO2011076982A1 (fr) * | 2009-12-22 | 2011-06-30 | Nokia Corporation | Authentification d'utilisateur |
US8174503B2 (en) | 2008-05-17 | 2012-05-08 | David H. Cain | Touch-based authentication of a mobile device through user generated pattern creation |
GB2490580A (en) * | 2011-04-27 | 2012-11-07 | Vance Burkill | Generating an alphanumeric password by selecting displayed images |
US8495714B2 (en) | 2011-07-20 | 2013-07-23 | Bridgewater Systems Corp. | Systems and methods for authenticating users accessing unsecured wifi access points |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US8638939B1 (en) * | 2009-08-20 | 2014-01-28 | Apple Inc. | User authentication on an electronic device |
US8782775B2 (en) | 2007-09-24 | 2014-07-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9128614B2 (en) | 2010-11-05 | 2015-09-08 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9146673B2 (en) | 2010-11-05 | 2015-09-29 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9213822B2 (en) | 2012-01-20 | 2015-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9223959B2 (en) | 2013-11-08 | 2015-12-29 | Wipro Limited | Systems and methods for authentication based on user preferences |
US9985971B2 (en) | 2015-09-29 | 2018-05-29 | International Business Machines Corporation | Cognitive password entry system |
US11165963B2 (en) | 2011-06-05 | 2021-11-02 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5345549A (en) * | 1992-10-30 | 1994-09-06 | International Business Machines Corporation | Multimedia based security systems |
US5966441A (en) * | 1996-11-18 | 1999-10-12 | Apple Computer, Inc. | Method and apparatus for creating a secure autonomous network entity of a network component system |
-
2001
- 2001-10-19 WO PCT/US2001/032604 patent/WO2002033882A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5345549A (en) * | 1992-10-30 | 1994-09-06 | International Business Machines Corporation | Multimedia based security systems |
US5966441A (en) * | 1996-11-18 | 1999-10-12 | Apple Computer, Inc. | Method and apparatus for creating a secure autonomous network entity of a network component system |
Cited By (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174462B2 (en) * | 2002-11-12 | 2007-02-06 | Intel Corporation | Method of authentication using familiar photographs |
AT413775B (de) * | 2004-03-31 | 2006-05-15 | Helmut Dipl Ing Schluderbacher | Verfahren zur sicheren anmeldung an ein technisches system |
US7836492B2 (en) * | 2005-10-20 | 2010-11-16 | Sudharshan Srinivasan | User authentication system leveraging human ability to recognize transformed images |
US8694923B2 (en) | 2005-12-23 | 2014-04-08 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8627237B2 (en) | 2005-12-23 | 2014-01-07 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US10078439B2 (en) | 2005-12-23 | 2018-09-18 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US10754538B2 (en) | 2005-12-23 | 2020-08-25 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8046721B2 (en) | 2005-12-23 | 2011-10-25 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US11086507B2 (en) | 2005-12-23 | 2021-08-10 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8209637B2 (en) | 2005-12-23 | 2012-06-26 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8286103B2 (en) | 2005-12-23 | 2012-10-09 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US11669238B2 (en) | 2005-12-23 | 2023-06-06 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8745544B2 (en) | 2005-12-23 | 2014-06-03 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US7793225B2 (en) | 2005-12-23 | 2010-09-07 | Apple Inc. | Indication of progress towards satisfaction of a user input condition |
US8640057B2 (en) | 2005-12-23 | 2014-01-28 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8527903B2 (en) | 2005-12-23 | 2013-09-03 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US8782775B2 (en) | 2007-09-24 | 2014-07-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9250795B2 (en) | 2007-09-24 | 2016-02-02 | Apple Inc. | Embedded authentication systems in an electronic device |
US9519771B2 (en) | 2007-09-24 | 2016-12-13 | Apple Inc. | Embedded authentication systems in an electronic device |
US9953152B2 (en) | 2007-09-24 | 2018-04-24 | Apple Inc. | Embedded authentication systems in an electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US9495531B2 (en) | 2007-09-24 | 2016-11-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US9329771B2 (en) | 2007-09-24 | 2016-05-03 | Apple Inc | Embedded authentication systems in an electronic device |
US8943580B2 (en) | 2007-09-24 | 2015-01-27 | Apple Inc. | Embedded authentication systems in an electronic device |
US9038167B2 (en) | 2007-09-24 | 2015-05-19 | Apple Inc. | Embedded authentication systems in an electronic device |
US9304624B2 (en) | 2007-09-24 | 2016-04-05 | Apple Inc. | Embedded authentication systems in an electronic device |
US9274647B2 (en) | 2007-09-24 | 2016-03-01 | Apple Inc. | Embedded authentication systems in an electronic device |
US9128601B2 (en) | 2007-09-24 | 2015-09-08 | Apple Inc. | Embedded authentication systems in an electronic device |
US9134896B2 (en) | 2007-09-24 | 2015-09-15 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US10275585B2 (en) | 2007-09-24 | 2019-04-30 | Apple Inc. | Embedded authentication systems in an electronic device |
US8174503B2 (en) | 2008-05-17 | 2012-05-08 | David H. Cain | Touch-based authentication of a mobile device through user generated pattern creation |
JP2011524593A (ja) * | 2008-06-16 | 2011-09-01 | クゥアルコム・インコーポレイテッド | ハッシュ記憶法を生成するための方法および装置 |
WO2010005665A1 (fr) * | 2008-06-16 | 2010-01-14 | Qualcomm Incorporated | Procédé et appareil de génération de mnémoniques de hachage |
US8386461B2 (en) | 2008-06-16 | 2013-02-26 | Qualcomm Incorporated | Method and apparatus for generating hash mnemonics |
US8638939B1 (en) * | 2009-08-20 | 2014-01-28 | Apple Inc. | User authentication on an electronic device |
US8843755B2 (en) | 2009-12-22 | 2014-09-23 | Nokia Corporation | User authentication |
WO2011076982A1 (fr) * | 2009-12-22 | 2011-06-30 | Nokia Corporation | Authentification d'utilisateur |
US8528072B2 (en) | 2010-07-23 | 2013-09-03 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US9740832B2 (en) | 2010-07-23 | 2017-08-22 | Apple Inc. | Method, apparatus and system for access mode control of a device |
US9128614B2 (en) | 2010-11-05 | 2015-09-08 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9146673B2 (en) | 2010-11-05 | 2015-09-29 | Apple Inc. | Device, method, and graphical user interface for manipulating soft keyboards |
US9053294B2 (en) | 2011-04-27 | 2015-06-09 | Vance Burkill | Password generation and recall |
GB2490580A (en) * | 2011-04-27 | 2012-11-07 | Vance Burkill | Generating an alphanumeric password by selecting displayed images |
US11165963B2 (en) | 2011-06-05 | 2021-11-02 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US12262111B2 (en) | 2011-06-05 | 2025-03-25 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US8495714B2 (en) | 2011-07-20 | 2013-07-23 | Bridgewater Systems Corp. | Systems and methods for authenticating users accessing unsecured wifi access points |
US9372978B2 (en) | 2012-01-20 | 2016-06-21 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9213822B2 (en) | 2012-01-20 | 2015-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US10867059B2 (en) | 2012-01-20 | 2020-12-15 | Apple Inc. | Device, method, and graphical user interface for accessing an application in a locked device |
US9223959B2 (en) | 2013-11-08 | 2015-12-29 | Wipro Limited | Systems and methods for authentication based on user preferences |
US9985971B2 (en) | 2015-09-29 | 2018-05-29 | International Business Machines Corporation | Cognitive password entry system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040030934A1 (en) | User selectable authentication interface and universal password oracle | |
WO2002033882A1 (fr) | Interface d'authentication selectionnable par l'utilisateur et oracle mot de passe universel | |
US6735695B1 (en) | Methods and apparatus for restricting access of a user using random partial biometrics | |
US8006291B2 (en) | Multi-channel multi-factor authentication | |
US7028192B2 (en) | Method and apparatus that enable a computer user to verify whether they have correctly input their password into a computer | |
US8516562B2 (en) | Multi-channel multi-factor authentication | |
EP1946514B1 (fr) | Systeme et methode pour effectuer des transactions securisees | |
CN108124482A (zh) | 登录屏幕上可访问的受限访问功能性 | |
JPH11224236A (ja) | 遠隔認証システム | |
WO2009152338A1 (fr) | Authentification à facteurs multiples monovoie | |
WO2007122726A1 (fr) | dispositif de serveur d'authentification, dispositif de terminal, système d'authentification et procédé d'authentification | |
CN101167304A (zh) | 证书界面 | |
CN1281609A (zh) | 利用指纹在网络上分发信息的方法 | |
WO2005022396A1 (fr) | Systeme d'authentification mutuelle entre un utilisateur et un systeme | |
JP2022180640A (ja) | 生体データ照合システム | |
US6304907B1 (en) | Network resource access method and apparatus | |
WO2012011229A1 (fr) | Dispositif de vérification et système de vérification | |
US20100250954A1 (en) | Website login processing method and apparatus | |
CN107517180A (zh) | 登录方法和装置 | |
EP2560122A1 (fr) | Authentification multifactorielle multicanaux | |
JP2002189702A (ja) | 個人認証情報出力装置 | |
JP3704318B2 (ja) | インターネットアクセス機能を持つ携帯装置を用いたユーザ認証システム及びそのユーザ認証装置 | |
JP2003140955A (ja) | 情報処理システム、情報処理プログラム、情報処理プログラムを記録したコンピュータ読み取り可能な記録媒体および情報処理方法 | |
Yampolskiy | Secure network authentication with passtext | |
Eljetlawi et al. | Graphical password: Usable graphical password prototype |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10398774 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: JP |