Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for protecting interface access security by combining visual array path with hidden operational character

A technology for accessing resources and users, applied in instruments, digital data authentication, electronic digital data processing, etc., can solve problems such as security vulnerabilities

Inactive Publication Date: 2012-09-26
诺曼・弗兰克・格岑
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the same factors also determine how difficult it is for a person to memorize tokens
Likewise, the number of possible token element values, e.g., is often made larger for pure digits versus digits plus letters to improve security, however, the increase in input set size is usually limited within the total possible value space use common words or numbers
[0005] While a "hint" can be given to the user encouraging them to collect tokens again, such hints also create a potential security hole, as tokens can be discovered by speculating when the hint is given

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting interface access security by combining visual array path with hidden operational character
  • Method and system for protecting interface access security by combining visual array path with hidden operational character
  • Method and system for protecting interface access security by combining visual array path with hidden operational character

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention provides improved security for accessing the system through token or password entry using a method implemented through the execution of program instructions. This technique is suitable for replacing traditional password and PIN entry in computer systems or dedicated terminals such as ATMs. In a computer system, the present invention can be adopted in the operating system of a general-purpose computing system, and can also be embedded in a dedicated application program, or provided through a web interface downloaded from a server, for example, through an extensible markup language (XML) program or java script program. The present invention is generally used to secure access to resources such as system login access, financial information and transaction capabilities at an ATM or login access to other secure resources such as applications or databases.

[0055] Instead of just accepting the input of a password or token and optionally manipulating the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for protecting interface access security by combining a visual array path with a hidden operational character, wherein the method and the system improve the security of a computer system and a special terminal. The method comprises the following steps of: expressing the point that the user input, namely the selection of a pattern element in a prompt display, is received by taking at least one prompt display to be generated in a random way as a digital value array; generating a token from the prompt display by using a predetermined pattern and algorithm while combining with one or a plurality of algorithms of mathematic, relationship and / or logical operation; and comparing the token with the user input to verify whether the user knows the pattern and the algorithm. The method and the system for protecting interface access security by combining a visual array path with a hidden operational character have the advantages that the prompt displayarray can be divided into subarrays while providing clues such as color to the user to express each subarray, and therefore the application is more convenient.

Description

[0001] This application is a divisional application of the patent application No. 200680054245.6 with the filing date of March 1, 2006, and the title of the invention is "Method and System for Protecting Interface Access Security by Combining Visible Array Paths with Hidden Operators". technical field [0002] The present invention relates generally to graphical / text user interfaces, and more particularly to methods and systems for securing access to machine interfaces. Background technique [0003] Computer systems and specialized equipment, such as automated teller machines (ATMs), continually provide access to interfaces that must be protected from unauthorized use. Often such security on user interfaces is provided by a password or "Personal Identification Number" PIN that must be registered on the individual (or, in some cases, another machine) accessing the interface. Provided to the user interface via an input device before further access. [0004] The level of secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/36
Inventor 诺曼·弗兰克·格岑
Owner 诺曼・弗兰克・格岑