Secret information identification system

A technology for identifying systems and inputting information, applied in the field of personal information identification systems, to solve problems such as inability to use machines

Inactive Publication Date: 2004-01-07
NEC CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the first type of system, since it allows the user to enter the password countless times, the password is easily deciphered, for example, by using a computer. The function is locked so that it is impossible to continue to enter the password. When the wrong password is accidentally entered, the password input function is locked. In this case, even the real user cannot use the machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information identification system
  • Secret information identification system
  • Secret information identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] refer to figure 1 , the password identification system according to one embodiment of the present invention has the following structure. The user inputs the password PW using an input device 101 such as a keypad IN and other required information. The check permission section 102 will enter the password PW IN converted to a signal with permission S T Corresponding checking part 103. In other words, the check permission section 102 has T And the function of permitting-checking operation. The checking part 103 passes the input password PW IN and a registered password PW pre-stored in memory 104 REG Compare to the input password PW IN Check it out. When the comparison result is "consistent", the lock controller 105 releases the lock of the system 106 . The permission signal generator 107 receives the comparison result from the collation section 103 and changes the generated permission signal S according to the comparison result. T period and generate a permission...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a secret information identification system, an input password (PWIN) is compared with a registered password (PWREG) every time a permission signal (ST) is generated. Lock release permission is given when a comparison result (SCOMP) indicates coincidence. Alternatively, an input password is compared with a registered password and lock release permission is given every time a permission signal is generated when the comparison indicates coincidence. The cycle of generation of the permission signal is elongated as the number of events of non-coincidence in comparison results increases. As a result, the password is not easily broken, and further the password input function is not locked even after input of a wrong password.

Description

technical field [0001] The present invention relates to a personal information identification system, and more particularly to an identification system for checking input confidential information. Background technique [0002] In automatic teller machines and the like equipped in banking systems, users are authenticated by their input of confidential information such as passwords, thereby preventing others from using their accounts. That is, in such a system, an input password is compared with a preset password, so that the machine is allowed to start operating when the two passwords coincide with each other. In such a system, the preset password is usually a fixed password. Several types of such systems are known, wherein the first type allows the user to enter the password an unlimited number of times, and for another type of system, if the number of times the password is entered exceeds a certain given number, the password input function is locked, for example, it will f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07D9/00G06F21/31G06Q10/00G06Q20/18G06Q20/40G06Q40/00G06Q40/02G06Q50/00G07C9/00G07F7/10
CPCG07C9/00142G07F7/1066G07F7/10G06Q20/341G06Q20/4012G07F7/1008G07F7/1083G07C9/33
Inventor 松本真理子
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products