Method and device for entering a computer database password

a database and password technology, applied in the computer field, can solve the problems of insufficient security of passwords, small number of password patterns that could be generated, and unauthorized persons' supervision and repeating of processes, so as to improve the number of possible combinations, prevent learning, and protect the user's password.

Inactive Publication Date: 2009-07-09
RUDDY THOMAS R
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008]The object of the present invention is to provide a method and apparatus for entering a password to gain access to computer databases, that would overcome the aforementioned problems of the prior art. The present invention provides the following technical result: efficient protection of the user's password from reproduction by an unauthorized person, substantially increased number of possible combinations to prevent learning the password by trial and error, and at the same time provision of passwords that are maximum easy for the users to memorize and convenient to enter.

Problems solved by technology

The password, however, suffers from insufficient security.
Firstly, an unauthorized person can oversee and repeat the process of entering data of the password.
Secondly, the number of password patterns that could be generated is small and the patterns are easy to produce by trial and error.
In addition to the insufficient security, the prior art method suffers one problem more—not every password selected by the user can be easily memorized.
To gain access to numerous databases, the user must remember a plurality of different password patterns, which becomes impossible due to abundance of such systems.
Security provided by the method is quite high, but the required additional logical operations increase load on the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for entering a computer database password
  • Method and device for entering a computer database password
  • Method and device for entering a computer database password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]In a first embodiment of a method is accordance with the present invention (FIG. 1), a user predetermines a number of screens, type of images to be displayed of each of the screens, a number of objects to be displayed on each of the screens, and an order and screen on which the objects of the dynamic image are to be selected. The user further determines which contact means (e.g. left or right button of a mouse or a certain key on a keyboard, etc.) will be used to point the time of appearance of a predetermined object on a screen. The predetermined object of the dynamic image is an object that has taken a user-conceived position in space and / or state in time.

[0028]The user can further determine which of the screens are significant for entering a password and which are not, i.e. which of the screens will be used to enhance security of the password entry. Respective user's settings are registered in software.

[0029]According to FIG. 1, a user is suggested to monitor appearance of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to computers, more particularly to a method and apparatus for entering a password to gain access to computer databases. The object of the invention is to provide efficient protection of the user's password from reproduction by an unauthorized person, to substantially increase the number of possible combinations and to create passwords that are maximum easy for the users to memorize. An embodiment of the invention comprises entering parameters of a password entry dynamic image to a computer; displaying to the user the dynamic image with the selected parameters; pointing at least one predetermined object of the dynamic image that has taken a user-predetermined position in space and / or state in time. Another embodiment comprises setting a predetermined access code in the form of a rhythmic pattern; preliminary entering said rhythmic pattern via a user's entry device to a computer to store and use the rhythmic pattern in subsequent password entries; when entering the password, entering said rhythmic pattern via a set of contact means of the user's entry device.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a divisional of prior application Ser. No. 10 / 484,711, filed Jan. 26, 2004, in the U.S. Patent and Trademark Office, and PCT Application PCT / RU01 / 00315 filed on Jul. 27, 2001, the disclosures of which are incorporated herein in their entirety by reference.BACKGROUND[0002]1. Field of the Invention[0003]The present invention relates to computers and specifically relates to a method for entering a password to gain access to computer databases and an apparatus for implementing the method.[0004]2. Description of the Related Art[0005]A method is known for entering a graphical password which requires a user to touch, via a mouse, areas of a graphical image on a display in a predetermined sequence (U.S. Pat. No. 5,559,961, IPC G06F 11 / 00, published on Sep. 24, 1996).[0006]The password, however, suffers from insufficient security. Firstly, an unauthorized person can oversee and repeat the process of entering data of the passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32G06F3/048G06F21/00G06F1/00G06F12/00G06F21/36
CPCG06F21/36G06F1/00
Inventor RUDDY, THOMAS R.
Owner RUDDY THOMAS R
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products