TWI268690B - A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system - Google Patents
A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the systemInfo
- Publication number
- TWI268690B TWI268690B TW094111395A TW94111395A TWI268690B TW I268690 B TWI268690 B TW I268690B TW 094111395 A TW094111395 A TW 094111395A TW 94111395 A TW94111395 A TW 94111395A TW I268690 B TWI268690 B TW I268690B
- Authority
- TW
- Taiwan
- Prior art keywords
- password
- characters
- authorized access
- identification background
- user
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a method for verifying authorized access, and more particularly to one which verifies authorized access through an improved password entry mode. It can prevent any theft behavior of password, and also guarantee easier memory of password. The feature of improved password entry mode lies in: the user can memorize at least one position relative to identification background, the sequence and number of position. The entry of password is by characters. Since these characters are generated randomly, the password characters may differ whenever you login the system. The method of verifying the authorized access include the following steps: (1) entering user's ID; (2) judging if it's an authorized user's ID, if yes, proceeding with step (4), if not, proceeding with the next step; (3) displaying an image according to predefined identification background wherein, this indicates the entry rule for a specified region of the identification background in order to enter and set the password, and the password is a password region sequence comprising one or several specified regions; (4) the image generated dynamically by the predefined identification background indicating a dynamic entry rule corresponding to a specified region of the identification background, entering the password, then verifying the authorized access; (5) finished.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW094111395A TWI268690B (en) | 2005-04-11 | 2005-04-11 | A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW094111395A TWI268690B (en) | 2005-04-11 | 2005-04-11 | A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200637324A TW200637324A (en) | 2006-10-16 |
| TWI268690B true TWI268690B (en) | 2006-12-11 |
Family
ID=57809574
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW094111395A TWI268690B (en) | 2005-04-11 | 2005-04-11 | A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI268690B (en) |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
| US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
| US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
| US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
| US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
| US8739261B2 (en) | 2011-08-31 | 2014-05-27 | International Business Machines Corporation | Dynamically providing algorithm-based password/challenge authentication |
| US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
| US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
| US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
| US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
| US9064104B2 (en) | 2009-06-18 | 2015-06-23 | Blackberry Limited | Graphical authentication |
| US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
-
2005
- 2005-04-11 TW TW094111395A patent/TWI268690B/en not_active IP Right Cessation
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9064104B2 (en) | 2009-06-18 | 2015-06-23 | Blackberry Limited | Graphical authentication |
| US10325086B2 (en) | 2009-06-18 | 2019-06-18 | Blackberry Limited | Computing device with graphical authentication interface |
| US10176315B2 (en) | 2009-06-18 | 2019-01-08 | Blackberry Limited | Graphical authentication |
| TWI557588B (en) * | 2009-06-18 | 2016-11-11 | 黑莓有限公司 | Computing device with graphical authentication interface |
| US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
| US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
| US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
| US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
| US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
| US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
| US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
| US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
| US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
| US10621328B2 (en) | 2010-12-16 | 2020-04-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
| US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
| US8739261B2 (en) | 2011-08-31 | 2014-05-27 | International Business Machines Corporation | Dynamically providing algorithm-based password/challenge authentication |
| US8745712B2 (en) | 2011-08-31 | 2014-06-03 | International Business Machines Corporation | Dynamically providing algorithm-based password/challenge authentication |
Also Published As
| Publication number | Publication date |
|---|---|
| TW200637324A (en) | 2006-10-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2240912B1 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
| TWI268690B (en) | A method for verifying authorized access memorizing at least one position relative to identification background, the sequence and number of position by the user, wherein characters are generated randomly and different in logging-in the system | |
| WO2010039788A3 (en) | Processor boot security device and methods thereof | |
| EP1571601A3 (en) | Combined individual authentication system | |
| US20110121943A1 (en) | Biometric remote control device and methods and computer program product for operating the same | |
| JP2019008702A (en) | Authentication apparatus | |
| US9122857B1 (en) | Authenticating a user in an authentication system | |
| JP2006306191A (en) | Personal authentication system for vehicle | |
| KR101737082B1 (en) | Image forming apparatus and method for executing user authentication using smart card | |
| ES2819098T3 (en) | Access control procedure to a secure area of a computer, computer program, computer support and associated equipment | |
| KR20130076213A (en) | Device for authentication of driver using body type information of driver and method thereof | |
| CN110843728B (en) | Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device | |
| JP4512010B2 (en) | Authentication system, authentication method, data control apparatus, and program thereof | |
| CN104717641B (en) | A kind of digital signature generation method and SIM card based on SIM card | |
| JP6048309B2 (en) | In-vehicle device | |
| JP7400876B2 (en) | Display control system, display control method, and computer program | |
| JP4382615B2 (en) | Electronic signature device | |
| JP6906866B2 (en) | Security device and vehicle equipped with it, authentication method | |
| JP2007310819A (en) | Password generation method with improved resistance to password analysis and authentication device using this password | |
| KR101559271B1 (en) | Security authentification method using security depth value | |
| JP4675764B2 (en) | Electronics | |
| KR20100049885A (en) | Smart key system and performance method thereof | |
| JP2010140379A (en) | Authentication device | |
| JP2007272662A (en) | Password authentication method and password authentication apparatus | |
| CN110395216B (en) | Vehicle unlocking and locking control method based on mobile terminal and mobile terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |