CA2495450A1 - A matrix based arrangement and method of graphical password authentication - Google Patents

A matrix based arrangement and method of graphical password authentication Download PDF

Info

Publication number
CA2495450A1
CA2495450A1 CA002495450A CA2495450A CA2495450A1 CA 2495450 A1 CA2495450 A1 CA 2495450A1 CA 002495450 A CA002495450 A CA 002495450A CA 2495450 A CA2495450 A CA 2495450A CA 2495450 A1 CA2495450 A1 CA 2495450A1
Authority
CA
Canada
Prior art keywords
recited
user
password
matrix
indicator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002495450A
Other languages
French (fr)
Inventor
Hai Tao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002495450A priority Critical patent/CA2495450A1/en
Publication of CA2495450A1 publication Critical patent/CA2495450A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A graphical password authentication arrangement and method display a matrix of marks on a display upon a user's request to access a restricted resource. The graphical password authentication arrangement requires the user to enter his or her access password by selecting one or more marks in the matrix on the display with an input device. A
processing means determines whether to grant the user to access the restricted resource by comparing the access password entered with a corresponding file password for the user, which is stored in a storage means.

Description

A MATRIX BASED ARRANGEMENT AND METHOD OF GRAPHICAL
PASSWORD AUTHENTICATION
FIELD OF THE INVENTION
This invention relates to graphical password authentication schemes.
BACKGROUND OF THE INVENTION
Conventional textual password scheme uses a string of alphanumeric characters to identify a user. As people tend to choose inherently weak passwords, i.e.
those passwords easy to remember, instead of strong password, textual password scheme is vulnerable to be attacked.
Graphical password schemes, which take advantage of a person's significant capability to recognize and to recall visual images, will resolve the problems associated with textual password scheme.
U.S. Patent No. 5,559,961 to Blonder, issued September 24, 1996, for example, discloses a graphical password scheme, in which a user is presented with a predetermined graphical image and is required to select one or more predetermined positions (''tap regions") on the image in a predetermined sequence, as a means of entering a password.
The drawback of such a scheme is that the memorable tap regions are usually limited and this leads to a limited effective password space.
Similarly, U.S. Patent No. 5,608,387 to Davies, issued March 4, 1997, teaches another graphical password scheme. Under this scheme, a user is required to select one or more complex human face images as a password. This scheme also suffers from the relatively small password space. For instance, in the case of a 3X4 face matrix, if the length of the password is 6, the full password space amounts to 1263 millions.
U.S. Patent No. 6,686,931 to Bodnar, issued February 3, 2004, discloses a graphical password methodology for a microprocessor device that accepts non-alphanumeric user input. The graphical password comprises a sequence of non-alphabetic keystrokes, such as FORWARD, FORWARD, BACK, BACK, SELECT. The full password space of this scheme is even smaller.
In 1999, Ian Jermyn proposed a graphical password scheme, "draw a secret", in which a user is required to draw a secret design on a grid. [In his paper entitled "The Design and Analysis of Graphical Passwords" in Proceedings of the 8th USENIX
Security Symposium, august 1999] However, in this scheme, many passwords are difficult to remember and repeat, since "difficulties might arise however, when the user chooses a drawing that contains stokes that pass too close to a grid-line". The author gave a tentative solution: "the system does not accept a drawing which contains strokes that are located 'too close' to a grid line". However, it is very difficult to define how close is "too close" in this scheme. Users have to draw their input sufficiently away from the grid lines and marks in order to enter the password correctly. If a user draws a password close to the grid lines or marks, the scheme can not distinguish which cell the user is choosing.
This limitation causes this scheme to require that the cells must be sufficiently large and must not be too small. This limitation also sacrifices the easiness of inputting password, restricts freedom of choosing password (or shapes of drawings), and subsequently reduces the effective password space for this scheme.
In addition, almost all graphical password schemes are subject to shoulder surfing, namely other people can get a user's password easily by watching the user entering his or her password.
SUMMARY OF THE INVENTION
This invention is directed to overcome the foregoing problems and disadvantages of the prior art. In the present invention, a user seeking access to a restricted resource is presented with a matrix of marks on a display and is required to select one or more marks in the matrix as a way of indicating his or her authorization to access the restricted resource.
The invention possesses numerous advantages over the prior art. Firstly, this invention makes use of a matrix of marks instead of using a grid to improve repeatability and easiness of entering password. Secondly, the invention takes advantage of the psychological theory that human has significant capability of recognizing and recalling a visual image than a word. Users can remember a visual password by remembering the corresponding shape of indicators. For example, line indicators can form many alphanumeric characters in different size. This feature could be further exploited in some Asian countries, such as China, Japan and Korea, where users can draw their own characters of their own languages on the matrix. Thirdly, the invention makes use of visual referencing aid to help users to remember their passwords. This expands the memorable password space. Fourthly, by adjusting the size of the matrix, the invention can produce different security levels for authentication. For example, in a 5X5 matrix, if the password length (the number of the corresponding unique values associated with selected marks) is 6, the full password space is (5 x 5)6=2.44X 10g. While in a 13X 13 matrix, if the password length is also 6, the full password space is (13X 13) 6=2.33X 1 p~3 Below is the comparison of the full password spaces of different size matrices.
length=4length=5length=6length=7length=8 M=5, n=5 3.91x1059.77x1062.44x1086.10x1091.53x10' M=7, n=7 5.76x1062.82x10$1.38x10'6.78x10"3,32x10'3 M=9, n=9 4.30x10'3.49x1092.82x10"2.29x10'31.85x10'5 m=13, n=13 8.16x1081.38x10"2.33x10'33.94x10'56.65x10"

m=17, n=19 1.09x10'3.52x10'21.14x10'53.67x10"1.18x102 m=19, n=19 1.70x10'6.13x10'22.21x10'57.99x10"2.88x102 Fifthly, as displaying a matrix on a display usually requires less system resource, such as memory space and display resolution rate, compared with displaying an image, this invention is more cost-effective. Sixthly, long passwords (the number of corresponding unique values associated with selected marks is more than eight) can be remembered easily; the effective password space can be considerably expanded further.
Seventhly, as the invention is language independent, anyone, including illiterate people and young children, can use the invention without difficulty. Finally, by using disguising indicators, this invention effectively resolves the shoulder surfing problem.
According to one aspect of the present invention, it provides an arrangement of graphical password authentication, comprising of a display displaying a matrix of marks 1 S on the display upon user's request for accessing a restricted resource, and an input device for the user to enter password by selecting one or more marks in the matrix for a means of entering password. The arrangement may optionally further comprise a storage means for storing a file password, and a processing means for comparing an access password entered by the user for accessing the restricted resource with the corresponding file password for the user stored in the storage means.
According to another aspect of the present invention, it provides a graphical password authentication method, comprising steps of displaying a matrix of marks on a display upon user's request, and entering an access password by the user using an input device by selecting one or more marks in the matrix. The method may optionally further comprise steps of storing a file password in a storage means, and comparing the entered access password for the user with the corresponding file password for the user stored in the storage means to determine whether access should be granted.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail with reference to the accompanying drawings, in which:
FIG. 1 shows an interface, which displays a matrix of marks along with reference aids on a display;
FIG. 2 shows locating scopes corresponding to each mark;
FIG. 3 shows indicators are being displayed when a user selects marks;
FIG. 4 shows disguising indicators are being used to prevent onlookers from misappropriating a user's access password; and FIG. 5 is a flow diagram illustrating the invention.
DETAILED DESCRIPTION OF THE INVENTION
Referring to the drawings, FIG. 1 shows an interface, which displays a matrix of marks 110 along with reference aids 130. The display can be a monitor of a computer, a screen of a terminal, a screen of a Personal Digital Assistant (PDA) or any other user login interfaces. When a user requests to access a restricted resource, a matrix of marks 110 along with reference aids 130 are shown on the display. The matrix comprises of two or more rows and two or more columns. The number of columns is defined as m, and the number of rows is defined as n, respectively, where m and n are integers, which are greater than one.
Each mark 110 in the matrix has a unique value associated with it. The value is denoted by a coordinate (x, y) E [ I ...m] X [ l ...n].
The mark 110 in the matrix has a specific shape, size and color, which are predefined. In FIG. I, the marks 110 are illustrated as small stars.
Visual aid for referencing position (or reference aid) may be displayed inside the matrix to assist a user to memorize and to correctly enter the password. The number and position of reference aids are predefined. The number of reference aids could be zero.
The reference aids can have a specific shape, size, pattern and color. The shape, size and color of reference aids are predefined.

In FIG. l, reference aids 130 are used to help users to memorize their passwords.
In FIG. l, reference aids 130 are illustrated as shaded areas in the marks 110.
A user is required to select one or more marks 110 in the matrix as a means of entering his or her password. The input device could be a mouse, a stylus, a keyboard or any other suitable input devices.
FIG. 2 shows locating scopes 200, which correspond to each mark 110. A
locating scope 200 is defined as an area surrounding a mark 110. The purpose of the locating scope 200 is to increase the possibility for a user to select the mark 110 successfully. The locating scope 200 has a specific size and shape, which are predefined.
Locating scopes 200 are invisible to the users. In other words, the locating scopes 200 are not shown on a display.
A user may select marks 110 either intermittently or continuously.
Selecting marks 110 intermittently means that the user selects one mark 110 at one time. A user can click, touch or tap on anywhere inside of the corresponding locating scope 200 with an input device.
Selecting marks 110 continuously means that a user selects two or more marks 110 sequentially without a break with an input device. To select marks 110 continuously, a user can pass through the corresponding locating scopes 200 with input device sequentially without a break.

Below we give an example of the operations of selecting marks 110 continuously.
In practice, software and hardware designers can define their own operation rules.
If input device is a mouse, a user can start by pressing down and holding the left button of the mouse on a starting mark 110. The user then continues to drag the mouse while Keep holding the left button. All the marks 110 with corresponding locating scopes 200 which the mouse pointer passed through are selected. Releasing the left button ends the selection.
If input device is a stylus, the operation could be simpler. A user can simply pass through the corresponding locating scopes 200 on the display with the stylus.
All the marks 110 whose corresponding locating scopes 200 have been touched by the stylus are selected. Lifting the stylus from the display surface ends the selection.
Means to indicate or notify the user acknowledging their input is often quite useful. Such indicator means may be visual dots, lines or audible sound generated simultaneously in response to the user input. Alternatively, it may be visual indicator located outside the matrix, displaying an indicator with predetermined shape, size and color simultaneously in response to the user input.
FIG. 3 shows how visual indicators are displayed when a user selects the marks 110 as his or her password.
When a user selects marks 110 intermittently, a dot indicator 300 may appear on the selected mark 110 in response to each selection. Dot indicators 300 have specific shape, size and color. The shape, size and color of dot indicators 300 are predetermined.
In FIG. 3, dot indicators 300 are black circles.
Whenever two marks are selected continuously, a line indicator 350 appears from the center of the first selected mark to the center of the second selected mark. A line indicator 350 could be horizontal, vertical or diagonal. Line indicators 350 have a specific shape, size, style and color. The shape, size, style and color of line indicators 350 are predefined. In FIG 3, the line indicators 350 are black bolded lines.
A mark 110 can be selected more than one time. If a mark 110 is selected intermittently more than one time, only one dot indicator 300 may be displayed. If two marks 110 are selected continuously more than one time, only one line indicator 350 may be displayed.
In order to draw a password like illustrated in FIG. 3, for example, a user select mark (I,5) and (2,5) intermittently by clicking any point inside the corresponding locating scopes 200 of the marks 110 with the input device. The dot indicators 300 appear simultaneously in response to the user selects the marks accordingly.
Then the user selects marks 110 continuously to draw a shape of letter "W"
with one stroke. In order to draw this using a mouse, for example, the user can press the left button (select button) of the mouse on the starting mark (1,4), and pass through (1,3) while keeps holding the left button of the mouse. As soon as the mouse touches the corresponding locating scope 240 ofthe mark (1,3), a line indicator 350 appears from the center of mark (I,4) to the center of mark (1,3). Then, the user passes from (I, 3) through (1,2), (2,3), (3,2), (3,3), and to the end mark (3,4), and then, release the left button. Line indicators 350 appear correspondingly to shape the letter "W" as shown in FIG.
3. To draw a shape of number "7" with one stroke, the user selects continuously using the mouse by holding the left button down from the starting mark (4,3), pass through (5,3) and (5,2), to the end mark (5,1 ), and then release the button. Line indicators 350 appear correspondingly.
A ''pen-up" event happens whenever a user releases the left button (or lift the stylus from the display surface) after and only after a user selected two or more marks continuously. A specific value, or pen-up value, which is expressed in the same manner as for the mark but is a different value from ones for marks, is used to denote the "pen-up" event, i.e., ((m+1), (n+1)). In FIG 3, as m=5 and n=5, so "pen-up" event may be denoted by coordinate (6,6). The value of "pen-up" event (or pen-up value) may be inserted into the sequence of selecting marks to indicate where and when the break happens while a user selects marks continuously. When the user selects marks intermittently by clicking or tapping one mark at a time, there is no "pen-up"
event happened.
In FIG 3, the password can be, then, denoted by a coordinate sequence with ''pen-up" events as follows:
(1,5), (2,5), (1,4), (1,3), (1,2), (2,3), (3,2), (3,3), (3,4), (6,6), (4,3), (5,3), (5,2), (5,1 ), (6,6) In this case, the length of the password is 15.

Although this password is very long, we still can remember it by remembering two dots and letter "W" and number "7".
Two passwords are deemed to be identical if they can be denoted by the same length and same coordinate sequence.
An access password is a password, which a user enters to request access to a restricted resource. A file password is a password that stored in a storage means, which may be individually configured by the user or by a system administrator, or may be configured randomly by a processing means. File passwords can be encrypted by a processing means using an encryption algorithm, and the result of the encryption is stored in a storage means of this arrangement to improve the security of passwords.
After the user enters his or her access password, processing means encrypts the access password and compares the result with the encrypted file password stored in the storage means, and decides whether the user is granted the access to a restricted resource.
The password could also be a set of selected marks, namely the sequence in which the marks are selected and the "pen-up" event are immaterial. In the case of FIG. 3, the password can be denoted by a set of coordinates:
{ (1,5), (2,5), (1,4), (1,3), (1,2), (2,3), (3,2), (3,3), (3,4), (4,3), (5,3), (5,2), (5,1)~
In this case, the length of the password is 13.
This option allows passwords to be memorized easily and, at the same time, reduces password space.

FIG. 4 shows how disguising indicators can prevent onlookers from getting the passwords.
To prevent onlookers from stealing a user's password by watching in the user's vicinity, disguising indicators can be used. In response to the user input, one or more disguising dot indicator 400 or disguising line indicator 450 may be displayed on randomly chosen positions along with the true dot indicator 300 or line indicator 350. A
disguising dot indicator 400 and disguising line indicator 450 has the same style, shape, color and size as the real dot indicator 300 and line indicator 350.
FIG. 5 is a flow diagram to illustrate how the invention can be used.
The steps for a user to create a new file password are as follows:
A matrix of marks 110 and reference aids 130 are displayed on the display, at step 512. The user is, then, required to select one or more marks 110 in the matrix. After the user completes entering his or her file password by selecting one or more marks 110 in the matrix, at step 514, the corresponding coordinate sequence is recorded, at step 516, and the user is prompted to enter his or her file password again, at step 518.
After the user inputs his or her file password for the second time, at step 520, the corresponding coordinate sequence is recorded, at step 522. These two coordinate sequences are compared by a processing means, at step 524. If they match, this coordinate sequence is stored in a storage means as the user's new file password, and the user is informed that the file password has been successfully created, at step 526. If they do not match, the user is informed that these two file passwords do not match and the user is required to input his or her file password again from the beginning, until the user inputs two identical file passwords.
After a new file password is created, a user is required to enter his or her access password before he or she is given access to a restricted resource. When a user requests to access to the restricted resource, a matrix of marks 110 and reference aids 130 are displayed on the display, and the user is required to select one or more marks 110 in the matrix at step 530. After the user completes entering his or her access password by selecting one or more marks 110 in the matrix, at step 532, the corresponding coordinate sequence is recorded, at step 534. The processing means compares this access password with the corresponding file password for the user stored in the storage means at step 536.
If they match, the user is granted to access to the restricted resource at step 538; if they do not match and the user has entered an access password for three times or more, the user is denied access the restricted resource, at step 542; if they do not match and the user has not entered the access password for three times or more, the user is informed that the I S access password he or she entered is incorrect, and is required to enter his or her access password again. The number of attempts that a user is allowed to enter wrong password consecutively is predefined. In our example here, the times that a user is allowed to enter wrong password consecutively is three.
While the invention has been described with reference to preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalent elements may be substituted for elements ofthe invention without departing from the scope of the present invention. In addition, modifications may be made to adapt a particular situation to the teachings ofthe present invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention include all embodiments falling within the scope of the appended claims.

Claims (45)

1. A graphical password authentication arrangement comprising:
(i) a display for displaying a matrix of marks on said display upon a user's request for accessing a restricted resource; and (ii) an input device for entering a password by said user by selecting one or more said marks in said matrix on said display.
2. The arrangement as recited in claim 1, further comprising:
(i) a storage means for storing a file password; and (ii) a processing means for comparing an access password entered by said user for accessing said restricted resource with said corresponding file password for said user stored in said storage means.
3. The arrangement as recited in any of claims 1 or 2, wherein said marks have a predetermined shape, size and color.
4. The arrangement as recited in any of claims 1 to 3, wherein said display includes predetermined number of reference aids having predetermined shape, size and color, wherein said reference aids are placed at predetermined positions along said matrix on said display.
5. The arrangement as recited in claims 1 to 3, wherein each of said mark in said matrix corresponds with a unique value.
6. The arrangement as recited in claim 5, wherein said unique value is a coordinate in said matrix.
7. The arrangement as recited in claim 1 to 2, wherein said password is comprising of a sequence of selecting one or more of said mark(s) in said matrix on said display.
8. The arrangement as recited in claim 7, wherein a "pen-up" event corresponds with a pen-up value, wherein said pen-up value is expressed in the same manner as for said mark.
9. The arrangement as recited in claim 8, wherein said password further comprising of said pen-up value.
10. The arrangement as recited in claim 1, wherein said password comprises a set of mark(s) selected from said matrix on said display.
11. The arrangement as recited in claim 1, wherein said mark has a corresponding locating scope around it, whereby said user selects one of said marks by touching inside an area of said corresponding locating scope with using said input device, wherein said touching includes tapping inside said area of said locating scope and passing through said area of said locating scope with said input device.
12. The arrangement as recited in claim 11, wherein said locating scope of said mark has a predetermined size and shape.
13. The arrangement as recited in claim 1 to 2, wherein an indicator means is provided to notify and acknowledge the user's input.
14. The arrangement as recited in claim 13, wherein said indicator means is an audible sound generated simultaneously as a response to user input.
15. The arrangement as recited in claim 13, wherein said indicator means is a visual dot indicator appeared simultaneously on selected mark in said matrix as a response to user input, and said visual dot indicator has a predetermined size, shape and color.
16. The arrangement as recited in claim 13, wherein said indicator means is a visual dot indicator appeared simultaneously outside said matrix to notify users input is accepted, and said visual dot indicator has a predetermined size, shape and color.
17. The arrangement as recited in claim 13, wherein said indicator means is more than one dot indicators appearing simultaneously on marks including selected mark in said matrix on said display to disguise a true input entered by a user, and said visual dot indicator has a predetermined size, shape and color.
18. The arrangement recited in claim l3, wherein said indicator means is a visual line indicator appeared simultaneously whenever two marks are continuously selected without a break, and said visual line indicator is drawn from the center of the first selected mark to the center of the second selected mark in said matrix as a response to user input, and said line indicator has a predetermined style, size, shape and color.
19. The arrangement as recited in claim 13, wherein said indicator means is more than one visual line indicators appearing simultaneously in said matrix on said display to disguise a true input entered by a user, and said visual line indicator has a predetermined style, size, shape and color.
20. The arrangement as recited in claim 2, wherein said storage means is configured to accept and to store a new file password for a user.
21. The arrangement as recited in claim 2, wherein said file passwords stored in said storage means are encrypted by a processing means.
22. The arrangement as recited in claim 21, wherein said processing means is configured to encrypt and decrypt said file passwords.
23. A graphical password authentication method comprising:
(i) displaying a matrix of marks on a display upon a user's request to access a restricted resource; and (ii) entering a password by said user using an input device by selecting one or more said marks in said matrix.
24. The method as recited in claim 23, further comprising (i) storing a file password in a storage means; and (ii) comparing an access password entered by said user with said file password corresponding to said user stored in said storage means to determine whether access is to be granted.
25. The arrangement as recited in any of claims 23 or 24, wherein said marks have a predetermined shape, size and color.
26. The method as recited in any of in claim 23 to 25, wherein said display includes predetermined number of reference aids having predetermined shape, size and color, and said reference aids are placed at predetermined positions along said matrix on said display.
27. The method as recited in any of claims 23 to 25, wherein each of said mark in said matrix corresponds with a unique value.
28. The method as recited in claim 27, wherein said unique value is a coordinate in said matrix.
29. The method as recited in claim 23 to 24, wherein said password is comprising of a sequence of selecting one or more of said mark(s) in said matrix on said display.
30. The arrangement as recited in claim 29, wherein a "pen-up" event corresponds with a pen-up value, wherein said pen-up value is expressed in the same manner as for said mark.
31. The arrangement as recited in claim 30, wherein said password further comprising of said pen-up value.
32. The method as recited in claim 23, wherein said password comprises a set of mark(s) selected in said matrix on said display.
33. The method as recited in claim 23, wherein said mark has a corresponding locating scope around it, whereby said user selects one of said marks by touching inside an area of said corresponding locating scope by using said input device, wherein said touching includes tapping inside said area of said locating scope and passing through said area of said locating scope with said input device.
34. The method as recited in claim 33, wherein said locating scope of said mark has a predetermined size and shape.
35. The method as recited in claim 23 to 24, wherein an indicator means is used to notify and acknowledge the users input.
36. The method as recited in claim 35, wherein said indicator means is an audible sound generated simultaneously as a response to user input.
37. The method as recited in claim 35, wherein said indicator means is a visual dot indicator appeared simultaneously on selected mark of said matrix as a response to user input, and said visual dot indicator has a predetermined size, shape and color.
38. The method as recited in claim 35, wherein said indicator means is a visual dot indicator appeared simultaneously at predetermined location outside said matrix to notify users input is accepted, and said visual dot indicator has a predetermined size, shape and color.
39. The method as recited in claim 35, wherein said indicator means is more than one dot indicators appearing simultaneously on marks including selected mark in said matrix for disguising a true input entered by a user, and said visual dot indicator has a predetermined size, shape and color.
40. The method recited in claim 35, wherein said indicator means is a visual line indicator appeared simultaneously whenever two marks are continuously selected without a break, and said visual line indicator is drawn from the center of the first selected mark to the center of the second selected mark in said matrix as a response to user input, and said line indicator has a predetermined style, size, shape and color.
41. The method as recited in claim 35, wherein said indicator means is more than one visual line indicators appearing simultaneously in said matrix on said display to disguise a true input entered by a user, and said visual line indicator has a predetermined style, size, shape and color.
42. The method as recited in claim 24, wherein said storage means is configured to accept and to store a new file password for a user.
43. The method as recited in claim 24, wherein said file passwords stored in said storage means are encrypted by a processing means.
44. The method as recited in claim 43, wherein said processing means is configured to encrypt and decrypt said file passwords.
45. An article of manufacture comprising:
(i) computer-readable program code module for handling user input from an input device;
(ii) computer-readable program code module for manipulating a display displaying a matrix of marks and requiring the user to enter password by selecting one or more marks in said matrix on said display;
(iii) computer-readable program code module for manipulating a storage means to register and to store file passwords; and (iv) computer-readable program code module for manipulating a processing means for determining user access to a restricted resource by comparing an entered access password with said file password corresponding to said user, wherein said file password is stored in said storage means.
CA002495450A 2005-01-31 2005-01-31 A matrix based arrangement and method of graphical password authentication Abandoned CA2495450A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002495450A CA2495450A1 (en) 2005-01-31 2005-01-31 A matrix based arrangement and method of graphical password authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002495450A CA2495450A1 (en) 2005-01-31 2005-01-31 A matrix based arrangement and method of graphical password authentication

Publications (1)

Publication Number Publication Date
CA2495450A1 true CA2495450A1 (en) 2006-07-31

Family

ID=36764072

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002495450A Abandoned CA2495450A1 (en) 2005-01-31 2005-01-31 A matrix based arrangement and method of graphical password authentication

Country Status (1)

Country Link
CA (1) CA2495450A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009022242A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Graphical image authentication
US11709925B1 (en) * 2018-09-27 2023-07-25 Amazon Technologies, Inc. Visual token passwords

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009022242A1 (en) * 2007-08-13 2009-02-19 Sony Ericsson Mobile Communications Ab Graphical image authentication
US8090201B2 (en) 2007-08-13 2012-01-03 Sony Ericsson Mobile Communications Ab Image-based code
US11709925B1 (en) * 2018-09-27 2023-07-25 Amazon Technologies, Inc. Visual token passwords

Similar Documents

Publication Publication Date Title
CA2495445A1 (en) An arrangement and method of graphical password authentication
US10176315B2 (en) Graphical authentication
AU2006307996B2 (en) Method and system for secure password/PIN input via mouse scroll wheel
US6209104B1 (en) Secure data entry and visual authentication system and method
US8212833B2 (en) Secure computer screen entry system and method
EP2763070B1 (en) Graphical user interface (GUI) that receives directional input to change face for receiving passcode
US8362875B2 (en) Secure system for non-covert user authentication and identification
US9589125B2 (en) 3D pass-go
US20100175016A1 (en) Security key inputting system for touch screen device
JP5996165B2 (en) Method and apparatus for generating a secret value
WO2001077792A2 (en) System and method for authenticating a user
JPH1097500A (en) Method for logging on computer system
US20140043243A1 (en) System and method for enhancing device passcode security
CN103996011A (en) Method and device for protecting codes to be input safely
US8117652B1 (en) Password input using mouse clicking
TWI599914B (en) Password input system and method for inputting password
Ritter et al. Miba: Multitouch image-based authentication on smartphones
Zhou et al. A comparison of a touch-gesture-and a keystroke-based password method: toward shoulder-surfing resistant mobile user authentication
WO2019137489A1 (en) Password input method, device, and computer-readable storage medium
CA2495450A1 (en) A matrix based arrangement and method of graphical password authentication
Salman et al. A graphical PIN entry system with shoulder surfing resistance
Umar et al. Graphical user authentication: A time interval based approach
CN111552948A (en) Electronic terminal unlocking method
Gao et al. Usability and security of the recall-based graphical password schemes
KR20080011362A (en) Method for hacking protection of gotp

Legal Events

Date Code Title Description
FZDE Dead