NL1037289A - System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system. - Google Patents

System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system. Download PDF

Info

Publication number
NL1037289A
NL1037289A NL1037289A NL1037289A NL1037289A NL 1037289 A NL1037289 A NL 1037289A NL 1037289 A NL1037289 A NL 1037289A NL 1037289 A NL1037289 A NL 1037289A NL 1037289 A NL1037289 A NL 1037289A
Authority
NL
Netherlands
Prior art keywords
symbols
rows
strips
matrix
row
Prior art date
Application number
NL1037289A
Other languages
Dutch (nl)
Other versions
NL1037289C2 (en
Inventor
Pieter Klaas Vries
Original Assignee
Pieter Klaas Vries
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pieter Klaas Vries filed Critical Pieter Klaas Vries
Priority to NL1037289A priority Critical patent/NL1037289C2/en
Publication of NL1037289A publication Critical patent/NL1037289A/en
Application granted granted Critical
Publication of NL1037289C2 publication Critical patent/NL1037289C2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/38Encryption being effected by mechanical apparatus, e.g. rotating cams, switches, keytape punchers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1033Details of the PIN pad
    • G07F7/1041PIN input keyboard gets new key allocation at each use
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/04Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system with sign carriers or indicators moved relative to one another to positions determined by a permutation code, or key, so as to indicate the appropriate corresponding clear or ciphered text
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Description

SYSTEM FOR MANAGING PERSONAL PASSWORDS, A KIT-OF-PARTS, A PROCESS, A COMPUTER PROGRAM, A COMPUTER PROGRAM PRODUCT,
AND A COMPUTER SYSTEM
The invention relates to a system for managing personal passwords, a kit-of-parts comprising the system for managing personal passwords, and a process, a computer program, a computer program product and a computer system associated with the system for managing personal passwords.
In recent years, the number of users of information systems, including computers and the internet, has been growing tremendously. Accessing many of these systems requires the use of a personal password, which is intended to be known solely to the user. Nowadays, users are confronted with the need to manage a multitude of such personal passwords. It would be beneficial if users would have at their disposal a convenient system in which they could store personal passwords, and retrieve the personal passwords when desired, without the danger that the personal passwords become known to others.
Systems for managing personal passwords comprising a carrier having a carrier surface displaying a matrix comprising symbols arranged in rows and columns are known in the art, for example from US Patent Application Publication US 2007/0089166 A1 and from Netherlands Patent publications 1000548 and 1004800.
The Netherlands Patent publications 1000548 and 1004800 disclose such systems wherein the matrix comprises a row, representing an index row, in which the symbols comprise characters arranged in alphabetical order. The personal passwords are retrieved by overlaying the matrix with a mask and reading in a predetermined order from the visible symbols only those symbols which are positioned in a certain pattern relative to the mask. In principle, for each personal password to be retrieved, the user may need to remember the position of the mask relative to the carrier, the pattern and the order. A plurality of carriers displaying different matrices may be used, in which case the user needs to remember also the carrier which is associated with the personal password to be retrieved.
The invention provides a system for managing personal passwords comprising - a holder adapted to hold a carrier having a carrier surface displaying a matrix which matrix comprises symbols arranged in a plurality of rows and a plurality of columns, of which a row, representing an index row, comprises, as symbols, characters and/or numbers arranged in a systematic order, and - a plurality of translucent or transparent strips displaying at least one marking such that symbols of the rows of the displayed matrix can be marked visibly by overlaying the rows with the strips, wherein the holder is further adapted to hold the strips such that, when the holder holds the carrier and the strips, the strips overlay displayed rows, other than the index row, and the strips are slideable in the longitudinal direction of the displayed rows.
The invention also provides a process for storing one or more personal passwords in a matrix according to the invention, which process comprises assembling the matrix by a. populating the index row, b. composing a main password which consists of symbols selected from the index row, the number of symbols being at least the number of symbols of the personal password having the most symbols, c. if personal passwords have less symbols than the main password, extending such personal passwords with one or more separation symbols, wherein the separation symbol is a symbol not occurring in the one or more personal passwords, d. selecting in respect of the main password a marking appearing on the strips, e. selecting in respect of each personal password a marking appearing on the strips, f. determining in respect of each symbol of the main password a start position in a row, other than the index row, such that - adjacent symbols in the main password correspond with starting positions in adjacent rows in a predetermined order, and - a respective start position is in the same column as the respective symbol of the main password appearing in the index row, g. populating selected positions in the rows, other than the index row, with the symbols of the personal passwords, or the extended personal passwords as the case may be, such that for each (extended) personal password - adjacent symbols, including separation symbols, if any, are positioned in adjacent rows in the predetermined order, and - upon overlaying a row with a strip with the marking selected for the main password marking the respective start position in the row, the respective symbol of the (extended) personal password appears in the position marked by the marking selected for the personal password, and h. populating positions, other than the selected positions as defined in step g, in a random manner with symbols.
In embodiments of the process for storing one or more personal passwords wherein step h precedes step g, step h is further defined by comprising populating the positions of the rows, other than the index row, with randomly selected symbols, and step g is further defined by comprising populating the selected positions in the rows by replacing in the selected positions randomly selected symbols by symbols of the (extended) passwords.
In embodiments of the process for storing one or more personal passwords wherein step g precedes the step h, step h is further defined as comprising populating with randomly selected symbols the positions which have not yet been populated.
The invention also provides a process for preparing the carrier having the carrier surface displaying the matrix according to the invention, which process comprises - assembling the matrix by the steps of the invented process, and - visualizing the rows of the matrix, other than the index row(s), on the carrier.
The invention also provides a kit-of-parts comprising - a system for managing personal passwords according to this invention, and - a computer program product comprising a memory medium and a computer readable program code recorded on the memory medium, wherein the computer readable program code is suitable for instructing a central processing unit to execute process steps of any of the invented processes.
The invention also provides a computer program comprising a computer readable program code for instructing a cehtral processing unit of a computer system to execute process steps of any of the invented processes.
The invention also provides a computer program product comprising a memory medium and a computer readable program code recorded on the memory medium, wherein the computer readable program code is suitable for instructing a central processing unit to execute process steps of any of the invented processes.
The invention also provides a computer system comprising a computer program product according to the invention and a central processing unit configured to receive and execute instructions read from the computer program product.
It is an advantage of this invention that many personal passwords may be stored in a single matrix, so that many personal passwords may be retrieved form a single carrier.
When retrieving a personal password using the invented system, the user of the system needs to remember the main password, the markings for the main password and the predetermined order. Remembering a main password, which main password may be simple and may be selected by the user himself, and certain markings, which may be as simple as colour markings, is generally more easy than remembering the position of a mask and remembering certain patterns of positions relative to the mask, as required in respect of the systems known from the 1000548 and 1004800 Patent publications, referred to hereinbefore. Further, the invention allows for the storage of relatively many personal passwords in a relatively small matrix, i.e. a matrix having few columns, and also, as appropriate for the length of the personal passwords, few rows. Such small matrices may be displayed on a relatively small carrier, still using relatively large symbols. Such small matrices having large displayed symbols are comfortable in their use, in particular when used by elderly people or under conditions of, for example, poor lighting. These are unexpected advantages of the invention over the prior art.
FIG. 1 is a perspective view of a carrier which may be used in this invention, which carrier has a carrier surface displaying a matrix FIG. 2 is a perspective view of a system for managing passwords according to this invention.
FIGS. 3 and 4 are perspective views of a system for managing passwords according to this invention which includes a carrier.
FIG. 5 is a perspective view of a further system for managing passwords according to this invention which includes a carrier.
FIG. 6 is a schematic représentation of a computer system in accordance with this invention.
The carrier for use in this invention has a carrier surface displaying a matrix of symbols. The symbols are arranged in the rows and the columns of the matrix. Such rows may be oriented perpendicular to the columns, but such orientation is not essential to the invention. It is also not essential whether the columns are placed vertically and read from top to bottom or from bottom to top, and the rows are placed horizontally and read from left to right or from right to left; or whether the rows are placed vertically and read from top to bottom or from bottom to top, and the columns are placed horizontally and read from left to right or from right to left. It is also not essential to the invention whether the symbols are oriented upwardly, upside down or laying on one side or another side, and whether the symbols have the same orientation. For the sake of convenience when using the system, it is advantageous to have the symbols in the same orientation.
In the practice of this invention, the symbols may typically be selected from characters, numbers and punctuation marks. Characters may be upper-case letters, lowercase letters or combinations of upper-case letters and lower-case letters. Numbers may be any number from 0 to 9. Examples of suitable punctuation marks include, for example, the following: period ampersand (“&”), parenthesis (“(“ or “)”), angle bracket (“<” or apostrophe (“ ’ ”), brace (“{” or “}”), bracket (“[” or “]”), colon comma exclamation mark (“!”), hyphen question mark (“?”), quotation mark (“ “ ” or “ ” ”), semicolon slash (“/”), back slash (“\”), and blank (“ ”). Other symbols may be used as well, such as “$”, “€”, “+”, “x”, and
The matrix comprises a row comprising, as symbols, characters and/or numbers arranged in a systematic order. In this patent document, a row comprising, as symbols, characters and/or numbers arranged in systematic order is referred to by the term “index row”. The matrix may comprise one index row. The matrix may comprise at least two index rows, for example two or three index rows. One index row may be identical to another index row. The advantage of using different index rows is that more personal passwords may be stored in one matrix. For example, one index row may comprise lower-case letters a-z and another index row may comprise lower-case letters z-a, i.e. in reverse order. As another example, one index row may comprise lower-case letters d-r followed by the numbers 0-9, a second index row may comprise the numbers 0-9 followed by upper-case letters A-F and J-R, and a third index row may comprise lowercase letters’ a’-y. "It will bë obvious to the skilled person that, as a matter of definition only, the rows of the matrix are those of which at least one comprises characters and/or numbers arranged in systematic order.
The number of symbols in the index row may be selected between wide limits. Suitably, the number of symbols may be selected in the range of from 5 to 50 (inclusive), preferably in the range of from 10 to 40 (inclusive). Preferably, the number of symbols may be 26, which may represent a full alphabet, or 36, which may represent a full alphabet plus the numbers 0-9. For practical purposes, the number of symbols in the index row equals the number of columns in the matrix, and if there is more than one index row, the index rows have the same numbers of symbols. The number of rows, other than the one or more index rows, may also be selected between wide limits, and such number may be selected in accordance with the number of symbols of the personal passwords, or vice versa. Suitably, the number of rows, other than the one or more index rows, may be selected in the range of from 2 to 20 (inclusive), preferably in the range of from 3 to 15 (inclusive). Preferably, the number of rows, other than the one or more index rows, may be in the range of from 4 to 10 (inclusive), for example 4 or 8.
The characters and numbers appear in the index row in a systematic order. Such systematic order makes the symbols easily retrievable. As an example, such systematic order may be a-c-b-d-e-g-f-h-i-k-j-1, or a-z-b-y-c-x-d-w-e-v-f-u. It is preferred for characters to appear in the index row in alphabetical order, and for numbers to appear in numerical order. A numerical order maybe, for example, the order of 0-1-2-3-4-5-6-7-8-9 or 1-2-3-4-5-6-7-8-9-0. When the symbols have the same orientation, and when the matrix is oriented such that the user reads the symbols in their normal orientation (i.e. as if the user reads the symbols in a book), it is preferred that the alphabetical order and/or numerical order proceed from left to right in a horizontally positioned index row, or from top to bottom in a vertically positioned index row.
The carrier is suitably in the form of a sheet, but other forms are conceivable as well, such as cylinders. Typically, the sheet is a rectangular or a squared sheet, in which case the rows of the displayed matrix are preferably oriented parallel with one pare of sides of the rectangle or the square. The sheet may be a flexible sheet, or a rigid sheet. The size of the sheet displaying the matrix may be selected between wide limits, for example the size may suitable be selected in the range of from 2 * 2 cm to 20 χ 30 cm, more suitably in the range of from 3 x 4 cm to 15 x 20 cm. A preferred size is the size of ' a credit card, i.e. 8.5 x 5.4 cm, or twice the size óf a credit card (i.e. 10.8 χ 8.5 cm). The thickness of the sheet may suitably be selected in the range of from 0.01 to 1 mm, more suitably in the range of from 0.02 to 0.5 mm. When the carrier is in the form of a sheet, the surface on one side of the sheet may display the matrix. More personal passwords may be stored using a single carrier in the form of a sheet when the surfaces on both sides of the sheet display a matrix. When the carrier surface is not flat, the dimensions of the carrier surface may be such that the surface area is in the range of from 5 to 600 cm2, in particular from 10 to 300 cm2.
The carrier material may be selected from a large group of materials. The skilled person will appreciate that the material may be such that the matrix can be visualized on the carrier surface. The surface of the carrier may display the matrix as a result of, for example, printing or engraving the symbols of the matrix. If desired, the material may be a composite material, of which, for example, an inner layer will provide rigidity and/or strength, and an outer layer may provide printability. Suitable materials may be, for example, paper, carton, plastic or metal.
The size of the displayed matrix, relative to the size of the carrier surface is not material to the invention. Typically, the rows of the displayed matrix have all the same lengths and the same widths, on the understanding that the index row may have a different width, so that it is easily distinguished form the other rows. Typically, the columns of the displayed matrix have all the same lengths and the same widths. For the sake of convenience, the lengths of the rows and the columns of the displayed matrix are in the range of from 50 % to 100 % of the dimensions of the carrier surface. Preferably, the lengths of the rows are in the range of from 90 % to 100 %, more preferably from 95 % to 100 %, of the dimension of the carrier surface which is in the longitudinal direction of the rows. As it will be explained hereinafter, this allows the use of “endless” strips positioned around the carrier.
The translucent or transparent strips for use in this invention display at least one marking such that symbols of the rows of the displayed matrix can be marked visibly by overlaying the rows with the strips. The strips have typically a length of at least the length of the displayed rows, and typically the length of the strips is up to 3 times, preferably 2 times, the length of the displayed rows. The width of the strips is typically up to the width of the rows of the displayed matrix, other than the index row. Typically, the width of the strips is in the range of from 50 to 100 %, preferably from 80 to 100 %, of the width of the rows of the displayed mätrix, other than the index row, wherein the width of the rows, other than the index row, is defined as the size of the symbols displayed in the row, plus the distance between the symbols, both measured in the transverse direction of the rows. The strips may be sufficiently thick to give the strips enough strength, while the strips may be sufficiently thin to achieve a desired flexibility. Typically the thickness of the strips is in the range of from 0.1 to 2 mm, more suitably in the range of from 0.2 to 1 mm. The material of the strips is not material to the invention. The material may be selected from a broad range of materials, such that the material gives the strips a desired level of strength, toughness, and translucency or transparency. Plastic or rubber-like materials may be suitable.
In the practice of this invention, the strips and the carrier displaying the matrix may be held by the holder, such that the strips overlay the rows of the displayed matrix while the strips are slideable relative to the rows of the displayed matrix and in the longitudinal direction of the rows. The strips lay side by side, such that the strips overlay the rows, typically all rows, other than the index row, of the displayed matrix, and that the strips can be moved into a position that all the different markings are aligned one next to the other each.
The strips have at least one marking such that symbols of the rows of the displayed matrix can be marked visibly when the strips overlay the rows. In principle, each marking on the strips corresponds with one personal password (to be) stored in the matrix. It is convenient, but not necessary, to have a separate marking for the main password. Typically, the strips have a plurality of different markings forming a certain pattern, and typically all strips display that same pattern of markings.
The number of markings within a pattern may be at most the number of columns. For example, the number of markings within a pattern may be half the number of columns, such that in a displayed row the odd or the even positions can be marked. Suitably, the number of markings within a pattern may be in the range of from 2 to 25 (inclusive), more suitably from 4 to 20 (inclusive).
A marking within a pattern distinguishes itself from other markings in the pattern, for example, by differences in the shape and/or colour. A marking may comprise, for example, one or more frames which can surround a symbol, one or more lines which can cross a symbol or can appear adjacent to a symbol, one or more dots which can overlay a symbol or appear adjacent to a symbol, or a shading which can overlay a symbol. Lines, frames and dots may have different sizes. A marking may comprise a combination of such shapes. Markings may have different colours. In a preferred embodiment, a marking comprises a pair of lines in the transverse direction of the strips such that the lines can appear at two sides adjacent to a symbol, and within a pattern these markings differ from each other by having different colours. For more clarity, such lines in the transverse direction of the strips may have a width such that they cover a portion of both adjacent symbols, for example 50 % of both adjacent symbols, in particular in cases that the number of markings within a pattern is no more than half the number of columns.
Preferably, the strips display a plurality of identical patterns of markings, more preferably two identical patterns of markings, with the patterns mutually positioned on each strip such that the length of the portion of the strip between the centers of two identical markings equals the length of the rows of the displayed matrix. When in this preferred embodiment, the length of the strip is no more than the length of the portion of the strip between the centers of two identical markings times the number of patterns per strip, each mark of a specific shape and/or colour present on the strip can mark a displayed symbol, independent of the position of the strip relative to the overlaid displayed row.
The number of strips may be selected between wide limits. The number of strips may be selected in accordance with the number of symbols of the personal passwords, as it will become apparent hereinafter. Suitably, the number of strips may be selected in the range of from 2 to 20 (inclusive), preferably in the range of from 3 to 15 (inclusive). The number of strips may equal the number of rows. Preferably, the number of strips equals the number of rows, other than the one or more index rows.
Typically, the holder is adapted to hold the carrier and the strips such that the strips overlay displayed rows, other than the index row, the markings and the displayed matrix are visible, and the strips are slideable in the longitudinal direction of the displayed rows. The holder may comprise a container, for example a case or a cylindrical container, which can hold the carrier. A case may be applied when the carrier has a flat surface displaying the matrix. A cylindrical container may be applied when the carrier is in the shape of a flexible sheet, or a solid or hollow cylinder.
The container may be made of a flexible material, but generally it is preferred that the container is made of a rigid material. The container may be made, at least partially, of a translucent or transparent material, for example a plastic material or a glassy material, such that the displayed matrix is visible. The thickness of the wall through which the displayed matrix is visible is not material to the invention. Preferably the wall thickness is in the range of from 0.2 to 2 mm, in particular 0.3 to 1.5 mm. When the container is a case, one or both walls of the case may be made of the translucent or transparent material. A case of which both walls are made of the translucent or transparent material allows the use of a flat carrier which displays matrices on both sides. The total of the wall thicknesses and the thickness of the space between the walls, may be in the range of from 0.5 to 5 mm, in particular 1 to 3 mm.
Preferably, the container is adapted such that the carrier can be inserted into the container and be removed from the container. The advantage of this arrangement is that, once the carrier has been placed in the container, it can be replaced by a carrier displaying a different matrix, for example when personal passwords have changed.
The case may be a flat case or a bend case. The bend case may be in the shape of a circular cylinder, an elliptic cylinder, an oval cylinder, a rectangular cylinder, or a squared cylinder, i.e. a cylinder having a circular, elliptic, oval, rectangular or squared cross-section, respectively, wherein the plane of the cross-section is perpendicular to the cylinder axis. The bend case in the shape of a circular cylinder, an elliptic cylinder, an oval cylinder, a rectangular cylinder, or a squared cylinder may comprise a slit in the shape of a circular, elliptic, oval, rectangular or squared ring, which slit can receive the carrier when bend into the desired shape, in which case the carrier is made of material which allows sufficient flexibility of the carrier to be bend into the desired cylindrical shape.
The skilled person will appreciate that bend cases having the shape of a circular cylinder, an elliptic cylinder, an oval cylinder, a rectangular cylinder, or a squared cylinder have an outer wall and an inner wall. The space confined by the inner wall of the bend case may be open or closed. When the space is closed, the bend case may be a part of a holder which may be, for example, a cigarette lighter wherein the case confines the fuel tank, or a box wherein the space confined by the inner wall may be utilised as a storage space, for example for business cards or credit cards.
The strips may be mounted to the container such that when the container holds the carrier, the strips are slideable in the longitudinal direction of the displayed rows. The strips may be mounted around the container. To that end, the strips of a suitable length may have their two ends connected so that they form end-less strips fitting around the container. The skilled person will understand that in the case that the strips are mounted around a cylindrical container, the expression “in the longitudinal direction” is to be construed as “tangentially”.
When the container is in the form of a flat case fitting narrowly around the carrier and the carrier displays a matrix having rows of a length in the range of from 90 % to 100 %, more preferably from 95 % to 100 %, of the dimension of the carrier surface which is in the longitudinal direction of the rows, it is preferred that the endless strips have two identical patterns of markings.
When the container is in the form of a bend case fitting narrowly around the carrier and the carrier displays a matrix having rows of a length in the range of from 90 % to 100 %, more preferably from 95 % to 100 %, of the dimension of the carrier surface which is in the longitudinal direction of the rows, it is preferred that the endless strips have a single pattern of markings.
The strips may be held in place, such that they are slideable as described hereinbefore, for example by being placed between protrusions present in the holder, in particular on the outside surface of the container, or by being placed in slits present in the holder, in particular on the outside surface of the container. The strips may have protrusions and/or indentations so that they may be manipulated easily.
Now turning to the drawings, FIG. 1 depicts a carrier 10 which may be used in this invention, which carrier has a carrier surface 12 displaying a matrix 14. The matrix has an index row 16, and further rows 18.
FIG. 2 depicts a system 20 for managing passwords according to this invention. The system comprises a flat case 22 holding slideable strips 24 which lay side by side and which fit around flat case 22. Each strip displays two patterns of markings 26, 28, 30.
One pattern of markings 25 is visible in FIG. 2; a second pattern of markings, positioned at the backside of flat case 22, is not visible in FIG. 2. In FIG. 2, markings 26, 28, 30 are shown to have different shadings. Alternatively, markings 26, 28, 30 may have different colours, for example, markings 26 may represent red markings, markings 28 may represent yellow markings, and markings 30 may represent blue markings. In FIG. 2, strips 24 have been moved into a position that all the different markings are aligned one next to the other each.
FIG. 3 depicts the system of FIG. 2, which system 40 includes a carrier 42, inserted in flat case 44. Symbols 46 displayed on the carrier surface are visible through flat case 44 and strips 50. Symbols 48 displayed on the carrier surface are visible through flat case 44. Strips 50 lay side by side, such that the strips overlay all rows, other than the index row, of the displayed matrix.
FIG. 4 depicts the system of FIG. 3. Relative to the positions shown in FIG. 3, the strips 52, 54, 56 have been moved. In the positions shown in this FIG. 4, the markings illustrate the invention as follows: when read from top to bottom, markings 62 in strips 52, 54, 56 are associated with the main password “CDE” of which the symbols appear in index row 60, and markings 62, 64 and 66 are associated with personal passwords “ATP”, “125”and “HZV”, respectively. It is noted that marking 66 of strip 56 has become visible in FIG. 4 as a result of moving the strip; this specific marking is positioned in FIGS. 2 and 3 at the backside of the case 22,44 and therefore not visible in FIGS. 2 and 3.
FIG. 5 depicts a system 70 for managing passwords according to this invention. The system comprises a circular cylindrical case 72 holding slideable strips 74, mounted and fitting around case 72. Each strip displays one pattern of markings 76, 78. In FIG. 5, markings 76, 78 are shown to have different shadings, viz. one marking is solid, and a second marking comprises a shading of parallel lines. System 70 includes a flexible carrier 80, bent from a flat sheet into a circular cylindrical shape and inserted into circular slit 82 of case 72. The length of the displayed rows equals the circumference of the slit. Symbols 84 displayed on the carrier surface are visible through case 72 and strips 74. Symbols of index row 86 are visible through case 72. It is noted that symbols displayed on the portion of the carrier surface which is positioned at the back side of case 72 are not visible in FIG. 5. In the positions of strips 74 as shown in this FIG. 5, the markings illustrate the invention as follows: when read from top to bottom, markings 76 in strips 74 are associated with the main password “BEAF” of which the symbols appear in index row 86, and markings 76 and 78 are associated with personal passwords “4898” and “2447”, respectively. It is noted that marking 78 in bottom strip 74a and the symbol “7” of the latter personal password marked by said marking 78 are positioned at the back side of case 72, and are therefore not visible in FIG. 5. Case 72 may be a portion of a larger entity. The larger entity may be, for example, a container having a lit (not shown in FIG. 5) and a bottom (not shown in FIG. 5) which together with case 72 confine a space suitable to hold small items.
The process for assembling the matrix comprises the steps of populating the index row(s) (step a); composing a main password (step b); selecting in respect of the main password and each personal password a marking appearing on the strips (steps d and e); determining in respect of each symbol of the main password a start position in a row (step f); populating selected positions in the rows, selected relative to the start positions, with the symbols of the personal passwords (step g); and populating with randomly selected symbols the positions not yet populated (step h). The steps of the process may be carried out in any suitable order.
Step a of the process comprises populating the row(s) of the matrix designated to be the index row(s) with symbols, as defined hereinbefore.
Step b of the process comprises composing a main password which consists of symbols selected from the index row, the number of symbols being at least the number of symbols of the personal password having the most symbols. The symbols of the index row may be as defined hereinbefore.
Step c is an optional step which comprises adjusting personal passwords having less symbols than the main password by extending such personal passwords with one or more separation symbols, i.e. symbols not occurring in the personal passwords.
Preferably the extended personal passwords and the main password have the same number of symbols including the one or more separation symbols. The advantage of this adjustment is that relatively short personal passwords can be retrieved unambiguously, despite the fact that they have less symbols. Preferred separation symbols may be the blank, the hyphen, and the period.
Steps d and e comprises selecting in respect of the main password and in respect of each personal password a marking appearing on the strips. Different markings may be selected in respect of the personal passwords. In respect of the main password, a marking may or may not be selected which is also selected in respect of one of the personal passwords.
Steps f, g and h concern populating the positions on the matrix, other than the positions in the index row, with symbols.
Step f comprises determining in respect of each symbol of the main password a start position in a row, other than the index row, such that (1) adjacent symbols in the main password correspond with starting positions in adjacent rows in a predetermined order, and (2) a respective start position is in the same column as the respective symbol of the main password appearing in the index row. The predetermined order may be selected from top to bottom, from bottom to top, from left to right, or from right to left.
Step g comprises populating selected positions in the rows, other than the index row, with the symbols of the personal passwords, or the extended personal passwords as the case may be, such that for each (extended) personal password (1) adjacent symbols, including separation symbols, if any, are positioned in adjacent rows in the predetermined order, and (2) upon overlaying a row with a strip with the marking selected for the main password marking the respective start position in the row, the respective symbol of the (extended) personal password appears in the position marked by the marking selected for the personal password.
The skilled person will appreciate that steps f and g are intended to result in, for example, the first symbol of an (extended) personal password being placed in the row in which the start position is associated with (by being in the same column as) the first symbol of the main password in the index row; the second symbol of the (extended) personal password being placed in the next row, other than the index row, in accordance with the predetermined order, i.e. in the row in which the start position is associated with the second symbol of the main password in the index row; etcetera·, and in each row the distance between a respective symbol of the (extended) personal password and the start position corresponds with the distance between the markings selected for the personal password and the main password.
Step h comprises populating positions not occupied with symbols of the (extended) personal passwords in a random manner with symbols. If this step h precedes step g, step h comprises populating the positions of the rows, other than the index row, with randomly selected symbols. In this case, step g comprises replacing in selected positions randomly selected symbols by the symbols of the (extended) personal passwords. If step g precedes this step h, step h comprises populating the remaining positions (i.e. the positions not yet occupied) with randomly selected symbols.
As described hereinbefore, the rows of the matrix, other than the index row(s), may be made visual on the carrier surface, for example, by printing or engraving. The matrix may be displayed without the index row, in which case the index row may be displayed separately. For example, the carrier may be taken from a stock of carriers, each carrier in the stock having the index row displayed in advance on the carrier surface, or the index row may be displayed on the container, such that it can be read together with the other rows of the matrix after the carrier has been inserted into the container. In other embodiments, the rows of the matrix, including the index row(s), may be made visual on the carrier surface.
A personal password may be retrieved using the system of this invention by the following method. When retrieving a personal password, the holder is deemed to hold a carrier displaying a matrix assembled in accordance with the invention. The method comprises two steps, step (a) and step (b).
Step (a) involves positioning the strips such that (1) for each strip the marking selected for the main password appears in the same column as a symbol of the main password appears in the index row, and (2) the markings of adjacent strips follow adjacent symbols of the main password in the predetermined order. The predetermined order is the order applied when assembling the matrix.
Step (b) involves retrieving the personal password by reading in the predetermined order the symbols marked by the markings selected for the personal password. When reading the symbols marked by the markings selected for the personal password, separation symbols, if any, are omitted, in order to read the personal password, as opposed to extended personal password.
The invention also provides a method for generating personal passwords using a system according to this invention. According to the invention, personal passwords are generated in association with a main password and a marking. When applying the method, the holder holds a carrier displaying a matrix assembled by the steps of - selecting and populating the index row, as described hereinbefore, - determining the number of rows, such that the number of rows, other than the index row, equals at least the number of symbols of the personal password to be generated having the most symbols, - populating the positions of the rows, other than the index row, with randomly selected symbols.
The method for generating personal passwords then comprises the steps of 1. composing a main password which consists of one or more symbols selected from the index row, the number of symbols being the number of rows, 2. selecting in respect of the main password a marking appearing on the strips, 3. selecting in respect of each personal password to be generated a marking appearing on the strips, 4. determining in respect of each symbol of the main password a start position in a row, other than the index row, such that - adjacent symbols in the main password correspond with starting positions in adjacent rows in a predetermined order, and - a respective start position is in the same column as the respective symbol of the main password appearing in the index row, 5. obtaining the personal passwords by reading in the predetermined order the symbols marked by the markings selected for the respective personal passwords, and optionally deleting symbols as necessary to obtain personal passwords of the desired length.
In accordance with the present invention, the various processes and methods may -at least partly- be carried out by using a computer system. The computer system comprises a computer program product and a central processing unit configured to receive and execute instructions read from the computer program product. The computer program product comprises a memory medium and computer readable program code recorded on the memory medium. The computer readable program code is executable by the central processing unit and comprises instructions in the appropriate format for execute the steps of the processes and methods of this invention, as defined hereinbefore.
A software system may work in conjunction with the computer readable program code to instruct the central processing unit to execute the steps comprised in the processes and methods of the present invention. The software system may be stored on a memory medium which is adapted to interact with the central processing unit. Examples of suitable software systems include WORD PERFECT (trademark), VISUAL DBASE (trademark), MICROSOFT WORD (trademark) and MICROSOFT EXCEL (trademark). Also included in the present invention is a computer program comprising the computer readable program code for instructing the central processing unit to execute the steps comprised in the processes and methods of the present invention.
The term "memory medium" may include an installation medium, for example, compact disks or floppy disks, a computer system memory, or a nonvolatile memory. Examples of computer system memory include, but are not limited to, DRAM and SDAM. Examples of a nonvolatile memory include, but are not limited to, a magnetic media, for example a hard drive, or optical storage. The memory medium may include other types of memory as well, or combinations thereof.
In an embodiment, desired selections of symbols for the index row, desired selections of random symbols, the main password, personal passwords, the marking for the main password and the personal passwords, and other variables, as appropriate, such as the size of the displayed matrix and the size of the symbols, are input via a keyboard or a touch screen into the central processing unit. The software system may be stored on a separate memory medium than the computer program product. The central processing unit is configured to receive and execute instructions from both the software system and the computer readable program code.
As an illustration of a computer system suitable for use in the various embodiments of the processes of the present invention, FIG. 6 provides a schematic representation showing the computer system 100. Computer system 100 typically includes one or more central processing units 102 with associated computer program products 103, 104 and 105, represented by a computer system memory 103, floppy disks 104 or compact disk 105. Computer system 100 may further include one or more display devices, for example monitor 106, one or more alphanumeric input devices, for example keyboard 108, and/or one or more directional input devices, for example mouse 110 or touch screen 112.
In an embodiment of the invention, personal passwords may be retrieved using a computer system 100. Suitably, the computer system is a small portable electronic system, such as a 16 GB “iPOD” system (trademark) or a cell phone. To this end, the matrix and the markings may be displayed on screen 112, for example a (touch) screen, of the electronic device. The matrix and the markings may be displayed on the screen in the same arrangement as they appear in the system according to this invention. In particular, the markings mark selected symbols of the displayed matrix and the markings are movable relative to, and in the longitudinal direction of, the rows of the displayed matrix, as if the markings had been placed on a transparent or translucent strip overlaying the displayed rows. The matrix and the markings may be input by methods well known to the skilled person. A software system may work in conjunction with a computer readable program code to instruct the central processing unit of the electronic device to execute the steps of displaying the matrix and the movable markings on the screen.
The following example is intended to illustrate the present invention and is not intended to unduly limit the scope of the invention.
EXAMPLE (according to the invention) A system for managing personal passwords comprises a holder adapted to hold a sheet of paper, size 8.5x5.4 cm (length x width), with printed on the paper a matrix comprising 26 columns and 7 rows, the rows printed over the full length of the sheet, and the columns printed over the full width of the sheet. The system is designed to be held relative to the user such that the rows are positioned horizontally (columns vertically), the first row at the top of the matrix is the index row, and the first position of a row is positioned at the left side of the matrix. The holder further comprises six identical transparent strips having coloured markings such that, when the holder holds the sheet of paper with the matrix printed on the paper, the six strips are slideable in the longitudinal direction of the rows, the six strips overlay the six rows, other than the index row, and the markings mark selected positions of the matrix. Each strip comprises two identical patterns of four coloured markings, red, blue, green, and yellow. The markings are positioned on the strips such that when a red marking marks the first position of a row, the blue, green, and yellow markings mark the third, fifth and seventh positions, respectively, and that the distance between the centres of two red markings equals the length of the sheet of paper. Each of the markings is comprised of a coloured, transparent dot, the diameter of the dot being equal to the width of the positions of the matrix.
The following personal passwords are to be stored in a matrix: personal password 1 : frv+w6 personal password 2: lhba4K personal password 3: v*nktW personal password 4: Ht81y.
Personal password 4 is extended with an ampersand, to read “Ht81y&”. A main password is composed: janvan. The main password and the personal passwords are associated with the coloured markings as follows: main password: red; personal password 1: blue; personal password 2: green; personal password 3: yellow; personal password 4: red.
The first row, designated to be the index row, is populated from left to right with the lower case alphabet letters a-z. Start positions are determined in the second - seventh rows, according to the main password “janvan”, as follows: - second row, tenth position (i.e. in the same column as “j” appearing in the index row), - third row, first position (i.e. in the same column as “a” appearing in the index row), - fourth row, fourteenth position (i.e. in the same column as “n” appearing in the index row), - fifth row, twenty second position (i.e. in the same column as “v” appearing in the index row), - sixth row, first position (i.e. in the same column as “a” appearing in the index row), - seventh row, fourteenth position (i.e. in the same column as “n” appearing in the index row).
The symbols of personal password 1 are placed in the matrix as follows: - the first symbol “f ’ on the second row, twelfth position (i.e. the position marked by the blue marking when the red marking would mark the tenth position), - the second symbol “r” on the third row, third position (i.e. the position marked by the blue marking when the red marking would mark the first position), - the third symbol “v” on the fourth row, sixteenth position (i.e. the position marked by the blue marking when the red marking would mark the fourteenth position), - the fourth symbol “+” on the fifth row, twenty fourth position (i.e. the position marked by the blue marking when the red marking would mark the twenty second position), - the fifth symbol “w” on the sixth row, third position (i.e. the position marked by the blue marking when the red marking would mark the first position), - the sixth symbol “6” on the seventh row, sixteenth position (i.e. the position marked by the blue marking when the red marking would mark the fourteenth position).
Likewise, the symbols of the personal password 2, personal password 3, and extended personal password 4, are placed in the matrix. In respect of the personal password 3, associated with the yellow markings, it is noted that the when the red marking would mark the fifth row, twenty second position, the yellow marking would mark the second position, so that the fourth symbol “k” is placed in the fifth row second position. In respect of the extended personal password 4, it is noted that it is associated with the red markings, together with the main password. Therefore, the symbols of the extended personal password 4, are placed in the respective start positions.
At this point, the symbols have been placed in the matrix as follows: abcdefghijkl mnopqrst uvwxyz H f 1 v t r h * 8 v b n k ..1 + ..a ÿ w 4 t
& 6 K W
The remainder of the positions is populated randomly with upper case and lower case characters, numbers, punctuation marks and other symbols, selected from “$”, “€”, “+”, “X”, and
The matrix is printed on a sheet of white paper in the appropriate size. The sheet of paper is cut such that after cutting the rows are printed over the full length of the sheet, and the columns are printed over the full width of the sheet. The sheet is inserted into the holder.
The personal passwords are retrieved from the system as follows. The strips are moved such that the following positions of the matrix are marked by red markings, in accordance with the main password “janvan”: - second row, tenth position (i.e. in the same column as “j” appearing in the index row), - third row, first position (i.e. in the same column as “a” appearing in the index row), - fourth row, fourteenth position (i.e. in the same column as “n” appearing in the index row), - fifth row, twenty second position (i.e. in the same column as “v” appearing in the index row), - sixth row, first position (i.e. in the same column as “a” appearing in the index row), - seventh row, fourteenth position (i.e. in the same column as “n” appearing in the index row).
The personal passwords 1,2,3, and 4 are read by reading the positions marked by the blue, green, yellow and red markings, respectively, in the order of the second, third, fourth, fifth, sixth and seventh row, the ampersand being omitted.

Claims (19)

1. Een systeem voor het beheren van persoonlijke wachtwoorden bevattende - een houder die is aangepast ten einde een drager te bevatten, welke drager een drageroppervlak heeft die een matrix van symbolen weergeeft die zijn gerangschikt in een veelheid van rijen en een veelheid van kolommen, waarbij een rij, die een indexrij voorstelt, als symbolen systematish gerangschikte letters en/of cijfers bevat, en - een veelheid van doorschijnde of doorzichtige strippen die tenminste één markering weergeven, zodanig dat symbolen van de rijen van de weergegeven matrix visueel gemarkeerd kunnen worden door de strippen over de rijen heen te leggen, waarbij de houder verder is aangepast ten einde de strippen te bevatten zodanig dat, wanneer de houder de drager en de strippen bevat, de strippen over rijen, anders dan de indexrij, liggen, en de strippen schuifbaar zijn in de lengterichting van de weergegeven rijen.A system for managing personal passwords comprising - a holder adapted to contain a carrier, said carrier having a carrier surface representing an array of symbols arranged in a plurality of rows and a plurality of columns, a row, which represents an index row, contains letters and / or numbers arranged systematically as symbols, and - a plurality of translucent or transparent strips representing at least one marking, such that symbols of the rows of the displayed matrix can be visually marked by the lay the strips over the rows, the holder being further adapted to contain the strips such that, when the holder contains the carrier and the strips, the strips lie over rows other than the index row, and the strips are slidable in the longitudinal direction of the rows shown. 2. Een systeem volgens conclusie 1, met het kenmerk dat de letters van de indexrij zijn gerangschikt in alfabetische volgorde en de cijfers van de indexrij zijn gerangschikt in numerieke volgorde.A system according to claim 1, characterized in that the letters of the index row are arranged in alphabetical order and the numbers of the index row are arranged in numerical order. 3. Een systeem volgens conclusie 1 of 2, met het kenmerk dat de matrix 10 tot en met 40 symbolen bevat in de indexrij en dat de matrix, behalve de indexrij, 3 tot en met 15 rijen bevat.A system according to claim 1 or 2, characterized in that the matrix contains 10 to 40 symbols in the index row and that the matrix contains 3 to 15 rows in addition to the index row. 4. Een systeem volgens conclusies 1,2 of 3, met het kenmerk dat de drager in de vorm van een vlak vel is, waarvan de afmeting is 3. bij 4 cm tot 15 bij 20 cm.A system according to claims 1,2 or 3, characterized in that the support is in the form of a flat sheet, the size of which is 3. by 4 cm to 15 by 20 cm. 5. Een systeem volgens conclusies 1,2, 3 of 4, met het kenmerk dat de lengte van de rijen 95 to 100 % bedraagt van de afmeting van het drageroppervlak in de lengterichting van de rijen.A system according to claims 1,2, 3 or 4, characterized in that the length of the rows is 95 to 100% of the dimension of the carrier surface in the longitudinal direction of the rows. 6. Een systeem volgens conclusies 1,2,3,4 of 5, met het kenmerk dat de strippen teminste twee identieke patronen van markeringen hebben, waarbij ieder patroon 4 tot en met 20 verschillende markeringen heeft.A system according to claims 1,2,3,4 or 5, characterized in that the strips have at least two identical patterns of markings, each pattern having 4 to 20 different markings. 7. Een systeem volgens conclusies 1,2,3,4, 5 of 6, met het kenmerk dat de markeringen verschillende kleuren hebben.A system according to claims 1,2,3,4, 5 or 6, characterized in that the markings have different colors. 8. Een systeem volgens conclusies 1,2,3,4,5,6 of 7, met het kenmerk dat het aantal strippen gelijk is aan het aantal rijen, anders dan de indexrij.A system according to claims 1,2,3,4,5,6 or 7, characterized in that the number of strips is equal to the number of rows, other than the index row. 9. Een systeem volgens conclusies 1,2, 3,4, 5,6,7 of 8, met het kenmerk dat de houder een hoes is die de drager kan bevatten zodanig dat, wanneer de drager in de hoes is geplaatst, de drager vervangen kan worden door een drager die een andere matrix weergeeft, waarbij de hoes tenminste gedeeltelijk is gemaakt van een doorschijnend of doorzichtig materiaal, zodanig dat de weergegeven matrix zichtbaar is wanneer de drager in de hoes is geplaatst.A system according to claims 1,2, 3,4, 5,6,7 or 8, characterized in that the holder is a cover that the carrier can contain such that when the carrier is placed in the cover, the carrier can be replaced by a carrier representing a different matrix, the sleeve being made at least partially from a translucent or transparent material such that the displayed matrix is visible when the carrier is placed in the sleeve. 10. Een systeem volgens conclusie 9, met het kenmerk dat de hoes nauw past rondom de drager, de drager een matrix weergeeft die rijen heeft met een lengte van 95 % tot 100 % van de afmeting van het drageroppervlak in de lengterichting van de rijen, de strippen hun twee einden met elkaar verbonden hebben zodat de strippen eindloze strippen vormen, de eindloze strippen twee identieke patronen van markeringen hebben, waarbij de patronen op iedere strip onderling zodanig zijn gepositioneerd dat de lengte van het gedeelte van de strip tussen de middens van twee identieke markeringen gelijk is aan de lengte van de rij van de weergegeven matrix, en de eindloze strippen schuifbaar zijn aangebracht rondom de hoes.A system according to claim 9, characterized in that the sleeve fits tightly around the carrier, the carrier displays a matrix having rows with a length of 95% to 100% of the size of the carrier surface in the longitudinal direction of the rows, the strips have their two ends joined together so that the strips form endless strips, the endless strips have two identical patterns of markings, the patterns on each strip being mutually positioned such that the length of the portion of the strip between the centers of two identical marks is equal to the length of the row of the matrix shown, and the endless strips are slidably arranged around the sleeve. 11. Een methode voor het opslaan van één of meer persoonlijke wachtwoorden in een matrix zoals gedefinieerd in conclusie 1, welke methode het samenstellen van de matrix bevat door a. de indexrij te bezetten, b. een hoofdwachtwoord samen te stellen dat bestaat uit symbolen die zijn geselecteerd uit de indexrij, waarbij het aantal symbolen ten minste het aantal symbolen van het persoonlijke wachtwoord met de meeste symbolen bedraagt, c. indien persoonlijke wachtwoorden minder symbolen hebben dan het hoofdwachtwoord, zulke persoonlijke wachtwoorden te verlengen met één of meer scheidingssymbolen, waarbij, het scheidingssymbool een symbool is dat niet voorkomt in de één of meer persoonlijke wachtwoorden, d. met betrekking tot het hoofdwachtwoord een markering te kiezen die op de strippen voorkomt, e. met betrekking tot elk persoonlijk wachtwoord een markering te kiezen die op de strippen voorkomt, f. met betrekking tot elk symbool van het hoofdwachtwoord een start positie in een rij, anders dan een indexrij, te bepalen, zodanig dat - naburige symbolen in het hoofdwachtwoord in een vooraf vastgestelde volgorde overeenkomen met startposities in naburige rijen, en - een respectievelijke startpositie in dezelfde kolom staat als het respectievelijke symbool van het hoofdwachtwoord voorkomt in de indexrij, g. geselecteerde posities in de rijen, anders dan de indexrij, te bezetten met de symbolen van de persoonlijke wachtwoorden, of met de verlengde persoonlijke wachtwoorden als dat het geval is, zodanig dat - naburige symbolen, inclusief eventuele scheidingssymbolen, in de vooraf vastgestelde volgorde zijn gepositioneerd in naburige rijen, en - wanneer de rij wordt bedekt met een strip waarbij de markering voor het hoofdwachtwoord de respectievelijke start positie in de rij markeert, het respectievelijke symbool van het (verlengde) persoonlijke wachtwoord verschijnt in de positie die wordt gemarkeerd door de markering die is geselecteerd voor het persoonlijke wachtwoord, en h. de posities, anders dan de geselecteerde posities zoals gedefinieerd in stap g, willekeurig te bezetten met symbolen.A method for storing one or more personal passwords in a matrix as defined in claim 1, which method comprises constructing the matrix by a. Occupying the index row, b. compile a master password consisting of symbols selected from the index row, the number of symbols being at least the number of symbols of the personal password with the most symbols, c. if personal passwords have fewer symbols than the main password, extend such personal passwords with one or more separation symbols, where the separation symbol is a symbol that does not appear in the one or more personal passwords, d. to choose a marker that appears on the strips with regard to the master password, e. to choose a marker that appears on the strips with regard to each personal password, f. determine with respect to each symbol of the master password a start position in a row, other than an index row, such that - neighboring symbols in the master password correspond in a predetermined order to start positions in neighboring rows, and - a respective start position in the same column is displayed if the respective master password symbol appears in the index row, g. occupy selected positions in the rows, other than the index row, with the symbols of the personal passwords, or with the extended personal passwords if that is the case, such that - neighboring symbols, including any separation symbols, are positioned in the predetermined order in adjacent rows, and - when the row is covered with a strip where the main password marker marks the respective start position in the row, the respective (extended) personal password symbol appears in the position marked by the marker that is selected for the personal password, and h. randomly position the positions, other than the selected positions as defined in step g, with symbols. 12. Een methode volgens conclusie 11, met het kenmerk dat de verlengde persoonlijke wachtwoorden en het hoofdwachtwoord hetzelfde aantal symbolen hebben, inclusief de één of meer scheidingssymbolen.A method according to claim 11, characterized in that the extended personal passwords and the master password have the same number of symbols, including the one or more separation symbols. 13. Een methode volgens conclusie 11 of 12, met het kenmerk dat stap h voorafgaat aan stap g, waarbij step h verder is gedefinieerd doordat stap h bevat het bezetten van de posities in de rijen, anders dan de indexrij, met willekeurig geselecteerde symbolen, en stap g is gedefinieerd doordat stap g bevat het bezetten van de geselecteerde posities in de rijen door in de geselecteerde posities de willekeurig geslecteerde symbolen te vervangen door symbolen van de (verlengde) persoonlijke wachtwoorden.A method according to claim 11 or 12, characterized in that step h precedes step g, wherein step h is further defined in that step h comprises occupying the positions in the rows, other than the index row, with randomly selected symbols, and step g is defined in that step g comprises occupying the selected positions in the rows by replacing the randomly selected symbols in the selected positions with symbols of the (extended) personal passwords. 14. Een methode volgens conclusie 11 of 12, met het kenmerk dat stap g voorafgaat aan stap h, waarbij stap h verder is gedefinieerd doordat stap h bevat het bezetten van de nog niet bezette posities met willekeurig geselecteerde symbolen.A method according to claim 11 or 12, characterized in that step g precedes step h, wherein step h is further defined in that step h comprises occupying the positions not yet occupied with randomly selected symbols. 15. Een methode voor het maken van een drager met een drageroppervlak dat een matrix zoals gedefinieerd in conclusie 1 weergeeft, welke methode bevat - het samenstellen van de matrix volgens de stappen van de methode van conclusies 11,12, 13 of 14, en - het zichtbaar maken van de rijen van de matrix, anders dan de indexrij(en), op de drager.A method of making a support with a support surface representing a matrix as defined in claim 1, which method comprises - assembling the matrix according to the steps of the method of claims 11, 12, 13 or 14, and - making the rows of the matrix, other than the index row (s), visible on the carrier. 16. Een samenstel van onderdelen bevattende - een systeem voor het beheren van persoonlijke wachtwoorden volgens conclusies 1,2,3,4, 5,6,7, 8,9 of 10, en - een computerprogrammaprodukt bevattende een geheugenmedium en een programmacode die door een computer kan worden gelezen en die is opgeslagen in het geheugenmedium, waarbij de programmacode geschikt is om een centrale proceseenheid te instrueren de stappen uit te voeren van een methode volgens conclusies 11,12,13,14 of 15.A combination of components comprising - a system for managing personal passwords according to claims 1,2,3,4, 5,6,7, 8,9 or 10, and - a computer program product comprising a memory medium and a program code which a computer can be read and stored in the memory medium, the program code being adapted to instruct a central process unit to perform the steps of a method according to claims 11, 12, 13, 14 or 15. 17. Een computerprogramma bevattende een programmacode die door een computer kan worden gelezen en die geschikt is om een centrale proceseenheid te instrueren de stappen uit te voeren van een methode volgens conclusies 11,12,13,14 of 15.A computer program comprising a program code that can be read by a computer and which is adapted to instruct a central process unit to perform the steps of a method according to claims 11, 12, 13, 14 or 15. 18. Een computerprogrammaprodukt bevattende een geheugenmedium en een programmacode die door een computer kan worden gelezen en die is opgeslagen in het geheugenmedium, waarbij de programmacode geschikt is om een centrale proceseenheid te instrueren de stappen uit te voeren van een methode volgens conclusies 11,12,13,14 of 15.A computer program product comprising a memory medium and a program code that can be read by a computer and stored in the memory medium, the program code being adapted to instruct a central process unit to perform the steps of a method according to claims 11,12, 13.14 or 15. 19. Een computer systeem bevattende een computerprogrammaprodukt volgens conclusie 18 en een centrale proceseenheid die is geconfigureerd om instructies te ontvangen en uit te voeren, welke instructies zijn gelezen vanaf het computerprogrammaprodukt.A computer system comprising a computer program product according to claim 18 and a central process unit configured to receive and execute instructions, which instructions are read from the computer program product.
NL1037289A 2009-09-16 2009-09-16 System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system. NL1037289C2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL1037289A NL1037289C2 (en) 2009-09-16 2009-09-16 System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL1037289 2009-09-16
NL1037289A NL1037289C2 (en) 2009-09-16 2009-09-16 System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system.

Publications (2)

Publication Number Publication Date
NL1037289A true NL1037289A (en) 2011-03-17
NL1037289C2 NL1037289C2 (en) 2011-10-11

Family

ID=44065528

Family Applications (1)

Application Number Title Priority Date Filing Date
NL1037289A NL1037289C2 (en) 2009-09-16 2009-09-16 System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system.

Country Status (1)

Country Link
NL (1) NL1037289C2 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2291252A (en) * 1994-07-04 1996-01-17 Julian Vincent Stone Device for storing and encrypying an alphanumeric code
DE4442755C1 (en) * 1994-12-01 1996-03-28 Edison Fatehpour Appts. for accumulation of personal identification numbers
WO1999012143A2 (en) * 1997-09-02 1999-03-11 Propella Device for storing codes
GB2411286A (en) * 2004-02-17 2005-08-24 Ian Thomas Flint A memory aid device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2291252A (en) * 1994-07-04 1996-01-17 Julian Vincent Stone Device for storing and encrypying an alphanumeric code
DE4442755C1 (en) * 1994-12-01 1996-03-28 Edison Fatehpour Appts. for accumulation of personal identification numbers
WO1999012143A2 (en) * 1997-09-02 1999-03-11 Propella Device for storing codes
GB2411286A (en) * 2004-02-17 2005-08-24 Ian Thomas Flint A memory aid device

Also Published As

Publication number Publication date
NL1037289C2 (en) 2011-10-11

Similar Documents

Publication Publication Date Title
JP2002215612A5 (en)
CN103631841B (en) Method and system for creating structured document
CN101257557A (en) Image processing apparatus and printing apparatus
US10576654B1 (en) Sign making apparatus and method
NL1037289A (en) System for managing personal passwords, a kit-of-parts, a process, a computer program, a computer program product, and a computer system.
US5971283A (en) Stereo code
CN101908295A (en) Method for preventing selling beyond agreed areas
CN100361169C (en) Dynamic commodity false proof mark
KR20170139974A (en) Article for pattern guide for forming a three-dimensional structure and a method for manufacturing a book having the three-dimensional structure using the article for pattern guide
Cleveland Bound to technology—the telltale signs in print
Harland et al. Designing the Latina landscape: graphic images of Italian Fascism
JP3242093U (en) Booklet set and booklet container
Lehman Flowcharting made simple
Orna Information design and information services What information professionals should know about design, in order to deliver value‐added information products
Mantzaris Multimodal Literature in the Age of Covid-19
JP2008279649A (en) Preparing method of menu for order system
Lippincott 'Mantegna's Tarocchi'
JP2007245563A (en) Method for providing index card, chart holder and chart managing system
Cooper et al. An education in letterpress: charting the history of letterpress education in the United Kingdom and Ireland
Gomes et al. Adapting Advanced Typographic Taxonomy Principles for Modular Stencil System Classification
CAUTION Do's and Don'ts of Poster Presentation
Brooks Master drawings close-up
Walters Mightier than the pen systems of type: Pleasure in the process Paul McNeil and Hamish Muir are graphic designers who construct typefaces through mathematics, systems and experimentation, pushing hard at the boundaries of alphabetic form
KR200289174Y1 (en) A Book For Advertising
Presutti The Sèvres Service des Départements and the anxiety of the fragment

Legal Events

Date Code Title Description
V1 Lapsed because of non-payment of the annual fee

Effective date: 20140401