System and method for identity recognition of an individual for enabling an access to a secured system
First Claim
1. A method for identity recognition of an individual for enabling an access to a secured system based on a code input pattern, comprising the steps of:
- providing said secured system with identification means for unabling access to said secured system for an unauthorized individual;
providing said identification means with an identification code that can be entered by said individual through said code input pattern, said code input pattern incorporating hidden characteristics which are invisible but uniquely inherent in said individual to the extent that they can be used for identification of said individual;
entering said identification code by said individual to said identification means;
measuring said hidden characteristics for obtaining code input pattern information;
providing said secured system with a reference input pattern information that enables access to said secured system;
comparing said code input pattern information with said reference input pattern information; and
enabling the access of said individual to said secured system if said code input pattern information coincides with said reference input pattern information.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of the invention for identity recognition based on the code input pattern are highly secure and simple. The system and the method prevent unauthorized access to a secured system by assuming that prior to the identification there should be a validation process. During the validation process a user inputs one or more times the patterns of the code or password entry, and the system measures and stores parameters of the input pattern that are unique to each user (for example, time delay between inputs of the adjacent symbols, time of holding each key depressed or other specific series of activities). These parameters form the user identity data validation pattern. When the user actually requests access to the secured system and submits the entry code, these parameters are measured again and compared against the previously stored data validation pattern to validate the identity of the user. The access to the secured system is granted or denied depending on the result of this comparison.
109 Citations
26 Claims
-
1. A method for identity recognition of an individual for enabling an access to a secured system based on a code input pattern, comprising the steps of:
-
providing said secured system with identification means for unabling access to said secured system for an unauthorized individual;
providing said identification means with an identification code that can be entered by said individual through said code input pattern, said code input pattern incorporating hidden characteristics which are invisible but uniquely inherent in said individual to the extent that they can be used for identification of said individual;
entering said identification code by said individual to said identification means;
measuring said hidden characteristics for obtaining code input pattern information;
providing said secured system with a reference input pattern information that enables access to said secured system;
comparing said code input pattern information with said reference input pattern information; and
enabling the access of said individual to said secured system if said code input pattern information coincides with said reference input pattern information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A secure system for identity recognition of an individual for enabling an access to a secured system to an authorized individual and unabling said access to an unauthorized individual on the basis of a code input pattern, said system comprising:
-
at least one code input unit for inputting an identification code to said secure system, said identification code can be entered by said individual through said code input pattern and incorporates hidden characteristics which are invisible but uniquely inherent in said individual to the extent that they can be used for identification of said individual;
at least one memory unit for memorizing at least said identity code;
a processor connected to said at least one code input unit and said at least one memory unit for processing information obtained from said at least one code input unit and said memory unit;
a program that is stored in said at least one memory unit and provides the following steps under control of said processor;
entering said identification code by said individual to said secure system;
measuring said hidden characteristics for obtaining a code input pattern information providing said secured system with a reference input pattern information that enables access to said secured system;
comparing said code input pattern information with said reference input pattern information; and
enabling the access of said individual to said secured system if said code input pattern information coincides with said reference input pattern information. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 25)
-
-
24. The system of 23, wherein said reference relationships are presented in the form of a normal probability density distribution range for said identification code.
-
26. The system of 25, wherein said reference relationships are presented in the form of a normal probability density distribution range for said identification code.
Specification