Secure entry of a user-identifier in a publicly positioned device
First Claim
1. A computer-implemented method for providing authorizing data comprising the steps of:
- identifying a device configured to receive a set of authorizing symbols through an input interface, wherein the input interface is in a publicly viewable location;
the device prompting for an initial number “
n”
of symbols from the set of authorizing symbols, where “
n”
is less than total number of symbols contained within the set of authorizing symbols;
receiving the prompted for “
n”
symbols through said input pad;
the device prompting for a number “
m”
of symbols, wherein the “
m”
symbols are not symbols of the set of authorizing symbols;
receiving the prompted for “
m”
symbols through said input pad;
the device prompting for a number “
o”
of symbols of the set of authorizing symbols;
receiving the prompted for “
o”
symbols through said input pad;
the device combining the “
n”
symbols and the “
o”
symbols to form an authorizing input, wherein the “
m”
symbols are not used to form the authorizing input; and
authorizing a user based upon whether the authorizing input is equivalent to previously established authorizing data.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
-
Citations
20 Claims
-
1. A computer-implemented method for providing authorizing data comprising the steps of:
-
identifying a device configured to receive a set of authorizing symbols through an input interface, wherein the input interface is in a publicly viewable location;
the device prompting for an initial number “
n”
of symbols from the set of authorizing symbols, where “
n”
is less than total number of symbols contained within the set of authorizing symbols;
receiving the prompted for “
n”
symbols through said input pad;
the device prompting for a number “
m”
of symbols, wherein the “
m”
symbols are not symbols of the set of authorizing symbols;
receiving the prompted for “
m”
symbols through said input pad;
the device prompting for a number “
o”
of symbols of the set of authorizing symbols;
receiving the prompted for “
o”
symbols through said input pad;
the device combining the “
n”
symbols and the “
o”
symbols to form an authorizing input, wherein the “
m”
symbols are not used to form the authorizing input; and
authorizing a user based upon whether the authorizing input is equivalent to previously established authorizing data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A public-access data processing system comprising:
-
a visual display for displaying prompts to a system user, the prompts comprising a mix of legitimate data and masking data that appears as scrambled data;
a data input unit for receiving data supplied by the system user in response to a prompt displayed by the visual display;
active glasses communicatively linked to said visual interface for establishing a private communications link between a system user and said visual interface, said active glasses having a shuttered display for opening and closing in response to synchronization pulses timed to enable a wearer of the active glasses to discern legitimate data among the scrambled data. - View Dependent Claims (9, 13, 14)
-
- 10. The system of 8, further comprising a display encoder for coordinating the operation of the visual display and the shuttered display of the active glasses.
-
15. A computer-readable storage medium, the storage medium comprising computer instructions for:
-
identifying a device configured to receive a set of authorizing symbols through an input interface, wherein the input interface is in a publicly viewable location;
the device prompting for an initial number “
n”
of symbols from the set of authorizing symbols, where “
n”
is less than total number of symbols contained within the set of authorizing symbols;
receiving the prompted for “
n”
symbols through said input pad;
the device prompting for a number “
m”
of symbols, wherein the “
m”
symbols are not symbols of the set of authorizing symbols;
receiving the prompted for “
m”
symbols through said input pad;
the device prompting for a number “
o”
of symbols of the set of authorizing symbols;
receiving the prompted for “
o”
symbols through said input pad;
the device combining the “
n”
symbols and the “
o”
symbols to form an authorizing input, wherein the “
m”
symbols are not used to form the authorizing input; and
authorizing a user based upon whether the authorizing input is equivalent to previously established authorizing data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification