Authentication method
First Claim
1. An authentication method in an information technology device having a fixed and a portable data-carrier, an intelligent chip, means for entering, storing, programming, processing, random release, comparison, transmission, and display of information, as well as a means for signal processing and an actuator, the method comprising the steps of:
- (a) constituting a plurality of associated ideas (PSPI) as constitutive elements in the form of images, symbols, text or sounds, said associated ideas (PSPI) being based on the individual knowledge and experiences of a person and being sufficient for the identification of that person, and storing said ideas;
(b) storing in the storing means the constitutive elements of the PSPI in a plurality of element groups such that the elements of a first group are placed in a determined sequence and the elements of the remaining groups are placed in a random sequence;
(c) adding numbers or letters to the constitutive elements of the stored PSPI by means of the device;
(d) displaying on the displaying means the elements of the first group in a determined sequence and the elements of the remaining groups in a random sequence;
(e) putting together the PSPI elements into a characteristic geometrical pattern of reconstituted PSPI, by connecting associated elements of the respective element groups;
(f) generating a code, the code depending on the numbers or letters and their position in the geometrical pattern; and
(g) comparing the code with a code permanently stored in the device.
2 Assignments
0 Petitions
Accused Products
Abstract
An authentifying method is revealed which uses as an identification feature images, tokens, texts or sounds which are based on individual knowledges and experiences of a person (PSPI) and which consist of a principal part and a complement or of associated notions, with that person performing the following steps with regard to a plurality of these PSPI: first register them within a memory and keep them inaccessible to other people, secondly make them visible or audible without the complement and in a sequence which other persons cannot foresee, thirdly restore them with the missing complement or verify them; or first subdivide them into their associated elements and assemble and register the latter ones within a plurality of element groups according to superordinated categories of these associated elements, whereby the elements may be accompanied by tokens like numbers or letters, secondly make them visible, audible or available in their subdivided form according to the groups, for the elements of one category in a determined sequence and for the elements of the other categories in a random sequence, thirdly and still in subdivided form, put them together into characteristic two-dimensional structures or linear chains, by means of connecting associated elements of the respective element groups and of connecting these reconstituted PSPI in a sequence which is defined by the way in which the elements were registered, made visible, audible or available, or by the inherent nature of the elements.
56 Citations
25 Claims
-
1. An authentication method in an information technology device having a fixed and a portable data-carrier, an intelligent chip, means for entering, storing, programming, processing, random release, comparison, transmission, and display of information, as well as a means for signal processing and an actuator, the method comprising the steps of:
-
(a) constituting a plurality of associated ideas (PSPI) as constitutive elements in the form of images, symbols, text or sounds, said associated ideas (PSPI) being based on the individual knowledge and experiences of a person and being sufficient for the identification of that person, and storing said ideas; (b) storing in the storing means the constitutive elements of the PSPI in a plurality of element groups such that the elements of a first group are placed in a determined sequence and the elements of the remaining groups are placed in a random sequence; (c) adding numbers or letters to the constitutive elements of the stored PSPI by means of the device; (d) displaying on the displaying means the elements of the first group in a determined sequence and the elements of the remaining groups in a random sequence; (e) putting together the PSPI elements into a characteristic geometrical pattern of reconstituted PSPI, by connecting associated elements of the respective element groups; (f) generating a code, the code depending on the numbers or letters and their position in the geometrical pattern; and (g) comparing the code with a code permanently stored in the device. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
2. An authentication method in an information technology device having a fixed and a portable data-carrier, an intelligent chip, means for entering, storing, programming, processing, random release, comparison, transmission, and display of information, as well as a means for signal processing and an actuator, the method comprising the steps of:
-
(a) constituting a plurality of PSPI, each PSPI consisting of a statement and its corresponding truth value (true/false), about half of the statements being true and the other half being false relating to constitutive elements in the form of images, symbols, text or sounds, said associated ideas (PSPI) being based on the individual knowledge and experiences of a person and being sufficient for the identification of that person, and storing said ideas; (b) storing the PSPI in said device; (c) displaying the statements one after another in a random sequence on the display means; (d) entering the truth value (true/false) directly after the display of the corresponding statement by pushing one or more buttons of the entering means; (e) comparing the entered truth value with a counterpart stored in the device; (f) counting the number of correct entries made, after the comparison of all entered truth values; and (g) deciding whether the authentication is positive, depending on the counted number of correct entries made. - View Dependent Claims (22, 23, 24, 25)
-
Specification