Method for producing a data structure for use in password identification
First Claim
1. A method for verifying an identification code received from a user, the method comprising:
- providing an identification system that is operable to electronically receive the identification code, wherein the identification system includes, a memory;
storing in the memory;
at least one matrix of characters, a code, a starting point symbol and a set of relative coordinates, wherein the at least one matrix of characters, the code, the starting point symbol and the set of relative coordinates correspond to a respective user, and further wherein the set of relative coordinates defines a reading path;
electronically receiving by the identification system the identification code submitted by the respective user;
determining by the identification system a first matrix of characters used by the respective user;
selecting by the identification system a line in the first matrix of characters identified by the starting point symbol;
selecting by the identification system a column in the first matrix of characters identified by the code;
selecting by the identification system a starting cell defining the start of a calculated identification code, wherein the starting cell is located in the first matrix of characters at the intersection of the selected line and the selected column;
calculating by the identification system the calculated identification code of characters defined by the starting cell and the reading path, wherein the identification system calculates by retrieving characters in the first matrix that correspond with the starting cell and each relative coordinate in the set of relative coordinates;
comparing the calculated identification code and the received identification code;
and verifying the received identification code in case the received identification code from the respective user and the calculated identification code are the same.
1 Assignment
0 Petitions
Accused Products
Abstract
Passwords consisting of symbols selected from a third set of third symbols, of which a first set constitutes a subset of the first symbols, can be created from a data structure. The method for obtaining this structure comprises the following steps: preparation of a second set of at least two second symbols; creation of a first number of first lists of the first symbols, each list being contained in a third list constituted of the third symbols; creation of a second list of the second symbols, each symbol appearing in that list only once; association of a first list with each symbol of the second list; association of a second symbol to each symbol of the first lists. With this structure (27), a multitude of pseudo-aleatory passwords can be created by means of a code comprising a second symbol, a subcode of at least one first symbol, and a reading path (51) of the symbols in the third lists of the structure, starting from a first symbol found by using the second symbol and the subcode.
-
Citations
10 Claims
-
1. A method for verifying an identification code received from a user, the method comprising:
-
providing an identification system that is operable to electronically receive the identification code, wherein the identification system includes, a memory; storing in the memory;
at least one matrix of characters, a code, a starting point symbol and a set of relative coordinates, wherein the at least one matrix of characters, the code, the starting point symbol and the set of relative coordinates correspond to a respective user, and further wherein the set of relative coordinates defines a reading path;electronically receiving by the identification system the identification code submitted by the respective user; determining by the identification system a first matrix of characters used by the respective user; selecting by the identification system a line in the first matrix of characters identified by the starting point symbol; selecting by the identification system a column in the first matrix of characters identified by the code; selecting by the identification system a starting cell defining the start of a calculated identification code, wherein the starting cell is located in the first matrix of characters at the intersection of the selected line and the selected column; calculating by the identification system the calculated identification code of characters defined by the starting cell and the reading path, wherein the identification system calculates by retrieving characters in the first matrix that correspond with the starting cell and each relative coordinate in the set of relative coordinates; comparing the calculated identification code and the received identification code; and verifying the received identification code in case the received identification code from the respective user and the calculated identification code are the same. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for verifying an identification code received from a user, the method comprising:
-
an identification system provided with memory, wherein the identification system electronically receives the identification code; at least one matrix of characters, a code, a starting point symbol, and a set of relative coordinates defining a reading path that collectively correspond to a respective user and are stored in the memory; and the identification code that is electronically received by the identification system and submitted by the respective user, wherein the identification system; determines a first matrix of characters used by the respective user; selects a line in the first matrix of characters identified by the starting point symbol; selects a column in the first matrix of characters identified by the code; selects a starting cell defining the start of the identification code at the cell located at the selected line and the selected column; calculates, by using the starting cell and the reading path to retrieve characters in the first matrix, a calculated identification code of characters corresponding with the starting cell and the set of relative coordinates; compares the calculated identification code and the received identification code; and verifies the received identification code in case the received identification code from the respective user and the calculated identification code are the same. - View Dependent Claims (7, 8, 9, 10)
-
Specification