×

System and method using personal identification numbers and associated prompts for controlling unauthorized use of a security device and unauthorized access to a resource

  • US 5,745,555 A
  • Filed: 06/07/1996
  • Issued: 04/28/1998
  • Est. Priority Date: 08/05/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A security method for controlling unauthorized access to a resource, comprising the steps of:

  • requesting an authorized user of a security device to select a set of N PINs and N distinct phrases, each one of the N distinct phrases including at least one word, each one of the N distinct phrases being associated with a corresponding one of the N PINs for identifying the corresponding one of the N PINs and for acting as a prompt to remind the authorized user of the corresponding one of the N PINs, wherein N is a positive integer;

    storing in the security device the N PINs and the associated N distinct phrases;

    transmitting an encoded signal from the security device to a verification service, the encoded signal representing the N PINs and the associated N distinct phrases;

    receiving the encoded signal from the security device at the verification service;

    decoding the encoded signal at the verification service to obtain the N PINs and the associated N distinct phrases;

    selecting, by the verification service, a first one of the N PINs;

    prompting, by the verification service, a current user of the security device for a first time using the one of the N distinct phrases associated with the first selected one of the N PINs as a first prompt;

    receiving at the verification service a first response to the first prompt from the current user;

    determining at the verification service, as a function of the first response, whether the current user of the security device is the authorized user, wherein the step of determining includes the step of comparing the first response to the first selected one of the N PINs to determine if there is a match; and

    granting, to the current user by the verification service, access to a resource if it is determined that the current user of the security device is the authorized user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×