System and method using personal identification numbers and associated prompts for controlling unauthorized use of a security device and unauthorized access to a resource
First Claim
1. A security method for controlling unauthorized access to a resource, comprising the steps of:
- requesting an authorized user of a security device to select a set of N PINs and N distinct phrases, each one of the N distinct phrases including at least one word, each one of the N distinct phrases being associated with a corresponding one of the N PINs for identifying the corresponding one of the N PINs and for acting as a prompt to remind the authorized user of the corresponding one of the N PINs, wherein N is a positive integer;
storing in the security device the N PINs and the associated N distinct phrases;
transmitting an encoded signal from the security device to a verification service, the encoded signal representing the N PINs and the associated N distinct phrases;
receiving the encoded signal from the security device at the verification service;
decoding the encoded signal at the verification service to obtain the N PINs and the associated N distinct phrases;
selecting, by the verification service, a first one of the N PINs;
prompting, by the verification service, a current user of the security device for a first time using the one of the N distinct phrases associated with the first selected one of the N PINs as a first prompt;
receiving at the verification service a first response to the first prompt from the current user;
determining at the verification service, as a function of the first response, whether the current user of the security device is the authorized user, wherein the step of determining includes the step of comparing the first response to the first selected one of the N PINs to determine if there is a match; and
granting, to the current user by the verification service, access to a resource if it is determined that the current user of the security device is the authorized user.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method using personal identification numbers and associated prompts for controlling unauthorized use of a security device and unauthorized access to a resource. The method includes requesting an authorized user of a security device to select a set of N PINs and N distinct phrases, each one of the N distinct phrases being associated with a corresponding one of the N PINs for acting as a prompt to remind the user of the corresponding one of the N PINs. A current user of the security device is prompted using one of the N distinct phrases and the user'"'"'s response to the prompt is compared to the associated PIN to determine whether the current user of the security device is the authorized user. The current user is granted access to the resource or is granted use of the security device if it is determined that the current user of the security device is the authorized user.
436 Citations
13 Claims
-
1. A security method for controlling unauthorized access to a resource, comprising the steps of:
-
requesting an authorized user of a security device to select a set of N PINs and N distinct phrases, each one of the N distinct phrases including at least one word, each one of the N distinct phrases being associated with a corresponding one of the N PINs for identifying the corresponding one of the N PINs and for acting as a prompt to remind the authorized user of the corresponding one of the N PINs, wherein N is a positive integer; storing in the security device the N PINs and the associated N distinct phrases; transmitting an encoded signal from the security device to a verification service, the encoded signal representing the N PINs and the associated N distinct phrases; receiving the encoded signal from the security device at the verification service; decoding the encoded signal at the verification service to obtain the N PINs and the associated N distinct phrases; selecting, by the verification service, a first one of the N PINs; prompting, by the verification service, a current user of the security device for a first time using the one of the N distinct phrases associated with the first selected one of the N PINs as a first prompt; receiving at the verification service a first response to the first prompt from the current user; determining at the verification service, as a function of the first response, whether the current user of the security device is the authorized user, wherein the step of determining includes the step of comparing the first response to the first selected one of the N PINs to determine if there is a match; and granting, to the current user by the verification service, access to a resource if it is determined that the current user of the security device is the authorized user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A security method for controlling unauthorized use of a device, comprising the steps of:
-
requesting an authorized user of a device having memory, a display and input keys, to select a set of N PINs and N distinct phrases, each one of the N distinct phrases including at least one word, each one of the N distinct phrases being associated with a corresponding one of the N PINs for identifying the corresponding one of the N PINs and for acting as a prompt to remind the authorized user of the corresponding one of the N PINs, wherein N is a positive integer; storing in the device the N PINs and the associated N distinct phrases; selecting, by the device, a first one of the N PINs; displaying, by the device, a first list of PINs from which a current user can select a PIN by using the input keys, the first list of PINs including the first selected one of the N PINs; prompting, by the device, the current user of the security device for a first time using the one of the N distinct phrases associated with the first selected one of the N PINs as a first prompt, to select from the displayed first list of PINs the first selected one of the N PINs; determining, by the device, whether the current user of the device is the authorized user, wherein the step of determining includes the step of detecting whether the current user selected the first selected one of the N PINs in response to the first prompt; and enabling, by the device, the current user to operate the device upon determining that the current user is the authorized user. - View Dependent Claims (13)
-
Specification