Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A METHOD AND DEVICE FOR PASSWORD PATTERN RANDOMIZATION
Document Type and Number:
WIPO Patent Application WO/2008/080228
Kind Code:
A1
Abstract:
An embodiment of the present invention is a method of password pattern randomization comprised of providing a predetermined number of input keys and a data array of a predetermined number of values, the number of data array values equalling the number of input keys. Each data array value is assigned to each input key, correspondingly mapped and then correspondingly displayed in operative connection with each of said key. On operation of any key, its corresponding value is transmitted to a processor. The assignment of each value to each key is random. Another embodiment of the present invention is a keyboard device employing this method of password pattern randomization.

Inventors:
SIMMONS PAUL (CA)
Application Number:
PCT/CA2007/002378
Publication Date:
July 10, 2008
Filing Date:
December 31, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SIMMONS PAUL (CA)
International Classes:
G07F7/10; G07F19/00
Domestic Patent References:
WO1985003787A11985-08-29
Foreign References:
US5428349A1995-06-27
US20040044739A12004-03-04
US20030004827A12003-01-02
Attorney, Agent or Firm:
SIMMONS, Paul (Toronto Ontario, M6S 3G2, CA)
Download PDF:
Claims:

Claims

What is claimed is:

1. A method of password pattern randomization for an individual transaction comprising: a) providing a predetermined number of input keys; b) providing a data array of a predetermined number of values, the number of data array values equalling the number of input keys; c) assigning each of said data array values to each of said input keys; d) correspondingly mapping each of said data array values to each of said input keys; e) correspondingly displaying each of said values in operative connection with each of said keys; f) correspondingly transmitting each of said values on operation of each of said keys to a processor; and g) the assignment of each of said values to each of said keys being random.

2. The method as defined in claim 1 wherein each data array value is unique within the data array.

3. The method as defined in claim 1 wherein the random assignment and corresponding mapping, displaying and transmitting is repeated for each new individual transaction.

4. A device for password pattern randomization in an individual transaction comprising: a) a processor;

b) a pre-determined number of input keys operatively connected to said

processor; c) a display operatively connected to said input keys; and d) a data array of a predetermined number of values, the number of data array values equalling the number of input keys, the data array being resident in said processor, the data array values being randomly assigned and correspondingly mapped and displayed in operative connection with said input keys, each of said data array values being transmittable to the processor on operation of each of said corresponding keys.

5. The device as defined in claim 4 further comprising a data reader operatively connected to said processor.

6. The device as defined in claim 4 wherein each data array value is unique within the data array.

7. The device as defined in claim 4 wherein the random assignment and corresponding mapping and displaying is repeated for each new individual transaction.

Description:

Title

[0001] A Method And Device For Password Pattern Randomization

Field of Invention

[0002] This invention relates to a method and device for identity validation and more specifically identity validation using passwords or pass codes such as personal identification numbers (PINs), whereby the password or pass codes are entered using input keys having a randomized configuration.

Background

[0003] PINs are often used in conjunction with data media such as credit or company identity cards that are swiped or inserted into a transaction processing device as an initiation of a request for a desired service. Examples include the use of automated teller machines ("ATM") for monetary withdrawal; point of sale (POS) integrated chip card transactions ("Smart Card technology" or "Chip and Pin") for commercial purchases; and username and password entry on computers or terminals for secure data access.

[0004] Validating an identity using a PIN reduces the risk that a lost, stolen or cloned medium (card or device) can be used fraudulently by an unauthorized user.

[0005] Many transaction locations (or entry points) where PINs are used are located in publicly accessible and are permanently situated where there is an opportunity for eavesdropping or "shoulder surfing". Most entry points or

transaction locations provide a processor device having a fixed input keyboard configuration, for password or PIN entry.

[0006] For any particular medium, the secret password or PIN is also often fixed. Even where the PIN is not fixed, movement of fingers across a fixed configuration keyboard (to enter a PIN into an entry point processing device) or observation of the general movement pattern (of fingers) of an individual while entering a PIN may cause inadvertent disclosure of the PIN to a second party, increasing the risk of fraudulent use.

[00007] US patent 5,239,583 discloses an improvement in structure and credit account access security employing method and means for ensuring that repeating an exact access code which was successful in accessing the account will be unsuccessful at the next or subsequent tries. This method is flawed because it requires the user to memorize multiple passwords, which is difficult. There is a high probability a user will forget some of those passwords.

[0008] US patent 5,428,349 discloses a password access method/ algorithm by generating a pseudorandom array of each letter of the alphabet and the numerals 0 through 9 such that the password entry can be monitored without disclosing the letters or numerals contained in the password. This method is flawed because relatively short passwords can still be easily cracked without knowledge of the actual password.

Summary

[0009] A preferred embodiment of the present invention provides a method of password pattern randomization for an individual transaction comprised of providing a predetermined number of input keys and a data array

of a predetermined number of values, the number of data array values equalling the number of input keys. Each of said data array values are assigned to each of said input keys, correspondingly mapped and then correspondingly displayed in operative connection with each of said keys. On operation of any key, its corresponding value is transmitted to a processor. The assignment of each of said values to each of said keys is random.

[0010] Another preferred embodiment of the present invention provides a device for password pattern randomization in an individual transaction comprised of a processor, a pre-determined number of input keys operatively connected to said processor, a display operatively connected to said input keys, and a data array of a predetermined number of values. The number of data array values equals the number of input keys. The data array is resident in (or operatively connected to) said processor, and the data array values are randomly assigned and correspondingly mapped and displayed in operative connection with said pre-determined number of input keys. On operation of any key, its corresponding value is transmitted to the processor.

Description of the drawings

[0011] Figure 1 is a perspective drawing of a processor device providing an input keyboard.

[0012] Figure 2 is a representative mapping of a conventional device processor input keyboard.

[0013] Figure 3 is a representative conventional device processor input keyboard.

[0014] Figure 4 is a sample populated data array with ten randomized data array values.

[0015] Figure 5 is a sample populated data array with twelve randomized data array values.

[0016] Figure 6 is an example input keyboard mapped with ten randomized data array values.

[0017] Figure 7 is a second example input keyboard mapped with twelve randomized data array values.

[0018] Figure 8 is an example input keyboard having a remote display.

[0019] Figure 9 is an example traditional 104-key input keyboard configuration having a remote display and blank keys.

[0020] Figure 10 is an example traditional 104-key input keyboard configuration having a remote display displaying randomized keys by light emission.

Detailed description of the drawings

[0021] In a preferred embodiment of the present invention, the transaction method herein can be practised on any processor device (10) including the type shown in figure 1. The processor device (10) is typically housed in a casing (34), has an input keyboard (14) comprised of a pre-determined number of input keys (26) operatively connected to the processor (10), an optional transmitter (22) (to transmit data to a selected source outside the processor (10)) and an optional data

reader (18) (for reading, for example, magnetic data strips found on credit cards) operatively connected (meaning able to transmit and possibly receive data) to the processor (10). A separate data reader (18) is not mandatory since transactions using the method herein can allow for key (26) based input as an alternate method of receiving magnetic strip data or the like.

[0022] The input keys (26) are pre-determined in number, have an assigned value selected from a populated data array of values (for example figures 4 and 5) in accordance with the method herein, and each value is displayed on its corresponding key face (38) (digitally in figure 1 as an example). The value of each key (26) can be shown locally on its face (38) or on a remote display (30) operatively connected (meaning able to receive and possibly send data) to the keyboard (figure 8), according to preference. The keys (26) are operatively connected to the processor (10) meaning that on operation (typically, pressing) of any key (26) during a transaction, the processor (10) is able to determine which key (26) is being operated, and the corresponding value transmitted.

[0023] A transaction can be defined as a single event like operating an individual key (26) (i.e. one keystroke), or as a series of events like the pressing or operating of a number of keys (26) in series to establish a password like "1X3Q". Especially where a transaction is defined as a single event, the method herein improves security further when it is repeated after each individual transaction (i.e. after each single key press, a new random assignment is formed (figure 4), and correspondingly mapped (figure 2) and displayed (figures 6 and 7))-

[0024] Resident in (or operatively connected to (generally in a software sense)) the processor (10) is a populated data array (figures 4 and 5) of a pre-

determined number of values (for example iconic, alphanumeric, cryptographic, or Braille values). The number of data array values matches the number of input keys (26). The data array values are randomly assigned (figure 4 showing an algorithm for random assignment of ten values to ten keys, and assignment of two values to two keys where the probability of those assignments being made is certain; figure 5 showing an algorithm for random assignment of twelve values to twelve keys), and correspondingly mapped (figure 2 showing a basic keyboard (14) map) and displayed (figures 3, 6 and 7) in operative connection (meaning each key (26) is connected to a specific data array value which the processor (10) can determine on operation of said key (26)) with the input keys (26). Each of the data array values is transmittable to the processor (10) on operation of each of the corresponding keys (26). In one embodiment of this invention, it may be preferable to not randomly assign certain keys (26). Figures 4 and 6 show an example of where it may be desirable to keep the values "Cancel" (figure 6 "Can") and "Enter" (figure 6 "Ent") in a pre- specified location, for convention and convenience. Where that is not required, all values can be randomized (figure 5) to generate a different result (figure 7 "C" and "E" respectively).

[0025] In any embodiment of this invention, it is possible to populate the data array either with unique or repeating values, depending on preference and need.

[0026] In operation, this method of password pattern randomization for an individual transaction provides to a user (not shown) a pre-determined number of input keys (26) available on any keyboard (14). A populated data array (figures 3, 4, and 5) comprised of a number of values equal in number to the number of input keys is provided, and the values within the array are randomly assigned to the available keys (26). Each value assignment is then

mapped (figures 2 through 7 inclusive) to its corresponding key (26). A user- friendly keyboard (14) map (figures 6 and 7) is then displayed for a user either locally (figure 1) or remotely (figure 8), depending on preference.

[0027] Every time a key (26) is operated it will transmit its corresponding assigned value to the processor (10). Depending on password requirements and the definition of the transaction, the steps of random assignment and correspondingly mapping, displaying and transmitting on key operation, may be repeated. For a higher level of security, after every key operation, a reassignment (and subsequent necessary operations) can occur. For a lower level of security, it may be suitable to run this method once, and accept a multi-value (multicharacter) password based on a single keyboard (14) configuration. Once the user has entered his password, the processor (10) either validates the password, or if it is not so equipped, the processor (10) transmits the password to a selected destination for validation via the optional transmitter (22).

[0028] The present invention can be practised on any type of keyboard

(14) including in a traditional 104-key input keyboard configuration (Figures 9 and 10).

[0029] Where a reassignment, etc. occurs after every key (26) operation, the probability of correctly breaking a three character (value) password using a three by three matrix keypad populated with nine unique values and absolutely no knowledge of the existing password (i.e. a pure guess), is 1 in 729. In contrast, the preexisting art (for example US patent 5,428,349) in the same situation would yield a probability of 1 in 27.

[0030] In a matrix of thirty-six keys (26) arranged six rows by six columns, the probability of a four or six character password being (purely) guessed

correctly is 1 in 1,296 and 1 in 46,656 respectively using the U.S. patent no. 5,428,349 solution. In the present invention the same arrangement would yield probabilities of 1 in 1,679,616 and 1 in 2,176,782,336 respectively. The invention herein is 1,296 times and 46,656 times respectively more secure.