Browse Prior Art Database

Passwords for Computer Systems and Cipher Locks Containing Rhythm Patterns

IP.com Disclosure Number: IPCOM000040245D
Original Publication Date: 1987-Oct-01
Included in the Prior Art Database: 2005-Feb-02
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Ditlow, G: AUTHOR [+3]

Abstract

Additional security is provided for a computer system by adding timing constraints on passwords. Examples of timing constraints include constraints on spatial timing (pauses between key-presses) and constraints on hold timing (how long a key is held). As an example, suppose the password to a computer system consists of symbols "7891," access to the system is allowed only when a user enters the password with the following timing pattern: Symbols : 7 8 9 1 Duration : long long long short The timing may be short and long durations on relative scale rather than on absolute scale in seconds. It is also possible to program the computer such that it would accept the password within certain timing tolerances.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Passwords for Computer Systems and Cipher Locks Containing Rhythm Patterns

Additional security is provided for a computer system by adding timing constraints on passwords. Examples of timing constraints include constraints on spatial timing (pauses between key-presses) and constraints on hold timing (how long a key is held). As an example, suppose the password to a computer system consists of symbols "7891," access to the system is allowed only when a user enters the password with the following timing pattern: Symbols : 7 8 9 1 Duration : long long long short The timing may be short and long durations on relative scale rather than on absolute scale in seconds. It is also possible to program the computer such that it would accept the password within certain timing tolerances.

1