Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Visual access restricted password entry system

IP.com Disclosure Number: IPCOM000206872D
Publication Date: 2011-May-12
Document File: 4 page(s) / 145K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method and system that provides a secure way of entering passwords and preventing others from getting access to passwords by shoulder surfing. The proposed approach can be adopted for entering passwords in any Unicode supported languages like tamil, kannada, Chinese, English, and the like

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 01 of 4

Visual access restricted password entry system

Background

Currently for providing secure way for entering passwords many type of systems have been designed. These systems have specific advantages in specific contexts. These systems provide some limited protection against loosing password by shoulder surfing. Example:- making passwords invisible on screen, providing scrambled keyboard, providing variable passwords, providing one time passwords. Most of these systems deal with entering passwords from a key board or pressing buttons.

In the proposed system password is entered on the surface (stylus) using a pen. There is no visual access to the password entered on the stylus. It is secure and flexible as it can be adapted to any language. It prevents loosing password to shoulder surfing.

This secure way of entering passwords can be used in computers, ATM, PIN entry in Point of Sale (POS) system.

Handwriting recognizing technology

The article [1] in the references section describes handwriting based text input using pen and touch interfaces, The article [2] in the references section describes Hidden Markov Models(HMM) for online handwritten Tamil word recognition. The two articles mentioned describes how handwriting can be trained in the system. Thus, these training data is used for handwriting recognition.

The article [3] in the references section demonstrates eyes free handwriting recognition. This considers the situation where characters are written one over other. In Fig-1 of article [3] it demonstrates a typical example. This situation is considered in Online overlaid handwriting recognition based on sub stroke HMMs described in article [4] in the references section.

The example for overlaid handwriting from the article [3] is reproduced below for easy reference.

1


Page 02 of 4

(This page contains 00 pictures or other non-text object)

The article [3] indicates the success of recognizing the data correctly >90%.

Implementation

The proposed password entry system consists of stylus and a pen. The stylus is placed inside a enclosure which has restricted visual access. This system has access to language recognizing training data.

The training data for each of the language allowed for password entry is made available for the password entry system. The finer variation of the individual's handwriting compared to established standard is updated for that individual in the system. The training data can also be accessed online or the training data is made available on the ATM-card or smart-card of the individual.

When the individual swipes his ATM card or smart card, the training data is read by the password entry system. Using...