Browse Prior Art Database

Passwords for Computer Systems and Cipher Locks Containing Rhythm Patterns Disclosure Number: IPCOM000040245D
Original Publication Date: 1987-Oct-01
Included in the Prior Art Database: 2005-Feb-02

Publishing Venue


Related People

Ditlow, G Keithley, DG Pickover, CA [+details]


Additional security is provided for a computer system by adding timing constraints on passwords. Examples of timing constraints include constraints on spatial timing (pauses between key-presses) and constraints on hold timing (how long a key is held). As an example, suppose the password to a computer system consists of symbols "7891," access to the system is allowed only when a user enters the password with the following timing pattern: Symbols : 7 8 9 1 Duration : long long long short The timing may be short and long durations on relative scale rather than on absolute scale in seconds. It is also possible to program the computer such that it would accept the password within certain timing tolerances.