GB2358948A - Password storage apparatus and method - Google Patents

Password storage apparatus and method Download PDF

Info

Publication number
GB2358948A
GB2358948A GB0102621A GB0102621A GB2358948A GB 2358948 A GB2358948 A GB 2358948A GB 0102621 A GB0102621 A GB 0102621A GB 0102621 A GB0102621 A GB 0102621A GB 2358948 A GB2358948 A GB 2358948A
Authority
GB
United Kingdom
Prior art keywords
escort
code
user
access code
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0102621A
Other versions
GB0102621D0 (en
Inventor
Allen John Keetch
Kenneth Edward Hines
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AZTAK TECHNOLOGY CORP
Original Assignee
AZTAK TECHNOLOGY CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AZTAK TECHNOLOGY CORP filed Critical AZTAK TECHNOLOGY CORP
Publication of GB0102621D0 publication Critical patent/GB0102621D0/en
Publication of GB2358948A publication Critical patent/GB2358948A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

A memory device 30 allows a person to remember only a single code and use that code to retrieve the identifying code or password required to access a secure facility. The memory device 30 is nearly the size and shape of a credit card and has a display 32, keypad 34, and housing 44, which may be tamper-proof, having a writing portion 46 on the rear. A user initially uses the keypad 34 to enter both a memory access code and a separate identifying code associated with each secure site or equipment. Subsequently, when the user desires to access a selected site or equipment (s)he can enter the access code and read, from the display, the required identifying code. A mnemonic descriptor can be written on a designated blank writing portion 46 on the housing, for each stored code. A brief advertising message can also be stored in the device memory and displayed each time the device is turned on. In a preferred embodiment, all the stored identifying codes are erased after a predetermined number of sequential inputs of the incorrect access code.

Description

2358948 PASSWORD STORAGE APPARATUS AND METHOD The invention relates to
security arrangements in which access to a transactional capability or to some physically secured location or object is granted responsive to an authorised user providing a password, personal identification number or other unique message to identify himself. More specifically, the invention relates to secure means of storing passwords for use with multiple systems.
There are many arrangements in which a person must provide a password, io personal identification number (PIN), or some other user-identifying code to a secure apparatus in order to carry out a transaction or to be permitted physical access to a protected area or object. These arrangements include many credit and debit transactions (e.g., those carried out at automated teller machines), entry to an area locked by a combination lock or electronic access control means; and password access to the use of a computer. In many such arrangements the secure system issues a Personal Identification Number (PIN) or other password to users. It is therefore common for many people in our society to have to remember and use multiple passwords, PINs and the like in order to get through an average day. A common problem in modem life is that of forgetting a password needed to carry out some essential or important activity.
The level of security offered by the use of a password is often compromised by users who simply can not remember all their passwords and who write them down somewhere handy. Whenever one of these people has a purse or wallet stolen, there is a high likelihood that the thief will discover the nominally hidden password and will try using that password with various credit cards, ATM cards, etc. in an attempt to steal more from the victim.
Several inventors have addressed the problems of password proliferation by attempting to provide a secure means of password storage that a user can carry along with whatever physical record (e.g., a teller machine card) is needed for access. The patent art in this field includes:
US 5,742,035, to Kohut, who teaches printing a matrix of numbers on the surface of a wallet card (e.g., a credit card, ATM card or the like). The PIN 2 associated with the card is made up of a sequential pattern of some of the numbers, where the sequential pattern is chosen by (and subsequently remembered by) the authorized user of the card.
US 5,259,649, wherein Shomron teaches printing a plurality of PINs on the surface of a credit card and using visual cues (such as choice of font, geometric patterns adjacent the PINs, etc.) to point out the correct PIN to the authorized user.
US 5,246,375, wherein Goede teaches the use of a matrix overlay that reveals the PIN when placed over a credit card in a predetermined orientation.
US 4,801,787, wherein Suzuki teaches an electronic apparatus comprising a memory in which the user can store easily remembered personal data (e.g., mother's maiden name) and use those data to validate his or her identity when he or she forgets the PIN.
Another area of interest to the present invention is that of telephone instruments having a "speed diaP or "memory diaP capability. In these devices a user can enter a frequently called telephone number into a memory and can write some sort of name or other designation associated with that number in an enumerated list of blank fields provided on the housing of the instrument. To call the stored number, the user may consult the enumerated list to see what number is associated with the person to be called, and then press a key that initiates the memory dial feature, followed by the number key on the keypad bearing the number associated with the person. It is recognised that in some such instruments (e.g., cellular phones) the number to be speed dialled is displayed on a small LCD display adjacent a keypad on a battery powered telephone instrument prior to the instrument being used to initiate the call to the selected number.
One of the goals of the invention is to provide means by which a person need only remember a single identifying code and can use that identifying code to retrieve whatever such code or password is required for access to a selected secure facility or 30 transaction.
One of the benefits of the invention is that it provides escort memory apparatus that can be used by a person who requires access to a number of secure sites, equipments or transaction accounts, who has a different identifying code for 3 each such use, and who must enter the appropriate identifying code to gain each desired access. The invention provides the user with a small card-like escort memory device having a display; a manual data input means; a housing having a writing portion; and an electronic memory having an escort memory access code stored therein. The user may initially use the input means to enter both the escort memory access code and an identifying code associated with the each site or equipment. Subsequently, when the user desires access to the selected site or equipment he or she can enter the escort access code and then read, from the display, the identifying code needed to access the selected site or equipment. In a preferred embodiment the user can write a nmemonic descriptor (e.g., the name of a bank) on a designated blank writing portion of the housing for each stored identifying code so that the descriptor is immediately adjacent an indicium representative of a unique data record label. In one such embodiment, twenty four blank spaces are provided where each blank is uniquely associated with an integer lying in the range from one to twenty four.
A preferred embodiment of the invention provides a software security arrangement in which all of the identifying codes stored in a memory of the escort memory device are erased after some predetermined number of sequential inputs of trial escort memory access codes fail to match the stored escort memory access code.
In a particular preferred embodiment, the escort memory enters a software selfdestruct mode after three erroneous codes are entered in sequence.
Moreover, a preferred embodiment of the invention provides physical means of preventing an unauthorised person from tampering with or illicitly acquiring the identifying codes stored in the escort memory. These means may include providing a sealed housing that can not be opened without a high likelihood that doing so would break a circuit trace or otherwise destroy the apparatus.
Although it is believed that the foregoing recital of features and advantages may be of use to one who is skilled in the art and who wishes to learn how to practice the invention, it will be recognised that the foregoing recital is not intended to list all of the features and advantages. Moreover, it may be noted that various embodiments of the invention may provide various combinations of the hereinbefore recited 4 features and advantages of the invention, and that less than all of the recited features and advantages may be provided by some embodiments.
To help understanding of the invention, a specific embodiment thereof will now be described by was of example and with reference to the accompanying drawings, in which:
Figure 1 is a front elevational view of an escort memory apparatus of the invention Figure 2 is a rear elevational view thereof Figure 3 is a schematic block diagram of the escort memory device.
Figure 4 depicts a flow chart that could be carried out by an escort memory of the invention and depicts flows of identity information between the escort memory and secure systems, the flows all passing through a user.
An escort memory apparatus 30 of the invention is preferably configured as a nearly wallet-sized card that can be carried about as easily as one could carry a credit card. Although small calculators having the same length and width as a credit card (i.e., about eighty five millimetres by fifty four millimetres) have been on the market for some time, they are considerably thicker than a credit or debit card, which is commonly about one half millimetre thick. A preferred embodiment of the escort memory apparatus 30 is between two and three millimetres thick. The overall dimensions for the apparatus 30 are thus selected to be about eighty three by fifty seven millimetres by three millimetres, where the length and width are chosen to differ from normal credit card dimensions by two to three millimetres in order to make the apparatus of the invention somewhat easier for a user 50 to find in his or her wallet. Additionally, the slight decrease in the width of the apparatus 30, offsets the greater thickness so that the apparatus 30 can fit into a wallet slot intended for a credit or debit card.
The escort memory apparatus 30 preferably comprises, as its only output, a low power display, which may be liquid crystal display 32; or may be any other such display operating with the same or lower power requirements 2E. The memory apparatus 30 has, as its only user input, a manual input device such as the preferred membrane keypad 34 depicted in the drawing. Operation of the apparatus 30 is controlled by a control means that is preferably a microcontroller or microprocessor 36 operating under control of a program stored in a read- only memory 38. Although many different sorts of microcontrollers or microprocessors could be considered, an initially preferred apparatus of the invention 30 used a Model MSM64155 made by Oki Semiconductor. In addition to the masked ROM 38, a read-write memory, such as an EEROM 40, was also associated with this microprocessor 36 and was used for storing identity codes, as will be described in greater detail hereinafter. In a subsequent embodiment of the invention an Oki Model MSM63184A microcontroller was selected. This latter device had sufficient on-board memory that the developers were able to dispense with the EEROM as a separate component. In the initially preferred embodiment using the Oki Model MSM64155, eliminating the EEROM led to a device capable of storing only five codes strings if each code string was ten characters in length.
A preferred escort memory apparatus 30 is powered by a non-rechargeable, non-replaceable primary battery 42 that is permanently sealed into the casing or housing 44 of the apparatus so as to prohibit replacement of the battery 42. This approach to making the apparatus 30 minimises its initial cost. The tamper-resistant housing 44 also provides a measure of security, in that no one can open the housing in order to attempt to read out data stored in the EEROM 40. As a flirther deterrent to theft by a skilled and well equipped thief, in a preferred embodiment the data stored in the EEROM 40 and in memory on the microprocessor 36 chip are encrypted.
Another feature of a preferred housing 44 is a writing area 46 disposed on the back of the housing 44 and providing an enumerated, or otherwise conveniently labelled, set of defined spaces 47 wherein a user 50 can write names that he or she can use to designate a bank account, computer, etc., for which he or she wants to remember a password or other identifying code. The writing area 46 may be formed as a roughened portion of a plastic housing, may be an adhesive-backed paper form adhered to the housing, or may be formed by any other known approach allowing someone to write short text strings thereon by the use of conventional writing implements.
6 Turning now to Fig. 4, one finds a depiction of the use of an escort memory 30 by a user 50 to store and to retrieve a plurality of useridentifying codes. Each of these codes is respectively associated with a separate secure system 52. The exchange of data between the user 50 and the various apparatuses 30, 52 is indicated in Fig. 4 with the bold arrows 53. As is well known in the art, each of the systems 52 issues a password, PIN, or other identity code (depicted as PIN 1 to PIN N in Fig. 4) to the user 50 and then requires the user to input that code in order to access the system 52. The user 50 can store the identity codes PIN 1... PIN N in the escort memory apparatus 30 by entering a trial escort access code as shown in Step 54. The program running in the escort memory apparatus 30 compares the trial code with an escort access code 56 stored in the EEROM 40, as indicated in Step 56. If the user enters the correct escort access code, he or she can then choose (Step 58) to either store a new identity code (Step 60) or to read a previously stored code (Step 62) from the memory. 40.
In order to prevent a thief from guessing the stored access code in a stolen escort memory device 30 a limit is placed on the number of allowable comparisons made in Step 56 between a trial escort access code and the stored escort access code. If a predetermined maximum allowable number of attempts to match the codes is reached, the program enters a software self-destruct or failure mode (Step 64). In a preferred embodiment, the maximum number of attempts to match the stored escort access code is set at three, and the failure mode completely and permanently disables the apparatus 30 by erasing or over- writing all of the stored identity codes and the stored escort access code.
In a specific preferred embodiment, the escort apparatus 30 is supplied to an end user with a factory set escort access code (e.g., "877). The user 50 is directed to begin his or her use of the apparatus by over- writing the factory generated and generally publicly known escort access code with an escort access code of his or her own choosing. This may be done by turning on the apparatus 30, which is programmed to initially read the stored escort access code, and, if that access code is the initial factory set code, to allow the user complete access to data stored in the device. Alternately, of course, the device could be programmed to display the same start-up message used in normal operation - e.g., "enter code", and the user could first 7 enter the factory code (which can be printed on a temporarily adhered tag), and then begin an escort access code change routine (e.g., by simultaneously pressing two keys, or by entering a code entry sequence, such as the "PGM" key followed by "00").
is After gaining access to the escort apparatus 30 by entering his or her escort access code, the user can enter one or more identity codes. For example, he or she could select a data field by keying in a unique record label and pressing the VW' key, which would result in the display of the unique record label designation 45 on the display. In a preferred embodiment the unique record label designation 45 is a two digit prompt, where the two digits (commonly the integers lying in the range of one to twenty, where the integers between one and nine are displayed with a leading zero) represent a memory location available for storage of a uniquely labelled data record. He or she could then use the keypad 34 to enter the desired identity code or PIN, which would be displayed as it was entered. After checking the display to ensure that the correct code was entered, the user would press the ENT key to write the code into the memory location operatively associated with the two digit prompting message. Before or after this step the user would preferably write a user-generated mnemonic designation in a corresponding space 47 in a writing area 46 on the back of the housing 44. It will be recognised that many variations on this data entry process are possible, and that the one cited above is merely one of several convenient choices. It may also be noted that the apparatus 30 can be configured to allow the entry of only one PIN for each entry of the access code, or may allow entry of any number of PINs once it has accepted a valid access code.
For the more common operation of consulting the escort apparatus 30 in order to retrieve an identity code for use with a secure system (e.g., an automatic teller machine from which the user wants to withdraw cash from a bank at which he or she has an account), the user would switch the escort apparatus into its active mode, enter his or her escort access code, and then select the identity code display function (e.g., by pressing the ENT key on the keypad). In a preferred embodiment the display then shows the PIN stored in the first memory location in the format "Ol.nnnnnnnnnn" where the dot or other separator separating the memory location designation "0 1 " from the access code "nnnnnnnnnn" may be printed on a overlay aligned with the LCD display 32 in order to avoid having to give up a portion of the LCD for the 8 display of repetitive material. At this point in the preferred sequence, the user refers to the list of mnemonic designations (e.g., the name of the bank) and inputs the two digit number associated with that designation in the enumerated list of names appearing on the back of the apparatus, and again presses "ENT" to display the requested identity code. It will be noted that many other arrangements, e.g., displaying a prompting message at start-up rather than showing the contents of the first memory location, or allowing the user to scroll sequentially through all the stored identity codes, could also be used for identity code retrieval and display.
The preferred apparatus is expected to have only a limited memory capacity e.g., it may store only one escort access code and twenty separate identity codes, where each code is up to twelve alphanumeric characters in length. Hence, an appropriate arrangement will be made for deleting or for over-writing old identity codes with new ones whenever a user changes banks, or is issued a new password for a computer used at work, etc. A preferred process of doing this comprises the steps of. a) gaining access to the apparatus 30 by entering the appropriate escort access code, b) entering the data field number associated with the account and hitting the "PGM" key; c) entering the new identity code datum followed by the "ENT" key. A similar approach may be used to change the escort access code. In this case, instead of entering a number associated with a data field, the user enters a selected number, such as "00% that is not within the range of numbers used to identify data fields (e.g., is not one of the integers between one and twenty).
A preferred operating program also uses an internal timer to automatically turn off the display and place the apparatus in a low power mode of the sort commonly called "sleep mode" after a short period (e.g.,fifteen seconds) of inactivity. As is known in the art, the period of inactivity may be measured from the time that a manual input places the apparatus in its active mode, or, more commonly, may be measured from the time that the most recent user input is supplied at the keyboard.
The use of this dual mode operation is important to the present invention for several reasons. Because the device is expected to be a low cost device to be used only until the battery is depleted and then thrown away and replaced, sleep mode operation is important in prolonging the life of the apparatus. Additionally, the provision of a timed operating cycle allows for simpler operation in that the user does not have to 9 learn any additional steps to turn the apparatus off. All he or she needs do is place the apparatus in a pocket or purse and it will automatically enter sleep mode and refuse to display stored identity codes until the stored escort access code has again been entered. Moreover, a preferred embodiment of the apparatus employs a small "telephone-type" keypad in the interest of reducing both size and cost and preferably uses one of the keys in the keypad (e.g., the "Y' key in the middle of the pad is pressed twice within three seconds) to cause the microprocessor to enter its active mode in which inputs are accepted and outputs displayed. This sort of arrangement avoids adding a dedicated ON/OFF switch to the unit.
As is known in the art, a telephone-type a keypad can be used for alphanumeric and special character data entry by using repetitive keystrokes to enter a selected one of the letters displayed above a numbered key. For example, a letter "e", which is the second letter in the 'DEP triad associated with the 'W' key can be entered by hitting 'W' key three times in succession.
Like many other relatively low cost products, the apparatus of the invention may also find use as an advertising specialty item bought in large numbers by a single company and then given away to that company's customers or prospective customers. In a preferred advertising specialty embodiment of the invention, a corporate logo, trademark emblem or other identifying indicium 66 is imprinted on the housing 44 of each storage apparatus 30 of a custom ordered lot thereof. Moreover, a brief advertising message comprising a string of alphabetic or alphanumeric characters may be stored in a predetermined portion of the memory 40 and displayed to the user of the apparatus 30 each time it is turned on. For example, the apparatus described above that could contain up to twenty PINs can be reprogrammed to serve as an advertising specialty product by dedicating the memory space otherwise used by four of the twenty identity codes to an advertising message or other message unrelated to identity codes. This message, which could be over thirty characters in length, is then scrolled across the twelve character display 32 whenever the apparatus 30 is turned on and before the user enters his or her access code. It will be appreciated by those skilled in the computer arts that the same hardware can be used for either application. Customising a batch of escort memory devices 30 can be done before packaging the apparatus by selecting the program to be stored in the microprocessor's ROM 38, storing an advertising message unrelated to any identity code that is to be used in the data memory 40 and by arranging for printing, engraving, or otherwise displaying custom indicia on the outside of the housing 44.
Alternately, the apparatus 30 can be customised after sealing by using a connector comprising a thin contact insertable into a connector in the housing to make electrical contact to appropriate circuit points. This arrangement permits a retailer to use the special writing apparatus to economically add advertising, promotional, or other messages to ones of a relatively small lot of apparatuses 30. In a preferred io arrangement, the writing apparatus is configured to have an interface to a desktop computer capable of running the writing software and of displaying the message to be written before it is entered into the apparatus 30.
Although the present invention has been described with respect to several preferred embodiments, many modifications and alterations can be made without departing from the invention. Accordingly, it is intended that all such modifications and alterations be considered as within the spirit and scope of the invention as defined in the attached claims.
The invention provides apparatus and method for conducting secure financial transactions and for acquiring access to secured facilities and equipment.
11

Claims (9)

1. Apparatus for storing an escort access code and up to a predetermined number of identifying codes, each of the identifying codes respectively an associated with a user-generated designation, the apparatus characterised in that:
a computer memory (40) is controlled by a microprocessor (36) to store, at respective locations therein, the escort access code and each of the identifying codes; a display (32) is controlled by the microprocessor (36) to display one of the identifying codes during a predetermined interval after the user supplies the escort access code to the microprocessor by means of a keypad (34); and 0 a writing area (46) is disposed on a portion of a housing (44) that encloses the microprocessor (36), a battery (42) and the computer memory (40), the writing area adapted to have the user-generated designation written thereon.
2. The apparatus of Claim 1 wherein the microprocessor has both a sleep mode and an active mode.
3. The apparatus of Claim 1 wherein the memory is further adapted to store a message unrelated to any of the codes, and wherein the microprocessor is adapted to retrieve the unrelated message and control the display to display the unrelated message whenever the microprocessor switches from a sleep mode to an active mode.
4. The apparatus of Claim 1 wherein the housing is tamper-resistant and is adapted to prohibit replacement of the battery, and wherein the battery is a primary battery.
5. The apparatus of Claim 1 wherein the computer memory comprises an EEROM.
6. A method for storing and retrieving a user-identifying code that is to be supplied to a secure apparatus in order to obtain access thereto, the method comprising the steps of.
a) storing, in an escort memory apparatus that requires entry of a trial access code matching a stored escort access code before displaying the identifying code, the user-identifying code as a record uniquely associated with a respective record label; b) supplying, by means of a manual input to a keypad, the trial access code to the escort memory apparatus; 12 c) reading a first message displayed by the escort memory apparatus and, if the first message indicates that the trial access code matches the escort access code, entering, by means of the keypad, the label uniquely associated with the user-identifying code; and d) reading the user-identifying code displayed by the escort memory apparatus responsive to the input of the unique record label.
7. The method of Claim 6 farther comprising a step subsequent to step a) and prior to step b) of.
0 writing a user-generated designation associated with the secure apparatus on an external portion of the escort memory apparatus, the external portion adjacent indicia representative of the unique record label.
8. The method of Claim 6 wherein the escort memory apparatus stores a second message, unrelated to any of the codes, and displays the second message prior to step b).
9. The method of Claim 6 wherein, if the trial access code supplied in step b) does not match the escort memory access code, the first message indicates to the user that a first repetition of step b) is required and, if the trial access code entered in the first repetition of step b) does not match the escort access code, a second message is displayed indicating that only one more repetition of step b) is allowed before the 20 escort memory apparatus erases all stored codes.
GB0102621A 2000-02-07 2001-02-02 Password storage apparatus and method Withdrawn GB2358948A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US49950700A 2000-02-07 2000-02-07

Publications (2)

Publication Number Publication Date
GB0102621D0 GB0102621D0 (en) 2001-03-21
GB2358948A true GB2358948A (en) 2001-08-08

Family

ID=23985524

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0102621A Withdrawn GB2358948A (en) 2000-02-07 2001-02-02 Password storage apparatus and method

Country Status (3)

Country Link
AU (1) AU2001234868A1 (en)
GB (1) GB2358948A (en)
WO (1) WO2001057814A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20121051U1 (en) 2001-12-29 2002-05-29 Bausch, Klaus-Dieter, 45475 Mülheim Mobile phone for creating a digital personal data safe
GB2387254A (en) * 2002-04-05 2003-10-08 Armoursoft Ltd User authentication for computer systems
WO2004068441A1 (en) * 2003-01-30 2004-08-12 Chiew Ying Chow Method for generating and inputting mnemonic devices and article for registering the input arrangement
SG134988A1 (en) * 2003-01-30 2007-09-28 Chow Chiew Ying Method for generating and inputting mnemonic devices and article for registering the input arrangement
US20150281214A1 (en) * 2014-03-31 2015-10-01 Sony Corporation Information processing apparatus, information processing method, and recording medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3250557B2 (en) * 1999-12-20 2002-01-28 いわき電子株式会社 Encryption display card
GB2417581A (en) * 2004-08-31 2006-03-01 Simon Heath Electronic device for storing sensitive data
JP2008527488A (en) * 2005-01-04 2008-07-24 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Card having input element for inputting PIN code and method for inputting PIN code
WO2006128214A1 (en) * 2005-06-01 2006-12-07 Michael Hennessy Device for keeping track of passwords
CN100426181C (en) * 2005-10-20 2008-10-15 万国电脑股份有限公司 Pocket memory device with object recognition information and set method of object recognition information
CN112115523A (en) * 2020-09-30 2020-12-22 海南大学 Data self-destruction encryption storage device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0335384A (en) * 1989-06-30 1991-02-15 Toshiba Corp Portable electronic device
GB2274184A (en) * 1993-01-06 1994-07-13 William Mcintosh Security device
DE29808147U1 (en) * 1998-05-06 1998-08-13 Karle, Friedhelm, 76474 Au Electronic memory card
NL1010221C2 (en) * 1998-09-30 2000-03-31 Klaas Tilma Electronic storage and display unit for multiple PIN codes, allows user to find all his PIN numbers by keying in only one overall PIN number
DE19938001A1 (en) * 1999-03-06 2000-09-07 Tillmanns Friedhelm PIN card for storing personal identification numbers
NL1011708C1 (en) * 1999-03-31 2000-10-03 Klaas Tilma PIN code storage device, has bank card shape and size with keys, display and microprocessor chip memory

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS629470A (en) 1985-07-05 1987-01-17 Casio Comput Co Ltd Identity collation system for individual identification card
FR2657984A1 (en) * 1990-02-07 1991-08-09 Tech Nles Applic Sa Et HELP MEMORY CODE.
IL94848A (en) 1990-06-22 1993-08-18 Gur Shomron Credit card
US5246375A (en) 1991-09-23 1993-09-21 Wouter Goede Memory aiding device
FR2714985B1 (en) * 1994-01-11 1996-04-12 Lenfant Jean Pierre Method for memorizing and restoring a secret code.
FR2719729B1 (en) * 1994-05-05 1996-05-31 Alcatel Business Systems Arrangement, in particular of telecommunications, associating a device and a memory and / or logic card, corresponding device and card.
US5742035A (en) 1996-04-19 1998-04-21 Kohut; Michael L. Memory aiding device for credit card pin numbers
NL1008454C2 (en) * 1998-03-03 1999-09-06 Geneva Bancorporation S A Storage and recall of PIN codes for several credit cards etc.
SE512671C3 (en) * 1998-04-23 2000-05-15 House Of Added Value Ab Proceed to store and retrieve personal codes
DE29904747U1 (en) * 1999-03-06 1999-05-27 Tillmanns, Friedhelm, 45470 Mülheim Electronic storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0335384A (en) * 1989-06-30 1991-02-15 Toshiba Corp Portable electronic device
GB2274184A (en) * 1993-01-06 1994-07-13 William Mcintosh Security device
DE29808147U1 (en) * 1998-05-06 1998-08-13 Karle, Friedhelm, 76474 Au Electronic memory card
NL1010221C2 (en) * 1998-09-30 2000-03-31 Klaas Tilma Electronic storage and display unit for multiple PIN codes, allows user to find all his PIN numbers by keying in only one overall PIN number
DE19938001A1 (en) * 1999-03-06 2000-09-07 Tillmanns Friedhelm PIN card for storing personal identification numbers
NL1011708C1 (en) * 1999-03-31 2000-10-03 Klaas Tilma PIN code storage device, has bank card shape and size with keys, display and microprocessor chip memory

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE20121051U1 (en) 2001-12-29 2002-05-29 Bausch, Klaus-Dieter, 45475 Mülheim Mobile phone for creating a digital personal data safe
GB2387254A (en) * 2002-04-05 2003-10-08 Armoursoft Ltd User authentication for computer systems
GB2387254B (en) * 2002-04-05 2005-11-23 Armoursoft Ltd User authentication for computer systems
WO2004068441A1 (en) * 2003-01-30 2004-08-12 Chiew Ying Chow Method for generating and inputting mnemonic devices and article for registering the input arrangement
SG134988A1 (en) * 2003-01-30 2007-09-28 Chow Chiew Ying Method for generating and inputting mnemonic devices and article for registering the input arrangement
US20150281214A1 (en) * 2014-03-31 2015-10-01 Sony Corporation Information processing apparatus, information processing method, and recording medium

Also Published As

Publication number Publication date
WO2001057814A1 (en) 2001-08-09
AU2001234868A1 (en) 2001-08-14
GB0102621D0 (en) 2001-03-21

Similar Documents

Publication Publication Date Title
US4667087A (en) Secure credit card
US4958066A (en) Financial instrument verification and method of production
US9727813B2 (en) Credit, security, debit cards and the like with buttons
US20070136593A1 (en) Secure information storage apparatus
IL104422A (en) Method and apparatus for magnetically writing on plastic cards
CN101322143A (en) Card having password input key
EP0216937A1 (en) Ic card.
GB2358948A (en) Password storage apparatus and method
US6595415B2 (en) IC card processor
GB2255934A (en) Integrated circuit card with display.
JP2009080729A (en) Processing system for a plurality of accounts and automated teller machine
GB2274184A (en) Security device
US8393535B1 (en) ID theft-reducing device to virtualize ID/transaction cards
EP1082708A1 (en) Visual code recordal and communication thereof
NL1011708C1 (en) PIN code storage device, has bank card shape and size with keys, display and microprocessor chip memory
NL1008454C2 (en) Storage and recall of PIN codes for several credit cards etc.
JPH09212723A (en) Personal information transaction device
Shoewu et al. Enhanced Biometric Based Attendance Module Interfaced with POS for an Academic Institution
JPS61228567A (en) Electronic personal identification card and its display system
GB2411286A (en) A memory aid device
EP0395659A1 (en) Security system
JP3226730B2 (en) Time management device with time tampering check function
JP2009054109A (en) Memory card
KR200216635Y1 (en) Electronic card wallet
JPH0668878B2 (en) Magnetic card issuing device

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)