The present invention relates to information technologies. More particularly, the invention relates to a method for producing a data structure for password identification in a machine to machine or user to machine configuration. In a preferred configuration the identification is a multilevel system consisting of a combination of at least 2 levels such as a user to machine communication and a machine to machine configuration.
In today's modern economy, individuals typically establish accounts with different institutions and entities and use these accounts to interact with others to obtain goods and services and establish histories. Accounts are typically maintained on server computers under the control of the institution or entity. Such accounts, however, are often vulnerable to security risks such as hacking and identity theft and are frequently out-of-date or inconsistent.
It is conventionally known that the services and devices can require a password identification to allow access to the device and to the data stored within or accessible thereby. This password requirement is most commonly encountered on the devices, which occurs during the initial boot up of the software of the device. However, for added security, many individuals will also password protect select files, emails, and other desired information which should be confidential.
The present invention relates to identification and password technologies. More particularly, the invention relates to a method for producing a data structure for password identification employing a dynamic interface in combination with a virtual rolling code.
It provide a security method for user to machine communication In which a user can be defined as machine or other entity. The technology can used as security and method in applications such as blockchain, cryptocoins, peer to peer, Internet of things networks etc.
The system, employing software running on a microprocessor such as a server, and communicating over a network, is configured to the task of providing each machine with a dynamically changing object, personal to that machine, and thereby indiscernible by third parties. Generation of the changing object is provided through following a set of pre-defined machine-criteria for generating a communicated data string representing a password, which is personal in input determination such that it can only be determined by the machine who set the original criteria.
The machine pre-defines the set of viewable objects and/or sounds, but not the position of the objects on the object nor the timing of the communication of sounds to their ears. The objects can be one or combination of objects, from a group of objects consisting of pictures, images, phrases, questions, numbers, colors, colored numbers, and/or sounds, and the like, which are embedded into the background of a display screen presented the machine as the objects, or communicated to the machine concurrently with the display screen as sounds.
In combination with the plurality of objects, or sounds, the machine additionally pre-defines a word-association with each respective object or sound communicated and discerned during a login. For example, an object may be a picture of the machine's childhood dog, and the associated word for input or matching with indicia on the screen, may be the dog's name “Spot”. Or, the object depicted on the login display may be a picture of an elderly woman, preferably the grandmother or another woman probably only known by the machine, which may be assigned the word “Granny” for input or matching to indicia on the screen. Or, for instance, a question may be chosen and presented the machine on login, and the answer is the associated word which is only known by the machine, and so on. Additionally, sounds such as the sound of the machine's mother's voice or that of another relative or friend which will easily be recognized by the machine on broadcast of the sound, thereby allowing the machine to input a matching word, or object.
With the plurality of objects and/or sounds which are chosen by and therefor easily remembered by the user or machine, when a password or security input is required for access to a device or system, the object is communicated and displayed to the machine displaying a sequence of the objects, a grid (i.e. X-Y grid), or a matrix with the objects randomly positioned at various locations of the depicted object, or along with one or a plurality of sounds which may play upon input to play such, or as an identifier by oral object for the machine to identify. Thus, pictures, photos, and sounds, displayable to the machine and personal only to each machine, are placed into a database for communication to the machine on screen or by auditory means, in subsequent logins.
Prior to such subsequent logins, the machine may also pre-define the sequence or pattern criteria for their subsequent selecting of the objects positioned on the object or sounds communicated during display of the object, and a subsequent inputting of text associated with each, or a subsequent matching of objects or sounds to displayed icons, photos, drawings, or text, which when read or seen by the machine, matches.
By employing this pattern, and a means for visually determining the objects or determining sounds through auditory means, a number of which may sequentially correspond to the machine—known pattern displayed on the object, an authentication password string or pattern is determined. The password or authorization string is determined by the machine typing the corresponding dynamic word string defined by the machine's pre-defined words which are associated with the viewed objects in that particular sequence. Or by a drag and drop method of matching displayed objects to displayed text or a matching of displayed objects with predetermined secondary objects, or by a matching of an icon or displayed object associated with a played sound, to a displayed object or word. For instance a sound is playable by a machine selecting the phonograph icon, that sound being their mother's voice. Thereafter the machine would drag the icon associated with the sound that played to a communication with an object being a photo or rendition of their mother.
Software adapted to the task, monitoring machine inputs, would discern this drag and drop, and using randomly associated numbers or codes preassigned that day, to each of the sound icon and the mother's picture, would generate an authentication string, and communicate it to the device, or over the network for network access. Software adapted to the task of matching the authentication string, to one or more strings based on the randomly assigned strings to each sound and object communicated that day, and temporarily stored in memory, will ascertain if a proper password string is communicated by the machine's actions in identifying the objects and/or sounds using textual or graphic matching inputs or combinations thereof.
As a simple example, the object may be a simple sequence of three objects positioned in a row. The machine first defines their preferred code criteria. For the code criteria, the machine selects a plurality such as three images well known to the machine and assigns word associations for each which they can easily remember. The machine causes matching words, or graphic associations, to be associated with the images or objects or sounds, to be stored in a relational database.
Now, using the associated words for each object or image displayed or sound transmitted and heard, known only to the machine, the password will always be defined by the dynamic word string consisting of a sequential string of those associated words from the group of associated words and objects in the database. The input words for each respective displayed objects will be typed using the machine—associated words sequentially using the known and pre-determined pattern of selection. Alternatively, icons or objects, having text or graphics discernable by the machine, and matching the text or words the machine defines to identify the objects are displayed. The machine will drag and drop, to mate the objects with the icons or objects matching them and known to the machine to input the string.
Again, in this example the authentication pattern is POSITION-2, POSITION-1, and POSITION-3. Therefor, the password is the word string constructed from the words associated from the images in the above positional pattern, in this case IMAGE-1, IMAGE-3, and IMAGE-2. Therefor the word string for this password is “momspotvacation”. The associated words are easily remembered by the machine since the objects are photos or pictures of a very dear person, a fondly remembered place, and a pet. The machine inputs this string into the password input window in the correct sequence, and authentication is verified by software adapted to compare the input words in the input sequence to the stored images and objects in the relational database. Since the sequence is known to the machine and the words easily remembered, a correct string of words is generated and the machine is allowed access.
Upon ending the authenticated session (i.e. logging out, turning off the device, etc.) the system employing software adapted to the task, then forgets the previously input password, and upon another authentication attempt (i.e. logging back in) the objects or images depicted in the object presented to the machine may either be different from a group larger than the number of image spots, or at least displayed in a different order.
Using the predetermined sequence for input and the objects or images placed in the three positions, software adapted to the task will then determine a correct new password based on the newly ordered objects or images positioned in the object. Thereafter, employing the same known sequence for the authentication pattern, the machine can easily determine the correct word string for input of a totally different password.
In an alternative but especially preferred mode of the system, the known objects and known sounds along with other sounds and objects, are communicated to the machine device for display and sound, from a server storing such for the system as originally provided by machine choice and identification.
In the communication upon initiation of a login by the machine, with each object, picture, sound, or other indicia or displayed material communicated by the server to the machine device, a random code or string is also associated. The association and random strings are also temporarily stored in memory on the server or machine. When the machine, during login, makes the appropriate match of object and sound to machine pre-identified indicia or matching object or other matching input in the object, the random strings of code or text communicated as associated with the objects and sounds, are combined and re-communicated back to the server. The random matched strings of text or code are compared to the temporary stored matched strings in memory, and if correct, access is provided. In this mode, the strings of code or text which are communicated are always random, and never the same on a subsequent visit. Thus, a hacker or third party monitoring the machine input or communications across the network, will never be able to capture reusable strings and string matches, since on every subsequent visit, new strings of code or text are associated with each object and sound communicated to the object login of the machine, and any prior captured login information will be useless.
This mode of the system, using randomly assigned code, text, or other transmittable identifiers, is especially preferred since there is no actual machine input of text or code required, just a matching of symbols or objects or icons or such on their object to the pictures or sounds or depictions of people or memories only known to the machine is required to communicated matching random code or text or other identifiers associated with the machine matches.
Continuing the example for a machine in the above second instance, in this second instance the depicted objects or images positioned in the sequence in the object may now show the machine; at POSITION-1 is shown IMAGE-2, at POSITION-2 is shown IMAGE-3, and at POSITION-3 is shown IMAGE-1. Therefore, the password set by the system, and determined by the machine using the known authentication pattern or sequence, will be “spotvacationmom,” or in the case of randomly assigned identifiers for the pattern matching a string of random text, or numbers, or other transmittable identifiers will be communicated and compared to a temporarily stored version of the same to ascertain match.
Again, in all modes, the images or objects or sounds or other displayable or broadcastable objects or sounds communicated to the object of the machine, are known well to the machine. However, for most third parties, such would be unknown, and even to friends and family of the party who has programmed the database, some of the objects or sounds can be such they would be unable to easily discern a proper match either.
One skilled in the art will realize that the complexity of the system and therefor difficulty for a hacker to determine the password can be increased by many factors. First, the total number of objects stored in group for a machine in the relational database can be increased. Since the objects are preferably images of people or things well known to the machine, the number of images or objects can be very large, and each associated to the word to that respective image causes the machine to easily remember. This word association provides an advantage over prior art as it is solely known to the machine and preferably uses images or objects which are easily remembered by the machine but would be virtually unknown to strangers.
Additionally, the object may present a longer sequence of objects, or sounds, or a grid of objects, or a matrix of objects and/or interlaced sounds, and/or some changing in the sequence used for input for the grid or matrix. All can either have the machine input identifiers and communicated strings of text or code or may be matched with randomly generated strings by the software adapted to the task, as noted above. As such the authentication pattern can be one of an infinite number of patterns using an extremely large number of objects chosen specifically by the machine. Further, the authentication pattern itself can be selectively changed by the machine with each authentication process, or by the system using randomly assigned identifiers or strings or code to sounds and objects to be matched, which can still provide the machine an easily discerned clue on proper matches to be communicated from the object as to the required sequence for each session input.
Therefore, the method herein provides a machine with a dynamic rendering of objects or pictures or sounds in an object and sound reproduction devices engaged therewith, which may be viewed, heard, and remembered, and associated with a word or other communicable identifier, for determining a proper machine input to function as a password identification based off machine—determined and easily remembered memories and personal criteria. The system, when communicating across a network, in addition to assigning random identifiers to objects and sounds, may employ software adapted to the task of data encryption to further prevent hackers from obtaining information during the authentication process. However, even if some input data for a password at one session is discerned through electronic eavesdropping, since the input identifiers of the matching objects and sounds changes with each subsequent session, a stolen input from the machine on one occasion acting as a password from one session would be useless on a subsequent session.
With respect to the above description, before explaining at least one preferred embodiment of the herein disclosed invention in detail, it is to be understood that the invention is not limited in its application to the details of construction and to the arrangement of the components in the following description. The invention herein described is capable of other embodiments and of being practiced and carried out in various ways which will be obvious to those skilled in the art. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for designing of other structures, methods and systems for carrying out the several purposes of the present disclosed device. It is important, therefore, that the claims be regarded as including such equivalent construction and methodology insofar as they do not depart from the spirit and scope of the present invention.
As used in the claims to describe the various inventive aspects and embodiments, “comprising” means including, but not limited to, whatever follows the word “comprising”.
Thus, use of the term “comprising” indicates that the listed elements are required or mandatory, but that other elements are optional and may or may not be present. By “consisting of” is meant including, and limited to, whatever follows the phrase “consisting of”. Thus, the phrase “consisting of” indicates that the listed elements are required or mandatory, and that no other elements may be present. By “consisting essentially of” is meant including any elements listed after the phrase, and limited to other elements that do not interfere with or contribute to the activity or action specified in the disclosure for the listed elements. Thus, the phrase “consisting essentially of” indicates that the listed elements are required or mandatory, but that other elements are optional and may or may not be present depending upon whether or not they affect the activity or action of the listed elements.
It is an object of this invention to provide a security system for machine login which is personalized to the memories of the machine and therefor hard to forget for the machine and virtually impossible to discern for third parties.
This and other objects of the invention will be brought out in the following part of the specification, wherein detailed description is for the purpose of fully disclosing the invention without placing limitations thereon.
As in the above described technology the machine can be considered as the user. The user can be also considered a personal user, a group of users, artificial intelligence, a second machine, a network of machines, a computer device or a blockchain like network.
The user provide the input using an interface. As used in the claims to describe the interface indicates the following possible variations of interfaces:
The above described technology can used to access blockchain-based identity and transaction platforms but can also be a part of the identity displaced on the blockchain. In an example approach, identity information (e.g., a photo) for a person can be encrypted and stored in a blockchain as part of enrolling the person as a user in a blockchain-based identity and transaction platform. Trust relationships using the above described technology can be formed between the user and other users, and records of the trust relationships can be stored in the blockchain.
Transactions between the user and other users with whom the user has formed a trust relationship can be authorized. Records of the transactions can also be stored in the blockchain. Authorization a described as above can involve, for example, a verification process that accesses information stored on the blockchain. The transactions and identity information, along with other information, can contribute to an economic identity of the person. Storing an economic identity (and the underlying information that forms the economic identity of the person) in the blockchain results in a secure platform accessible to people regardless of their economic or geographic circumstances.
The above described technology is used to the authorization of a blockchain-based transaction, specifically the use of payment network transaction messages and payment networks to securely store and convey transaction details for a blockchain-based transaction for use thereof in execution of the blockchain-based transaction.
The above described technology is used to store and protect identity data on a wallet. In an example embodiment, a server computer system is communicatively coupled to one or more client computers and to a distributed blockchain computer system that includes multiple computing nodes, each computing node storing a copy, or a portion thereof, of a blockchain of the distributed blockchain computer system. The server computer system is configured to: record on the blockchain, by transmitting one or more electronic messages to the distributed blockchain computer system, ownership information of respective groups of one or more units of an asset for each of a plurality of owners of the asset; and to configure, for each of one or more of the plurality of owners, a digital wallet corresponding to one of said groups of one or more units of the asset, the digital wallet being associated with a private cryptographic key using the above described technology and at least one blockchain address generated based upon the private cryptographic key.
The above described technology can be used to access control using a blockchain data structure.
Computing resources such as hardware, software or combination resources are increasingly deployed in a distributed manner. Resources can include, for example: security services such as antimalware, proxy, antivirus, scanning or protective services; data storage services such as real or virtualised memories, data stores or databases; middleware services such as messaging middleware software, transaction handling software and the like; business process automation such as commercial applications, bespoke business process software and the like; network services such as telecommunications, communication facilities, internet servers or websites; directory services such as registries; media services such as audio, video or multimedia; network access facilities; entertainment services such as computer entertainment software, video games and the like; social media services; and other resources or services as will be apparent to those skilled in the art. Distributed computing environments are environments in which computer systems, services and supporting or offered resources (whether hardware, software or a combination) are distributed physically and/or virtually with a dependence on communications networks for interoperability.
The above described technology can be defined for the use of a proprietary private blockchain, specifically the submitting of data captured in a transaction message to a blockchain for clearing and settlement for the transaction using a private blockchain as an alternative to traditional transaction settlement.
The above described technology as base for a tokenisation System for Blockchain-based Cryptocurrencies Technical Field to provide a solution for the control and/or transfer of an asset, or the transfer of ownership of an asset. In particular, it relates to a method of creating, transferring ownership and redeeming tokens which represent assets. The present disclosure has particular application with creating tokens associated with transactions on a peer-to-peer distributed ledger such as, for example, the Bitcoin blockchain The token may be representative of a contractual right, smart contract or other form of asset.
The above described technology can be used as an proper authentication input or password to computer networks, and, more particularly, to block chain-based device identity verification and anomaly detection in Internet of Things (IoT) and similar networks. The possibility to use rolling codes in different cross over authorization methods can make IoT more secure and expand his possibilities.