Personal cyber security is of ever increasing significance in the modern world. Unlike concerns over forged signatures on checks and more traditional modes of identity theft, modern forms of such breaches may take place in more discrete and harder to detect manners. For example, stolen credit card information may be utilized by the thief or other unauthorized user over the phone or through a computer screen where such theft is much less detectable.
Fortunately, the degree of harm in such thefts is often prevented through the use of password and PIN (personal ID number) protections. So, for example, where a bank card or number is stolen, the thief must also possess the true owner's password or PIN in order to make use of the card. Indeed, after a few failed attempts at guessing the PIN at the ATM (automated teller machine), the card thief is likely to have achieved no more than invalidating the card to any further uses.
Unfortunately, the bank card as described above is often utilized in a public space. That is, the ATM is located where a passerby is able to witness the user's entry of PIN information. In fact, with the advent of smartphone cameras and video, a whole new area of identity theft is emerging which involves discrete recording of users as they input password or PIN information at locations such as an ATM. Once more, such public space concerns are quite widespread. For example, computer screens at the public library, bank card use at the grocery store, shared office spaces and other close quarters leave such user password or PIN information more susceptible to theft. In fact, even where the use of such information is at a personal computer in a private location, a computer virus may be tailored to monitor a user's keystroke pattern at a bank website and send the information to an offshore identity thief.
Of course, more traditional thefts of this nature exist such as the threat of stolen safe or high school locker combinations. However, in many ways the threat is much more pronounced in the case of today's password and PIN information. For example, such information is much more likely to be frequently used and in open public space as compared to a private safe combination. Once more the information may provide unfettered access to a user's life savings as opposed to a mere book in a high school locker.
Efforts have been undertaken to address the susceptibility of password and PIN information to susceptibility in public forum or computer virus thefts as described above. For example, in a banking context, a user may be asked a personal question in advance of entering PIN or password data to the host bank website, such as “What is your mother's maiden name?”.
Unfortunately, this added level or threshold of security may be of minimal value where the identity thief knows the user. Further, it presents no real barrier where the identity thief obtained the PIN or password data in a manner that also resulted in theft of an answer to such a personal information question. Indeed, in the public forum and computer virus examples described above, it would be commonplace that an answer to a personal data question would accompany the theft of the underlying PIN or password information.
Ultimately, the user and the legitimate host, such as the bank in the example above, are left with no better than a recurring need to address the theft issue. Regular computer virus checks, new bank cards and an ever-increasing volume of new PIN and password information for the user to remember are the practical result of such thefts. Once more, the amount of time and capital spent on third party policing of identity theft, whether government or privately funded, is a drain on resources that continues to grow at an escalating rate as the marketplace moves further and further, into the cyber realm.
Embodiments of techniques for accessing data through a graphical user interface are detailed herein. Certain embodiments may include aligning a first set indicator of a combination display with a personalized indicator of a counter-combination display. The paired alignment may be noted as valid through standard entry at the interface. This type of aligning may be repeated. For example, a second set indicator of the combination display may be aligned with another personalized indicator of a second counter-combination display. This second paired alignment may again be confirmed as valid through entry at the interface. Ultimately, multiple entries of such valid alignments may allow access to the secure data
Embodiments are described with reference to certain techniques of displaying and aligning indicators of combinations and counter-combinations through a graphical user interface (GUI) in order to attain access to secure data. More specifically, a given set indicator of a combination may be paired with a personalized indicator of a counter-combination, the pairing noted, marked, or otherwise entered as valid and the process repeated with reference to another counter-combination and personalized indicator. In this manner, a combination code or sequence may be entered by a user through the GUI in a substantially undetectable manner by a third party that does not already have access to the combination code. That is, as detailed herein even watching the user make the entries fails to reveal the combination code to an onlooker or key-monitoring type virus.
Example embodiments herein generally utilize dial-type combinations with set indicators which are graphically adjacent dial-type counter-combinations employing personalized indicators. However, the combinations and counter-combinations need not be of a dial variety (e.g. see
It is of note that embodiments herein are directed at generation of a new counter-combination for pairing with set indicators of the combination by way of the counter-combinations relating to personalized user data. For example, as detailed herein, one counter-combination may consist of personalized indicators in the form of possible user best friend names whereas the second counter-combination may utilize personalized indicators in the form of possible user favorite colors. In this manner, the user need not always have memorized or written recall of complete combination/counter-combination pairings but may rely to some degree on memory of his or her own personal history. To this extent, embodiments herein are similar but also supplemental to those detailed in U.S. patent application Ser. No. 13/252,994 where subsequent or “new” counter-combination dials or groupings are described as generated through a technique of randomization.
That is, in the parent '994 Application hereof, once a pairing is entered, the newness of the counter-combination dial may be created by randomization of its indicators (e.g. a set of seemingly arbitrary letters or numbers). Thus, the undetectable nature of password entry emerges as detailed throughout the '994 Application and herebelow. The present application expounds on this concept to clarify that different sets of personalized indicators may be utilized for the counter-combination dials (or groupings), not limited to seemingly arbitrary number sets. Thus, a new counter-combination dial may be presented by changing user personal topics (e.g. from best friend to favorite color). As a result, even though the use of combination/counter-combination pairings may appear to add complexity, for example to enter passwords, the reliance on a user's own personal historical information may substantially mitigate such complexity from the user's perspective as clarified further hereinbelow.
Referring now to
Continuing with reference to
As indicated above, rather than align the first set indicator 23 of the combination dial 125 with a fixed mark adjacent the dial 125, the user instead is asked to align the set indicator 23 with a personalized indicator 177 of the counter-combination dial 175. As detailed further below, personalized indicators 177 may be established ahead of time based on the user's own personal history. In the example shown in
Once the enter button 160 is pressed, a different personal history topic 180 and key chart 140 may be presented and the process repeated. Use of the dials 125, 175 in this manner prevents an onlooker from being able to ascertain what particular alignment is being made. That is, from the user's perspective an alignment is being made between 23 with C. However, from an onlooker's perspective 10 is being aligned with J, 35 is being aligned with D, and several other decoy alignments are also taking place. That is, an onlooker is unable to ascertain which is the true alignment that is actually being made. Further, guessing the true alignment at random would ultimately be of no realistic practical value. For example, remembering the 10/J decoy alignment would be of no use when, on subsequent attempts to enter the first number of the combination, a different topic 180 and key chart 140 are presented. Indeed, in embodiments herein, once any valid alignment is entered (160), the counter-combination dial 175 may also be reshuffled in terms of letter positioning used for the personalized indicators 177. For example, the “C”, “J”, and every other letter may switch locations on the dial 175 after every time the enter button 160 is selected. Thus, tracking of valid alignments by an onlooker becomes a practically impossible undertaking as the user moves from entry to entry to entry.
The complexity may seem daunting to a hacker trying to lift the user's 23-16-37 combination in the example used here. At the same time however, the user is unlikely to be confused or burdened down with a cumbersome amount of data to recall in order to make use of his own combination. That is, unlike the onlooker, the user need only recall the 23-16-37 combination along with his own self-completed personal history in order to make use of such a technique and access the underlying secure data. For example, where the underlying data is the user's own bank account information, the interface 150 may be that displayed by a bank website or tablet application (“app”). Thus, through a questionnaire, the user may separately establish personal history data with the host banking institution such as follows:
Of course, many other categories of user personal facts may be provided to the host institution for sake of generating any number of different indicator key charts 140. Additionally, the chart 140 may be replaced by simply placing the information directly at the personalized indicators 177 where practical (see indicators 277 of
It is of note that embodiments of secure access data techniques as detailed herein may be particularly well suited for use in public spaces such as with a computer at a public library, an airline ticket kiosk, or an ATM. That is, with such public space usage, any given user is unlikely to dominate usage of the device and/or GUI 150. As a result, an onlooker or virus tracking user inputs would be subject to a variety of different intervening users and different user combinations being utilized by the same device. Thus, the odds of tracking a given user's inputs long enough to gather any usable code cracking information would be nearly, if not completely, impossible with such public use devices that employ techniques as described herein.
The interface 150 of
Referring now to
With specific reference to
Indeed, moving to
Thus, looking specifically at
The GUI 150, 250 of the above example embodiments may include a host of additional features. For example, in addition to enter 160 or turn 260, 265 buttons, other entries are possible. These may include those such as “I Forgot My Favorite Month (or Color, etc)” so as to allow the user to present a new topic 180, 280, 281, 282. Additionally, dials 125, 175 may be moved by more manual single clicking as noted above or perhaps through slide control and/or with an auto-spin function that turns the dial until directed to stop by the user.
Referring now to
Moving to
Again, while a user may bear witness to the alignments represented by
Referring now to
The concept of decoy may also be taken a step further such that an entire dial set 401 or 410 is a decoy. Specifically, as shown in
Referring now to
In the embodiment shown, all data compartments are personalized indicators 526, 577. However, one or both may alternatively be set indicators such as with a more conventional combination type as in the embodiments of FIGS. 1 and 2A-2C. Regardless, just as with other techniques detailed hereinabove, an alignment may be made that includes a majority of decoy alignments and one true alignment followed by pressing an enter button 160. Thus, new topic 580 and rows 525, 575 may be presented to the user for new alignment and entry. In this manner a sequence of entered alignments may be used to provide user access to secure data in a manner substantially undetectable to an onlooker or keystroke tracking virus.
Referring now to
Embodiments described hereinabove provide added levels of security when entering passwords for sake of accessing secured data. The techniques employed allow the user to enter password characters in a manner that is substantially undetectable to an onlooker, whether physically present or even in the form of keystroke tracking type of virus applications. Once more this is achieved in a manner that minimizes complexity for the user by allowing reliance on a sequence of unique personal information entries that are unlikely to be uncovered even by someone that knows the user. Thus, the amount of time capital and even brain-space that must be dedicated to identity protection, password security and recollection may be dramatically reduced.
The preceding description has been presented with reference to presently preferred embodiments. Persons skilled in the art and technology to which these embodiments pertain will appreciate that alterations and changes in the described structures and methods of operation may be practiced without meaningfully departing from the principle, and scope of these embodiments. Regardless, the foregoing description should not be read as pertaining only to the precise structures described and shown in the accompanying drawings, but rather should be read as consistent with and as support for the following claims, which are to have their fullest and fairest scope.
This Patent Document is a Continuation-In-Part claiming priority under 35 U.S.C. §120 to U.S. application Ser. No. 13/252,994, entitled “Data Encryption and Input System”, filed Oct. 4, 2011 and which in turn claims priority under 35 U.S.C. §119 to U.S. Provisional App. Ser. Nos. 61/390,115, 61/434,805 and 61/444,627, all of which are incorporated herein by reference in their entireties. This Patent Document further claims priority under 35 U.S.C. §119 to U.S. Provisional App. Ser. No. 61/390,115, filed May 31, 2012 which is also incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 13252994 | Oct 2011 | US |
Child | 13873350 | US |