scispace - formally typeset
Search or ask a question

Showing papers on "Password published in 1984"


Patent
24 Dec 1984
TL;DR: In this paper, a system for supervising one or more individual member accounts comprising a first data file for storing information characterizing each employer, a second data file that characterizes each union member, and password protected provisions for manually updating each of these first and second data files is presented.
Abstract: A system for supervising one or more individual member accounts comprising a first data file for storing information characterizing each employer, a second data file for storing information characterizing each union member, and password protected provisions for manually updating each of these first and second data files. Each of the accounts are represented by an account module provided with an account processor, an account storage, and an account entry unit and each account module is in communication with the first and second data files. The system allows limited access to each account while utilizing central files characterizing each employer and union member.

86 citations


Journal ArticleDOI
TL;DR: A ''user-friendly'' model for the password selection and re-creation processes rooted in cognitive psychology is presented, suggesting two approaches to password selection - one rooted in a nomothetic, or particularized, the other in an idiographic, or generalized, treatment of experience - that exploit principles of recall, memory aids and simple formal transformations.

51 citations


Journal ArticleDOI
TL;DR: The method validates users who demonstrate knowledge of a secret algorithm rather than a password, which represents an attractive alternative to more costly systems security features and equipment.
Abstract: A superset of the secondary passwords technique, pass-algorithms provide enormous flexibility and ease of implementation and represent an attractive alternative to more costly systems security features and equipment. The method validates users who demonstrate knowledge of a secret algorithm rather than a password.

43 citations


Patent
13 Nov 1984
TL;DR: In this paper, a password-protected data communication system for transfer of data between remote user terminals and a host computer via public telephone lines and the like is further made secure by virtue of the fact that password transactions and/or interchanges are automatically effected between special modems provided at the user terminal and at the host computer without action or intervention (other than call initiating action) by the users who are denied access to or control over the passwords.
Abstract: A password-protected data communication system for transfer of data between remote user terminals and a host computer via public telephone lines and the like is further made secure by virtue of the fact that password transactions and/or interchanges are automatically effected between special modems provided at the user terminals and at the host computer without action or intervention (other than call initiating action) by the users who are denied access to or control over the passwords. A callback facility may also be provided and can be structured to enable users to communicate with the host from non-static locations.

31 citations


Patent
15 Oct 1984
TL;DR: A memory card has a card medium (11) and a laser memory (17) for storing data as mentioned in this paper, where the input data is encrypted and decrypted in accordance with the encryption and/or decryption key data and the encryption/decryption program.
Abstract: A memory card has a card medium (11) and a laser memory (17) for storing data. A data processing section (16) for storing encryption and/or decryption key data, an encryption and/or decryption program and a password is arranged in the card medium (11). When the same password as prestored in the data processing section (16) is input, the input data is encrypted and/or decrypted in accordance with the encryption and/or decryption key data and the encryption and/or decryption program. The encrypted and/or decrypted data is stored in the laser memory (17).

26 citations


Patent
Ryuichi Kimizu1
21 Dec 1984
TL;DR: In this article, a plurality of means for inputting digits of a password number are adapted to be manually operated, and a means is provided for displaying the mapping between each of the plurality of digit inputting means and the digit which it currently represents and inputs when actuated, and also there is provided a means for altering this mapping.
Abstract: A plurality of means for inputting digits of a password number are adapted to be manually operated. A means is provided for displaying the mapping between each of the plurality of digit inputting means and the digit which it currently represents and inputs when actuated, and also there is provided a means for altering this mapping. The altering means alters the mapping between the digit inputting means and the digits which they represents and input when actuated, every time a password number is inputted. Thereby, if an evilly intentioned person should watch a user actuating the digit inputting means, he will not be able to discern the user's password number by observing his finger movements. Optionally, a means is provided for restricting the visibility of the means for displaying the mapping between each of the plurality of digit inputting means and the digit which is currently represents to within a relatively narrow solid angle, so as to make peeking more difficult.

15 citations


Patent
13 Dec 1984
TL;DR: In this paper, the author proposed a method to provide one card with the function of plural individual authorization cards such as a credit card by storing plural pieces of individual authorization information and corresponding pieces of identify matching information in a memory.
Abstract: PURPOSE: To provide one card with the function of plural individual authorization cards such as a credit card by storing plural pieces of individual authorization information and corresponding pieces of identify matching information in a memory, performing identity matching when identify matching information is inputted, and reading and displaying the individual authorization information out of memory when the identity is obtained. CONSTITUTION: When an individual authorization card 10 is used as a credit card, a ten-key is operated to input a numeral corresponding to a desired credit company, and then a CPU24 searches the individual authorization information memory 28; when it is judged there is a corresponding numeral, the password number for the company is read out of the memory 28 and set in a PIN memory 26. Then, the card user inputs a password number on a keyboard 11 and also hits a matching key 16. The password number written in an X register 27 and the password number read in the memory 26 are sent to a comparing part 29 to judge whether they are coincident with each other or not. When it is judged that they are coincident, the account number of the company is read out of the memory 28 to the display, buffer 231 of a display control part 23 and displayed on a display part 12 together with the company name. COPYRIGHT: (C)1986,JPO&Japio

7 citations


Patent
04 Dec 1984
TL;DR: In this paper, a simplified system enabling a user to access plural data groups continuously without complete execution of password inputs by storing the inputted passwords in a prescribed storing area is presented.
Abstract: PURPOSE:To obtain a simplified system enabling a user to access plural data groups continuously without complete execution of password inputs by storing the inputted passwords in a prescribed storing area. CONSTITUTION:A means for storing inputted passwords in a prescribed storing area is formed. If an access request to an information set is inputted to a proccessor 3 through a keyboard 2, a protection code 7 in a file 5 is checked to test whether the information is locked or not. When the protection code 7 is ''1'' and the information is locked, whether a password 8 necessary for the unlocking of the information is included or not in a password stack in a storage device 4 is tested, and when the password 8 is not included, a password input request is displayed on a display 1. When the inputted password coincides with a key necessary for the unlocking, the input password is stored in the password stack and then the information is unlocked. In case of inconsistency, an input request is displayed again on the display 1.

5 citations



Patent
14 Dec 1984
TL;DR: In this paper, a 2-dimensional information point (passward point) is used as a password to appeal to the visual sensation of a user and then the genuineness of the user is checked.
Abstract: PURPOSE:To attain a user confirming system that is easy to master and easy to operate for users by checking the genuineness of a user according to whether the previously registered coordinate point exists or not within a closed curve shown by graphic information supplied by the user. CONSTITUTION:A 2-dimensional information point (passward point) is used as a password to appeal to the visual sensation of a user. Thus it is checked whether or not a password point 61 registered previously by the user is included within a closed curve 63 shown by graphic information supplied by the user. Then the genuineness of the user is checked.

4 citations



Patent
19 Jan 1984
TL;DR: In this article, a numeric table TA consisting of m-number of rows and n- number of columns and information of transacting persons such as their names, account numbers, or the like are stored in a magnetic storage disc controlled by a CPU of the center device.
Abstract: PURPOSE:To prevent a card from using by stealth by using series to change a password number at each transaction and generating a password number from plural series of information of individual transacting persons stored in the center side to compare it with a received password number. CONSTITUTION:A numeric table TA consisting of m-number of rows and n- number of columns and information of transacting persons such as their names, account numbers, or the like are stored in a magnetic storage disc controlled by a CPU of the center device. A transacting person inserts his card to a terminal device and inputs the amount of money of transaction with keys and inputs his password number. A specific row (i) of the numeric table TA given preliminarily to the transacting person is used to change the key number, for example, to ''6801'' in the first row at the first transaction time and to ''8015'' in the second row at the second transaction time. In the center 3, the row (i) designated to the transacting person is read out from the numeric table TA and is compared with the inputted password number, and the transaction processing is started when they coincide with each other. Thus, the wrong payment due to stealing of the card is prevented.

Patent
01 Dec 1984
TL;DR: In this paper, a cipher sentence is produced and fed to a register and a comparator 16 compares the contents of the register 14 with those of register 15. When the coincidence is obtained from this comparison, the confirmation of the corresponding person is possible and displayed at a display part 17.
Abstract: PURPOSE:To increase safety when cipher is carried out with a password as a key by providing a different key to a person individually. CONSTITUTION:A card is put into a reader 13 to read a cipher recorded on the card. The cipher are fed to a register 14. Then an operator feeds a password through a keyboard 1. The keyboard input performs the cipher with the password used as a key. Thus a cipher sentence is produced and fed to a register 15. A comparator 16 compares the contents of the register 14 with those of the register 15. When the coincidence is obtained from this comparison, the confirmation of the corresponding person is possible and displayed at a display part 17.

Journal ArticleDOI
TL;DR: This paper is a proposal for a standard for the user-system interface protocol ALACS, developed when it was noticed that clerical employees in business offices were being asked to use several different computer systems via terminal-type devices, each with a different sign-on protocol.
Abstract: This paper is a proposal for a standard for the user-system interface protocol. The standard was developed when we noticed that clerical employees in business offices were being asked to use several different computer systems (via terminal-type devices). Each of these systems was implemented for unique applications. And, although in some cases multiple units were from the same manufacturer, each had a different sign-on protocol. Our interest is mostly in security, and we noticed that the result of this welter of varying processes was almost invariably the posting of "how to sign on" instructions, including passwords. Hence, the ALACS proposal.The proposal has been given to IEEE for consideration, and to the National Bureau of Standards, who are working on similar ideas.

Patent
04 Feb 1984
TL;DR: In this paper, the authors propose to prevent a collision between data when plural processors access a shared memory by storing identification codes corresponding to the plural processors in a specific address area of the shared memory.
Abstract: PURPOSE:To prevent a collision between data when plural processors access a shared memory by storing identification codes corresponding to the plural processors in a specific address area of the shared memory. CONSTITUTION:The memory 50 is stored with the identification codes (password) of the respective CPUs. For example, when the CPU1 accesses the memory 50, it outputs an access request signal AR1 to a bus controller 60. At the same time, the CPU is also to read its password out of the memory 50 to an address bus selector 10 through an address bus AB1. When the controller 60 reads specific data out of the memory 50 without receiving the signal AR1 of the CPU1, memory access to the CPU1 is rejected because a data bus DB1 is at a high level. Then, the CPU1 recognizes that the memory 50 is used by another CPU and resets the signal AR1.

Journal ArticleDOI
01 Oct 1984-Edpacs