scispace - formally typeset
Search or ask a question

Showing papers on "Password published in 1986"


Patent
22 Dec 1986
TL;DR: In this paper, a keypad is employed to input the stimulus output from the computer (34, 68) into the access key (12), which allows for secure communications between different computers and between distant locations.
Abstract: A semiconductor device that functions as a key (12) to control access to a computer (34) or a software program resident in a computer or provides for secure communications. The device (64) executes an algorithm that combines a root and a seed to produce a password. The password is input to the computer (34). The computer (34) uses an equivalent algorithm to produce a password within the computer (34). Comparison or other methods are employed to allow access to the computer (34) or computer program or to allow for secure communications. The computer (34) can be coded to produce on a video display (18) thereof a time-space stimulus pattern which can be received by sensors (28a-28d) of the key. Alternatively, a keypad (700) can be employed to input the stimulus output from the computer (34, 68) into the access key (12). Further the present system allows for secure communications using algorithms between different computers and between distant locations.

127 citations



Patent
05 Nov 1986
TL;DR: In this paper, a video game machine for business use for playing a long video game including a status memory for storing status data which represents the status of the game stopped, a forward conversion circuit for converting the status data to an easy-to-remember password by using a forward converter function, a display circuit for displaying the password for the game player, a password input device into which the player inputs the password when he resumes the game, and a backward conversion circuit was used to convert the password inputted to the status dataset.
Abstract: A video game machine for business use for playing a long video game including a status memory for storing status data which represents the status of the game stopped, a forward conversion circuit for converting the status data to an easy-to-remember password by using a forward conversion function, a display circuit for displaying the password for the game player, a password input device into which the player inputs the password when he resumes the game, and a backward conversion circuit for converting the password inputted to the status data of the game stopped by using a backward conversion function. The initial condition of the game is set by the status data obtained by the backward conversion, and the game can be resumed from where it was stopped.

104 citations


Patent
Kunio Fujisaki1, Akiko Iwanaga1
18 Feb 1986
TL;DR: In this article, a high security and rewritable IC card has a microprocessor, a memory, and a keyboard, and the memory has a password registration area, an error counter area in which the number of occurrences of an error in inputting a password is stored, and card information area.
Abstract: A high security and rewritable IC card has a microprocessor, a memory, and a keyboard. The memory has a password registration area, an error counter area in which the number of occurrences of an error in inputting a password is stored, and a card information area. The microprocessor controls a password registration operation, registers the password inputted through the keyboard in the password registration area. When the registered password is to be updated, the microprocessor clears the password registration area in the memory to allow writing of a new password only when the microprocessor detects that a password data inputted by a card user matches the registered password and the error count in the error counter is no more than a predetermined count.

56 citations


Patent
23 Sep 1986
TL;DR: In this article, the same password as that stored in the password storage register, is input via a switch, and the password input by the switch is compared with the password stored in an encrypted storage register by a coincidence detection circuit.
Abstract: An electronic key apparatus wherein an encrypted code for unlocking an electronic lock is stored in an encrypted code storage register. A password is stored in a password storage register. The same password as that stored in the password storage register, is input via a switch. The password input by the switch is compared with the password stored in the password storage register, by a coincidence detection circuit. When a coincidence is detected, the encrypted code stored in the encrypted code storage register is transmitted to the electronic lock, by a transmitter.

55 citations


Journal ArticleDOI
TL;DR: The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings and has application in office automation systems, electronic funds transfer, and “smart cards” (interactive computers embedded in credit-card-sized packages).
Abstract: A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electronic funds transfer, and “smart cards” (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system (Figure 1) can provide a timely solution to the security dilemma.

42 citations


Patent
Furukawa Noriyuki1
02 Sep 1986
TL;DR: In this paper, a data communication system, plural telephone lines are divided into a registered group and a non-registered group, and the registered telephone numbers and the passwords of the associated remote terminals are stored in a memory.
Abstract: In a data communication system, plural telephone lines are divided into a registered group and a non-registered group. Authorized remote terminals are respectively associated with the telephone lines of the registered group. Each remote terminal transmits a password when it accesses to the central station from the associated, registered telephone line. The password is appended with an extra code when the access is made from a non-registered telephone line. The registered telephone numbers and the passwords of the associated remote terminals are stored in a memory. A coincidence between the password transmitted from a remote terminal and a stored password is detected to proceed with the detection of whether the transmitted password is appended with an extra code or not. In the absence of the extra code, the central station calls back the remote terminal using a telephone number stored in the memory in association with the transmitted password. If an extra code is appended, the remote terminal is requested to inform the central station of the non-registered telephone number to allow it to call back the remote terminal.

30 citations


Journal ArticleDOI
TL;DR: Girling's strategy for one-time keywords for authentication forwarding is combined with a proxy login mechanism to obtain a reliable method for network authentication that does not depend on the transmission of passwords.

23 citations


Patent
Hiroshi Fujii1
23 May 1986
TL;DR: A portable electronic memorandum device is placed in the password set mode by operating switch Sl. In this mode, if the correct password is set, the secret mode is set up and the secret data is displayed as mentioned in this paper.
Abstract: A portable electronic memorandum device is placed in the password set mode by operating switch Sl. In this mode, if the correct password is set, the secret mode is set up and the secret data is displayed. If user forgets the password, switch Sc is operated in the error display mode. By this operation, the password and the secret data are both cleared, so that secrecy of the secret data can be protected.

14 citations


Patent
02 Jun 1986
TL;DR: In this paper, a file is produced by using a keyboard for input of data, etc. with reference to a CRT display 2, a printer, etc., the collation is performed automatically to check the coincidence between the password 9 which is inherent in terms of hardware and a password of the part 12 in the file 11 internally and by a disk operating system.
Abstract: PURPOSE:To attain the assured protection of secrecy by adding automatically a cipher or code inherent to a computer to a computer to a produced file on the hardware. CONSTITUTION:A file is produced by using a keyboard 3 for input of data, etc. with reference to a CRT display 2. This file is stored in a memory medium like a floppy disk 10, etc. that can be attached to and detached from a computer. In this case, a password 9 inherent to the computer main body is added automatically to the file internally, i.e., by a disk operating system. Thus a file 11 containing an intra-password part 12 and a contents part 7 original to the file is obtained. Then a writing operation is carried out. When the file 11 is delivered to a CRT display 2, a printer, etc., the collation is performed automatically to check the coincidence between the password 9 which is inherent in terms of hardware and a password of the part 12 in the file 11 internally and by a disk operating system. Then the file 11 is delivered only when the coincidence is obtained in said collation.

9 citations


Patent
26 May 1986
TL;DR: In this article, a portable electronic memorandum device is set to a password mode by a switching operation, and data (0 - 9, alphabete) is stored as a pasword (step 58) in a password memory (S58) in the case, where no password has been stored there (S51).
Abstract: A portable electronic memorandum device is set to a password mode by a switching operation. If, in this password set mode, data (0 - 9, alphabete) is entered, the entered data is stored as a pasword (step 58) in a password memory (S58) in the case, where no password has been stored there (S51). If on the other hand, the password has already been entered in that memory, the entered data are compared to the password in the memory and is only displayed when a coincidence occures between the two.

Patent
09 Dec 1986
TL;DR: In this paper, the secretness of information stored in IC cards was improved by executing the writing or reading of data only when the IC cards have been inserted into at least two loading ports and their password code has been collated.
Abstract: PURPOSE:To improve the secretness of information stored in IC cards by executing the writing or reading of data only when the IC cards have been inserted into at least two loading ports and their password code has been collated CONSTITUTION:Data writing processing is commanded, a member's card and a master card are inserted into connectors 4a, 4b respectively and their password code are inputted through a keyboard Signals from card detectors 5a, 5b are checked, and when two cards are inserted, the password code recorded in respective cards is collated with the inputted password code The data inputted from the keyboard are temporarily stored in a RAM8 Then, whether two cards are inserted or not is checked and their password code is collated When the identification card is legal, the data inputted to respective cards are written Data reading from the IC card will be executed almost similarly to the writing operation

Patent
18 Dec 1986
TL;DR: In this article, the authors proposed to eliminate the need to communicate with a host computer so as to check a password number by using at least check digit for checking the password number.
Abstract: PURPOSE: To eliminate the need to communicate with a host computer so as to check a password number by using at least check a digit for checking the password number CONSTITUTION: A terminal device 1 has a keyboard 2 and a microprocessor 3 and is connected to a center host computer 5 through a communication line 4 At least one check digit is used to check the password number This check digit is inputted together with essential input information other than the password so that a user is unaware, and it is checked in the terminal device 1 whether or not the check digit and a manually inputted password number are in predetermined relation, thereby checking the password number COPYRIGHT: (C)1988,JPO&Japio

Patent
26 Dec 1986
TL;DR: In this paper, the authors propose a scheme to change a station which is charged by transmitting an outgoing and incoming call conversion request, the telephone number of an origination side, and a password predetermined between the origination and a termination side from the origination side and calling the origin side automatically from the termination side after the terminate side confirms the password and disconnects the circuit.
Abstract: PURPOSE:To change a station which is charged by transmitting an outgoing and incoming call conversion request, the telephone number of an origination side, and a password predetermined between the origination side and a termination side from the origination side, and calling the origination side automatically from the termination side after the termination side confirms the password and disconnects the circuit. CONSTITUTION:The origination side sends out an identification signal for setting a nonstandard device, reports the request for outgoing/incoming call conversion and the password for said conversion, and also sends its dial number in specific pattern. The reception side, on the other hand, decides the password for outgoing/incoming call conversion, and then returns a signal for reception preparation confirmation and stores the dial number of the originating station when the password coincides with a previously specified password. In this case, the origination side sends out a circuit disconnection command and disconnects the circuit. The termination side performs the outgoing/incoming call conversion after the circuit is disconnected and dials the dial number stored during nonstandard device setting reception automatically, and follow a normal facsimile procedure thereafter.


Patent
17 Jun 1986
TL;DR: In this paper, the authors proposed a scheme to make it possible to administrate the pay-per-view program by parent, by making to possible to utilize the payprogram when the password number registered in advance and the password inputted coincide each other.
Abstract: PURPOSE:To make it possible to administrate the pay-per-view program by parent, by making to possible to utilize the pay-program when the password number registered in advance and the password number inputted coincide each other. CONSTITUTION:A subscriber operates a ten-key 101 of a tuner 1, and inputs the password number. The password code inputted is sent from a tuning control microcomputer 13 to pay-by-view microcomputer 31, and compared with the contents of a password memory 32. When they coincide, descrumble is executed, and the program is made possible to be utilized.

Patent
14 Aug 1986
TL;DR: In this article, the authors proposed a method to prevent the perceived password from being perceived by other passwords by adding and inputting a front part additional word and a rear part extra word to the original password.
Abstract: PURPOSE:To prevent without fail that the password is perceived from other password by adding and inputting a front part additional word and a rear part additional word to the original password and detecting and processing the original password part only. CONSTITUTION:When an identifying card 11 is inserted into a terminal equipment 12, identifying data are removed and transferred to a decoder 14. A user file 15 is accessed, an identifying character of a password PW of the user and the remaining part of the password are read together with other necessary data and written in a data register 16. A user sets an artificial password PPW inputted from a keyboard 10 to a register 18 character by character. The head character of an artificial password reaches the right edge of the register, and till then, shifting is executed, and the first and second comparators 19 and 20 compares the identifying character at the data register 16, the password remaining part and the character column corresponding to the identifying character and the password remaining part, and the password is detected and processed.

Journal ArticleDOI
TL;DR: This paper describes representative functions that security modules perform, the benefits to be derived when security modules are deployed, and some current and future applications of this new technology.

Patent
02 Dec 1986
TL;DR: An access security device for a lock (1) has a microphone (2) for input of a password; normal operation is by recognition (3) of the speaker and releases the lock, security being preserved by actuation of an alarm as mentioned in this paper.
Abstract: An access security device for a lock (1) has a microphone (2) for input of a password; normal operation is by recognition (3) of the speaker and releases the lock, security being preserved by actuation of an alarm (5).

Patent
19 Mar 1986
TL;DR: In this paper, a PIN error counter is used to prevent the illegal use without invalidating an IC card by inhibiting a system control part from responding to the IC card until the prescribed restoration is executed if a value counted by an error counter reaches the prescribed value at the time of inputted a password.
Abstract: PURPOSE:To prevent the illegal use without invalidating an IC card by inhibiting a system control part from responding to the IC card until the prescribed restoration is executed if a value counted by an error counter reaches the prescribed value at the time of inputted a password CONSTITUTION:A CPU 16 collates (1-1) a number inputted from a PIN input part 12 with a password stored in a ROM 15 When they coincide with each other, the CPU 16 sets (1-2 and 1-3) the number of wrong inputs (i) to zero, responds to the system control part 13, and starts the prescribed processing If the input number do not coincide with the password stored in the ROM 15, the PIN error counter 17 counts (1-4) the wrong inputs of the password Then the number of wrong inputs (i) is decided (1-5) to be greater than a preset value (n) If the number (i) is smaller than the value (n), the input of the password is permitted again When the number of wrong inputs (i) attains the value (n), the CPU 16 inhibits (1-6 and 1-7) the system control part 13 from responding

Patent
23 Oct 1986
TL;DR: In this paper, the facsimile information field (FIF) of the received CIF with the password set by a password setting device was collated with the caller side in polling communication, and the transmission station identification (TSI)/digital instruction signal (DCS) only when they are coincident, and sends original information after the reception preparation confirmation (CFR) is awaited.
Abstract: PURPOSE:To attain communication while realizing secrecy security with a general G3 equipment sending call station identification by collating a facsimile information field of call station identification sent from the caller side with a password set by the called party in polling communication. CONSTITUTION:When a called party facsimile equipment 9 is called by a ringer signal of a caller-side facsimile equipment 8, an automatic incoming device 10 detects the ringer signal, connects a telephone line to the facsimile equipment and the called side facsimile equipment 9 sends called station identification (CED)/non-standard equipment (NSF)/called station identification (CSI)/digital identification signal (DIS). The caller-side facsimile equipment 1 receives the signals and detects the NSF to identify that the opposite station is not the equipment of the own company, and then the non-standard equipment instruction (NSC) is not sent but the caller station identification (CIG)/digital transmission instruction (DTC) are sent. Then the called party facsimile equipment 2 collates the facsimile information field (FIF) of the received CIF with the password set by a password setting device 12 and sends the transmission station identification (TSI)/digital instruction signal (DCS) only when they are coincident, and sends original information after the reception preparation confirmation (CFR) is awaited.

Patent
22 Mar 1986
TL;DR: In this paper, the authors propose to disable an outsider from reproducing the information on an individual by permitting the reproduction of a message of a calling subscriber only when the owner of an automatic answering telephone set supplies a password registered previously through a microphone.
Abstract: PURPOSE:To disable an outsider from reproducing the information on an individual by permitting the reproduction of a message of a calling subscriber only when the owner of an automatic answering telephone set supplies a password registered previously through a microphone. CONSTITUTION:A message (analog signals) supplied from a calling subscriber is converted into digital signals by an A/D converter 1 and stored to a random access memory 2. When this message is reproduced, the owner of an automatic answering telephone set supplies a password registered previously through a microphone 5. Then a voice recognizing circuit 6 delivers a discrimination code corresponding to the password. A deciding circuit 8 compares the discrimination code (password) written previously to a proper memory 7 with a discrimination code given from the circuit 6. Then the circuit 8 opens a gate circuit 3 to deliver the message (digital signals) sent from the memory 2. This message is converted into analog signals by a D/A converter 4 and delivered.

Patent
21 Oct 1986
TL;DR: In this paper, the authors propose to prevent the illegal use of others and the inconvenience due to illegal use by inputting a password to a mobile set in using the system and permitting the communication from the mobile set only when the password is collated with a stored password.
Abstract: PURPOSE:To prevent the illegal use of others and the inconvenience due to illegal use by inputting a password to a mobile set in using the system and permitting the communication from the mobile set only when the password is collated with a stored password. CONSTITUTION:In making a call from a mobile set, the user inputs a passcode stored in this mobile set from a pushbutton section. When a control unit CPU confirms the collation between the inputted password and that stored in a memory unit MM, the unit CPU informs the release of the mobile set to the user from a speaker SP via a voice processing unit VCON. The user confirms the release of the mobile set, inputs an opposite party number by the pushbutton section and the opposite party is connected and the communication is enabled. Thus, the inconvenience due to a demand for payment of an unexpected charge for a mobile set registration personnel caused by illegal use of the 3rd party is prevented.

Patent
06 Mar 1986
TL;DR: In this article, the authors propose to add conditions of access when a person who cannot input the password accesses data, by providing a means which outputs an arbitrary access inhibiting command to a terminal executing the arbitrary access.
Abstract: PURPOSE:To make a person who can input a password adds conditions of access possible when a person who cannot input the password accesses data, by providing a means which outputs an arbitrary access inhibiting command to a terminal executing the arbitrary access. CONSTITUTION:An arbitrary password reporting part 2d of a terminal 2 outputs an arbitrary password reportion signal to a terminal 1 to report the password. The terminal 1 outputs the arbitrary password signal from an arbitrary password transmitting part 1e to a control part 4, and an access signal is outputted from the terminal 1 to a storage part 5 through the control part 4, and the arbitrary access is performed, and this execution is displayed on a monitor 2g. A terminal 2 outputs an arbitrary access inhibiting request signal from an arbitrary access inhibiting request signal transmitting part 2f to the control part 4 as required, and an arbitrary access inhibiting part 4d of the control part 4 outputs an arbitrary access inhibiting signal to the terminal 1. Even if this inhibiting signal is outputted before the expiration of the validity time, the terminal 2 inhibits the arbitrary access of the terminal 1.

01 Jan 1986
TL;DR: This RFC specifies a standard for the ARPA Internet community that provides a set of six randomly generated eight-character "words" with a reasonable level of pronounceability, using a multi-level algorithm.
Abstract: This RFC specifies a standard for the ARPA Internet community. The Password Generator Service (PWDGEN) provides a set of six randomly generated eight-character "words" with a reasonable level of pronounceability, using a multi-level algorithm. Hosts on the ARPA Internet that choose to implement a password generator service are expected to adopt and implement this standard.

Patent
31 Mar 1986
TL;DR: In this paper, the check between the password number read out from a ROM and that from a reader/writer is performed, and it is decided that the presenter of the IC card is a principal when coincidence is obtained.
Abstract: PURPOSE:To protect an IC card from a crime, such as forgery, or theft, etc., by performing the check of a secret proper number after the check of a password number. CONSTITUTION:At an IC card side, the check between the password number read out from a ROM and that from a reader/writer is performed. As a result of check, it is decided that the presenter of the IC card is a principal when coincidence is obtained. Next, at a reader/writer side, the secret proper number stored at the ROM is read out, and it is outputted to the IC card side. At the IC card side, the secret proper number is read out from the ROM, and it is checked with the proper number from the reader/writer side. When the coincidence is obtained as the result of check, it is decided that the IC card itself is a true card, and a bit of information to permit the use of the IC card is outputted. In this way, it is possible to protect the IC card from the crime, such as the forgery, or the theft, etc.

Patent
02 May 1986
TL;DR: In this article, an IC card 8 is put into a card reader 7, and a password number input key K is operated for input of said number, then the 1st signal circuit 12 produces a single pulse if the password number is correct.
Abstract: PURPOSE:To prevent a foul bank transaction by using an IC built-in card (IC card) which is not altered easily as well as a password number. CONSTITUTION:An IC card 8 is put into a card reader 7, and a password number input key K is operated for input of said number. Then the 1st signal circuit 12 produces a single pulse if the password number is correct. This pulse is applied to a 1-bit memory circuit 19, and a pulse train is delivered through an AND gate 21 when the output of a reverse gate 20b is equal to '1'. The pulses of said train are applied to a memory DM as the timing signals and also counted by a counter 22. Then the using times of the card 8 are counted. While the reader 7 detects that an IC10 of the card 8 had the correct working according to the input password number. Thus a normalized transaction is carried out only when the card 8 is recognized as a correct one.

Patent
21 May 1986
TL;DR: In this paper, the authors proposed to prevent an illegal use due to a burglary, lost, etc., of the card, to improve safety and to confirm a user with an easy realization by using a spare area of a card and installing an additional code at a password code.
Abstract: PURPOSE:To prevent an illegal use due to a burglary, lost, etc, of the card, to improve safety and to confirm a user with an easy realization by using a spare area of a card and installing an additional code at a password code CONSTITUTION:A card 10 has a magnetic stripe 11, four-digit password codes are recorded in the password number column when the card is prepared, and further an additional code up to maximum four-digit is recorded by using a spare area When a cash automatic transaction is executed by the card, the card 10 is inserted into a transaction terminal device 20, the password code is inputted with a key, and then, the device 20 transmits an input password code including card information and additional codes to a center system 30 CPU31 of the system 30 checks the number of digits and the contents the input password code through a main memory device 32 and compared with the data read from the password code table 34 As such a result, in the case of 'inconsist ent', the card using prohibition is answered to the device 20 Thus, the illegal use of the card can be prevented, safety can be improved and a user confirma tion can be easily executed

Patent
07 Nov 1986
TL;DR: In this paper, an audio response system is used to protect a password number from the third party even when an input device which the 3rd party can easily understand by rendering a user to convert his password number to the other number according to the indication of a system and inputting the converted number through a pushbutton telephone set.
Abstract: PURPOSE:To protect a password number from the 3rd party even when an input device which the 3rd party can easily understand by rendering a user to convert his password number to the other number according to the indication of a system and inputting the converted number through a pushbutton telephone set, etc. CONSTITUTION:When incoming from user's key telephone set 1 is present, an audio response system 7 indicates converting the password number from an audio response unit 3. When the indication of a new password number 4361 is issued with respect to a password number 1984, for instance, the user adds the figure indicated from the audio response unit 3 and the one having the order corresponding to the original password number, and forms the new password number by taking only the 1st order, and inputs it through the key telephone set 1. The inputted password number is received by a key signal receiver 4. A central control unit 5 converts reversely the newly obtained password number into its original, which is collated with the password number that corresponds to the user and is stored in a memory device 6. Finally whether services required by the user is accepted or not is decided.

Patent
27 Jun 1986
TL;DR: In this article, when a password number fails to be inputted continuously four times, a counter register 16 counts up to '4' and a '1' signal is outputted from an output line 16a.
Abstract: PURPOSE:To use efficiently a P-ROM whose capacity is limited by writing data at a stored bit area location without succession when a correspondence result is obtained as a result of password number matching and writing the data at a bit area location which is one higher than the stored bit area location when the correspondence relation is not obtained. CONSTITUTION:When a password number fails to be inputted continuously four times, a counter register 16 counts up to '4' and a '1' signal is outputted from an output line 16a. At this time, a dissidence signal is supplied from a control part 17 to an AND circuit 22, so the output of the AND circuit 22 is '1', which is sent as a buzzer signal to the control part 17. Consequently, the control part 17 gives a warning to a user. Further, if the next password number also fails to be inputted, the register 16 counts up to '5' and the '1' signal is outputted from an output line 16b and sent to the control part 17 through an AND circuit 23. The control part 17 when supplied with the '1' signal from the register 16 through the AND circuit 23 writes all-'0' data in the final address N of an RN storage area 20a to make the IC card 10 permanently ineffective.