[go: up one dir, main page]

WO2007017500A1 - Method and apparatus for secure insertion of an access code using an eye-tracking device - Google Patents

Method and apparatus for secure insertion of an access code using an eye-tracking device Download PDF

Info

Publication number
WO2007017500A1
WO2007017500A1 PCT/EP2006/065133 EP2006065133W WO2007017500A1 WO 2007017500 A1 WO2007017500 A1 WO 2007017500A1 EP 2006065133 W EP2006065133 W EP 2006065133W WO 2007017500 A1 WO2007017500 A1 WO 2007017500A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
password
visualization
access code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2006/065133
Other languages
French (fr)
Inventor
Francesco Maringelli
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SR Labs Srl
Original Assignee
SR Labs Srl
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SR Labs Srl filed Critical SR Labs Srl
Publication of WO2007017500A1 publication Critical patent/WO2007017500A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • G06F3/013Eye tracking input arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/205Housing aspects of ATMs
    • G07F19/2055Anti-skimming aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1033Details of the PIN pad

Definitions

  • the present invention concerns the field of the authentication of the individual identity during the procedure of access to a determined system or to a determined protected resource.
  • the apparatus and the method according to the present invention are used in the field of the security systems in order to manage, protect and control conditional access resources, particularly through the password use.
  • State of the art In these last years, in the field of computer science, the necessity to increase the security measures to protect the access to reserved and sensitive data, so that only authenticated and qualified users has access, has taken a great importance. For instance with the proliferation of the cash points, the automated teller machines and other automatic equipments of this type, today different devices of authentication that use magnetic cards or microprocessor and password are used on large scale.
  • a standard method for the insertion of an alphanumeric password for instance, consists in typing the password on a standard ASCII keyboard or a numerical keyboard.
  • the user password is not directly displayed on the screen but an asterisk or another character is shown as feedback to every character inserted to confirm the occurred typing.
  • ATM Automatic Teller Machine
  • the purpose of the present invention is to realize a method and an apparatus that allow the secure insertion of password to a conditioned access application / system, erasing the possibility of code theft through direct observation or video recording of code typing.
  • the method and the apparatus according to the present invention allow the code/password insertion without the use of the user hands but only with his gaze, using an eye-tracking device. Summary of the invention
  • the object of the present invention is a method and an apparatus for the secure insertion of password or access codes to protected areas and contents protected as described in the claims that compose the integral part of the present description.
  • Fig. 1 shows a block diagram of a preferred embodiment of the present invention.
  • Fig. 2 shows the flow chart of the method according to the present invention.
  • Fig. 3 shows the flow chart regarding the routine of raw data filtering upcoming from the eye - tracker device.
  • Fig. 4 shows the flow chart regarding the routine of optical command determination corresponding to the data upcoming from the eye-tracker device.
  • the apparatus, object of the present invention includes: means of visualization of graphical images or text, means of survey of the gaze coordinates of the user turned to these visualization means, means of processing of the data produced by means of survey of the user gaze coordinates, means of interfacing with the security systems that regulate the access to the areas protected by password.
  • Said means of produced data processing include means of data filtering, means of identification of the activated areas - on said means of visualization of graphical images or text - by the user gaze, means of activation of the components belonging to said active areas, means of dispatch, to said means of visualization, of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch, to said means that generate the interface with the security systems, of said password.
  • said means of images visualization include at least a monitor 10
  • said means of survey of the user gaze coordinates comprise at least an eye-tracker device 1 1
  • said means of processing of the data produced by said means of survey of the user gaze coordinates include means of data elaboration, for instance a personal computer 12, associated to said monitor 10 and to said eye-tracker device 1 1.
  • the apparatus according to the present invention develops the method following described, as shown in Fig. 2, where it is illustrated the flow chart that describes the single steps of it.
  • a page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing, b) The user gaze coordinates are calculated (21 ) by the eye - tracking device, c) The data concerning said user gaze coordinates are sent (22) to said means of processing. d) The data concerning said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25).
  • step d) of the sequence previously described is developed by the raw data filtering module according to the steps sequence following described and illustrated in Fig. 3: k) A pre-filtering is performed (30), so that the non valid samples are noticed and eliminated.
  • the determination of the optical command corresponding to the data coming from the eye-tracker referring to the step e) of the sequence illustrated in the Fig. 2, is performed according to the following sequence and illustrated in Fig. 4: p)
  • the filtered data are elaborated (40) in order to determine what area of the interface has currently gazed from the user.
  • the component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component.
  • the optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention concerns a method and an apparatus for the secure insertion of a code, using an eye controlled interface, in order to access to any protected application. Besides the present invention allows the user to interface with eye-tracking systems and devices that enable him to use only his own gaze rather than the usual user interface like keyboards, mouse, etc. increasing, in such way, the security level of said code insertion.

Description

METHOD AND APPARATUS FOR SECURE INSERTION OF AN ACCESS CODE USING AN EYE-TRACKING DEVICE Field of the invention
The present invention concerns the field of the authentication of the individual identity during the procedure of access to a determined system or to a determined protected resource. The apparatus and the method according to the present invention are used in the field of the security systems in order to manage, protect and control conditional access resources, particularly through the password use. State of the art In these last years, in the field of computer science, the necessity to increase the security measures to protect the access to reserved and sensitive data, so that only authenticated and qualified users has access, has taken a great importance. For instance with the proliferation of the cash points, the automated teller machines and other automatic equipments of this type, today different devices of authentication that use magnetic cards or microprocessor and password are used on large scale.
At the ATM points for banking transactions whoever in possession of an ATM card and aware of the corresponding personal identification number (PIN) is allowed to access to the corresponding bank account to withdraw or to transfer money. The simple passwords or also the security magnetic cards that are normally used to authenticate the users introduce the drawback that they can be lost, stolen and cloned so that whoever improperly takes possession of these could access to sure areas. In banks and in other societies of services is an extremely important problem to establish the clients identity, in other words the authentication; the correct authentication, in fact, is required to protect themselves against any attempt of possible swindler to access the account of another person. Therefore it is clear the necessity of security measures that are not easily susceptible of violation and duplication. One of the most used and simple methods to provide access to computer systems, to secure areas, to financial transaction systems, etc. is characterized by the insertion of a password using a keyboard to which is often associated a display.
A standard method for the insertion of an alphanumeric password, for instance, consists in typing the password on a standard ASCII keyboard or a numerical keyboard. The user password is not directly displayed on the screen but an asterisk or another character is shown as feedback to every character inserted to confirm the occurred typing.
Nevertheless, in many systems it is possible, for a not authorized observer, to see or to film the sequence of the code insertion in order to steal it. Frequent changes of the password used by the authorized user can prevent this possibility, but despite this changes a not authorized user can still access to different systems before the password is changed. Moreover, in systems like the
Automatic Teller Machine (ATM), the user password or the secret code cannot be easily changed. For these reasons, it is extremely important that the passwords and the methods of code and password insertion are secure regarding the possible identification from third persons.
Therefore, the purpose of the present invention is to realize a method and an apparatus that allow the secure insertion of password to a conditioned access application / system, erasing the possibility of code theft through direct observation or video recording of code typing.
The method and the apparatus according to the present invention allow the code/password insertion without the use of the user hands but only with his gaze, using an eye-tracking device. Summary of the invention
The object of the present invention is a method and an apparatus for the secure insertion of password or access codes to protected areas and contents protected as described in the claims that compose the integral part of the present description. Brief description of the figures
Fig. 1 shows a block diagram of a preferred embodiment of the present invention.
Fig. 2 shows the flow chart of the method according to the present invention. Fig. 3 shows the flow chart regarding the routine of raw data filtering upcoming from the eye - tracker device.
Fig. 4 shows the flow chart regarding the routine of optical command determination corresponding to the data upcoming from the eye-tracker device. Detailed description of the invention
The apparatus, object of the present invention, includes: means of visualization of graphical images or text, means of survey of the gaze coordinates of the user turned to these visualization means, means of processing of the data produced by means of survey of the user gaze coordinates, means of interfacing with the security systems that regulate the access to the areas protected by password.
Said means of produced data processing include means of data filtering, means of identification of the activated areas - on said means of visualization of graphical images or text - by the user gaze, means of activation of the components belonging to said active areas, means of dispatch, to said means of visualization, of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch, to said means that generate the interface with the security systems, of said password. In a preferred embodiment of the present invention, described in Fig. 1 , said means of images visualization include at least a monitor 10, said means of survey of the user gaze coordinates comprise at least an eye-tracker device 1 1 , said means of processing of the data produced by said means of survey of the user gaze coordinates include means of data elaboration, for instance a personal computer 12, associated to said monitor 10 and to said eye-tracker device 1 1. The apparatus according to the present invention develops the method following described, as shown in Fig. 2, where it is illustrated the flow chart that describes the single steps of it. a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing, b) The user gaze coordinates are calculated (21 ) by the eye - tracking device, c) The data concerning said user gaze coordinates are sent (22) to said means of processing. d) The data concerning said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization, h) The steps a) - g) are repeated until the password is completely inserted, i) Said password is sent (27) to said means of interfacing with the security systems. j) The code corresponding to said password is sent (28) to said security systems that determine its validity.
The step d) of the sequence previously described is developed by the raw data filtering module according to the steps sequence following described and illustrated in Fig. 3: k) A pre-filtering is performed (30), so that the non valid samples are noticed and eliminated.
I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation (32) related to the number desired of samples are calculated n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded The determination of the optical command corresponding to the data coming from the eye-tracker, referring to the step e) of the sequence illustrated in the Fig. 2, is performed according to the following sequence and illustrated in Fig. 4: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed from the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component. r) The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.

Claims

1. Apparatus for the secure insertion of an access code characterized by comprising: means of visualization of graphic images or text, means of survey of the gaze coordinates of the user turned to said means of visualization, means of processing of the data produced by said means of survey of the gaze coordinates of the user, means of interfacing with the security systems that regulate the access to the areas protected from password.
2. Apparatus for the secure insertion of an access code according to claim 1 characterized in that said means of processing of the produced data comprise means of data filtering, means of determination of the areas activated by the user gaze - on said means of visualization - means of activation of the components belonging to said active areas, means of dispatch to said means of visualization, means of activation of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch of said password to said means of interfacing with the security systems.
3. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of visualization of images comprise at least a monitor (10), said means of survey of the gaze coordinates of the user include at least an eye-tracker device (1 1 ).
4. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of processing of the data produced by said means of survey of the gaze coordinates comprise an electronic calculator (12) suitably associated to said monitor (10) and to said eye-tracker device (1 1 ).
5. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said eye-tracker device (1 1 ) is integrated in said monitor (10).
6. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said electronic calculator (12) is a personal computer.
7. Method for the secure insertion of an access code characterized in that it comprises the following steps: a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing. b) The user gaze coordinates are calculated (21 ) by the eye - tracking device. c) The data concerning to said user gaze coordinates are sent (22) to said means of processing. d) The data concerning to said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization. h) The steps a) - g) are repeated until the password is completely inserted. i) Said password is sent (27) to said means of interfacing with the security systems, j) The code corresponding to said password is sent (28) to said security systems that determine its validity.
8. Method for the secure insertion of an code access according to claim 7 characterized in that said step d) is performed by said raw data filtering module according to the following steps sequence: k) A pre-filtering is performed (30) so that the non valid samples are noticed and eliminated. I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation related to the number desired of samples are calculated (32) n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded 9. Method for the secure insertion of an access code according to claim 8 characterized in that said step e) is performed according to the following steps sequence: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed by the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component. The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.
PCT/EP2006/065133 2005-08-10 2006-08-08 Method and apparatus for secure insertion of an access code using an eye-tracking device Ceased WO2007017500A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITFI2005A000176 2005-08-10
ITFI20050176 ITFI20050176A1 (en) 2005-08-10 2005-08-10 METHOD AND APPARATUS FOR THE SAFE INSERTION OF AN ACCESS CODE THROUGH THE USE OF AN EYE CONTROLLED DEVICE

Publications (1)

Publication Number Publication Date
WO2007017500A1 true WO2007017500A1 (en) 2007-02-15

Family

ID=37400877

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2006/065133 Ceased WO2007017500A1 (en) 2005-08-10 2006-08-08 Method and apparatus for secure insertion of an access code using an eye-tracking device

Country Status (2)

Country Link
IT (1) ITFI20050176A1 (en)
WO (1) WO2007017500A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009113026A2 (en) 2008-03-12 2009-09-17 Sr Labs S.R.L. Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor
ITFI20090198A1 (en) * 2009-09-11 2011-03-12 Sr Labs S R L METHOD AND APPARATUS FOR THE USE OF GENERIC SOFTWARE APPLICATIONS THROUGH OCULAR CONTROL AND INTERACTION METHODS IS APPROPRIATE.
EP2503479A1 (en) * 2011-03-21 2012-09-26 Research In Motion Limited Login method based on direction of gaze
US8625847B2 (en) 2011-03-21 2014-01-07 Blackberry Limited Login method based on direction of gaze
JP2015097075A (en) * 2013-11-15 2015-05-21 由田新技股▲ふん▼有限公司 Hand-held eye control / eyepiece device, encryption input device, method, computer-readable storage medium, and computer program product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4595990A (en) * 1980-12-31 1986-06-17 International Business Machines Corporation Eye controlled information transfer
US4973149A (en) * 1987-08-19 1990-11-27 Center For Innovative Technology Eye movement detector
US5471542A (en) * 1993-09-27 1995-11-28 Ragland; Richard R. Point-of-gaze tracker
US6282553B1 (en) * 1998-11-04 2001-08-28 International Business Machines Corporation Gaze-based secure keypad entry system
WO2005010836A1 (en) * 2003-07-24 2005-02-03 Itautec Philco S/A - Grupo Itautec Philco Improvements introduced in equipment used in security, commercial and bank automation systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4595990A (en) * 1980-12-31 1986-06-17 International Business Machines Corporation Eye controlled information transfer
US4973149A (en) * 1987-08-19 1990-11-27 Center For Innovative Technology Eye movement detector
US5471542A (en) * 1993-09-27 1995-11-28 Ragland; Richard R. Point-of-gaze tracker
US6282553B1 (en) * 1998-11-04 2001-08-28 International Business Machines Corporation Gaze-based secure keypad entry system
WO2005010836A1 (en) * 2003-07-24 2005-02-03 Itautec Philco S/A - Grupo Itautec Philco Improvements introduced in equipment used in security, commercial and bank automation systems

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009113026A2 (en) 2008-03-12 2009-09-17 Sr Labs S.R.L. Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor
WO2009113026A3 (en) * 2008-03-12 2010-01-21 Sr Labs S.R.L. Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor
US8205165B2 (en) 2008-03-12 2012-06-19 Sr Labs S.R.L. Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor
ITFI20090198A1 (en) * 2009-09-11 2011-03-12 Sr Labs S R L METHOD AND APPARATUS FOR THE USE OF GENERIC SOFTWARE APPLICATIONS THROUGH OCULAR CONTROL AND INTERACTION METHODS IS APPROPRIATE.
WO2011030212A1 (en) * 2009-09-11 2011-03-17 Sr Labs S.R.L. Method and apparatus for using generic software applications by means of ocular control and suitable methods of interaction
US9372605B2 (en) 2009-09-11 2016-06-21 Sr Labs S.R.L. Method and apparatus for controlling the operation of an operating system and application programs by ocular control
EP2503479A1 (en) * 2011-03-21 2012-09-26 Research In Motion Limited Login method based on direction of gaze
US8625847B2 (en) 2011-03-21 2014-01-07 Blackberry Limited Login method based on direction of gaze
US8953845B2 (en) 2011-03-21 2015-02-10 Blackberry Limited Login method based on direction of gaze
JP2015097075A (en) * 2013-11-15 2015-05-21 由田新技股▲ふん▼有限公司 Hand-held eye control / eyepiece device, encryption input device, method, computer-readable storage medium, and computer program product

Also Published As

Publication number Publication date
ITFI20050176A1 (en) 2007-02-11

Similar Documents

Publication Publication Date Title
EP1615181B1 (en) A method of secure data communication
US7882361B2 (en) Method and system for accepting a pass code
US7107454B2 (en) Signature system presenting user signature information
US7992005B2 (en) Providing pattern based user password access
US20170324726A1 (en) Digital authentication using augmented reality
US20120005735A1 (en) System for Three Level Authentication of a User
US20090144162A1 (en) Transaction Security Method and Apparatus
US20120104090A1 (en) Card-reader apparatus
US20130264384A1 (en) Automatic teller machine ("atm") including a user-accessible usb port
AU2006221804B2 (en) A method of secure data communication
US20040243856A1 (en) Four factor authentication system and method
CA2898041A1 (en) Authentication device & related methods
Onyesolu et al. Improving security using a three-tier authentication for automated teller machine (ATM)
WO2007017500A1 (en) Method and apparatus for secure insertion of an access code using an eye-tracking device
US20170103395A1 (en) Authentication systems and methods using human readable media
US20150288684A1 (en) Device assembly for carrying out or enabling an electronic service and a method for securely inputting authorization data
US9214051B1 (en) Dynamic touch screen for automated teller machines (“ATMs”)
JP2007164423A (en) Personal identification system and personal identification method
KR101993057B1 (en) Safe password input device and method using eye movement recognition
US12393661B2 (en) Systems and methods for secure data input and authentication
JP2007115058A (en) Automatic transaction device
WO2022001707A1 (en) Method and system for receiving a secure input, using a secure input means
Simon et al. ATM Security Using Iris Recognition
AU2012202723B2 (en) A Method of Secure Data Communication
GB2454944A (en) Protecting the security of an access code such as a PIN or password

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06778192

Country of ref document: EP

Kind code of ref document: A1