WO2007017500A1 - Method and apparatus for secure insertion of an access code using an eye-tracking device - Google Patents
Method and apparatus for secure insertion of an access code using an eye-tracking device Download PDFInfo
- Publication number
- WO2007017500A1 WO2007017500A1 PCT/EP2006/065133 EP2006065133W WO2007017500A1 WO 2007017500 A1 WO2007017500 A1 WO 2007017500A1 EP 2006065133 W EP2006065133 W EP 2006065133W WO 2007017500 A1 WO2007017500 A1 WO 2007017500A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- data
- password
- visualization
- access code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
- G06F3/013—Eye tracking input arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/205—Housing aspects of ATMs
- G07F19/2055—Anti-skimming aspects at ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1033—Details of the PIN pad
Definitions
- the present invention concerns the field of the authentication of the individual identity during the procedure of access to a determined system or to a determined protected resource.
- the apparatus and the method according to the present invention are used in the field of the security systems in order to manage, protect and control conditional access resources, particularly through the password use.
- State of the art In these last years, in the field of computer science, the necessity to increase the security measures to protect the access to reserved and sensitive data, so that only authenticated and qualified users has access, has taken a great importance. For instance with the proliferation of the cash points, the automated teller machines and other automatic equipments of this type, today different devices of authentication that use magnetic cards or microprocessor and password are used on large scale.
- a standard method for the insertion of an alphanumeric password for instance, consists in typing the password on a standard ASCII keyboard or a numerical keyboard.
- the user password is not directly displayed on the screen but an asterisk or another character is shown as feedback to every character inserted to confirm the occurred typing.
- ATM Automatic Teller Machine
- the purpose of the present invention is to realize a method and an apparatus that allow the secure insertion of password to a conditioned access application / system, erasing the possibility of code theft through direct observation or video recording of code typing.
- the method and the apparatus according to the present invention allow the code/password insertion without the use of the user hands but only with his gaze, using an eye-tracking device. Summary of the invention
- the object of the present invention is a method and an apparatus for the secure insertion of password or access codes to protected areas and contents protected as described in the claims that compose the integral part of the present description.
- Fig. 1 shows a block diagram of a preferred embodiment of the present invention.
- Fig. 2 shows the flow chart of the method according to the present invention.
- Fig. 3 shows the flow chart regarding the routine of raw data filtering upcoming from the eye - tracker device.
- Fig. 4 shows the flow chart regarding the routine of optical command determination corresponding to the data upcoming from the eye-tracker device.
- the apparatus, object of the present invention includes: means of visualization of graphical images or text, means of survey of the gaze coordinates of the user turned to these visualization means, means of processing of the data produced by means of survey of the user gaze coordinates, means of interfacing with the security systems that regulate the access to the areas protected by password.
- Said means of produced data processing include means of data filtering, means of identification of the activated areas - on said means of visualization of graphical images or text - by the user gaze, means of activation of the components belonging to said active areas, means of dispatch, to said means of visualization, of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch, to said means that generate the interface with the security systems, of said password.
- said means of images visualization include at least a monitor 10
- said means of survey of the user gaze coordinates comprise at least an eye-tracker device 1 1
- said means of processing of the data produced by said means of survey of the user gaze coordinates include means of data elaboration, for instance a personal computer 12, associated to said monitor 10 and to said eye-tracker device 1 1.
- the apparatus according to the present invention develops the method following described, as shown in Fig. 2, where it is illustrated the flow chart that describes the single steps of it.
- a page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing, b) The user gaze coordinates are calculated (21 ) by the eye - tracking device, c) The data concerning said user gaze coordinates are sent (22) to said means of processing. d) The data concerning said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25).
- step d) of the sequence previously described is developed by the raw data filtering module according to the steps sequence following described and illustrated in Fig. 3: k) A pre-filtering is performed (30), so that the non valid samples are noticed and eliminated.
- the determination of the optical command corresponding to the data coming from the eye-tracker referring to the step e) of the sequence illustrated in the Fig. 2, is performed according to the following sequence and illustrated in Fig. 4: p)
- the filtered data are elaborated (40) in order to determine what area of the interface has currently gazed from the user.
- the component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component.
- the optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention concerns a method and an apparatus for the secure insertion of a code, using an eye controlled interface, in order to access to any protected application. Besides the present invention allows the user to interface with eye-tracking systems and devices that enable him to use only his own gaze rather than the usual user interface like keyboards, mouse, etc. increasing, in such way, the security level of said code insertion.
Description
METHOD AND APPARATUS FOR SECURE INSERTION OF AN ACCESS CODE USING AN EYE-TRACKING DEVICE Field of the invention
The present invention concerns the field of the authentication of the individual identity during the procedure of access to a determined system or to a determined protected resource. The apparatus and the method according to the present invention are used in the field of the security systems in order to manage, protect and control conditional access resources, particularly through the password use. State of the art In these last years, in the field of computer science, the necessity to increase the security measures to protect the access to reserved and sensitive data, so that only authenticated and qualified users has access, has taken a great importance. For instance with the proliferation of the cash points, the automated teller machines and other automatic equipments of this type, today different devices of authentication that use magnetic cards or microprocessor and password are used on large scale.
At the ATM points for banking transactions whoever in possession of an ATM card and aware of the corresponding personal identification number (PIN) is allowed to access to the corresponding bank account to withdraw or to transfer money. The simple passwords or also the security magnetic cards that are normally used to authenticate the users introduce the drawback that they can be lost, stolen and cloned so that whoever improperly takes possession of these could access to sure areas. In banks and in other societies of services is an extremely important problem to establish the clients identity, in other words the authentication; the correct authentication, in fact, is required to protect themselves against any attempt of possible swindler to access the account of another person. Therefore it is clear the necessity of security measures that are not easily susceptible of violation and duplication. One of the most used and simple methods to provide access to computer systems, to secure areas, to financial transaction systems, etc. is characterized by the insertion of a password using a keyboard to which is often associated a
display.
A standard method for the insertion of an alphanumeric password, for instance, consists in typing the password on a standard ASCII keyboard or a numerical keyboard. The user password is not directly displayed on the screen but an asterisk or another character is shown as feedback to every character inserted to confirm the occurred typing.
Nevertheless, in many systems it is possible, for a not authorized observer, to see or to film the sequence of the code insertion in order to steal it. Frequent changes of the password used by the authorized user can prevent this possibility, but despite this changes a not authorized user can still access to different systems before the password is changed. Moreover, in systems like the
Automatic Teller Machine (ATM), the user password or the secret code cannot be easily changed. For these reasons, it is extremely important that the passwords and the methods of code and password insertion are secure regarding the possible identification from third persons.
Therefore, the purpose of the present invention is to realize a method and an apparatus that allow the secure insertion of password to a conditioned access application / system, erasing the possibility of code theft through direct observation or video recording of code typing.
The method and the apparatus according to the present invention allow the code/password insertion without the use of the user hands but only with his gaze, using an eye-tracking device. Summary of the invention
The object of the present invention is a method and an apparatus for the secure insertion of password or access codes to protected areas and contents protected as described in the claims that compose the integral part of the present description. Brief description of the figures
Fig. 1 shows a block diagram of a preferred embodiment of the present invention.
Fig. 2 shows the flow chart of the method according to the present invention.
Fig. 3 shows the flow chart regarding the routine of raw data filtering upcoming from the eye - tracker device.
Fig. 4 shows the flow chart regarding the routine of optical command determination corresponding to the data upcoming from the eye-tracker device. Detailed description of the invention
The apparatus, object of the present invention, includes: means of visualization of graphical images or text, means of survey of the gaze coordinates of the user turned to these visualization means, means of processing of the data produced by means of survey of the user gaze coordinates, means of interfacing with the security systems that regulate the access to the areas protected by password.
Said means of produced data processing include means of data filtering, means of identification of the activated areas - on said means of visualization of graphical images or text - by the user gaze, means of activation of the components belonging to said active areas, means of dispatch, to said means of visualization, of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch, to said means that generate the interface with the security systems, of said password. In a preferred embodiment of the present invention, described in Fig. 1 , said means of images visualization include at least a monitor 10, said means of survey of the user gaze coordinates comprise at least an eye-tracker device 1 1 , said means of processing of the data produced by said means of survey of the user gaze coordinates include means of data elaboration, for instance a personal computer 12, associated to said monitor 10 and to said eye-tracker device 1 1. The apparatus according to the present invention develops the method following described, as shown in Fig. 2, where it is illustrated the flow chart that describes the single steps of it. a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing, b) The user gaze coordinates are calculated (21 ) by the eye - tracking device, c) The data concerning said user gaze coordinates are sent (22) to said means of processing.
d) The data concerning said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization, h) The steps a) - g) are repeated until the password is completely inserted, i) Said password is sent (27) to said means of interfacing with the security systems. j) The code corresponding to said password is sent (28) to said security systems that determine its validity.
The step d) of the sequence previously described is developed by the raw data filtering module according to the steps sequence following described and illustrated in Fig. 3: k) A pre-filtering is performed (30), so that the non valid samples are noticed and eliminated.
I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation (32) related to the number desired of samples are calculated n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded The determination of the optical command corresponding to the data coming from the eye-tracker, referring to the step e) of the sequence illustrated in the Fig. 2, is performed according to the following sequence and illustrated in Fig. 4: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed from the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component. r) The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.
Claims
1. Apparatus for the secure insertion of an access code characterized by comprising: means of visualization of graphic images or text, means of survey of the gaze coordinates of the user turned to said means of visualization, means of processing of the data produced by said means of survey of the gaze coordinates of the user, means of interfacing with the security systems that regulate the access to the areas protected from password.
2. Apparatus for the secure insertion of an access code according to claim 1 characterized in that said means of processing of the produced data comprise means of data filtering, means of determination of the areas activated by the user gaze - on said means of visualization - means of activation of the components belonging to said active areas, means of dispatch to said means of visualization, means of activation of feedback corresponding to the determined action, means of generating a password corresponding to the determined action and means of dispatch of said password to said means of interfacing with the security systems.
3. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of visualization of images comprise at least a monitor (10), said means of survey of the gaze coordinates of the user include at least an eye-tracker device (1 1 ).
4. Apparatus for the secure insertion of an access code according to claim 2 characterized in that said means of processing of the data produced by said means of survey of the gaze coordinates comprise an electronic calculator (12) suitably associated to said monitor (10) and to said eye-tracker device (1 1 ).
5. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said eye-tracker device (1 1 ) is integrated in said monitor (10).
6. Apparatus for the secure insertion of an access code according to the previous claim characterized in that said electronic calculator (12) is a personal computer.
7. Method for the secure insertion of an access code characterized in that it comprises the following steps: a) A page that requires to the user to insert his own password is visualized (20) on said means of visualization associated to said means of data processing. b) The user gaze coordinates are calculated (21 ) by the eye - tracking device. c) The data concerning to said user gaze coordinates are sent (22) to said means of processing. d) The data concerning to said user gaze coordinates are filtered (23) from said means of processing. e) The filtered data coming from the previous step are interpreted (24) to determine the corresponding optical command. f) The action corresponding to said optical command is performed (25). g) An apposite feedback is sent (26) to said means of visualization. h) The steps a) - g) are repeated until the password is completely inserted. i) Said password is sent (27) to said means of interfacing with the security systems, j) The code corresponding to said password is sent (28) to said security systems that determine its validity.
8. Method for the secure insertion of an code access according to claim 7 characterized in that said step d) is performed by said raw data filtering module according to the following steps sequence: k) A pre-filtering is performed (30) so that the non valid samples are noticed and eliminated. I) The coordinates of the point gazed by the user are determined (31 ) m) The average and the standard deviation related to the number desired of samples are calculated (32) n) The tolerances for the evaluations are planned (33) o) The acceptable data are discriminated (34) from those to be discarded 9. Method for the secure insertion of an access code according to claim 8 characterized in that said step e) is performed according to the following steps sequence: p) The filtered data are elaborated (40) in order to determine what area of the interface has currently gazed by the user. q) The component of the graphical interface related to the area determined at the previous step is activated (41 ). The activation of such selection can for example happen using dwell time on the active component. The optical command corresponding to the data coming from the previous step is determined (42), including the action to perform and a possible feedback to be sent to said means of visualization.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ITFI2005A000176 | 2005-08-10 | ||
| ITFI20050176 ITFI20050176A1 (en) | 2005-08-10 | 2005-08-10 | METHOD AND APPARATUS FOR THE SAFE INSERTION OF AN ACCESS CODE THROUGH THE USE OF AN EYE CONTROLLED DEVICE |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2007017500A1 true WO2007017500A1 (en) | 2007-02-15 |
Family
ID=37400877
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2006/065133 Ceased WO2007017500A1 (en) | 2005-08-10 | 2006-08-08 | Method and apparatus for secure insertion of an access code using an eye-tracking device |
Country Status (2)
| Country | Link |
|---|---|
| IT (1) | ITFI20050176A1 (en) |
| WO (1) | WO2007017500A1 (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009113026A2 (en) | 2008-03-12 | 2009-09-17 | Sr Labs S.R.L. | Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor |
| ITFI20090198A1 (en) * | 2009-09-11 | 2011-03-12 | Sr Labs S R L | METHOD AND APPARATUS FOR THE USE OF GENERIC SOFTWARE APPLICATIONS THROUGH OCULAR CONTROL AND INTERACTION METHODS IS APPROPRIATE. |
| EP2503479A1 (en) * | 2011-03-21 | 2012-09-26 | Research In Motion Limited | Login method based on direction of gaze |
| US8625847B2 (en) | 2011-03-21 | 2014-01-07 | Blackberry Limited | Login method based on direction of gaze |
| JP2015097075A (en) * | 2013-11-15 | 2015-05-21 | 由田新技股▲ふん▼有限公司 | Hand-held eye control / eyepiece device, encryption input device, method, computer-readable storage medium, and computer program product |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4595990A (en) * | 1980-12-31 | 1986-06-17 | International Business Machines Corporation | Eye controlled information transfer |
| US4973149A (en) * | 1987-08-19 | 1990-11-27 | Center For Innovative Technology | Eye movement detector |
| US5471542A (en) * | 1993-09-27 | 1995-11-28 | Ragland; Richard R. | Point-of-gaze tracker |
| US6282553B1 (en) * | 1998-11-04 | 2001-08-28 | International Business Machines Corporation | Gaze-based secure keypad entry system |
| WO2005010836A1 (en) * | 2003-07-24 | 2005-02-03 | Itautec Philco S/A - Grupo Itautec Philco | Improvements introduced in equipment used in security, commercial and bank automation systems |
-
2005
- 2005-08-10 IT ITFI20050176 patent/ITFI20050176A1/en unknown
-
2006
- 2006-08-08 WO PCT/EP2006/065133 patent/WO2007017500A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4595990A (en) * | 1980-12-31 | 1986-06-17 | International Business Machines Corporation | Eye controlled information transfer |
| US4973149A (en) * | 1987-08-19 | 1990-11-27 | Center For Innovative Technology | Eye movement detector |
| US5471542A (en) * | 1993-09-27 | 1995-11-28 | Ragland; Richard R. | Point-of-gaze tracker |
| US6282553B1 (en) * | 1998-11-04 | 2001-08-28 | International Business Machines Corporation | Gaze-based secure keypad entry system |
| WO2005010836A1 (en) * | 2003-07-24 | 2005-02-03 | Itautec Philco S/A - Grupo Itautec Philco | Improvements introduced in equipment used in security, commercial and bank automation systems |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2009113026A2 (en) | 2008-03-12 | 2009-09-17 | Sr Labs S.R.L. | Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor |
| WO2009113026A3 (en) * | 2008-03-12 | 2010-01-21 | Sr Labs S.R.L. | Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor |
| US8205165B2 (en) | 2008-03-12 | 2012-06-19 | Sr Labs S.R.L. | Apparatus to create, save and format text documents using gaze control and method associated based on the optimized positioning of cursor |
| ITFI20090198A1 (en) * | 2009-09-11 | 2011-03-12 | Sr Labs S R L | METHOD AND APPARATUS FOR THE USE OF GENERIC SOFTWARE APPLICATIONS THROUGH OCULAR CONTROL AND INTERACTION METHODS IS APPROPRIATE. |
| WO2011030212A1 (en) * | 2009-09-11 | 2011-03-17 | Sr Labs S.R.L. | Method and apparatus for using generic software applications by means of ocular control and suitable methods of interaction |
| US9372605B2 (en) | 2009-09-11 | 2016-06-21 | Sr Labs S.R.L. | Method and apparatus for controlling the operation of an operating system and application programs by ocular control |
| EP2503479A1 (en) * | 2011-03-21 | 2012-09-26 | Research In Motion Limited | Login method based on direction of gaze |
| US8625847B2 (en) | 2011-03-21 | 2014-01-07 | Blackberry Limited | Login method based on direction of gaze |
| US8953845B2 (en) | 2011-03-21 | 2015-02-10 | Blackberry Limited | Login method based on direction of gaze |
| JP2015097075A (en) * | 2013-11-15 | 2015-05-21 | 由田新技股▲ふん▼有限公司 | Hand-held eye control / eyepiece device, encryption input device, method, computer-readable storage medium, and computer program product |
Also Published As
| Publication number | Publication date |
|---|---|
| ITFI20050176A1 (en) | 2007-02-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1615181B1 (en) | A method of secure data communication | |
| US7882361B2 (en) | Method and system for accepting a pass code | |
| US7107454B2 (en) | Signature system presenting user signature information | |
| US7992005B2 (en) | Providing pattern based user password access | |
| US20170324726A1 (en) | Digital authentication using augmented reality | |
| US20120005735A1 (en) | System for Three Level Authentication of a User | |
| US20090144162A1 (en) | Transaction Security Method and Apparatus | |
| US20120104090A1 (en) | Card-reader apparatus | |
| US20130264384A1 (en) | Automatic teller machine ("atm") including a user-accessible usb port | |
| AU2006221804B2 (en) | A method of secure data communication | |
| US20040243856A1 (en) | Four factor authentication system and method | |
| CA2898041A1 (en) | Authentication device & related methods | |
| Onyesolu et al. | Improving security using a three-tier authentication for automated teller machine (ATM) | |
| WO2007017500A1 (en) | Method and apparatus for secure insertion of an access code using an eye-tracking device | |
| US20170103395A1 (en) | Authentication systems and methods using human readable media | |
| US20150288684A1 (en) | Device assembly for carrying out or enabling an electronic service and a method for securely inputting authorization data | |
| US9214051B1 (en) | Dynamic touch screen for automated teller machines (“ATMs”) | |
| JP2007164423A (en) | Personal identification system and personal identification method | |
| KR101993057B1 (en) | Safe password input device and method using eye movement recognition | |
| US12393661B2 (en) | Systems and methods for secure data input and authentication | |
| JP2007115058A (en) | Automatic transaction device | |
| WO2022001707A1 (en) | Method and system for receiving a secure input, using a secure input means | |
| Simon et al. | ATM Security Using Iris Recognition | |
| AU2012202723B2 (en) | A Method of Secure Data Communication | |
| GB2454944A (en) | Protecting the security of an access code such as a PIN or password |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 06778192 Country of ref document: EP Kind code of ref document: A1 |