U.S. patent application number 10/333868 was filed with the patent office on 2004-03-18 for secret information record medium, secret information protection method, secret information protective storing method, and system for reporting emergency such as theft or confinement when secret information is accessed.
Invention is credited to Kokumai, Hitoshi, Kuriyama, Masayuki, Masuno, Ryuhei.
Application Number | 20040053654 10/333868 |
Document ID | / |
Family ID | 27344160 |
Filed Date | 2004-03-18 |
United States Patent
Application |
20040053654 |
Kind Code |
A1 |
Kokumai, Hitoshi ; et
al. |
March 18, 2004 |
Secret information record medium, secret information protection
method, secret information protective storing method, and system
for reporting emergency such as theft or confinement when secret
information is accessed
Abstract
Disclosed are protection of secret information including an
encryption key and a system for reporting an emergency such as
theft or confinement when secret information is accessed. Secret
information includes a large quantity of decoy data and a
piece/pieces of true and correct data mixed into the decoy data.
The secret data including the decoy data and the true and correct
data is two-dimensional code data the code of which is composed of
groups of cells having different areas. The positions and order of
storage of the true and correct data dispersedly mixed in the decoy
data are determined and reported to the user. The user adds a
predetermined alerting signal when inputting the password to tell
that the user is under control of a third party. The system can
detect the alerting signal and know that the user is in an abnormal
state, performs normal identification procedures, and takes
protection/preservation measures. Part of decoy data is specified
as confinement report data and added to the true and correct data.
Consequently at least a piece of confinement report data is
included and therefore the user himself is judged to be under
control of the third party. Then the user is identified and a
confinement report alert is issued.
Inventors: |
Kokumai, Hitoshi; (Kobe-shi,
JP) ; Masuno, Ryuhei; (Osaka-shi, JP) ;
Kuriyama, Masayuki; (Asiya-shi, JP) |
Correspondence
Address: |
Koda & Androlia
Suite 3850
2029 Century Park East
Los Angeles
CA
90067-3024
US
|
Family ID: |
27344160 |
Appl. No.: |
10/333868 |
Filed: |
January 24, 2003 |
PCT Filed: |
July 23, 2001 |
PCT NO: |
PCT/JP01/06356 |
Current U.S.
Class: |
463/1 |
Current CPC
Class: |
G06F 21/31 20130101;
G06F 21/554 20130101; G06F 21/36 20130101; G06F 2221/2127
20130101 |
Class at
Publication: |
463/001 |
International
Class: |
A63F 009/24 |
Foreign Application Data
Date |
Code |
Application Number |
Jul 25, 2000 |
JP |
2000-223940 |
Sep 20, 2000 |
JP |
2000-284811 |
Dec 27, 2000 |
JP |
2000-396990 |
Claims
1. A secret information record medium, wherein a single item of
true data is interspersed among numerous items of false data and
the false and true data are composed of two-dimensional code data
in plural groups having different areas, and wherein the location
of the item of true data interspersed among the numerous items of
false data is determined and presented to a user.
2. A secret information record medium, wherein plural items of true
data are interspersed among numerous items of false data and the
false and true data are composed of two-dimensional code data in
plural groups having different areas, and wherein the locations and
storing order of the items of true data interspersed among the
numerous items of false data are determined and presented to a
user.
3. A secret information record medium according to claim 1 or 2,
characterized by the user refers to illustrations or graphics
composed of the numerous items of false data and true data as
auxiliary means, in determining and selecting the locations and the
reading order of the items of true data among the numerous items of
false data from the user's own memory.
4. A secret information record medium according to claim 1 or 2,
characterized by the user also refers to illustrations or graphics
which exist in the background to the numerous items of false data
and true data, in determining and selecting the locations and the
reading order of the items of true data among the numerous items of
false data from the user's own memory.
5. A secret information protection method, wherein a single item of
true data encrypted by applying two-dimensional codes to secret
information with cryptographic keys for entrant-limited and/or
operator-limited control is interspersed among numerous items of
false data, and wherein the location of the item of true data with
respect to the numerous items of false data is held in a user's
memory for memory authentication to prevent any unauthorized person
from decrypting the secret information.
6. A secret information protection method, wherein plural items of
true data encrypted by applying two-dimensional codes to secret
information with cryptographic keys for entrant-limited and/or
operator-limited control are interspersed among numerous items of
false data, and wherein the locations and storing order of the
items of true data with respect to the numerous items of false data
are held in a user's memory for memory authentication to prevent
any unauthorized person from decrypting the secret information.
7. A secret information protection method according to claim 5 or
6, wherein said false and true data are printed on a paper card so
that they can be read by an optical reader for data
reproduction.
8. A secret information protective storing method, wherein items of
true data indicating decryption keys for encrypted secret
information are interspersed among numerous items of false data for
concealment and the locations and reading order of the items of
true data interspersed among the numerous items of false data are
held in a user's memory.
9. A secret information protective storing method, wherein true
information is divided into plural items and interspersed among
numerous items of false information to conceal the true
information, wherein numerous items of true data indicating the
locations of the items of true information and numerous items of
false data indicating the locations of the items of false
information are provided, and wherein the locations and storing
order of the items of true data interspersed among the numerous
items of false data are determined from a user's memory.
10. A secret information protective storing method according to
claim 9, wherein true information is divided into plural items and
interspersed among numerous items of false information to conceal
the true information, wherein numerous items of true data
indicating the locations of the items of true information and
numerous items of false data indicating the locations of the items
of false information are provided, and wherein the locations and
storing order of the items of true data interspersed among the
numerous items of false data are determined from a user's memory by
referring to a graphic sheet which includes coloring,
illustrations, graphics, and landscapes to specify portions of the
graphic sheet.
11. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein during the input of a
password upon user authentication in an internet transaction, a
user adds an alarm signal that is set in advance for informing that
he or she is placed under the control of an unauthorized person,
and the system detects that the user is under an abnormal condition
by detecting the alarm signal, whereupon the system performs a
protection/preservation measure.
12. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein during the input of a
password upon user authentication in an internet transaction, a
user adds an alarm signal that is set in advance for informing that
he or she is placed under the control of an unauthorized person,
and the system detects that the user is under an abnormal condition
by detecting the alarm signal, whereupon the system performs a
normal user authentication procedure as well as performs a
protection/preservation measure.
13. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein during the input of a
password upon user authentication in an internet transaction, a
user deletes an alarm signal that is set in advance in a password
for informing that he or she is placed under the control of an
unauthorized person, and the system detects that the user is under
an abnormal condition by detecting the alarm signal, whereupon the
system performs a protection/preservation- .
14. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein the number of items of
matching data to be recorded on a recording medium is selected to
include a single item of true data and plural items of false data
to provide a user authentication data recording medium which has
the matching data interspersed with the single item of true data
and the plural items of false data, wherein in recording secret
information with cryptographic keys on said user authentication
data recording medium, one of the numerous items of matching data
is determined to be the true data and the remaining items of
matching data are determined to be the false data, wherein
information indicated by the single item of true data is determined
to be authentication data indicating the secret information with
the cryptographic keys on the user authentication data recording
medium, wherein in using the user authentication data recording
medium to enter the authentication data, the single item of true
data is selected from the user authentication data recording
medium, thereby determining that the true authentication data is
selected and validating the user authentication, and wherein in
selecting the single item of true data from the user authentication
data recording medium during the input operation by means of the
user authentication data recording medium, if at least one item of
false data is included in the input data, it is determined that a
theft-causing unauthorized access is attempted and then the user
authentication is invalidated with a theft alarm generated.
15. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein the number of items of
matching data to be recorded on a recording medium is selected to
include plural items of true data and plural items of false data to
provide a user authentication data recording medium which has the
matching data interspersed with the plural items of true data and
the plural items of false data, wherein in recording secret
information with cryptographic keys on said user authentication
data recording medium, several ones of the numerous items of
matching data are determined to be the true data by specifying the
locations or features and order, the remaining items of matching
data are determined to be the false data, and information indicated
by the plural items of true data is determined to be authentication
data indicating the secret information with the cryptographic keys
on the user authentication data recording medium, wherein during
the input operation by means of the user authentication data
recording medium, the plural items of true data are selected from
the user authentication data recording medium in a correct order,
thereby determining that the true authentication data is selected
and validating the user authentication, wherein in selecting the
plural items of true data from the user authentication data
recording medium during the input operation by means of the user
authentication data recording medium, if the number of items of
false data included in the input data is equal to or more than a
predetermined number, it is determined that a theft-causing
unauthorized access is attempted and then the user authentication
is invalidated with a theft alarm generated, and wherein a control
center which detects the generated theft alarm prevents subsequent
use of said user authentication data recording medium.
16. A system for reporting emergency such as theft or conferment
when secret information is accessed, wherein the number of items of
matching data to be recorded on a recording medium is selected to
include a single or plural items of true data and plural items of
false data to provide a user authentication data recording medium
which has the matching data interspersed with the single or plural
items of true data and the plural items of false data, wherein in
recording secret information with cryptographic keys on said user
authentication data recording medium, one or several ones of the
numerous items of matching data are determined to be the true data
with a reading order determined, the remaining items of matching
data are determined to be the false data, information indicated by
the single item of true data or the plural items of true data in
the correct reading order is determined to be authentication data
indicating the secret information with the cryptographic keys on
the user authentication data recording medium, and some of the
false data is determined to be confinement informing data, wherein
during the input operation by means of the user authentication data
recording medium, the single or plural items of true data from the
matching data on the user authentication data recording medium and
the reading order are selected and said confinement informing data
is added, thereby determining that the true authentication data is
selected and validating the user authentication, and wherein if at
least one item of confinement informing data is included in
addition to the true data, it is determined that the user is placed
under the control of an unauthorized person and a control center
validates the user authentication with a confinement informing
alarm generated.
Description
TECHNICAL FIELD
[0001] The present invention relates to security of secret
information including cryptographic keys. In addition, the present
invention relates to a protection system (for example, emergency
conditions informing system) for use of secret information
including cryptographic keys (for example, use of user
authentication passwords).
[0002] More particularly, the present invention relates to security
of secret information including cryptographic keys (such as
personal identification information for user authentication,
information indicating a particular authorized user to enter an
information control room or to identify an operator, individual
identification information for a customer, sensitive personal
information (assets, value of securities, and storage data such as
storage space), sensitive corporate information [sales activity
materials (such as customer data and merchandise data) and research
activity materials (such as mathematical expressions, chemical
formulas, and other numeric data in research result lists and
details in research reports)].
[0003] For example, it relates to cryptographic keys used for user
authentication in electronic commerce as well as those used to
protect secret information stored in a personal computer or mobile
telephone against loss and theft and those used as entrant-limited
control or operator-limited control cryptographic keys to inhibit
an unauthorized person's access to a storage medium of a
server.
[0004] In addition, the present invention is not limited to online
applications such as user authentication in electronic commerce but
is finding offline applications such as recording on a recording
medium, transporting printout or image outputs through facsimile or
by mail, and transporting and storing in movable or storable form
such as printed matter or floppy disks as well as other wide
applications such as storing on a recording medium of a
computer.
BACKGROUND ART
[0005] To protect these kinds of secret information, passwords of
plural digits and/or characters and/or IC cards have been commonly
used. In addition to or in place of such prior passwords, there
exists user authentication means for authenticating a user by means
of fingerprints or other physical features. Such an IC card maybe
used by someone other than the owner or authorized user of the IC
card if it is lost or thieved.
[0006] In addition, as a prior safety measure against loss and
theft of an authentication card which has secret information with
cryptographic keys recorded thereon, an authentication request from
an unauthorized person may be denied to reject an online connection
made by that person, resulting in a transaction failure. However,
there is no system to actively invalidate an electronic key
(authentication card) used for an unauthorized access or inform
that there occurs an unauthorized access to a restricted area or
electronic device.
[0007] Therefore, if an authentication card which has secret
information with cryptographic keys recorded thereon is lost,
replicated, and/or thieved, there is no safety measure to be taken
when the card is used fraudulently by an unauthorized person in bad
faith, when a deceitful user authentication request is made by an
unauthorized person in bad faith, or when an authorized user placed
under the control of an unauthorized person in bad faith makes a
user authentication request (authentication data entry).
[0008] It is an object of first and second embodiments of the
present invention to provide means of concealing and storing secret
information as well as a method of protecting secret information,
wherein these means and method have functions as user
authentication means but do not need fingerprint recognition or
other physical feature user authentication means. It is also an
object of these embodiments to provide means of concealing,
recording, and storing secret information such as corporate
information and technical information.
[0009] It is an object of a third present invention to detect
access from an authorized user placed under the control of an
unauthorized person in bad faith to allow for protection and
preservation of both the user and the system.
[0010] It is an object of fourth through ninth invention to
establish an alarm system and a system for informing that there
occurs an unauthorized access to a restricted area or electronic
device as a safety measure to be taken when secret information with
cryptographic keys, a recording medium including such secret
information, or an electronic and/or communication device having
such a recording medium is thieved or lost, or fraudulently used by
means of an invalid authentication card or leaked authentication
data.
DISCLOSURE OF INVENTION
[0011] The first invention (claims 1 through 4) provides a Secret
Information Record Medium for secret information, wherein a single
or plural items of true data are interspersed among numerous items
of false data and the false and true data are composed of
two-dimensional code data in plural groups having different areas,
and wherein the location(s) and/or storing order of the item(s) of
true data interspersed among the numerous items of false data are
determined and presented to a user.
[0012] The second invention (claims 5 through 7) provide a Secret
Information Protective storing Method, wherein a single or plural
items of true data encrypted by applying two-dimensional codes to
secret information are interspersed among numerous items of false
data, and wherein the location(s) and/or storing order of the
item(s) of true data with respect to the numerous items of false
data are held in a user's memory for memory authentication (brain
authentication) to prevent any unauthorized person from decrypting
the secret information.
[0013] The third invention (claim 8) provides a Secret Information
Protective storing Method wherein items of true data indicating
decryption keys for encrypted secret information are interspersed
among numerous items of false data for concealment and the
locations and reading order of the items of true data interspersed
among the numerous items of false data are held in a user's
memory.
[0014] The fourth invention (claim 9) provides a Secret Information
Protective storing method of concealing, recording, and storing
secret information interspersed with true information and false
information, wherein the true information is divided into plural
items and interspersed among numerous items of the false
information to conceal the true information, wherein numerous items
of true data indicating the locations of the items of true
information and numerous items of false data indicating the
locations of the items of false information are provided, and
wherein the locations and storing order of the items of true data
interspersed among the numerous items of false data are determined
from a user's memory.
[0015] The invention of claim 10 is achieved, in the invention of
claim 9 by referring to a graphic sheet which includes coloring,
illustrations, graphics, and landscapes, when the locations and
order of the items of true data interspersed among the numerous
items of false data are determined from a user's memory.
[0016] The fifth invention (claim 11) provides a System for
Reporting Emergency such as Theft or conferment when Secret
Information is accessed, wherein during the input of a password
upon user authentication in an internet transaction, a user adds an
alarm signal that is set in advance for informing that he or she is
placed under the control of an unauthorized person, and the system
detects that the user is under an abnormal condition by detecting
the alarm signal, whereupon the system performs a
protection/preservation measure.
[0017] The sixth invention (claim 12) provides a System for
Reporting Emergency such as Theft or conferment hen Secret
Information is accessed, wherein during the input of a password
upon user authentication in an internet transaction, a user adds an
alarm signal that is set in advance for informing that he or she is
placed under the control of an unauthorized person, and the system
detects that the user is under an abnormal condition by detecting
the alarm signal, whereupon the system performs a normal user
authentication procedure as well as performs a
protection/preservation measure.
[0018] The seventh invention (claim 13) provides a system for
informing theft, confinement, and other emergency conditions
occurring during operations on secret information, wherein during
the input of a password upon user authentication in an internet
transaction, a user deletes an alarm signal that is set in advance
in a password for informing that he or she is placed under the
control of an unauthorized person, and the system detects that the
user is under an abnormal condition by detecting the alarm signal,
whereupon the system performs a protection/preservation
[0019] The eighth invention (claim 14) provides a and System for
Reporting Emergency such as Theft or conferment when Secret
Information is accessed, wherein the number of items of matching
data to be recorded on a recording medium is selected to include a
single item of true data and plural items of false data to provide
a user authentication data recording medium which has the matching
data interspersed with the single item of true data and the plural
items of false data, wherein in recording secret information with
cryptographic keys on the user authentication data recording
medium, one of the numerous items of matching data is determined to
be the true data and the remaining items of matching data are
determined to be the false data, wherein information indicated by
the single item of true data is determined to be authentication
data indicating the secret information with the cryptographic keys
on the user authentication data recording medium, wherein in using
the user authentication data recording medium to enter the
authentication data, the single item of true data is selected from
the user authentication data recording medium, thereby determining
that the true authentication data is selected and validating the
user authentication, and wherein in selecting the single item of
true data from the user authentication data recording medium during
the input operation by means of the user authentication data
recording medium, if at least one item of false data is included in
the input data, it is determined that a theft-causing unauthorized
access is attempted and then the user authentication is invalidated
with a theft alarm generated.
[0020] The ninth invention (claim 15) is achieved, in the invention
of claim 8, by including plural items of true data in the user
authentication data recording medium. More specifically, several
ones of the numerous items of matching data are determined to be
the true data by specifying the locations and order of them, the
remaining items of matching data are determined to be the false
data, and information indicated by the plural items of true data is
determined to be authentication data on the user authentication
data recording medium. Thus, the plural items of true data are
selected from the user authentication data recording medium in a
correct order during the input operation by means of the user
authentication data recording medium, thereby determining that the
true matching data is selected and validating the user
authentication.
[0021] The tenth invention (claim 16) is achieved, in the claim 8
and claim 9, by determining some of the false data as confinement
informing data and adding it to the true data to include at least
one item of confinement informing data, thereby determining that
the user is placed under the control of an unauthorized person and
validating the user authentication with a confinement informing
alarm generated.
[0022] More specifically, in recording secret information with
cryptographic keys on the user authentication data recording
medium, one or several ones of the numerous items of matching data
are determined to be the true data with a reading order determined,
the remaining items of matching data are determined to be the false
data, information indicated by the single or plural items of true
data in the correct reading order is determined to be
authentication data indicating the secret information with the
cryptographic keys on the user authentication data recording
medium, and some of the false data is determined to be confinement
informing data. During the input operation by means of the user
authentication data recording medium, the single or plural items of
true data from the matching data and the reading order are selected
and the confinement informing data is added, thereby determining
that the true authentication data is selected and validating the
user authentication. Then, if at least one item of confinement
informing data is included in addition to the true data, it is
determined that the user is placed under the control of an
unauthorized person and a control center validates the user
authentication with a confinement informing alarm generated.
BRIEF DESCRIPTION OF DRAWINGS
[0023] FIG. 1 is an explanatory drawing for showing a first
embodiment of a recording and storage card which includes secret
information composed of two-dimensional code data.
[0024] FIG. 2 is an explanatory drawing for showing a second
embodiment of the card.
[0025] FIG. 3 is an explanatory drawing for showing a third
embodiment of the card.
[0026] FIG. 4 is an explanatory drawing for showing a fourth
embodiment of the card.
[0027] FIG. 5 is an explanatory drawing of two-dimensional codes,
which are composed of small squares in FIG. 5a, large squares in
FIG. 5b, and rectangles in FIG. 5c, respectively.
[0028] FIG. 6 is an explanatory drawing for showing a fifth
embodiment of the recording and storage card which includes secret
information composed of two-dimensional code data.
[0029] FIG. 7 is a schematic drawing for showing recording and
reading operations on a card 1.
[0030] FIG. 8 is a block diagram for showing the same operations as
shown in FIG. 7.
[0031] FIG. 9 is an explanatory drawing of encrypted
information.
[0032] FIG. 10 is an explanatory drawing of address cards.
[0033] FIG. 11 is an explanatory drawing of address cards including
illustrations.
[0034] FIG. 12 is a flowchart of the fifth invention.
[0035] FIG. 13 is a flowchart of the sixth invention.
[0036] FIG. 14 is a flowchart of the seventh invention.
[0037] FIG. 15 is an explanatory drawing of a user authentication
data recording card.
[0038] FIG. 16 is an explanatory drawing of a user authentication
data recording card for an embodiment which uses matching data of
different shapes.
[0039] FIG. 17 is an explanatory drawing of user authentication
data recording cards for showing an embodiment in which
two-dimensionally coded data is recorded.
[0040] FIG. 18 is an explanatory drawing of user authentication
data recording cards for showing an embodiment in which marks and
symbols are used as matching data.
[0041] FIG. 19 is an explanatory drawing of reading means for
matching data in the second embodiment and also shows the functions
of a control computer.
[0042] FIG. 20 is an explanatory drawing for showing the system
operation of an emergency conditions informing system according to
the eighth through tenth embodiments.
[0043] FIG. 21 is a flowchart for showing the same system operation
as shown in FIG. 21.
[0044] FIG. 22 is an explanatory drawing for showing the embodiment
of the tenth invention in a similar manner to FIG. 19.
[0045] FIG. 23 is a flowchart for showing the seventh embodiment of
the tenth invention.
BEST MODE FOR CARRYING OUT THE INVENTION
[0046] According to the invention of claims 1 and 2, a user who
holds a recording and storage card including secret information of
two-dimensional code data composed of a single or plural items of
true data interspersed among numerous items of false data,
determines and selects the location(s) and the reading order of the
item(s) of true data among the numerous items of false data from
the user's own memory, so that the secret information of
two-dimensional data is reproduced and provided to a computer
directly or through a communication line.
[0047] In the invention of claim 3, the user refers to
illustrations or graphics composed of the numerous items of false
data and true data as auxiliary means, in determining and selecting
the locations and the reading order of the items of true data among
the numerous items of false data from the user's own memory.
[0048] In the invention of claim 4, the user also refers to
illustrations or graphics which exist in the background to the
numerous items of false data and true data, in determining and
selecting the locations and the reading order of the items of true
data among the numerous items of false data from the user's own
memory.
[0049] According to the invention of claims 5 through 7, the
location(s) and the storing order of the single or plural items of
true data with respect to the numerous items of false data are
determined from the user memory authentication (brain
authentication) to select the single or plural items of true data
interspersed among the numerous items of false data, so that the
secret information with cryptographic keys is decrypted for
reproduction.
[0050] According to the embodiment of claim 8, the user determines
and selects the locations and the reading order of the items of
true data which indicate decryption keys, from among the numerous
items of false data from the user's own memory in decrypting the
encrypted secret information.
[0051] According to the embodiment of claim 9, the locations and
the order of the items of true data for true information
interspersed among the numerous items of false data are determined
from the user's memory, and according to the embodiment of claim 8,
the determination from the user's memory is accomplished by using,
as auxiliary means, a graphic sheet which includes coloring,
illustrations, graphics, and landscapes.
[0052] Now, the present invention will be described below in detail
with reference to the drawings.
[0053] Referring to FIGS. 1 through 3, the reference numeral 1
designates a recording and storage card including secret
information, on which a single or plural items of true data A are
interspersed among numerous items of false data B and the false
data B and the true data A are encrypted by applying
two-dimensional codes thereto.
[0054] The single or plural items of true data A and the numerous
items of false data B are arranged in groups of different sizes.
Therefore, all the items of false data B and true data A cannot be
identified visually. Recorded data items of two-dimensional codes
may be different from each other or some of the recorded data items
may be in a group of numerous identical data items.
[0055] Moreover, the items of false data B and true data A may be
in identical shape (for example, a square) or in different shapes
such as a square, a rectangle, and a circle and such different
shapes may allow the user to hold the locations of the items of
true data A in the user's memory more easily. For this purpose, it
is assumed that any difference in size or shape is irrelevant to
whether the data is true or false and thus, the data cannot be
authenticated based on any difference in size or shape.
[0056] FIG. 1 shows that a single item of true data A and numerous
other items of data are in identical shape (for example, a square)
but of two different sizes, that is, larger squares and smaller
squares.
[0057] Referring to FIG. 1, it is assumed that a collection of
first unit records 10 and second unit records 12 represents an
apartment house, the second unit records 12 represent collectively
a staircase and/or elevator, and the first unit records 10
represent dwellings in the apartment house.
[0058] To locate cryptographic keys, it is also assumed that the
second dwelling on the right side of the staircase on the second
floor is the item of true data A and all the others are items of
false data B.
[0059] FIG. 2 shows that plural items of true data A and other
items of data are represented by squares and rectangles as three
types of unit records, that is, first unit records 10, second unit
records 12, and third unit records 13.
[0060] The first unit records 10 in smaller square shape represent
dwellings, the second unit records 12 in larger square shape
represent collectively a staircase and/or elevator in a similar
manner to FIG. 1, and the third unit records 13 in rectangular
shape represent collectively an anti-disaster floor in order to
facilitate holding in a user's memory where the items of true data
A are located.
[0061] FIG. 3 shows the embodiment and that a "robot" is
represented as an illustration or graphic formed of numerous items
of false data and true data.
[0062] To determine and select the locations of the items of true
data interspersed among the numerous items of false data from a
user's memory, it is assumed that a rectangle "above the robot's
left eye" represents a first item of true data A1, a larger square
"in the middle of the robot's belly" represents a second item of
true data A2, and a smaller square at the toe of "the robot's left
leg" represents a third item of true data A3.
[0063] Such auxiliary means as the robot's "eye", "belly", and
"leg" can be used to facilitate determination of the locations of
the items of true data and the order of selecting them from the
numerous items of false data.
[0064] FIG. 4 shows the embodiment that a landscape is represented
as a background to the numerous items of false data and true
data.
[0065] In the figure, the landscape is placed over the graphics
formed of a collection of the numerous items of false data and the
items of true data interspersed among them. It should be noted that
a landscape sheet with the landscape printed on a transparent sheet
can be placed over a data sheet with the collection of the numerous
items of false data and true data displayed thereon to overlay or
superimpose the landscape.
[0066] To determine and select the items of true data interspersed
among the numerous items of false data from a user's memory, it is
assumed that a rectangle in the leftmost one of "three pine trees
on a mountain" represents a first item of true data A01, a larger
square in the cargo on an "on-river ship" represents a second item
of true data A02, and a smaller rectangle nearest to a bridge among
"three stones near the bridge" represents a third item of true data
A03.
[0067] Such auxiliary means as the "trees on a mountain", "on-river
ship", and "stones near the bridge" can facilitate determination of
the locations of the items of true data and the order of selecting
them from the numerous items of false data.
[0068] Next, data obtained by applying two-dimensional codes will
be described below with reference to FIG. 5.
[0069] The two-dimensional codes include grid-arranged (matrixed)
squares or rectangles, concentrically-arranged circles, and
multilevel bar codes and it has the advantages that, as compared
with one-dimensional bar codes of data units, the amount of
information can be increased in a series manner because of its
two-dimensional arrangement, that numerous different items of data
can be visually approximated by making a change to a data unit to
vary the data to be displayed, and that numerous items of data with
different sizes and shapes can be also considered as identical
items of data. The first embodiment of the present invention makes
use of these advantages.
[0070] In FIG. 5, the two-dimensional codes are composed of
grid-arranged (matrixed) squares or rectangles, that is, smaller
squares in FIG. 5a, larger squares in FIG. 5b, and rectangles in
FIG. 5c, and the respective recorded items of two-dimensional data
indicate an identical numerical value or mark throughout the three
figures. In addition, the reference numeral 14 designates a border
of data range and 15 designates two-dimensional code data.
[0071] In the above-described embodiment, coloring can facilitate
determination of the locations of the items of true data and the
order of selecting them from the numerous items of false data in
recording the data on a recording medium or in printed form.
[0072] Next, the second embodiment will be described below.
[0073] According to the embodiment of claim 3, some items of true
data encrypted by applying two-dimensional codes to secret
information with cryptographic keys are interspersed among numerous
items of false data, and the locations of the item of true data
with respect to the numerous items of false data are held in a
user's memory for memory authentication (brain authentication) to
prevent any unauthorized person from decrypting the secret
information.
[0074] The second through fourth embodiments (claims 3 through 7)
can be implemented by using a recording and storage card for secret
information with cryptographic keys encrypted by two-dimensional
data according to the first embodiment and another recording and
storage card for secret information with cryptographic keys
encrypted by two-dimensional data as shown in FIG. 6 can be also
used.
[0075] In a card shown in FIG. 6, two-dimensional data for each
item of data is in identical shape, that is, a square of the same
size. A sequence of alphanumeric characters are added for assisting
in holding the locations and reading order of the items of true
data in a user's memory. It should be noted that alphanumeric
characters (for example, B2, B1, F1, F2, F3, . . . ) may be added
to the cards shown in FIGS. 1 and 2 as memory assistance for the
locations and reading order of the items of true data.
[0076] Referring to FIGS. 7 and 8, recording and reading operations
on a card 1 will be described below.
[0077] It is assumed that among twenty codes printed on the card 1,
sixteen codes are dummies. A password is divided into four parts,
which are placed in the upper second location, the lower fifth
location, the lower sixth location, and the upper ninth location
from the left end (see FIG. 6). It is assumed that these four parts
are read out in the order of "E-9-2-F".
[0078] An authorized user who knows this order uses a handheld or
pen-type scanner 2 to sequentially read out the lower fifth
location #1, the upper ninth location #2, the upper second location
#3, and the lower sixth location #4 as shown in FIG. 7 while
ignoring the other code locations. An accessed system receives a
restored password of hundreds through thousands of digits and/or
characters to identify the authorized user.
[0079] Referring to FIGS. 7 and 8, the reference numeral 3
designates a terminal unit, 4 designates a keyboard, 5 designates a
communication network such as Internet, 6 designates a central
control computer, and 7 designates data.
[0080] Next, the third embodiment (claim 6) and the fourth
embodiment (claim 7) will be described below.
[0081] Encrypted information 20 in FIG. 9 is divided into three
items of true information P1, P2, P3, which are interspersed among
items of false information Q1, Q2, . . . to conceal the true
information. Thus, the false information Q and the true information
P cannot be discriminated from their appearances.
[0082] The items of true information P1, P2, P3 are assigned 5, A,
and (a katakana character) as items of address information p (true
data) and the other items of false information Q1, Q2, .cndot.
.cndot. .cndot. .cndot. are assigned numbers other than 5,
alphabetic characters other than A, and katakana characters other
than as items of address information q (false data).
[0083] Referring to FIG. 10, both the items of true data P and the
items of false data Q are placed on address cards 21A, 21B, and
21C.
[0084] Then the user selects the items of true data 5, A, and from
among the items of false data through memory authentication (brain
authentication).
[0085] To facilitate secure selection of the reading order, these
items of data can be colored in red, yellow, and blue.
[0086] If two-dimensional codes are applied, the embodiments as
shown in FIGS. 1 through 4 and FIG. 6 can be used. In addition, as
shown in FIG. 11, marks and symbols other than alphanumeric
characters can be also used.
[0087] It should be noted that the third and fourth embodiments
(claims 8 through 10) are not limited to optical/printed
two-dimensional codes but they are applicable to
non-optical/non-printed indexed data blocks and optical/non-optical
symbols. The algorithm used for these embodiments is also
applicable not only to some items of data printed as
two-dimensional codes but to those printed as symbols or to data
blocks or symbols which are not printed but indexed and recorded on
a storage medium.
[0088] The above-described first through fourth embodiments (claims
1 through 10) can facilitate input operations of authentication
data used for user authentication as well as selection of true
authentication data from numerous items of false data, thereby
holding it in one's memory more easily. In addition, since the
number of items of false data is equal to that of alphanumeric
characters, these embodiments can prevent any unauthorized person
from decrypting authentication symbols for greater safety. A
recording medium storing corporate information and/or personal
information can be concealed more securely. Moreover, cryptographic
keys for user authentication and secret information such as
corporate information and/or personal information can be treated in
a more secret manner for online applications and offline
applications as well as in recording and storing on a recording
medium in a computer itself.
[0089] Since the number of items of data is equal to the number of
alphanumeric character strings of plural digits, these embodiments
can prevent any unauthorized person from decrypting authentication
symbols for greater safety. A recording medium storing corporate
information and/or personal information can be concealed more
securely.
[0090] Subsequently, the third through seventh embodiments (claims
11 through 13) will be described below.
[0091] Referring to a flowchart shown in FIG. 12, ["123947=] is set
as a password for user authentication in an internet transaction
(or in other cases including the operation of a cash dispenser,
user authentication upon a credit, or a key number for opening a
key of a doorway, a safe or a case for a recording medium) and an
authorized user is informed of this password in advance.
Specifically, a password obtained by adding ["] and to the original
password [123947], i.e., a password obtained by adding ["] to the
first place of the original password [123947] and [=] to the last
place thereof, is set as an alarm signal.
[0092] The alarm signal may be set irrelevant to the password. For
example, the one having ["] at the first place, [=] at the last
place and numerical strings between ["] and [=] may be set as the
alarm signal (i.e., [123947] in the above-mentioned ["123947=] is
changed to numerical strings irrelevant to the password). Further,
the position of ["] and the numerical strings between ["] and [=]
are composed of optional numerals in optional digit numbers. When
randomly selected symbols are assigned to each user as additional
signals, this alarm signal cannot be known other than the
authorized user. Accordingly, an unauthorized person in bad faith
cannot detect the sending of this alarm signal.
[0093] During the input operation of a password for the
above-mentioned user authentication, the user informs that he or
she is placed under the control of an unauthorized person by adding
the above-mentioned alarm signal set in advance.
[0094] A system detects that the user is under an abnormal
condition by detecting the alarm signal, and it is to perform a
protection/preservation measure. In the invention of claim 2 with
reference to FIG. 13, the user authentication is completed ignoring
the existence of the alarm signal.
[0095] As the protection/preservation measure, the system leads the
access to a false web page that is prepared beforehand for
transmitting information that is similar to but not the same as the
true information and does not give great damage to its
organization, facility or corporation even if it is leaked.
[0096] Even in the case where there is no such preparation and the
outflow of true information (for example, remittance instruction or
the like) is missed for a safety of user's life and body, the
system can promptly set about a user rescue, detection of an
invader or complementary activity if it grasps the abnormal
condition on real time.
[0097] In this case, the system never asks the user the question of
"Is there anything abnormal?". The system persistently proceeds the
processing, or false processing. Or a danger occurs that the user
is immediately exposed to a revenge of the unauthorized person
because the user does not follow the instruction.
[0098] When a method is applied wherein numerous passwords are
divided into plural parts and the one in which false items are
interspersed is recorded and printed to any medium so that only the
authorized user memorizes the position and restoration order of the
true data, this alarm signal can be concealed, thereby enhancing
practicability. Specifically, it is enough to together select this
data block upon emergency, so that the process can easily be
performed even under the tense condition. Similarly, another method
can be applied wherein an alarm signal is added or inserted upon
sending so-called authentication information other than a password
such as decrypted open keys or cryptographic keys.
[0099] Further, this software algorithm can be applied not only to
the password but also to the other authentication method. In the
case of fingerprint authentication, the fingerprint on the third
finger of the right hand is, for example, determined as a signal
that completes the authentication but alarms the occurrence of the
abnormal condition. In the case of signature recognition, a second
signature maybe registered for this purpose. In case where symbols
are used for authentication without using characters or numerals,
one or plural symbols may be assigned to each user for this
purpose.
[0100] In the seventh embodiment (claim 13), referring to a
flowchart shown in FIG. 14, a user inputs a password by adding an
alarm signal set in advance in user authentication in an internet
transaction. For example, the user adds [#] to [A1234], i.e.,
inputs [A1234#]. The user deletes [#] at the end and inputs [A1234]
for informing that he or she is placed under the control of
unauthorized person. The preservation measure after this is the
same as that shown in the fifth embodiment (claim 11) and the sixth
embodiment (claim 12).
[0101] The fifth through seventh embodiments detects an access from
a user placed under the control of an unauthorized person in bad
faith in user authentication in an internet transaction, thereby
being capable of protecting and preserving both the user and the
system. Providing the alarm signal continued from the original
password assuredly specify a sender of the alarm signal and further
reduces "prank sending" or "miss-sending" of the alarm signal.
Moreover, specifying an alarm signal every user can reduce "prank
sending" or "miss-sending" of the alarm signal.
[0102] Now, the eighth through tenth embodiments (claims 14 through
16) will be described below.
[0103] FIG. 15 shows a user authentication data recording card A1
as a user authentication data recording medium used with the
present invention and numerous items of matching data a such as
kanji character strings, alphanumeric character strings, image
and/or audio data are two-dimensionally coded and recorded on the
data recording card through recording means which is capable of
optically and/or magnetically reading data.
[0104] FIG. 16 shows matching data in different shapes a1, a2,
a3.
[0105] FIG. 17 shows matching data printed by a computer-controlled
printer or magnetically recorded and the two-dimensional coding as
shown in the figure can allow for recording identical data
irrespective of data shapes. In addition, the two-dimensional
coding can make it difficult to discriminate visibly recorded data
items because they are printed in substantially identical
appearances.
[0106] It should be noted that the present invention is not limited
to the two-dimensional codes as described above and one-dimensional
codes, symbols including illustrations and caricatures,
alphanumeric character strings, kanji character strings, words and
phrases can be used as matching data. Therefore, matching data may
include character strings and image and/or audio data which can be
manipulated by a computer for matching operations.
[0107] A recording medium of the user authentication data recording
card A1 may be a portion of an optically readable printing card or
a magnetically recording area formed on a portion of a card such as
a credit card. Alternatively, the data recording card may be an
electrically recording medium such as an IC card.
[0108] FIG. 18 shows an embodiment of the user authentication data
recording medium (user authentication data recording card A) which
includes marks and symbols as matching data a4, a5, a6.
[0109] Before issuing the above-described user authentication data
recording medium 1 to each user, a single or plural items of true
data P are determined from numerous items of matching data a and
all the remaining items of matching data are determined to be
plural items of false data Q, and then the matching data consisting
of the single or plural items of true data and the plural items of
false data are recorded on the user authentication data recording
medium. It should be noted that when plural items of true data P
are used, the order of reading the items of true data P is also
determined. For example, as shown in FIG. 12, the items of true
data are determined to be P1=E, P2=9, P3=2, and P4=F to complete
the user authentication data recording medium 1 (user
authentication data recording card A1) as a matching card.
[0110] The location of an item of true data or the locations and
the reading order of plural items of true data in the user
authentication data recording medium 1 (user authentication data
recording card A1) are determined and recorded in a recording unit
of a CPU or central control computer 6 to allow the computer to
perform a matching operation for authentication data recorded on
the user authentication data recording medium 1 (user
authentication data recording card A1) presented by a holder
thereof.
[0111] Next, a process of entering authentication data on a user
authentication data recording medium 1 (user authentication data
recording card A1) will be described below.
[0112] Referring to FIG. 19, the authentication data on the user
authentication data recording medium 1 (user authentication data
recording card A1) as shown in FIG. 15 is entered into a terminal
unit 3 through a pen-type scanner 2 and then transmitted directly
or through a communication line (Internet) to a CPU connected to
the terminal unit.
[0113] For each authorized user, four predetermined items of data
among the twenty items of matching data are entered in a particular
order. More specifically, the lower fifth item #1, the upper ninth
item #2, the upper second item #3, and the lower sixth item #4 are
read out in this order. These items of data are alphanumeric
characters "E-9-2-F" as shown in FIG. 15. The handheld scanner 2
reads all the items of data on the user authentication data
recording medium 1 and then items of authentication data selected
through selective input means such as a keyboard 4 are transmitted
to the CPU or central control computer 6 via the terminal unit
3.
[0114] In addition to the recording unit described above, the CPU
or central control computer 6 includes a true data discriminator, a
false data discriminator, a confinement informing data
discriminator, a true data counter, a false data counter, a user
authentication signal generator, a theft alarm (unauthorized access
alarm) generator, and a confinement informing message
generator.
[0115] The operation performed by the CPU or control computer 6 to
transmit the authentication data as described above will be
described below with reference to an operational flow explanatory
drawing of FIG. 20 and a flowchart of FIG. 8.
[0116] When four particular items of data are entered in a
particular order (for example, the user authentication data
recording medium 1 in FIG. 15 is used to enter the four items of
true data P1=E, P2=9, P3=2, and P4=F in the order of "E-9-2-F"),
the process goes on as shown by the left-hand flow in FIG. 21.
Namely, steps S1, S2, S3, and S4 are performed in this order to
complete a user authentication operation successfully.
[0117] If any item of true data is entered in an incorrect order
(any item of false data is entered or any item of data which does
not exist in the user authentication data (noise data) is entered),
this is considered as an authentication error to cause a branch at
any of the steps S1, S2, S3, and S4, resulting in a user
authentication failure. Then, if the error count exceeds a
predetermined value, for example, three at step S5, the
authentication access is terminated. If the error count is less
than the predetermined value, for example, it is two or less,
another authentication access may be permitted.
[0118] If items of false data are entered, the process goes on as
shown by the central flow in the figure and steps S6, S7, S8, and
S9 are performed in this order to store the items of false data in
the recording means of the CPU or computer 6, counting the entered
items of false data.
[0119] If the false data count is two or more, a branch is caused
at any of steps S10, S11, and S12 to detect an "unauthorized
access".
[0120] If the false data count is one during four input operations,
this is considered as a "misoperation" to allow for entering
matching data again.
[0121] As an alternative to the method of interspersing
predetermined items of true data among items of false data as
described above, a user authentication recording medium with
numerous items of matching data a, irrespective of whether these
items are true or false (that is, without predetermined items of
true and false data) may be given to a user to allow the user to
select some items of true data from among them with the remaining
items to be assumed as those of false data. Namely, the user may be
given a temporary right to select items of true and false data and
also items of confinement informing data.
[0122] If a particular one among numerous items of false data is
determined as an item of "alarm data" and such an item of alarm
data is entered after the steps S1, S2, S3, and S4 have been
performed in this order to complete the user authentication
operation successfully (namely, after the four items of true data
have been entered), a user authentication and confinement informing
message is generated and transmitted upon detection of any item of
"confinement informing data" at step S13.
[0123] In an embodiment shown in FIGS. 22 and 23, all items of data
recorded in a user authentication data recording medium 1 (user
authentication data recording card A1) can be read by a card reader
and then items of authentication data selected by selective input
means such as a keyboard can be transmitted to a CPU or central
control computer 6 via a terminal unit 3. Alternatively, as
described below, a computer included in an electronic device
terminal unit may be used to electronically record the content of a
user authentication data recording medium (user authentication data
recording card A) as well as to record it in a control center
(authentication data registration computer) online or offline, so
that matching data strings entered as authentication data based on
the user-transmitted record can be entered in a control center
(authentication computer) online or offline for matching the
authentication data. It should be noted that alphanumeric
characters, binary comparison, image comparison, and other data
comparison techniques may be used for matching.
[0124] Referring to FIG. 25, a CPU or central control computer 6A
in a control center (authentication data registration computer) has
an input data storage in addition to the functional means as shown
in FIG. 5 for the first embodiment [the true data discriminator,
the false data discriminator, the confinement informing data
discriminator, the true data counter, the false data counter, the
user authentication signal generator, the theft alarm (unauthorized
access alarm) generator, and the confinement informing message
generator].
[0125] The operation performed by the CPU or control computer 6A to
transmit the authentication data as described above will be
described below with reference to a flowchart of FIG. 10. When four
particular data are entered in a particular order (for example, the
user authentication data recording medium 1 in FIG. 12 is used to
enter the four items of true data P1=E, P2=9, P3=2, and P4=F in the
order of "E-9-2-F") and authentication data in a recording unit
matches the authentication data in the input data storage, it is
determined that true authentication data is entered to complete a
user authentication operation successfully. If the authentication
data in the recording unit does not match the authentication data
in the input data storage (any item of true data is entered in an
incorrect order or any item of false data is entered or any item of
data which does not exist in the user authentication data (noise
data) is entered), this is considered as an authentication error,
resulting in a user authentication failure.
[0126] Then, if the false data count is less than a predetermined
value, for example, it is one or less, another authentication
access may be permitted.
[0127] If the false data count is equal to or more than the
predetermined value, for example, it is two or more, this is
considered as an "unauthorized access" to generate a theft
alarm.
[0128] If a particular one among numerous items of false data is
determined as an item of "alarm data" and such an item of alarm
data is entered after the user authentication operation has been
completed successfully (namely, after the four items of true data
have been entered), a user authentication and confinement informing
message is generated and transmitted upon detection of any item of
"confinement informing data".
[0129] If the content of a user authentication data recording
medium is recorded in a recording unit of a computer built in a
mobile telephone or portable terminal unit, recording means in a
portable electronic device can be used to allow the control center
to issue a user authentication data recording medium by recording
similar information to that in a user authentication data recording
card, that is, numerous items of matching data a, in the recording
means of the portable electronic device, determining items of true
data P from the items of matching data a, and determining and
recording authentication data for a holder of the portable
electronic device in the recording means of the portable electronic
device and a computer in the control center.
[0130] During a user authentication operation, the numerous items
of matching data a are provided on a display of the portable
electronic device to allow the user to specify the locations of the
items of true data P from the user's memory for transmitting them
to the control center (authentication data registration computer).
If any item of false data Q is transmitted, it will be informed or
alarmed that the portable electronic device (such as a mobile
telephone or an entrant authentication device) may be lost or
thieved. If any item of "confinement informing data" is detected, a
user authentication and confinement informing message will be
generated and transmitted.
[0131] To specify the locations of the items of true data P, a
keyboard (including a ten key pad or a dial), a touch screen, or
other computer input means may be used. For an application wherein
a user authentication operation must be performed offline without
any communication to the control center, a single device may
include all functions to be performed by the computer in the
authentication data registration center as well as the
authentication computer shown in FIG. 19. For example, an entrant
controller can unlock a door to permit someone to enter the room
only through user authentication without any communication to an
external computer. However, such a controller can be set to
generate and transmit a theft alarm or confinement informing
message through communication means for online communication to
security.
[0132] Particularly, under circumstances where a user confinement
informing message is required, a communication to security in
addition to permission to enter the room and operate an electronic
device may be effective for both user rescue and security of the
electronic device and the electronic device control room.
[0133] The eighth invention uses a single item of true data P. As
soon as an item of false data Q is detected, a loss or theft is
informed or alarmed.
[0134] The ninth invention uses plural items of true data P and
generates an alarm upon detection of plural items of false data Q,
thereby reducing erroneous alarms due to input mistakes.
[0135] In addition to the features of the eighth and tenth
invention, the invention can generate and transmit a confinement
informing message upon detection of any item of "confinement
informing data". Therefore, when the fifth or sixth embodiment is
implemented, the additional feature to generate and transmit a
confinement informing message upon detection of any item of
"confinement informing data" as shown in FIG. 23 can be
omitted.
[0136] The eighth through tenth inventions (claims 14 through 16)
can use a user authentication data recording medium 1 on which
numerous similar items of matching data are recorded, and these
embodiments can also select items of true data from among the
numerous similar items of matching data from a user's memory to
securely prevent an unauthorized person from making a user
authentication request based on authentication data. If the
authentication data to be transmitted includes an item of false
data, generation of a theft alarm can enhance the feature to
prevent an unauthorized access through a lost or thieved user
authentication data recording medium.
[0137] Furthermore, as same as inventions of claims 11 through 13,
these inventions can be effective for protecting and preserving
both the user and the system against access from the user, if the
user is placed under the control of an unauthorized person in bad
faith.
INDUSTRIAL APPLICABILITY
[0138] The present invention provides means for concealing,
recording, and storing secret information such as corporate
information and technical information. The present invention also
establishes an alarm system as a safety measure to be taken when
secret information with cryptographic keys, a recording medium
including such secret information, or an electronic and/or
communication device having such a recording medium is thieved or
lost, or fraudulently used by means of leaked authentication data.
The present invention further establishes a system for informing
that there occurs an unauthorized access to a restricted area or
electronic device. In addition, the present invention can detect
access from an authorized user placed under the control of an
unauthorized person in bad faith to allow for protection and
preservation of both the user and the system. Therefore, the
present invention is very useful in industrial fields where a
secret information recording medium which has secret information
with cryptographic keys recorded thereon, such as an authentication
card, is used.
* * * * *