Abstract: A method and system for protecting user secret information such as passwords from different attacks is disclosed herein. According to the method and system of the present invention, the user password is dynamically ciphered by entering few elements of the password in ciphered form while the remaining elements as it is in non-ciphered form at each instance of login of the user in an electronic device. The user is authenticated based on dynamic deciphering of the password by deciphering the ciphered elements allowing the user to access the electronic device.
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)
Title of invention:
A METHOD AND SYSTEM FOR PROTECTING USER SECRET INFORMATION SUCH AS PASSWORD FROM ATTACKS
Applicant:
TATA Consultancy Services Limited A company Incorporated in India under The Companies Act, 1956
Having address:
Nirmal Building, 9th Floor,
Nariman Point, Mumbai 400021,
Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.
FIELD OF THE INVENTION
The present invention relates to domain of authentication and security in electronic environment and more particularly to a system and method for protecting passwords from cyber attacks and the like.
BACKGROUND OF THE INVENTION
Generally, in order to gain access to various information systems and databases, a user has to be authenticated using login credentials such as username and password. The username uniquely identifies each user, while password is considered to be secret information that needs to be entered along with the username in order to identify the user authorized for accessing these information systems and databases. Though, the technique of using login credentials is adopted worldwide today for gaining access to various computer systems, the passwords utilized are still prone to be cracked or attacked by any unauthorized user using systems and methods implementing password attacks.
The term 'crack' refers to any unauthorized access to a resource protected by computer security systems by guessing, inferring, decrypting, or otherwise unethically obtaining and using the secret information such as passwords and the like. The passwords or secret information of the login credentials of authorized users can be attacked or cracked by unauthorized users using several password attack techniques. Some of the password attacks known in the art include cookies and Trojan horse attacks, Key and Asterisk logger attacks, Brute-Force Search attacks, Dictionary attacks, and Shoulder Surfing attacks etc.
In case of Key and Asterisk logger attacks, an intruder or cracker or an unauthorized user may install the "key logger or keystroke monitor software" in a system that maintains a log file of all the keys pressed by an authorized user while entering the password for authenticating with said system. This results in enabling the unauthorized user to discover the password through the log file maintained and thus an unauthorized access to the presumingly protected system.
Similarly, in Trojan horse attacks, the password of the authorized user may be cracked or attacked by enabling the unauthorized user or intruder to gain access of the system of the authorized user from remote location that allows stealing of secret information including the login credentials such as username and password. Likewise, cookies allow the website owner the opportunity to store a little piece of information on a user's computer which they can then retrieve at a later date. Cookies are just tiny text files and a website can write them to the user's computer via the web browser. It can store important information such as the username and password of a user accessing a website and therefore can be accessible to unauthorized users in the network. Similarly, in case of Brute-force and dictionary attacks, the password of the user is determined by trying all possible combination of passwords using an exhaustive list of dictionary words.
Another technique of attacking the user-sensitive information such as password is a shoulder surfing technique. Shoulder surfing involves a direct observation techniques of unauthorized user. In most of the cases of shoulder surfing, the unauthorized user has an unrestricted access to the site if not the target system itself. Most prevalent techniques in shoulder surfing include looking over someone's shoulder, camera capturing key presses, reflectors and mirrors. Shoulder surfing is an effective way to get information be it in a user's home while he works on his personal computer or in a public place which is more prone to shoulder surfing attack. Shoulder surfing can
also be done long distance with the aid of binoculars or other vision-enhancing devices. The increase in the number of laptop and personal digital assistant (PDA) usage has greatly increased the danger of unauthorized observation of authentication procedures. The users have become more prone to password theft due to such kind of sneaking. Especially when the users are moving around it is difficult for them to keep a strict vigilance on their surroundings. They could be easily trapped by someone who is viewing the traveler's authentication information. Yet another password technique facilitating password attacks is phishing. Phishing is a way of attempting to acquire sensitive information such as usemame and password by masquerading as a trustworthy user while communicating through an electronic media.
Thus, the user secret and/or sensitive information such as passwords and the like utilized for authentication in various electronic devices are still vulnerable to various cyber attacks and the like. Therefore, in view of this, there is a long-felt need in the art for system and method that protects or secures the user sensitive information such as passwords from unauthorized access or attacks.
More particularly, there is a need for a system and method that enables real-time dynamic ciphering of the password of a user each time when the user is prompted for authentication in an electronic environment that prevents the password being attacked or cracked by any means or attacks.
OBJECTS OF THE INVENTION
The primary object of a present invention is to enable a system and method for securing secret information of a user such as passwords and the like susceptible to
attacks while said user is authenticating on an electronic device using said secret information.
Another object of the invention is to enable a system and method for dynamically generating a matrix comprising plurality of cells storing plurality of elements.
Yet another object of the invention is to enable a system and method for receiving said secret information as ciphered elements in the form of cell value of the cells storing said ciphered elements in combination with non-ciphered elements.
Yet another object of the invention is to enable a system and method for deciphering said ciphered elements by mapping the cell values of the ciphered elements with the plurality of elements stored in the matrix.
Still another object of the invention is to enable a system and method authenticating the user based on said deciphered elements and non-ciphered elements in the received secret information.
SUMMARY OF THE INVENTION:
Before the present systems and methods, enablement are described, it is to be understood that this application is not limited to the particular systems, and methodologies described, as there can be multiple possible embodiments which are not expressly illustrated in the present disclosures. It is also to be understood that the terminology used in the description is for the purpose of describing the particular versions or embodiments only, and is not intended to limit the scope of the present application.
In one embodiment, the present invention discloses a system and method for securing or protecting secret information such as passwords from attacks. In this embodiment, the system comprises a matrix module that is adapted to dynamically generate a matrix consisting of plurality of cells storing plurality of elements that is displayed to a user each time said user is prompted for authentication on any electronic device.
In accordance with this embodiment, the user enters the secret information as combination of ciphered and non-ciphered elements. In this embodiment, the user enters some of the elements of the secret information as cell-value of the cells storing the said elements from the generated matrix while the remaining elements as non-ciphered elements or actual elements of the secret information through an input module.
According to this embodiment, the present invention implements a mapping module that maps the entered cell-value of the elements of the secret information to that of the plurality of cells in the matrix in order to decipher the ciphered elements of the secret information.
Finally, in accordance with this embodiment of the present invention, a validation engine is utilized for validating the secret information of the user based on deciphered elements of the secret information in order to authenticate and thereby grant access to the user in the electronic device.
BRIEF DESCRIPTION OF DRAWINGS
The foregoing summary, as well as the following detailed description of embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, there is shown in the present
document example constructions of the invention; however, the invention is not limited to the specific methods and apparatus disclosed in the document and the drawings:
Figure 1 is an architecture system diagram (100) illustrating various system elements enabling protection of user secret information according to an exemplary embodiment of the invention.
Figures 2(A) and 2(B) illustrate a flow diagram (200) showing various steps implemented by various system elements collectively for enabling protection of user secret information according to an exemplary embodiment of the invention.
Figure 3(A), 3(B) and 3(C) illustrates dynamically generated matrix examples (302) (304) and (306) according to an exemplary embodiment of the invention.
The figures depict various embodiments of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
DETAILED DESCRIPTION OF THE INVENTION
Some embodiments of this invention, illustrating all its features, will now be discussed in detail. The words "comprising," "having," "containing," and "including," and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended
claims, the singular forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present invention, the exemplary, systems and methods are now described. The disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms.
Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. For example, although the present invention will be described in the context of a system log-in, one of ordinary skill in the art will readily recognize that the method and system can be utilized in any situation where a user is prompted to enter a password, e.g., to access a software module or sensitive data on a server. Thus, the present invention is not intended to be limited to the embodiments illustrated, but is to be accorded the widest scope consistent with the principles and features described herein.
The present invention discloses a system and method for securing or protecting user secret information such as passwords from attacks for authenticating the user on an electronic device using said secret information. The system comprises a matrix module in an authentication terminal that is adapted to dynamically generate a matrix consisting of plurality of cells storing plurality of elements, hereinafter referred to as a first set of elements that is displayed to the user each time said user is prompted for authentication on any electronic device. In one of the embodiment, the first set of elements includes alphabets, numerals, special characters and combinations thereof.
Further, the authentication terminal comprises a display module that displays the dynamically generated matrix to said user every time the user is prompted to enter
the secret information while accessing sensitive data through said authentication terminal. Thus, the user is displayed randomly arranged said first set of elements in the cells of the matrix at different instances of authentication. In an embodiment, the user based on the displayed matrix enters the secret information uniquely identifying said user as a combination of a second set of elements hereinafter referred to as ciphered elements, and a third set of elements, hereinafter referred to as non-ciphered elements. In an embodiment, said second and third set of elements is the sub-set of the first set of elements. That is, the user entered secret information as combination of ciphered and non-ciphered elements is a sub-set of the first set of elements from the dynamically generated matrix displayed to the user.
In multiple alternative embodiments, the ciphered elements are entered as a value of cells storing said ciphered elements in the generated matrix. In one embodiment, said value of each cell is a numeric value consisting of a row number concatenated with a column number of each cell storing one of the ciphered elements and is displayed to the user in the cell of the matrix. In other embodiments, the cell value is displayed to the user randomly in the cell as a combination of alphanumeric or special characters and combinations thereof. In still another embodiment, the user identifies the row and column storing each element of the second set of elements in the matrix and enters the row number concatenated with column number as ciphered elements.
In an embodiment, the third set of elements is entered in combination with the ciphered elements, wherein ciphered elements represents value of cells storing the second set of elements in the matrix. Thus, the secret information is received by the electronic device in ciphered form and needs to be deciphered in order to authenticate the user in the authentication terminal. More particularly, the ciphered elements in the secret information are to be deciphered by the authentication terminal.
In an embodiment of the invention, the authentication terminal further comprises a mapping module that maps the received cell value of the ciphered elements to that of the values of cells storing the first set of elements in the matrix. As a result of such mapping, a fourth set of elements is retrieved from the first set of elements whose cell values are mapped with the cell values of the ciphered elements. The retrieved fourth set of elements is the second set of elements in deciphered form.
In an embodiment, as a result of retrieval of fourth set of elements, a validation engine in the authentication terminal validates the user identity based on the deciphered second set of elements in combination of the third set of elements. The validation engine compares the deciphered secret information corresponding to that stored in a database, electronically coupled to the authentication terminal for that particular user in order to validate and authenticate the user. Various embodiments of the present invention will now be described with the help of appended figures 1, 2 and 3.
Referring to figure 1 is a system architecture diagram (100) illustrating multiple system elements according to an exemplary embodiment of the present invention. As illustrated in figure 1, the system (100) comprises an authentication terminal (104) that is interactively communicating with a user (102). In an exemplary embodiment, the authentication terminal (104) is an electronic device selected from a group consisting of a smartphone, a computer, a laptop, a PDA, a mobile phone and combinations thereof. In one embodiment, the authentication terminal (104) is a stand-alone electronic device. In alternative embodiments, the authentication terminal (104) is an electronic device electronically coupled to various other electronic devices in a communication network.
As illustrated in figure 1, in an exemplary embodiment, the authentication terminal (104) further is electronically coupled with a database module (118). In one embodiment, said database module resides in the authentication terminal (104). In another embodiment, the database module (118) is stored in a server (116) that is electronically coupled to the authentication terminal (104) through a communication network. In alternative embodiments, said communication network includes from a group consisting of a LAN, a MAN, a WAN, an intranet, an internet, Wi-Fi, a cellular network and combination thereof. The database module (118) in addition to various data is configured to store actual secret information such as actual password of the user (102) utilized for gaining access to the terminal (104) based on authentication of the user.
Further, as illustrated in figure 1, the authentication terminal (104) comprises a matrix module (106), a display module (108), an input module (110), a mapping module (112) and a validation engine (114) c ollectively performing t he task of protecting the secret information such as passwords and the like according to exemplary embodiment. In this embodiment, the matrix module (106) dynamically generates a matrix each instance when the user (102) is prompted for authentication by the authentication terminal (104) and is displayed to the user (102) through the display module (108). In an exemplary embodiment, a privacy filter (not shown in figure) is attached to the display module (104) to prevent viewing of the matrix displayed from different viewing angles. This in turn, ensures that the matrix is displayed only to the user (102) and no other party can view the generated matrix and thus avoiding any unauthorized parties to attack the user secret information such as passwords and the like from hacking and unauthorized access in the user sensitive data stored.
In one of the embodiment of the invention, the display module (108) can be configured to display the dynamically generated matrix in the form of an embedded barcode. That is the actual matrix is displayed as a barcode, more specifically as a QR (quick response) code. The QR code is a type of matrix or two-dimensional barcode consisting of black modules arranged in a square pattern on a white background. The generated matrix information is embedded in such QR codes and is displayed to the user (102). In this embodiment, the user (102), in order to decode the embedded matrix information, utilizes an image-capturing device (not shown in figure 1) capable of resolving the matrix embedded in the QR code. More particularly, the user (102) renders the QR code displayed through the display module (108) on the image-capturing device that decodes the QR code and displays the matrix to the user on the image-capturing device. In an exemplary embodiment, the image-capturing device is selected from a group consisting of a digital camera, a Smartphone, a mobile phone with camera, a bar-code scanner or any other device capable of resolving the embedded barcode.
In one embodiment, the matrix displayed comprises a plurality of cells randomly storing the first set of elements. In a exemplary embodiment, the first set of elements includes alphabets A-Z, numerals 0-9, special characters such as !,@,#,$,%,A,&.* and combinations thereof. Each of the first set of elements is stored in one of said plurality of cells in the matrix. In an exemplary embodiment, each cell is represented as an intersection of a row and a column of the matrix. In an exemplary embodiment, each of the cells is associated with a cell value, wherein said cell value is stored in the cell along with one element from the first set of elements. In one embodiment. the cell value of each cell is represented as concatenation of row number and a column number, wherein said row and column indicates the intersection point of said cell storing one of the elements from the first set of elements in the matrix. In another embodiment, the user (102) identifies the row and column number from the
matrix displayed for interpreting the value of the cell. In other embodiments, the cell value is represented as combination of numeric values, alphanumeric values, special characters and combinations thereof. In an exemplary embodiment, the cell value of each cell is different than that of actual element stored in the cell of the matrix.
In an exemplary embodiment, the matrix generated at one instance of authentication is different from that generated at a different instance. More particularly, when the user is prompted for authentication at first instance, location of an element stored in the matrix is different at second instance of authentication of the user. Similarly, the location of said element with respect to cell in the matrix is different at various instances of authentication of the user (102). That is a cell in the matrix storing the element is different at different instances of authentication or user login in the authentication terminal (104). Therefore, the cell values stored in the cells are randomly arranged in the matrix at different instances of login of the user (102) in the authentication terminal (104).
In an exemplary embodiment, the user (102) enters secret information such as password and the like through the input module (110) along with username in order to access the authentication terminal (104). In alternative embodiments, the input module (110) is selected from a group consisting of a keypad, a virtual keypad, a touch screen or a touch pad, a mouse, a joystick and combinations thereof. In this embodiment, the secret information is entered as a combination of second set of elements and the third set of elements referred to as ciphered and non-ciphered elements respectively. In this exemplary embodiment, the second and third sets of elements are sub-set of the first set of elements. That is the secret information selected by the user (102) for authentication includes combination of elements from the first set of elements in the matrix.
In an exemplary embodiment, the ciphered elements represent the second set of elements in ciphered form. In this embodiment, the ciphered elements entered by the user (102) indicate the cell value of the second set of elements from the first set of elements in the matrix displayed. In various embodiments, the user (102) enters the ciphered elements in the form of cell values such as combination of numeric values, alphanumeric values, special characters and combination thereof, displayed through currently displayed matrix. In one of the embodiment, the user (102) identifies the row number and column number of cells storing elements as cell value through displayed matrix and enters the cell value as concatenation of the row number and column number through input module (110).
In an alternative embodiment, the user (102) enters the secret information only in the form of ciphered elements comprising the second set of elements entered as cell value from the displayed matrix. That is, in this alternative embodiment, the user (102) enters the secret information as combination of the second set of elements and the third set of elements, wherein the third set of elements includes zero number of elements. More particularly, in this alternative embodiment, the secret information is entered as only ciphered elements with no elements entered in non-ciphered form.
As a result of the dynamic occurrence of the matrix and the protective privacy filter, the user entered secret information as combination of ciphered and non-ciphered elements avoids the other parties to attack or hack the secret information of the user (102). Further, in addition of the privacy filter protection, the invention facilitates more protection to the user secret information by enabling the embedding of the matrix generated in the barcode format which is resolved by the user through the barcode scanning devices known in the art. Thus, the present invention avoids any other parties to attack the user secret information used by the user for authentication in any electronic device.
In an exemplary embodiment, the user entered ciphered elements is to be deciphered for authenticating the user (102). In this embodiment, the mapping module (112) in the authentication terminal (104) maps the received ciphered elements to that of the first set of elements. More particularly, the cell value of the second set of elements entered as ciphered elements is mapped with cell value of each of the cell storing the first set of elements in the matrix. As a result of mapping, a fourth set of elements are retrieved from the first set of elements whose cell values are mapped to that of the second set of elements. Thus, the ciphered elements are deciphered as fourth set of elements resulting in deciphering of the secret information of the user (102). Therefore, the deciphered secret information is a combination of the fourth set of elements and the third set of elements, wherein, the fourth and third set of elements are sub-sets of the first set of elements displayed in the matrix.
In an exemplary embodiment, the deciphered secret information is then validated by the validation engine (114) in order to authenticate the user (102). The validation engine (114) compares the deciphered secret information with the actual password of the user stored in the database module (118). Based on result of the comparison, the user (102) is allowed to access the authentication terminal (104). Thus, the present invention enables authorized login of the user (102) in the authentication terminal (104) while preventing the secret information of the user from the attacks that is utilized for gaining access to the terminal (104).
Referring to figures 2(A) and 2(B), a flow diagram (200) illustrating various steps implemented by system elements for protecting user secret information in an exemplary embodiment of the invention.
As illustrated in figure 2 (A), at step (202), a dynamic matrix comprising plurality of cells storing first set of elements is generated.
At step (204), the generated matrix is displayed to the user.
At step (206), the user enters secret information in ciphered form as combination of ciphered elements (second set of elements) and non-ciphered elements (third set of elements)
At step (208), the ciphered elements are mapped with the first set of elements to retrieve a fourth set of elements.
At step (210), the ciphered elements are replaced with the fourth set of elements to form deciphered secret information.
As illustrated in figure 2 (B), at step (212), the deciphered secret information is compared with user secret information stored in the database module.
At step (214), a verification of whether the deciphered secret information is matched with the user secret information stored in the database module is done.
At steps (216) and (218), the user is determined to be an authorized user or an unauthorized user respectively based on the result of verification step (214).
WORKING EXAMPLE:
Referring to figures 3(A) 3(B) and 3(C), consider a user is displayed with three different matrices at three different instances of authentication namely Matrix 1 (302), Matrix 2 (304) and Matrix n (306) respectively. In an exemplary embodiment,
the matrices (302), (304) and (306) comprise 8 rows and 6 columns storing the first set of elements including alphanumeric and special characters. Each intersection of a row and column is represented as a cell of the matrix.
In an exemplary embodiment, the matrix generated is an 8*6 order matrix consisting of eight rows and six columns. Such a matrix generated is illustrated in figure 3(A), 3(B) and 3(C). The rows are numbered using the numbers 1 to 8 and columns are numbered using the numbers from 1 to 6. The first set elements for the matrix is a randomly generated set of alphabets, numerals and symbols or special characters without repetition of any alphabet, numerals and symbols in the matrix. In the exemplary embodiment, the English alphabets have varying relative frequencies among each other. As illustrated in Matrix (302) of figure 3(A), in the first row of the matrix, the most frequently occurring alphabets of English which are E, T, A, O, I and N are randomly arranged. In the next five rows, the remaining 30 alphabets and numbers are randomly arranged. Further, the matrix consists of symbols or special characters arranged randomly in the matrix. In this exemplary embodiment, twelve commonly used symbols or special characters are displayed and are included in the last two rows of the matrix. Further, such arrangement is randomly changed at different two instances of authentication of the user as indicated in Matrices (304) and (306) illustrated as figures 3(B) and 3(C) respectively.
In an exemplary embodiment, consider the user selects a password "SECURITY" to be entered for successful authentication in an electronic environment. In an exemplary embodiment, the user enters the first five elements of the password, i.e. :S\ 'E', 'C, 'U' and 'R' in ciphered form represented as concatenation of column and row number of the cells storing said five elements in the matrix. In this exemplary embodiment, the user identifies the row number and column number of a cell storing the five elements namely 'S', 'E\ 'C\ 'U' and 'R\ In an exemplary
embodiment, the remaining three elements of the password, i.e. T, 'T', and 'Y' are entered as non-ciphered elements. Thus, the user entered password represents ciphered password as combination of ciphered elements (concatenation of column and row number of the cells storing S', 'E', 'C, 'U' and 'R') and non-ciphered elements (T, 'T, and 'Y')-
In an exemplary embodiment, the user entered ciphered password varies at different instances of the user authentication. For example, from the displayed matrices (302), (304) and (306) the user entered ciphered password are "3413514155ITY" (308), "2453113115ITY" (310) and "5463411145ITY" (312) respectively. Thus, such dynamic ciphering of password at different instance protects the user password from being attacked or hacked by unauthorized parties.
In an exemplary embodiment, the user is authenticated by mapping the ciphered elements from the displayed matrix at that particular instance and retrieving the actual elements corresponding to the ciphered elements. Thus, the ciphered elements are accordingly deciphered to form a dynamic deciphered password. The deciphered password is then compared to actual password of the user in order to authenticate the user in the electronic systems.
The methodology and techniques described with respect to the exemplary embodiments can be performed using a machine or other computing device within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies discussed above. The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet PC, a laptop computer, a desktop computer, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single machine is illustrated, the term "machine" shall also
be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The machine may include a processor (e.g., a central processing unit (CPU)), a memory which communicates with each other via a bus. The memory stores the instructions when executed, may cause the processor of the machine to perform any one or more of the methodologies discussed above.
The illustrations of arrangements described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Many other arrangements will be apparent to those of skill in the art upon reviewing the above description. Other arrangements may be utilized and derived there from, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are also merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
Claims:
1. A method (200) for securing a secret information of a user from attacks characterized by dynamically ciphering said secret information each time when the user is prompted for authentication by any electronic device, the said method comprising processor implemented steps of:
a) dynamically generating (202) at least one matrix comprising plurality of cells, each cell of said matrix randomly storing at least one element from a first set of elements at different instances of authentication of the user;
b) receiving (206) the secret information from the user, wherein said secret information comprises a second set of elements in ciphered form as value of cells storing said second set of elements in the generated matrix and a third set of elements;
c) mapping (208) the value of the cells storing the second set of elements with value of cells of the first set of elements in the matrix;
d) retrieving a fourth set of elements from the first set of elements whose value of the cells storing the second set of elements are mapped with value of cells of the first set of elements in the matrix; and
e) replacing (210) the second set of elements with the fourth set of elements in the received secret information to decipher the secret information in order to securely authenticate the user.
2. The method of claim 1, wherein said dynamically generated matrix can be a two-dimensional matrix consisting of six rows and eight columns.
3. The method of claim 1, wherein said first set of elements is selected from a group, consisting of alphanumeric characters, special characters and combinations thereof.
4. The method of claim 2, wherein the matrix can be configured to arrange the most frequently occurring alpha characters of the first set of elements in a first row, the remaining alphanumeric characters in the next five rows and the special characters in the last two rows.
5. The method of claim 1, wherein value of each cell is selected from a group, consisting of a numeric value or an alphanumeric value or a special character and combinations thereof.
6. The method of claim 5, wherein said value of each cell is displayed in the cell of the matrix generated to the user.
7. The method of claim 5, wherein the numeric value can be a concatenation of a row number and column number of a cell storing said element in the matrix that is identified by the user from the displayed matrix.
8. The method of claim 1, wherein said third set of elements consists of zero or more elements from the first set of elements.
9. The method of claim 1, wherein said second and fourth set of elements are subsets of the first set of elements.
10. A system (100) for securing secret information of a user from attacks
characterized by dynamically ciphering said secret information each time
when the user is prompted for authentication, said system comprising: an
authentication terminal (104) electronically coupled to a database (] 18), said
authentication terminal further comprising:
a) a matrix module (106) to dynamically generate at least one matrix;
b) a display module (108) to display the generated matrix to the user;
c) an input module (110) to receive the secret information as a combination of ciphered and non-ciphered elements;
d) a mapping module (112) to decipher the ciphered elements; and
e) a validation engine (114) to validate said deciphered secret information.
11. The system of claim 10, wherein the authentication terminal (104) is any electronic device that prompts the user to enter the secret information for authentication.
12. The system of claim 10, wherein a privacy filter is attached to the display module (108) to prevent viewing of the matrix displayed from different viewing angles.
13. The system of claim 10, wherein the display module (108) can be configured to display the generated matrix in the form of a two-dimensional matrix comprising plurality of cells storing the first set of elements.
14. The system of claim 10, wherein the display module (108) can be configured to display the generated matrix in the form of embedded barcode.
15. The system of claim 14, wherein the embedded barcode can be decoded to resolve the matrix by using an image-capturing device capable of decoding the embedded barcode.
| # | Name | Date |
|---|---|---|
| 1 | 3701-MUM-2011-IntimationOfGrant09-06-2022.pdf | 2022-06-09 |
| 1 | ABSTRACT1.jpg | 2018-08-10 |
| 2 | 3701-MUM-2011-MARKED COPY(17-1-2012).pdf | 2018-08-10 |
| 2 | 3701-MUM-2011-PatentCertificate09-06-2022.pdf | 2022-06-09 |
| 3 | 3701-MUM-2011-FORM 3.pdf | 2018-08-10 |
| 3 | 3701-MUM-2011-COMPLETE SPECIFICATION [26-01-2019(online)].pdf | 2019-01-26 |
| 4 | 3701-MUM-2011-FORM 26(6-2-2012).pdf | 2018-08-10 |
| 4 | 3701-MUM-2011-FER_SER_REPLY [26-01-2019(online)].pdf | 2019-01-26 |
| 5 | 3701-MUM-2011-OTHERS [26-01-2019(online)].pdf | 2019-01-26 |
| 5 | 3701-MUM-2011-FORM 2.pdf | 2018-08-10 |
| 6 | 3701-MUM-2011-FORM 2(TITLE PAGE).pdf | 2018-08-10 |
| 6 | 3701-MUM-2011-ABSTRACT.pdf | 2018-08-10 |
| 7 | 3701-MUM-2011-FORM 18.pdf | 2018-08-10 |
| 7 | 3701-MUM-2011-CLAIMS.pdf | 2018-08-10 |
| 8 | 3701-MUM-2011-FORM 13(17-1-2012).pdf | 2018-08-10 |
| 8 | 3701-MUM-2011-CORRESPONDENCE (17-1-2012).pdf | 2018-08-10 |
| 9 | 3701-MUM-2011-CORRESPONDENCE(29-3-2012).pdf | 2018-08-10 |
| 9 | 3701-MUM-2011-FORM 1.pdf | 2018-08-10 |
| 10 | 3701-MUM-2011-CORRESPONDENCE(6-2-2012).pdf | 2018-08-10 |
| 10 | 3701-MUM-2011-FORM 1(29-3-2012).pdf | 2018-08-10 |
| 11 | 3701-MUM-2011-CORRESPONDENCE.pdf | 2018-08-10 |
| 11 | 3701-MUM-2011-FER.pdf | 2018-08-10 |
| 12 | 3701-MUM-2011-DESCRIPTION(COMPLETE).pdf | 2018-08-10 |
| 12 | 3701-MUM-2011-DRAWING.pdf | 2018-08-10 |
| 13 | 3701-MUM-2011-DESCRIPTION(COMPLETE).pdf | 2018-08-10 |
| 13 | 3701-MUM-2011-DRAWING.pdf | 2018-08-10 |
| 14 | 3701-MUM-2011-CORRESPONDENCE.pdf | 2018-08-10 |
| 14 | 3701-MUM-2011-FER.pdf | 2018-08-10 |
| 15 | 3701-MUM-2011-CORRESPONDENCE(6-2-2012).pdf | 2018-08-10 |
| 15 | 3701-MUM-2011-FORM 1(29-3-2012).pdf | 2018-08-10 |
| 16 | 3701-MUM-2011-CORRESPONDENCE(29-3-2012).pdf | 2018-08-10 |
| 16 | 3701-MUM-2011-FORM 1.pdf | 2018-08-10 |
| 17 | 3701-MUM-2011-FORM 13(17-1-2012).pdf | 2018-08-10 |
| 17 | 3701-MUM-2011-CORRESPONDENCE (17-1-2012).pdf | 2018-08-10 |
| 18 | 3701-MUM-2011-FORM 18.pdf | 2018-08-10 |
| 18 | 3701-MUM-2011-CLAIMS.pdf | 2018-08-10 |
| 19 | 3701-MUM-2011-FORM 2(TITLE PAGE).pdf | 2018-08-10 |
| 19 | 3701-MUM-2011-ABSTRACT.pdf | 2018-08-10 |
| 20 | 3701-MUM-2011-OTHERS [26-01-2019(online)].pdf | 2019-01-26 |
| 20 | 3701-MUM-2011-FORM 2.pdf | 2018-08-10 |
| 21 | 3701-MUM-2011-FORM 26(6-2-2012).pdf | 2018-08-10 |
| 21 | 3701-MUM-2011-FER_SER_REPLY [26-01-2019(online)].pdf | 2019-01-26 |
| 22 | 3701-MUM-2011-FORM 3.pdf | 2018-08-10 |
| 22 | 3701-MUM-2011-COMPLETE SPECIFICATION [26-01-2019(online)].pdf | 2019-01-26 |
| 23 | 3701-MUM-2011-PatentCertificate09-06-2022.pdf | 2022-06-09 |
| 23 | 3701-MUM-2011-MARKED COPY(17-1-2012).pdf | 2018-08-10 |
| 24 | ABSTRACT1.jpg | 2018-08-10 |
| 24 | 3701-MUM-2011-IntimationOfGrant09-06-2022.pdf | 2022-06-09 |
| 1 | SearchStrategy_24-07-2018.pdf |