METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM
The invention relates in particular to a method of authenticating a user (30) at a first terminal (32) or a remote server (50) connected to the first terminal (32), the authentication consisting in inputting a code into the first terminal (32) by the user (30) and in comparing this code with a confi...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention relates in particular to a method of authenticating a user (30) at a first terminal (32) or a remote server (50) connected to the first terminal (32), the authentication consisting in inputting a code into the first terminal (32) by the user (30) and in comparing this code with a confidential personal code of the user (30), the confidential personal code comprising symbols to be input successively by the user (30) into the first terminal (32). According to the invention, the method consists in: a. Transmitting from the first terminal (32) to a second terminal (33) belonging to the user a disordered series of symbols, a subset of which constitutes the confidential personal code; b. Displaying on a screen of the second terminal (33) the disordered series of symbols in a grid (37), called the second grid (37), each symbol of the series being contained in a box of the second grid (37); c. Inputting by the user (30) on the first terminal (32), the confidential personal code into a grid (39), called the first grid (39), at the corresponding locations of the symbols of the confidential personal code in the second grid (37); d. Verifying, at the first terminal (32) or the remote server (50), that the series of symbols input by the user (30) is identical to the confidential personal code, so as to authenticate the user (30).
L'invention concerne notamment un procédé d'authentification d'un utilisateur (30) auprès d'un premier terminal (32) ou d'un serveur distant (50) connecté au premier terminal (32), l'authentification consistant à entrer un code dans le premier terminal (32) par l'utilisateur (30) et à comparer ce code à un code personnel confidentiel de l'utilisateur (30), le code personnel confidentiel comprenant des symboles à entrer successivement par l'utilisateur (30) dans le premier terminal (32). Selon l'invention, le procédé consiste à: a. Transmettre du premier terminal (32) à un second terminal (33) appartenant à l'utilisateur une série désordonnée de symboles dont un sous-ensemble constitue le code personnel confidentiel; b. Afficher sur un écran du second terminal (33) la série désordonnée de symboles dans une grille (37), appelée seconde grille (37), chaque symbole de la série étant contenu dans une case de la seconde grille (37); c. Entrer, par l'utilisateur (30) sur le premier terminal (32), le code personnel confidentiel dans une grille (39), appelée première grille (39), aux emplacements correspondants des symboles du code personn |
---|