Feature to facilitate numeric passcode entry

ABSTRACT

Information systems which provide access over a variety of devices (e.g. telephones, automated banking machines, computers) typically require that passcodes be numeric to allow entry on all device types. Alphabetic characters are associated with the numeric digits on both telephones and automated banking machines, allowing users to use mnemonic words to remember their numeric passcodes. Computer terminals do not have this association, creating user difficulties. The invention translates text entry on a computer keyboard into the equivalent numeric digits according to an appropriate mapping.

FIELD OF THE INVENTION

This invention relates to a method and apparatus for handling a passcodefor a numeric passcode controlled device.

BACKGROUND OF THE INVENTION

Automatic systems which provide information to users have become verycommon. For years, many systems have allowed users to access informationfrom a telephone and its keypad or from a banking machine and morerecently, with the growth of home computers, modems, and the internet,from a computer and its keyboard as well. In many cases, these systemsrequire that the user identify themselves with some passcode or accesscode.

Typical examples of such systems are: voice messaging systems--whichallow a user to retrieve the messages that others have left them--andautomated banking or account information systems--which allow a user toretrieve information about their personal accounts and perhaps to makepayments from or transfers between those accounts.

NORSTAR VOICE MESSAGING™ version 3, MERIDIAN MAILS™ and VISITMESSENGER™, all manufactured by Northern Telecom Limited, are voicemessaging systems which allow the user to retrieve their messages fromeither a telephone or a computer connected via network or modem.MERIDIAN IVR™, also manufactured by Northern Telecom Limited, is aninteractive voice response system which allows third parties tocustomize systems for information retrieval. In many cases such a systemis used to integrate with banking or other systems and build theaforementioned information retrieval systems, allowing a customer of abank to access information from a telephone, a banking machine, or acomputer.

As these systems provide access to confidential information, theyrequire that the user identify and authenticate themselves. Theidentification is typically an account number, with authentication byway of a confidential passcode. As users may access the system at anytime from either the telephone or computer, the passcode must be numericin nature.

Recognising that many users have difficulty in remembering these numericpasscodes (of which they may have a multiplicity for different services,machines, and environments), the keypads of telephones and bankingmachines provide standard mappings of letters to numbers. This allowsusers to make use of a mnemonic aid, that is, to select an easilyremembered word which utilises the letters to which the numbers of thepasscode map.

The user can then simply "type" their mnemonic word by pressing thecorresponding numeric keys. A problem occurs, however, when the usermust enter their passcode on a computer. Existing systems require thatthe user enter the number on their computer. And unfortunately, computernumeric keys do not have the associated alphabetic lettering on them.

This problem is typically solved by users referring to a telephone todetermine which numeric key each letter of their mnemonic word maps to,and then entering these numeric keys on their computer. This is awkwardfor the user, and where no telephone is proximate to the computer, mayresult in the attempt being abandoned until the user can find a phoneand write down the appropriate number. It is also potentially confusingfor the user since the layout of the numeric keys on the telephonediffers from that on computer keyboards, that is, some computerkeyboards have only a row of numbers, and those that have a numerickeypad as well have it in a different layout from that on a telephone.

Where a user resorts to writing down the numeric equivalent of themnemonic word to prevent future trouble, the security andconfidentiality of the passcode, and therefore the information which isprotected by the passcode, is reduced.

It should be noted that a similar problem occurs when a user is creatinga new passcode while using the computer. Without the ability toconveniently enter a mnemonic word, the user generally resorts to anumeric passcode, which in most cases is written down, againcompromising the security and confidentiality of the protectedinformation.

SUMMARY OF THE INVENTION

This invention relates generally to systems or devices which provideusers the ability to access information via a telephone and its keypadand/or via a banking machine and its keypad and via a computer and itskeyboard, and which require users to enter passcodes to authenticatethemselves. An object of the present invention is to allow a user toenter their mnemonic word directly on a computer terminal.

According to the present invention, there is provided a method forhandling a passcode for a numeric passcode controlled device, comprisingthe steps of: receiving an alphabetic passcode; mapping each letter ofsaid alphabetic passcode to a number based on a pre-defined mapping toobtain a mapped passcode; and utilising said mapped passcode to attemptaccess of said numeric passcode controlled device.

According to another aspect of the invention, there is providedapparatus for accessing a numeric passcode controlled device,comprising: entry means to enter an alphabetic passcode; processingmeans to map each letter of said alphabetic passcode to a number; andmeans to utilize said mapped passcode to attempt access of said numericpasscode controlled device.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings which illustrate example embodiments of the invention:

FIG. 1 illustrates a keypad of an exemplary banking machine ortelephone,

FIGS. 2 is a software block diagram of the software control for a systemoperating in accordance with this invention,

FIG. 3 is a mapping table stored in memory of a system operating underthe software control of FIG. 2,

FIG. 4 is a software block diagram of the software control for a systemoperating in accordance with another aspect of this invention, and

FIG. 5 is a block diagram of a system which may embody the subjectinvention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Turning to FIG. 1, a keypad 10 for a banking machine or telephone hasten digit keys 12 as well as keys marked with a "*" and a "#". The digitkeys have letters associated with them, with the standard associationbeing "ABC" associated with the digit key marked 2, "DEF" with 3, "GHI"with 4, "JKL" with 5, "MNO" with 6, "PRS" with 7, "TUV" with 8, and"WXY" with 9. The "Q" and "Z", however, appear in one of several places,as follows:

1 The vast majority of banking machines, and a significant number ofexisting telephones, associate the "Q" and "Z" with the 1 key.

2 International standards for telephones now associate the "Q" and "Z"with the 7 and 9 respectively, and many new telephones have thisassociation.

3 A significant number of existing telephones associate the "Q" and "Z"with the 0 key.

This letter association encourages a user to utilize a more easilyremembered alphabetic passcode (i.e., a passcode composed wholly ofletters or a passcode which is an alphanumeric which includes at leastone letter) where a passcode is required to enter a system accessible bythe keypad. A system embodying the subject invention allows a user toaccess the same system through a computer keyboard or other alphabetbased entry device without difficulty.

In overview, a system embodying the subject invention may be programmedsuch that whenever access is attempted through a text based input devicesuch as a keyboard, the user is prompted to enter their numeric passcodeeither numerically or utilising an alphabetic mnemonic. The user maytype the mnemonic passcode directly on the alphabetic section of thekeyboard (e.g. "S E C R E T"). The system translates the entered lettersinto the corresponding digits (e.g. 7 3 2 7 3 8) in accordance withwhichever mapping is determined by the system as appropriate (themapping only differs with the letters "Q" and "Z"). The resultingnumeric passcode is then passed on to the authenticating system onbehalf of the user.

Users who happen to remember the numeric equivalent, or who indeed usean easily remembered number are not impacted in any way; they enternumeric digits which are passed through without translation. Theforegoing operation is also descriptive of the process used when a newpasscode is entered into the system, allowing the use of a mnemonicword.

FIG. 2 shows the program control for a system embodying this invention.It is assumed the user accesses the system through a keyboard. Turningto FIG. 2, the system initialises an "Index" variable to 0, a "Limit"variable to the length of the "Input" string, and an "Output" string toa null set (box 102). If the length of an Input string is greater thanzero (box 104), then the Index variable is incremented to one and thefirst number of the Output string is determined from the mapping tableillustrated in FIG. 3 using, as table pointers, the value (i.e., theidentity) of the first character of the Input and the appropriatemapping for lower and upper case "q" and "z" (box 106). The system maydetermine which mapping is appropriate for the small and upper caseletters "q" and "z" based on the identity of the user, which identity isnormally input to the system by a user prior to inputting theirpasscode. In this regard, it is noted that Mapping No. 1 maps the "q"and "z" to the number 1, Mapping No. 2 maps these letters to the number0 and Mapping No. 3 maps the "q" to 7 and the "z" to 9. After the firstnumber of the Output is determined, the process is repeated from box 104to determine the next number of the Output string, and so on. Once thelast character of the Input string has been mapped, the Index variablewill have been incremented to the value of the Limit variable so thatprocessing will be complete when box 104 is next encountered (boxes 104,108) and the Output string may be utilised as the passcode.

FIG. 4 shows the program control for another system embodying thesubject invention. The system under the program control of FIG. 4returns multiple passcodes when an upper or lower case "q" or "z" isincluded in the user's input. Turning to FIG. 4, again an Index variableis initially set to zero, a Limit variable is set to the length of theInput string, and three Output strings, OutputM1, OutputM2, andOutputM3, are each set to a null set (box 202). If the Limit variable islarger than the current value of the Index variable (box 204), then theIndex variable is incremented to one, and, utilising the mapping tableof FIG. 3, the first character of the Input is mapped in accordance withMapping No. 1 to obtain the first number of the output string OutputM1,the first character of the Input is mapped in accordance with MappingNo. 2 to obtain the first number of the output string OutputM2, and thefirst character of the Input is mapped in accordance with Mapping No. 3to obtain the first number of the output string OutputM3 (box 206). Theprocess is then repeated from box 204 to determine the next number foreach of the Output strings. Once the last character of the Input stringhas been mapped, the Index variable will have been incremented to thevalue of the Limit variable so that processing will be complete when box204 is next encountered (boxes 204, 208) and the three Output stringsmay be consecutively utilised as the passcode.

Thus, the embodiment of FIG. 4 provides multiple numeric passcodes inresponse to character entries which are ambiguous due to the differencesin character mappings; for example, if a user were to enter "J A Z Z",the translation mechanism would provide three alternate passcodes forauthentication, 5 2 9 9; 5 2 1 1; and 5200. This facilitates user accesswhen the mapping basis for the mnemonic is unknown. The authenticationsoftware can then attempt to validate both resulting passcodes, andallow user access if one is correct; it is noted that this wouldminimally reduce security of the system.

Systems utilising this invention may have many different architectures;the described embodiments of the invention assume a client/serverarchitecture depicted in FIG. 5 in which user input from an input device302 (such as a keyboard or voice input device) is collected at a user PC304, and transmitted, unprocessed, to the server 306 for validation by apasscode control program. Further assumed is that the client disallowsany attempted user's entry of invalid characters (e.g. non-numeric andnonalphabetic) and appropriately signals the user in such an event.

This invention is applicable to any system or device which accepts userinput of a numeric passcode which may be remembered by the user as atextual or alphanumeric string.

While the embodiments described utilize the most common three mappingsfrom letters to numbers, a system of this invention could readily beadapted to accommodate other mappings.

The advantages of this mechanism are as follows: users frustration iseliminated; user and computer time wasted in manual translation iseliminated; passcode security is not compromised unnecessarily. Insummary, this invention facilitates numeric passcode entry, to theadvantage of both user and system.

Modifications will be apparent to those skilled in the art and,therefore, the invention is defined in the claims.

What is claimed is:
 1. A method for handling a passcode for a numericpasscode controlled device comprising the steps of:receiving analphabetic passcode; mapping each letter of said alphabetic passcode toa number based on a pre-defined mapping to obtain a mapped passcode,wherein said mapping step comprises mapping each upper and lower caseletter a, b, and c of said alphabetic passcode to the number two; andutilizing said mapped passcode to attempt access of said numericpasscode controlled device.
 2. The method of claim 1 wherein saidmapping step comprises mapping each upper and lower case letter d, e,and f of said alphabetic passcode to the number three.
 3. The method ofclaim 2 wherein said mapping step comprises mapping each upper and lowercase letter g, h, and i of said alphabetic passcode to the number four.4. The method of claim 3 wherein said mapping step comprises mappingeach upper and lower case letter j, k, and l of said alphabetic passcodeto the number five.
 5. The method of claim 4 wherein said mapping stepcomprises mapping each upper and lower case letter m, n, and o of saidalphabetic passcode to the number six.
 6. The method of claim 5 whereinsaid mapping step comprises mapping each upper and lower case letter p,r, and s of said alphabetic passcode to the number seven.
 7. The methodof claim 6 wherein said mapping step comprises mapping each upper andlower case letter t, u, and v of said alphabetic passcode to the numbereight.
 8. The method of claim 7 wherein said mapping step comprisesmapping each upper and lower case letter w, x, and y of said alphabeticpasscode to the number nine.
 9. The method of claim 8 wherein saidmapping step comprises mapping each upper and lower case letter q and zof said alphabetic passcode to the number one.
 10. The method of claim 8wherein and lowering step comprises mapping each upper and lower caseletter q and z of said alphabetic passcode to the number zero.
 11. Themethod of claim 8 wherein said mapping step comprises mapping each upperand lower case letter q of said alphabetic passcode to the number sevenand each upper and lower case letter z of said alphabetic passcode tothe number nine.
 12. A method for handling a passcode for a numericpasscode controlled device, comprising the steps of:receiving analphabetic passcode; mapping each letter of said alphabetic passcode toa number based on a first pre-defined mapping to obtain a first mappedpasscode: mapping each letter of said alphabetic passcode to a numberbased on a second pre-defined mapping to obtain a second mappedpasscode; mapping each letter of said alphanumeric passcode to a numberbased on a third pre-defined mapping to obtain a third mapped passcode;and utilizing said first mapped passcode along with said second mappedpasscode and said third mapped passcode to attempt access of saidnumeric passcode controlled device;wherein, apart from lower and uppercase letters q and z, for any given letter, said first mapping step,said second mapping step, and said third mapping step map said givenletter to the same number.
 13. The method of claim 12 wherein said firstmapping step comprises mapping each upper and lower case letter q and zof said alphabetic passcode to the number zero, said second mapping stepcomprises mapping each upper and lower case letter q and z of saidalphabetic passcode to the number one, and said third mapping stepcomprises mapping each upper and lower case letter q of said alphabeticpasscode to the number seven and each upper and lower case letter z ofsaid alphabetic passcode to the number nine.