6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
A notched 2D shape may encode information. For instance, a physical tag may display, form or include a polygon that is modified by notches and by one or more holes. This notched 2D shape may encode data that identifies, or provides information regarding, a physical product to which the tag is physically attached. Alternatively, this notched 2D shape may encode any other type of information, such as information about what we sometimes call a product shape or shape matrix. The notched shape may be an octagon that is modified by notches and by one or more holes.
6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
A notched 2D shape may encode information. For instance, a physical tag may display, form or include a polygon that is modified by notches and by one or more holes. This notched 2D shape may encode data that identifies, or provides information regarding, a physical product to which the tag is physically attached. Alternatively, this notched 2D shape may encode any other type of information, such as information about what we sometimes call a product shape or shape matrix. The notched shape may be an octagon that is modified by notches and by one or more holes.
6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
6.
Methods and apparatus for encoding passwords or other information
6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
7.
Methods and apparatus for encoding passwords or other information
6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
8.
METHODS AND APPARATUS FOR ENCODING PASSWORDS OR OTHER DATA WITH SHAPES
In illustrative implementations, shape is used to encode computer passwords or other information. The passwords may be easy for a human to remember - and yet have an extremely high number of permutations (e.g., in some cases, greater than 1030 permutations, or greater than 10261permutations, or greater than 106264 permutations). This combination of a password being easy for a human to remember - yet having a large number of permutations - offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
6264 permutations). This combination of a password being easy for a human to remember—yet having a large number of permutations—offers many practical benefits. Among other things, the huge number of permutations makes the password extremely resistant to guessing attacks. In addition, in some cases, the passwords that are created with the shapes are highly resistant to attacks by keystroke logging, mouse logging, touch-gesture logging, screen logging, shoulder surfing, phishing, and social engineering. Alternatively, the shapes may be used to encode other information, such as information that uniquely identifies a product or a machine part.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06T 19/20 - Édition d'images tridimensionnelles [3D], p. ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 17/20 - Description filaire, p. ex. polygonalisation ou tessellation
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Shape-matrix geometric instruments having numerous applications including, but not limited to, anti-counterfeiting, graphical passwording, games, and geometry education. A shape-matrix geometric instrument is a manufacture and/or a method whose design is based on a shape-matrix that, in turn comprises a set of building blocks that are N-dimensional polytopes. Corner shapes are positioned in or near the interior corner spaces of at least ones of the shape-matrix building blocks. At least ones of the corner shapes differ from others in at least one property or aspect including, for example, geometric shape, orientation within the building block, and one or more surface “finishes,” such as color, shading, cross-hatching or real or apparent texture.
G09B 23/04 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour les mathématiques pour la géométrie, la trigonométrie, la projection ou la perspective
G09B 23/02 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour les mathématiques
G09B 23/06 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour la physique
A63H 33/04 - Blocs, bandes ou autres éléments pour les jeux de construction
G09B 1/32 - Matériel à but éducatif à commande manuelle ou mécanique utilisant des éléments formant ou comportant des symboles, des signes, des images ou similaires, qui sont agencés ou adaptés pour être disposés selon un ou plusieurs schémas particuliers comprenant des éléments destinés à être utilisés sans support spécial
G09B 19/00 - Enseignement non couvert par d'autres groupes principaux de la présente sous-classe
G09B 5/02 - Matériel à but éducatif à commande électrique avec présentation visuelle du sujet à étudier, p. ex. en utilisant une bande filmée
Shape-matrix geometric instruments having numerous applications including, but not limited to, anti-counterfeiting, graphical passwording, games, and geometry education. A shape-matrix geometric instrument is a manufacture and/or a method whose design is based on a shape-matrix that, in turn comprises a set of building blocks that are N-dimensional polytopes. Corner shapes are positioned in or near the interior corner spaces of at least ones of the shape-matrix building blocks. At least ones of the corner shapes differ from others in at least one property or aspect including, for example, geometric shape, orientation within the building block, and one or more surface “finishes,” such as color, shading, cross-hatching or real or apparent texture.
G09B 23/04 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour les mathématiques pour la géométrie, la trigonométrie, la projection ou la perspective
G09B 23/02 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour les mathématiques
G09B 23/06 - Modèles à usage scientifique, médical ou mathématique, p. ex. dispositif en vraie grandeur pour la démonstration pour la physique
A63H 33/04 - Blocs, bandes ou autres éléments pour les jeux de construction