GATE [ Graphic Access Tabular Entry ]
An Interception-resistant
Passcode Anti-theft Authentication System
To authenticate, after user enters user name the server renders an array of entry buttons for the user to enter passcode. Each button will have multiple characters with user pins mixed in with other symbols.
When button selection is made by a user, an observer won't know the actual passcode due to the multiple characters per button. Each subsequent rendering of buttons by the server will be unique, based on the GATE algorithm, ensuring button selection cannot simply be repeated based on button location in order to infiltrate an account.
Due to the rendering process required in order to present passcode buttons to a user, a server has to already know the passcode of the user in order to render an appropriate array of buttons.
Therefore bogus or malicious servers will not be able to render an appropriate array of buttons to a user, which allows the user to recognize whether or not the screen he is looking at is being controlled by the appropriate entity.
- Since special symbols are part of GATE passcode by default, there is no need for the requirements of lowercase、uppercase、numbers and special characters, which makes it easier for users to create and remember their passcodes.
- By hiding user pins among other symbols, GATE increases passcode strength exponentially.
- The buttons are rendered with symbols of the same category in the same position, e.g. all numbers are on the upper left side of the buttons, all alphabet is on the upper right side, this speeds up button selection. Once users learn the rules of the GATE system, it's easy to use.
- Because the GATE system is software based, it depends on the knowledge users have about their passcodes, there is no special hardware to purchase/possess, install, imitate, carry or be stolen.
- The passcodes are stored on the server, and they are encrypted with any trusted encryption method of choice.
- The symbols used in the GATE system are Unicode based, which is available in all modern operating systems of different platforms, therefore there is no need to upload and maintain any image.
- The GATE system can not only be used for human to machine authentication, but it can also be used for machine to machine authentication.
- Although the sample application is written in Java, GATE can be implemented with any preferred computer language.
- GATE can defeat peeking、wiretapping、keylogging、phishing and dictionary attack.
This is how current password system is like : weak !
This is how GATE system is like : secure !