Authentication method and system
First Claim
1. A computer-implemented verification method comprising the step of:
- enabling a user to input an identifier into an electronic device having;
a screen; and
an operable, virtual keypad provided within a keypad zone of the screen, the operable, virtual keypad comprising a plurality of labeled keys, each labeled key having at least one indicia associated with it which, when operated by the user, causes the associated indicia to be inputted to the device, and the operable, virtual keypad generated at run time;
by operating at least one labeled key of the operable, virtual keypad through an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone, and which functions as a cover superimposed over the operable, virtual keypad such that;
the operable, virtual keypad is hidden, at least partially, by the image; and
,when the user identifies a location within the image it operates the operable, virtual keypad key positioned at that location within the keypad zone to record the indicia of the operable, virtual keypad key in the device as an encoded version of the user'"'"'s input.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user'"'"'s operation of the keypad key via the image generates an encoded version of the user'"'"'s intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user'"'"'s identity must be verified before access is granted to a controlled resource.
198 Citations
23 Claims
-
1. A computer-implemented verification method comprising the step of:
-
enabling a user to input an identifier into an electronic device having; a screen; and an operable, virtual keypad provided within a keypad zone of the screen, the operable, virtual keypad comprising a plurality of labeled keys, each labeled key having at least one indicia associated with it which, when operated by the user, causes the associated indicia to be inputted to the device, and the operable, virtual keypad generated at run time; by operating at least one labeled key of the operable, virtual keypad through an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone, and which functions as a cover superimposed over the operable, virtual keypad such that; the operable, virtual keypad is hidden, at least partially, by the image; and
,when the user identifies a location within the image it operates the operable, virtual keypad key positioned at that location within the keypad zone to record the indicia of the operable, virtual keypad key in the device as an encoded version of the user'"'"'s input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
providing, by an electronic device, a scrambled operable, virtual keypad, the scrambled operable, virtual keypad (i) being positioned within a keypad zone of a screen associated with the electronic device and (ii) comprising a first plurality of labeled keys; outputting, by the electronic device and for display at least partially within the keypad zone, an image of a keypad comprising a second plurality of keys, wherein the first plurality of keys of the scrambled operable, virtual keypad are (i) in a scrambled order or configuration with respect to the second plurality of keys of the image and (ii) hidden, at least partially, by the image of the keypad comprising the second plurality of keys; and receiving, at the electronic device and by operation of at least one key of the first plurality of keys through the image of a keypad comprising a second plurality of keys, an identifier. - View Dependent Claims (21, 22, 23)
-
Specification