Access control for a resource
First Claim
1. An access control method for a resource in a computer system comprising:
- generating a challenge image including a user challenge;
generating a mask image including a mask;
generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and
granting access to the resource on receipt of a correct response by a user of the computer system to the challenge,wherein the user challenge is at least 70% masked by the mask,wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images,wherein the composite image is dynamic by the mask randomly moving in the composite image periodically,wherein the mask comprises a plurality of mask elements having spaces therebetween for revealing portions of the user challenge, andwherein the mask moves by movement of individual mask elements, each individual mask element moving in a random direction independently for each period.
1 Assignment
0 Petitions
Accused Products
Abstract
An access controller comprising: a data store storing: a challenge image including a user challenge; a mask image including a mask; a composite image generator to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image; and a display to display the dynamic composite image to a user; a user input receiver, wherein the access controller grants access to the resource on receipt, via the user input receiver, of a correct response by a user to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image, and wherein the composite image is dynamic by the mask randomly moving in the composite image periodically.
13 Citations
17 Claims
-
1. An access control method for a resource in a computer system comprising:
-
generating a challenge image including a user challenge; generating a mask image including a mask; generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and granting access to the resource on receipt of a correct response by a user of the computer system to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images,wherein the composite image is dynamic by the mask randomly moving in the composite image periodically, wherein the mask comprises a plurality of mask elements having spaces therebetween for revealing portions of the user challenge, and wherein the mask moves by movement of individual mask elements, each individual mask element moving in a random direction independently for each period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An access controller for a resource in a computer system, the access controller comprising:
-
a data store having stored therein; a challenge image including a user challenge, and a mask image including a mask; a composite image generator adapted to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image, a display adapted to display the dynamic composite image to a user; and a user input receiver, wherein the access controller is adapted to grant access to the resource on receipt, via the user input receiver, of a correct response by a user of the computer system to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images,wherein the composite image is dynamic by the mask randomly moving in the composite image periodically, wherein the mask comprises a plurality of mask elements having spaces therebetween for revealing portions of the user challenge, and wherein the mask moves by movement of individual mask elements, each individual mask element moving in a random direction independently for each period. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium storing a computer program element comprising computer program code to, when loaded into a computer system and executed thereon, cause the computer to perform a method comprising:
-
generating a challenge image including a user challenge; generating a mask image including a mask; generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and granting access to the resource on receipt of a correct response by a user of the computer system to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images,wherein the composite image is dynamic by the mask randomly moving in the composite image periodically, wherein the mask comprises a plurality of mask elements having spaces therebetween for revealing portions of the user challenge, and wherein the mask moves by movement of individual mask elements, each individual mask element moving in a random direction independently for each period.
-
Specification