×

Feedback-based data security

  • US 10,491,391 B1
  • Filed: 09/23/2016
  • Issued: 11/26/2019
  • Est. Priority Date: 09/23/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving a first request to store user data encrypted under a user key, the request specifying one or more user credentials for obtaining access to the user data and the user data including at least one of an access token, a credit card number, a social security number, a financial account number, a date of birth, or a health record;

    specifying a security identifier for the user data, the security identifier including at least one of an image, an animation, a video clip, a sound or sequence of sounds, a song clip, a haptic feedback pattern, or a light pattern;

    generating the user key and encrypting the user data using the user key;

    storing the user key and the security identifier;

    receiving a second request to access the user data, the second request specifying at least one incorrect user credential;

    presenting, in response to receiving the at least one incorrect user credential, an incorrect security identifier for confirmation by a submitter of the second request;

    receiving confirmation of the presented incorrect security identifier, the confirmation corresponding to a verification of the presented incorrect security identifier;

    generating a set of incorrect data values, in response to the confirmation of the presented incorrect security identifier, the incorrect data values having formats corresponding to the user data;

    changing the set of incorrect data values for subsequent confirmations of incorrect security identifiers; and

    providing, to the submitter of the second request, access to the set of incorrect data values, wherein the submitter does not receive the access to the user data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×