Information hiding through time synchronization
First Claim
1. A method of authenticating a user attempting to access a portable computing device comprising:
- causing a sequence of images to be shown on a display;
accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user'"'"'s password, the user'"'"'s password being known by the portable computing device;
correlating the input selection to the currently displayed image; and
allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user'"'"'s password.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticating a user operating a portable computing device includes causing a sequence of images to be shown on a display, accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user'"'"'s password, the user'"'"'s password being known by the portable computing device, correlating the input selection to the currently displayed image, and allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user'"'"'s password.
120 Citations
21 Claims
-
1. A method of authenticating a user attempting to access a portable computing device comprising:
-
causing a sequence of images to be shown on a display;
accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user'"'"'s password, the user'"'"'s password being known by the portable computing device;
correlating the input selection to the currently displayed image; and
allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user'"'"'s password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for authenticating a user attempting to access a portable computing device by
causing a sequence of images to be shown on a display;
accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user'"'"'s password, the user'"'"'s password being known by the portable computing device;
correlating the input selection to the currently displayed image; and
allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user'"'"'s password. - View Dependent Claims (10, 11, 12, 13, 14, 15)
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for authenticating a user attempting to access a portable computing device by
-
16. A portable computing device comprising:
-
a memory to store instructions and data;
a processor to execute the instructions obtained from the memory to cause a sequence of images to be shown on a display of an un-trusted computing system, to accept an input selection from a user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user'"'"'s password, the user'"'"'s password being known by the portable computing device, to correlate the input selection to the currently displayed image; and
to allow access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user'"'"'s password. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification