Method and system for authenticating a user of a computer system
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
-
Citations
53 Claims
-
1. Cancelled.
-
2. A system for authenticating a user of an electronic device, the system comprising:
-
an input device configured to communicate an authorization pattern to an electronic device;
a user interface configured to receive security information;
a compare circuit coupled to the input device and configured to determine whether the authorization pattern matches a stored pattern;
a timer configured to measure a duration of time between the communication of the authorization pattern and the receiving of the security information; and
a process circuit coupled to the compare circuit and to the timer, wherein the process circuit is configured to grant a user access to the electronic device in the event of a satisfactory match and if the measured duration is less than a designated amount. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authenticating a user of an electronic device, the system comprising:
-
a user interface configured to receive security information and an authorization pattern from a user;
a memory configured to store a predetermined pattern;
a compare circuit coupled to the user interface and to the memory;
wherein the compare circuit is configured to determine whether the authorization pattern matches the predetermined pattern;
a timer configured to measure a duration of time between the receiving of the security information and the receiving of the authorization pattern; and
a process circuit coupled to the timer and to the compare circuit, wherein the process circuit is configured to grant the user access to the electronic device in the event of a satisfactory match and if the measured duration is less than a designated amount. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for authenticating a user of an electronic device, the system comprising:
-
a user interface configured to instruct a user to provide security information to an electronic device;
process circuitry coupled to the user interface and configured to receive a first input signal representing the security information, wherein the process circuitry is further configured to receive a second input signal representing an authorization pattern; and
a timer coupled to the process circuitry and configured to measure a duration of time between the receiving of the first input signal and the receiving of the second input signal, wherein the process circuitry is further configured to determine the authenticity of the security information and of the authorization pattern. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A method of authenticating a user of an electronic device, the method comprising:
-
receiving authentication information from a user;
receiving an authorization pattern provided by an input device, wherein the authorization pattern is non-prompted;
comparing the non-prompted authorization pattern with a stored pattern;
measuring a duration of time between the receiving of the authentication information and the receiving of the authorization pattern; and
granting the user access to an electronic device in the event of a satisfactory match between the non-prompted authorization pattern and the stored pattern and if the duration of time is less than a threshold amount. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method of authenticating a user of an electronic device, the method comprising:
-
receiving security information from a user;
receiving an authorization pattern provided by an input device;
determining whether the authorization pattern matches a stored pattern;
measuring a duration of time between the receiving of the security information and the receiving of the authorization pattern; and
granting the user access to an electronic device in the event of a satisfactory match and if the measured duration of time is less than a designated time. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A system for authenticating a user of an electronic device, the system comprising:
-
means for inputting an authorization pattern into an electronic device, means for comparing the authorization pattern with respective information associated with the user;
means for measuring a duration of time between an entry of security information and the inputting of the authorization pattern; and
processing means for granting the user access to the electronic device if the measured duration is less than a threshold duration and in the event of a satisfactory match between the authorization pattern and the respective information associated with the user. - View Dependent Claims (48, 49, 50, 51, 52, 53)
-
Specification