System and method for user authentication
First Claim
Patent Images
1. A method of authenticating a user of an electronic device, the method comprising:
- prompting a user to input security information;
receiving in an electronic device the security information from the user;
receiving in the electronic device an authorization pattern, wherein entry of the authorization pattern is non-prompted, and wherein the receiving of the non-prompted authorization pattern occurs after the receiving of the security information;
authenticating the security information;
determining whether the non-prompted authorization pattern matches a stored pattern;
measuring a duration of time between the receiving of the security information and the receiving of the non-prompted authorization pattern; and
granting the user access to the electronic device if the measured duration of time is less than a designated amount and in the event of a satisfactory match between the non-prompted authorization pattern and the stored pattern.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.
-
Citations
46 Claims
-
1. A method of authenticating a user of an electronic device, the method comprising:
-
prompting a user to input security information;
receiving in an electronic device the security information from the user;
receiving in the electronic device an authorization pattern, wherein entry of the authorization pattern is non-prompted, and wherein the receiving of the non-prompted authorization pattern occurs after the receiving of the security information;
authenticating the security information;
determining whether the non-prompted authorization pattern matches a stored pattern;
measuring a duration of time between the receiving of the security information and the receiving of the non-prompted authorization pattern; and
granting the user access to the electronic device if the measured duration of time is less than a designated amount and in the event of a satisfactory match between the non-prompted authorization pattern and the stored pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of user authentication, the method comprising:
-
prompting a user of an electronic device to input authentication information;
receiving authentication information from the user;
receiving an authorization pattern input by the user, wherein the inputting of the authorization pattern is non-prompted;
authenticating the authentication information;
determining whether the authorization pattern matches a stored pattern; and
granting the user access to the electronic device in the event of a satisfactory match. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for authenticating a user of an electronic device, the system comprising:
-
at least one input device coupled to an electronic device;
a user interface configured to prompt a user to provide authentication information with the at least one input device;
a processor coupled to the at least one input device and configured to receive said authentication information from the at least one input device, said processor being further configured to receive from the at least one input device a non-prompted authorization pattern;
a timer configured to measure a duration of time between the receiving of the authentication information and the receiving of the non-prompted authorization pattern;
a memory configured to store a predetermined pattern; and
a compare circuit coupled to the processor and to the memory, wherein the compare circuit is configured to compare at least the non-prompted authorization pattern with the predetermined pattern, and wherein the compare circuit is configured to grant the user access to the electronic device in the event of a satisfactory match. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A system for authenticating a user of an electronic device, the system comprising:
-
a user interface configured to instruct a user to provide security information to an electronic device; and
process circuitry coupled to the user interface and configured to receive a first input signal representing said security information, wherein said process circuitry is further configured to receive a second input signal representing a non-prompted authorization pattern, and wherein said process circuitry in further configured to determine the authenticity of said security information and of said non-prompted authorization pattern. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for authenticating a user of an electronic device, the system comprising:
-
means for prompting the input of security information by a user;
means for inputting the security information;
means for inputting an authorization pattern, wherein the input of the authorization pattern is non-prompted; and
means for comparing the security information and the non-prompted authorization pattern with respective information associated with the user, wherein said means for comparing is configured to grant the user access to an electronic device in the event of a satisfactory match between the security information and non-prompted authorization pattern and the respective information associated with the user. - View Dependent Claims (42, 43, 44, 45, 46)
-
Specification