Online data encryption and decryption
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user'"'"'s computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
-
Citations
20 Claims
-
1. (canceled)
-
2. An authentication interface system comprising:
-
a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send to and receive information from each other over the computer network; and
the user computer programmed to display a graphical interface sent by the server;
wherein;
the server sends a first distorted graphical interface to the user computer at the beginning of an authentication session;
the user computer displays the first distorted graphical interface; and
the server sends a different distorted graphical interface with each successive authentication session. - View Dependent Claims (3, 4, 5)
-
-
6. An authentication interface system comprising:
-
a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send and receive information from each other over the computer network;
the user computer is programmed to display a graphical interface received from the server and to send encrypted authentication data to the server;
wherein;
the graphical interface is comprised of a set of alphanumeric symbols;
the server is programmed to send the user computer mapping instructions that correlate each alphanumeric symbol of the graphical interface with a corresponding symbol; and
the user computer is programmed to encrypt authentication data entered into the user computer by using the mapping instructions to generate a sequence of the corresponding symbols that correspond to the authentication data;
the user computer sends the encrypted authentication data to the server; and
the server decrypts the encrypted authentication data. - View Dependent Claims (7, 8, 9)
-
-
10. An authentication interface system comprising:
-
a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send and receive information from each other over the computer network; and
the user computer programmed to display a graphical interface sent by the server;
wherein;
the server sends a graphical interface to the user computer at the beginning of an authentication session;
the user computer displays the graphical interface at a first location on a display of the user computer; and
the location of the graphical interface within the display is different with each successive authentication session. - View Dependent Claims (11)
-
-
12. A computer implemented system for encrypting and decrypting a user identifier, comprising:
-
a user computer;
a server computer operably linked to the user computer;
wherein the user computer;
displays a graphical user interface comprising an arrangement of buttons representing identifies elements that, when selected by a user generate an input comprising the selected screen locations, wherein a sequence of identifier elements identifying a user;
distorts and/or displaces the arrangement of buttons from time-to-time so that the screen locations of the buttons changes, and transmits the screen locations selected by the user to the server, and wherein the server computer decrypts an identifier by correlating the screen locations selected by a user with the known distortions and/or displacements, the decrypted identifier confirming the identity of the user - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer implemented method for providing encryption and decryption of a user identifier that is used to gain access to a web site, which comprises:
-
a user computer; and
a server computer operably linked to the user computer;
wherein the user computer displays a graphical user interface comprising an image includes a plurality of sections configured to allow the user to input the predetermined identifier elements of the user identifier, with the server distorting, displacing, or jittering the image after each input of an identifier element to encrypt the user identifier by defining a distortion or displacement and a sequence of distortions or displacements encrypting a sequence of the predetermined identifier elements that identify a user; and
wherein the user computer transmits distortion or displacement data generated from the displayer user interface to the server computer, and the server computer decrypts the sequence of predetermined identifier elements by correlating the distortion or displacement data with the initial image prior to input to confirm the user identity. - View Dependent Claims (18, 19, 20)
-
Specification