Image or pictographic based computer login systems and methods
First Claim
1. A user authentication method, comprising:
- displaying a first image on a computer display screen;
receiving a first user input indicating a portion of the first image;
determining if the first user input corresponds to a first acceptable user input for user authentication; and
proceeding with a user authentication procedure when the first user input corresponds to the first acceptable user input for user authentication.
2 Assignments
0 Petitions
Accused Products
Abstract
Image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.
-
Citations
20 Claims
-
1. A user authentication method, comprising:
-
displaying a first image on a computer display screen;
receiving a first user input indicating a portion of the first image;
determining if the first user input corresponds to a first acceptable user input for user authentication; and
proceeding with a user authentication procedure when the first user input corresponds to the first acceptable user input for user authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a computer display screen;
an input system for receiving user input; and
a processor system programmed and adapted to;
(a) display a first image on a computer display screen, (b) determine if a first user input indicating a portion of the first image corresponds to a first acceptable user input for user authentication, and (c) proceed with a user authentication procedure when the first user input corresponds to the first acceptable user input for user authentication. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification