Method for verifying authorized access
First Claim
1. A method for verifying authorized access, said method comprising the steps of:
- (1) inputting a user identification by a user;
(2) determining whether said user identification is an authorized user identification, if positive, then proceeding to step (4), if negative, then proceeding to the next step;
(3) displaying an image according to a predetermined reference background to indicate an inputting rule for assignable districts of said reference background, so as to facilitate inputting and setting of a password which consists of one or multiple said assignable districts;
(4) displaying an dynamically constructed image according to a predetermined reference background to indicate an inputting rule that is produced dynamically and corresponds to assignable districts of said reference background, so as to facilitate inputting of a password, and then proceeding to verify validity of said password;
(5) End.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is related to a method for verifying authorized access, and is specifically a method for verifying authorized access with an improved means of inputting a password, so as to prevent a spectator observing the inputting process from learning the password, and to facilitate memorizing the password. In said method, a user memorizes as a ‘user-friendly’ password, in relation to a reference background predetermined by the user, at least one locations as assignable districts, their order, and their number, but inputs the password by inputting codes that are shown at locations of the assignable districts consisting the memorized password. These codes are randomly determined and shown to the user, so that the codes as password change each time whenever the user asks to enter the system.
51 Citations
6 Claims
-
1. A method for verifying authorized access, said method comprising the steps of:
-
(1) inputting a user identification by a user;
(2) determining whether said user identification is an authorized user identification, if positive, then proceeding to step (4), if negative, then proceeding to the next step;
(3) displaying an image according to a predetermined reference background to indicate an inputting rule for assignable districts of said reference background, so as to facilitate inputting and setting of a password which consists of one or multiple said assignable districts;
(4) displaying an dynamically constructed image according to a predetermined reference background to indicate an inputting rule that is produced dynamically and corresponds to assignable districts of said reference background, so as to facilitate inputting of a password, and then proceeding to verify validity of said password;
(5) End. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification