Online data encryption and decryption
First Claim
1. A computer-implemented authentication interface system comprising:
- a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send and receive information from each other over the computer network; and
a graphical interface comprising a combination image that includes a user-specific image correlated to a user-name, and an entry interface;
wherein the server is programmed to;
send the graphical interface to the user computer in response to the user-name received from the user computer, and the user computer is programmed to receive and display the graphical interface sent by the server; and
randomly alter the file size of the combination image by changing values to prevent a fraudulent entity from accurately identifying the combination image.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user'"'"'s computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
-
Citations
21 Claims
-
1. A computer-implemented authentication interface system comprising:
-
a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send and receive information from each other over the computer network; and
a graphical interface comprising a combination image that includes a user-specific image correlated to a user-name, and an entry interface;
wherein the server is programmed to;
send the graphical interface to the user computer in response to the user-name received from the user computer, and the user computer is programmed to receive and display the graphical interface sent by the server; and
randomly alter the file size of the combination image by changing values to prevent a fraudulent entity from accurately identifying the combination image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 12, 13, 14)
-
-
9. A computer-implemented authentication interface system comprising:
-
a server connected to a computer network;
a user computer connected to the computer network;
the user computer and the server programmed to send and receive information from each other over the computer network; and
a graphical interface comprising a combination image that includes a user-specific image correlated to a user-name, and an entry interface;
wherein the user computer is programmed to receive and display a user-name interface, and to send to the server a user-name that is input by a user into the user-name interface, the server is programmed to correlate the user-name with a pre-defined list of user computers, and the server is programmed to send a personalized graphical interface to the user computer if the identity of the user computer matches one of the computers listed on the pre-defined list. - View Dependent Claims (10, 11)
-
- 15. A computer implemented authentication method between a user and an entity holding information of a user, whereas the entity must authenticate the identity of the user prior to providing user access to the information, whereas the entity provides to the user a shift encrypted graphical interface comprising a combination image that includes a user-specific image correlated to the user and an entry interface, so that the user can authenticate the entity prior to attempting to access the information.
-
21-23. -23. (canceled)
Specification