BEHAVIORAL BIOMETRICS FOR AUTHENTICATION IN COMPUTING ENVIRONMENTS
First Claim
1. A computing system operable in a gaming environment that effectively provides one or more games, wherein said computing system is capable of:
- determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image and/or input provided in connection with said at least one image, wherein said at least one image is effectively provided for authentication of said one or more entities associated with said gaming environment; and
authenticating said one or more entities based on said one or more attribute values associated with said at least one image.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for authenticating one or more entities are disclosed. Authentication can be performed based on one or more attributes associated with an image and/or input provided in connection with an image. The image is effectively provided for authenticating one or more entities associated with a computing environment. The attributes which can be measures include the manner in which an image has been created and/or traced by a person being authenticated. A person can initially register with an authentication system by creating and/or tracing an image. Subsequently, the person can be provided with the same, similar and/or completely different image in order to be authenticated by the authentication system. It will be appreciated that the image needs not be a signature or provide any personal information about the person being authenticated.
-
Citations
57 Claims
-
1. A computing system operable in a gaming environment that effectively provides one or more games, wherein said computing system is capable of:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image and/or input provided in connection with said at least one image, wherein said at least one image is effectively provided for authentication of said one or more entities associated with said gaming environment; and authenticating said one or more entities based on said one or more attribute values associated with said at least one image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computing system operable in a gaming environment that effectively provides one or more games, wherein said computing system is capable of:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image effectively provided for authentication of one or more entities associated with said gaming environment; and storing said one or more one or more attribute values for subsequent authentication of said one or more entities.
-
-
38. A method for authenticating one or more entities in a gaming environment that effectively provides one or more games, said method comprising:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image effectively provided for authentication of one or more entities associated with said gaming environment; and storing said one or more attribute values for subsequent authentication of said one or more entities.
-
-
39. A computer readable medium including computer program code for authenticating one or more entities in a gaming environment that effectively provides one or more games, said computer readable medium comprising:
-
computer program code for determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image effectively provided for authentication of one or more entities associated with said gaming environment; computer program code for storing said one or more attribute values for subsequent authentication of said one or more entities.
-
-
40. A method for authenticating one or more entities in a gaming environment that effectively provides one or more games, said method comprising:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image and/or input provided in connection with said at least one image effectively provided for authentication of said one or more entities; and authenticating said one or more entities based on said one or more attribute values associated with said at least one image. - View Dependent Claims (41, 42, 43)
-
-
44. A computer readable medium including computer program code for authenticating one or more entities in a gaming environment that effectively provides one or more games, said computer readable medium comprising:
-
computer program code for determining, identifying and/or receiving one or more attribute values for one or more attributes associated with at least one image effectively provided for authentication of said one or more entities; and computer program code for authenticating said one or more entities based on said one or more attributes associated with said at least one image. - View Dependent Claims (48, 49, 50, 51, 52, 53)
-
-
45. A computing system operable in a computing environment, wherein said computing system is capable of:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with the manner in which at least one image has been created and/or traced, wherein said at least one image is effectively provided for authentication of one or more entities in said computing environment; and authenticating said one or more entities based on said one or more attribute values associated with the manner in which said at least one image has been created and/or traced. - View Dependent Claims (46, 47)
-
-
54. A computer-implemented method for authenticating one or more entities, said computer-implemented method comprising:
-
determining, identifying and/or receiving one or more attribute values for one or more attributes associated with the manner in which at least one image has been created and/or traced, wherein said at least one image is effectively provided for authentication of one or more entities in computing environment; and authenticating said one or more entities based on said one or more attribute values associated with the manner in which said at least one image has been created and/or traced.
-
-
55. A computer readable medium including computer program code for authenticating one or more entities, said computer-implemented method comprising:
-
computer program code for determining, identifying and/or receiving one or more attribute values for one or more attributes associated with the manner in which at least one image has been created and/or traced, wherein said at least one image is effectively provided for authentication of one or more entities in computing environment; and computer program code for authenticating said one or more entities based on said one or more attribute values associated with the manner in which said at least one image has been created and/or traced.
-
-
56. A computer-implemented method for registering one or more entities for subsequent authentication of said one or more entities, said computer-implemented method comprising:
-
determining one or more attribute values for one or more attributes associated with the manner in which at least one image has been created and/or traced, wherein said at least one image is effectively provided for authentication of one or more entities in computing environment; and saving said one or more attribute values for subsequent authentication of said one or more one or more.
-
-
57. A computing system capable of operating in a computing environment, wherein said computing system is capable of:
-
determining one or more attribute values for one or more attributes associated with the manner in which at least one image has been created and/or traced, wherein said at least one image is effectively provided for authentication of one or more entities in computing environment; and saving said one or more attribute values for subsequent authentication of said one or more one or more.
-
Specification