User authentication with image password
First Claim
Patent Images
1. A method for authenticating a user, the method comprising:
- displaying a plurality of icons, wherein the plurality of icons are arranged in a pattern;
receiving a sequence of selected inputs, wherein each of the inputs corresponds to one of the plurality of icons;
repositioning the plurality of icons after each input; and
determining whether the user is authenticated based on the received sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus authenticates a user with an image password. In one implementation, a method is provided. According to the method, a plurality of icons are displayed. The plurality of icons are arranged in a pattern. The method receives a sequence of selected inputs. Each of the inputs corresponds to one of the plurality of icons. The method further repositions the plurality of icons after each input and determines whether the user is authenticated based on the received sequence.
95 Citations
20 Claims
-
1. A method for authenticating a user, the method comprising:
-
displaying a plurality of icons, wherein the plurality of icons are arranged in a pattern; receiving a sequence of selected inputs, wherein each of the inputs corresponds to one of the plurality of icons; repositioning the plurality of icons after each input; and determining whether the user is authenticated based on the received sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for authenticating a user, the apparatus comprising:
-
a display device, wherein the display device displays a plurality of icons arranged in a pattern; a processor, the processor executing program instructions for receiving a sequence of selected inputs, wherein each input corresponds to one of the plurality of icons and the plurality of icons are repositioning after receiving each input, the processor further determining whether the user is authenticated based on the received sequence. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for authenticating a user, the method comprising:
-
receiving an identity of user; displaying a plurality of icons, wherein the plurality of icons are arranged in a pattern on a touch screen; receiving a sequence of selected inputs received by the touch screen, wherein each of the inputs corresponds to one of the plurality of icons; repositioning the plurality of icons after each input; and determining whether the user is authenticated based on the identify of the user and the received sequence.
-
Specification