LANGUAGE INDEPENDENT LOGIN METHOD AND SYSTEM
First Claim
1. A method for preventing illegitimate access to a user computing machine comprising:
- setting an authentication routine in the user computing machine;
generating a virtual keyboard on the user computing machine;
entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor;
comparing the entered user identification with a secure user identification previously stored in the user computing machine; and
validating the user access to the user computing machine if a match occurs, otherwise denying access.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
-
Citations
17 Claims
-
1. A method for preventing illegitimate access to a user computing machine comprising:
-
setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for preventing illegitimate access to a user computing machine, comprising:
-
a system for setting an authentication routine in the user computing machine; a system for generating a virtual keyboard on the user computing machine; a system for entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; a system for comparing the entered user identification with a secure user identification previously stored in the user computing machine; and a system for validating the user access to the user computing machine if a match occurs, otherwise denying access. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program stored on a computer readable medium, which when executed, prevents illegitimate access to a user computing machine, comprising program code for:
-
setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
-
Specification