Kinematic Based Authentication
First Claim
1. A computer implemented method for authentication by kinematic pattern match, the computer implemented method comprising:
- prompting for a kinematic input;
receiving an element of a kinematic pattern to form a set of received elements;
determining whether there are additional elements of the kinematic pattern;
responsive to a determination that there are no additional elements of the kinematic pattern, forming the kinematic pattern from the set of received elements;
computing a signature from the set of received elements;
determining whether the signature matches a predetermined value; and
responsive to a determination that the signature matches a predetermined value, sending an authentication signal.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a computer-implemented method for authentication by kinematic pattern match is provided. The computer implemented method prompts a user for a kinematic input, receives an element of a kinematic pattern to form a set of received elements, and determines whether there are additional elements of the kinematic pattern. Responsive to a determination that there are no additional elements of the kinematic pattern, forms a kinematic pattern from the set of received elements and computes a signature from the set of received elements. The computer implemented method further determines whether the signature matches a predetermined value, and responsive to a determination that the signature matches a predetermined value, sends an authentication signal.
68 Citations
1 Claim
-
1. A computer implemented method for authentication by kinematic pattern match, the computer implemented method comprising:
-
prompting for a kinematic input; receiving an element of a kinematic pattern to form a set of received elements; determining whether there are additional elements of the kinematic pattern; responsive to a determination that there are no additional elements of the kinematic pattern, forming the kinematic pattern from the set of received elements; computing a signature from the set of received elements; determining whether the signature matches a predetermined value; and responsive to a determination that the signature matches a predetermined value, sending an authentication signal.
-
Specification