Visual authentication systems and methods
First Claim
Patent Images
1. A method for authentication of an individual comprising:
- providing an automated system for controlling access by users, the system including a computer having memory, a processor, a power source, and a display having graphic user interface (GUI), wherein the system is operable for user interaction;
presenting a series of discernable images on the GUI to an individual user;
the series of discernable images including a first image and a next image;
requiring the individual user to input at least one selection relating to the series of discernable images;
authenticating the user and authorizing access if the user input matches previously stored initial settings.wherein the previously stored initial settings are established by the same individual user.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods for authenticating a user including presenting a series of images that are solely identifiable by the user, and that are not otherwise capable of being represented or expressed by the user, apart from the recognition thereof. Additionally, methods are provided that include the use of a gradient of morphed images created from a related set of initial images, including facial photos of various emotions that have been morphed into discernable images that are uniquely identifiable by a single user for use in authenticating the identification of that user by a secure system.
-
Citations
19 Claims
-
1. A method for authentication of an individual comprising:
-
providing an automated system for controlling access by users, the system including a computer having memory, a processor, a power source, and a display having graphic user interface (GUI), wherein the system is operable for user interaction; presenting a series of discernable images on the GUI to an individual user;
the series of discernable images including a first image and a next image;requiring the individual user to input at least one selection relating to the series of discernable images; authenticating the user and authorizing access if the user input matches previously stored initial settings. wherein the previously stored initial settings are established by the same individual user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating a user comprising the following steps:
-
providing a first image and at least one subsequent image; morphing the first image into the next of at least one subsequent image; recording at least one graduated image, wherein the at least one graduated image is created during the morphing step such that the at least one graduated image represents a transitional image state between the first image and the next of at least one subsequent image; and utilizing the at least one graduated image to provide a visual representation for identification by the user to authenticate the identity of the user for authorizing access to a secure system. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for authenticating a user comprising the following steps:
-
providing a first image and a second image; morphing the first image to the second image; recording on a computer readable medium a set of discernable graduated images created during the morphing step; selecting at least one of the discernable graduated images to represent an authentication key; presenting the set of discernable graduated images; and authenticating the user if the user selects the at least one of the discernable graduate images representing the authentication key.
-
Specification