Method And System For On-Screen Authentication Using Secret Visual Message
First Claim
Patent Images
1. A method of authenticating a user, comprising:
- providing a user key to an authentication authority;
providing a transmission message from the authentication authority in response to the user key;
providing a secret message using the transmission message;
displaying the secret message to the user using a display screen; and
providing a user response to the authentication authority in response to the user observing the secret message.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating a user includes providing a user key to an authentication authority, providing a transmission message from the authentication authority in response to the user key, providing a secret message using the transmission message, displaying the secret message to the user using a display screen, and providing a user response to the authentication authority in response to the user observing the secret message.
-
Citations
102 Claims
-
1. A method of authenticating a user, comprising:
-
providing a user key to an authentication authority; providing a transmission message from the authentication authority in response to the user key; providing a secret message using the transmission message; displaying the secret message to the user using a display screen; and providing a user response to the authentication authority in response to the user observing the secret message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 61)
-
-
11. A method of authenticating a user, comprising:
-
providing a visual overlay from an authentication authority; providing a user key to the authentication authority; providing a background message from the authentication authority in response to the user key; displaying the background message on a display screen while the visual overlay is positioned over, aligned with and attached to the display screen; displaying a secret message to the user using the visual overlay and the background message; and providing a user response to the authentication authority in response to the user observing the secret message. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 28, 29, 31)
-
-
25-27. -27. (canceled)
-
30. (canceled)
-
32-40. -40. (canceled)
-
41. A method of authenticating a user, comprising:
-
providing a user key to the authentication authority; encoding a secret message at the authentication authority in response to the user key, thereby providing an encoded message; providing the encoded message from the authentication authority in response to the user key; decoding the encoded message, thereby providing the secret message; displaying the secret message on a display screen to the user in response to decoding the encoded message; and providing a user response to the authentication authority in response to the user observing the secret message on the display screen. - View Dependent Claims (51, 101, 102)
-
-
42-50. -50. (canceled)
-
52-60. -60. (canceled)
-
62-70. -70. (canceled)
-
71. A method of authenticating a user, comprising:
-
providing a private key from an authentication authority; providing a user key to the authentication authority; providing a background message from the authentication authority in response to the user key; displaying the background message on a display screen while a mobile phone with the user private key is used to capture the background message on the display screen; displaying a secret message to the user using the mobile phone containing the private key and the background message; and providing a user response to the authentication authority in response to the user observing the secret message. - View Dependent Claims (72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 91)
-
-
84-90. -90. (canceled)
-
92-100. -100. (canceled)
Specification