Authentication system and method
First Claim
1. An authentication system for authenticating a user, the system comprising:
- one or more participant terminals operable to act as a client on a network;
a computer operable to act as a server on the network and to communicate with each of the participant terminals over the network, the computer comprising;
a memory configured to store a set of instructions; and
a processor configured to execute the set of instructions, wherein the set of instructions cause the processor to;
receive user login information from at least one participant terminal, wherein the user login information corresponds to a user profile;
generate an authentication data set comprising;
a plurality of decoy data;
an anchor data, wherein the anchor data is based on information from the user profile; and
at least one target data in a predetermined relationship relative to the anchor data, wherein the predetermined relationship is based on information from the user profile;
generate a decoy data set comprising;
a plurality of second decoy data; and
at least one anchor data, wherein the anchor data is based on information from the user profile;
display the authentication data set and decoy data set at at least one terminal;
determine an authentication result by performing a predetermined manipulation of the at least one target data, wherein the predetermined manipulation is based on information from the user profile;
receive a user response to an authentication prompt; and
compare the authentication result and the user response and authenticating the user if the authentication result and user response are the same.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system includes one or more terminals in communication with a server on a network. The server is operable to receive user login information; and generate an authentication data set having: a plurality of decoy data; an anchor data, wherein the anchor data is based on information from a user profile; and target data in a predetermined relationship relative to the anchor data. The server is also operable to generate a decoy data set having: a plurality of second decoy data; and at least one anchor data. The server may then display the authentication data set and decoy data set and determine an authentication result by performing a predetermined manipulation of the target data. The server may receive a user response to an authentication prompt; and authenticate the user if the authentication result and user response are the same.
19 Citations
20 Claims
-
1. An authentication system for authenticating a user, the system comprising:
-
one or more participant terminals operable to act as a client on a network; a computer operable to act as a server on the network and to communicate with each of the participant terminals over the network, the computer comprising; a memory configured to store a set of instructions; and a processor configured to execute the set of instructions, wherein the set of instructions cause the processor to; receive user login information from at least one participant terminal, wherein the user login information corresponds to a user profile; generate an authentication data set comprising;
a plurality of decoy data;an anchor data, wherein the anchor data is based on information from the user profile; and
at least one target data in a predetermined relationship relative to the anchor data, wherein the predetermined relationship is based on information from the user profile;generate a decoy data set comprising;
a plurality of second decoy data; andat least one anchor data, wherein the anchor data is based on information from the user profile; display the authentication data set and decoy data set at at least one terminal; determine an authentication result by performing a predetermined manipulation of the at least one target data, wherein the predetermined manipulation is based on information from the user profile; receive a user response to an authentication prompt; and compare the authentication result and the user response and authenticating the user if the authentication result and user response are the same. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An authentication system for authenticating a user generated event, the system comprising:
-
one or more participant terminals operable to act as a client on a network; a computer operable to act as a server on the network and to communicate with each of the participant terminals over the network, the computer comprising; a memory configured to store a set of instructions; and a processor configured to execute the set of instructions, wherein the set of instructions cause the processor to; generate an event confirmation data set in response to a user generated event, the event confirmation data set comprising;
a plurality of decoy data; and
at least one target data directly related to the event;display the confirmation data set at at least one terminal; determine an authentication result by performing a predetermined manipulation of the at least one target data, wherein the predetermined manipulation is based on information from a user profile; receive a user response to an authentication prompt; and compare the authentication result and the user response and authenticating the event if the authentication result and user response are the same. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for authenticating a user, said method comprising:
-
receiving user login information, wherein the user login information corresponds to a user profile; generating an authentication data set comprising;
a plurality of decoy data;
an anchor data, wherein the anchor data is based on information from the user profile; and
at least one target data in a predetermined relationship relative to the anchor data, wherein the predetermined relationship is based on information from the user profile;generating a decoy data set comprising;
a plurality of second decoy data; and
at least one anchor data, wherein the anchor data is based on information from the user profile;displaying the authentication data set and decoy data set for the user; determining an authentication result by performing a predetermined manipulation of the at least one target data, wherein the predetermined manipulation is based on information from the user profile; receiving a user response to an authentication prompt; and comparing the authentication result and the user response and authenticating the user if the authentication result and user response are the same.
-
Specification