MULTI-FACTOR AUTHENTICATION USING DIGITAL IMAGES OF BARCODES
First Claim
1. A method of implementing a multi-factor authentication scheme in a computing device having one or more processors, the method comprising:
- receiving a request from a user to access the computing device;
prompting the user to present a security image;
scanning the security image;
determining that the security image is associated with authorized access to the device;
prompting the user to enter a password;
receiving the password from the user;
determining that the received password is associated with authorized access to the device; and
granting the user access to the device in response to determining that the security image is associated with authorized access to the device and determining that the received password is associated with authorized access to the device.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media for implementing a multi-factor authentication scheme utilizing barcode images in computing devices, such as standard mobile devices and smartphones having no native hardware support for reading barcodes other than standard digital camera componentry for capturing digital images of real-world phenomena. A mobile device may be configured by software to require a user, as a first authentication factor, to present a barcode, such as a Quick Response (QR) Code for image scanning using digital camera componentry built into the mobile device. The device analyzes the digital image of the barcode to decode the barcode into its encoded character data. If the device recognizes the character data as valid, then, as a second authentication factor, the device prompts the user to enter a valid password associated with the barcode. If the user-entered barcode is also valid, then the device may grant the user access.
-
Citations
21 Claims
-
1. A method of implementing a multi-factor authentication scheme in a computing device having one or more processors, the method comprising:
-
receiving a request from a user to access the computing device; prompting the user to present a security image; scanning the security image; determining that the security image is associated with authorized access to the device; prompting the user to enter a password; receiving the password from the user; determining that the received password is associated with authorized access to the device; and granting the user access to the device in response to determining that the security image is associated with authorized access to the device and determining that the received password is associated with authorized access to the device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system configured to perform a multi-factor authentication scheme, the system comprising:
-
a processing system comprising one or more processors; digital camera componentry comprising one or more light sensors; and a memory system comprising one or more computer-readable media, wherein the computer-readable media contain instructions that, when executed by the processing system, cause the processing system to perform operations comprising; receiving a request from a user to access the system; prompting the user to present a security image; scanning the security image using the digital camera componentry; determining that the security image is associated with authorized access to the device; prompting the user to enter a password; receiving the password from the user; determining that the received password is associated with authorized access to the device; and granting the user access to the device in response to determining that the security image is associated with authorized access to the device and determining that the received password is associated with authorized access to the device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium tangibly embodying computer instructions for performing, by one or more processors, a method of implementing a multi-factor authentication scheme comprising:
-
receiving a request from a user to access the computing device; prompting the user to present a security image; scanning the security image; determining that the security image is associated with authorized access to the device; prompting the user to enter a password; receiving the password from the user; determining that the received password is associated with authorized access to the device; and granting the user access to the device in response to determining that the security image is associated with authorized access to the device and determining that the received password is associated with authorized access to the device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification