SYSTEMS AND METHODS FOR SECURE AUTHENTICATION USING A WATERMARK
First Claim
1. A device for authenticating a user, comprising:
- one or more processors configured to;
prepare information including a watermark and a request for user credentials in response to a request for service requiring authentication, wherein the watermark comprises at least one of an image, text, a sound, a photo, and a combination thereof that is chosen by the user; and
match received user credentials to stored user credential information;
a network interface component coupled to a network, the network interface component configured to;
receive the request for the service requiring authentication; and
transmit the information including the watermark and the request for user credentials; and
a memory, the memory storing the user credential information for matching to received user credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and devices for authenticating a user using a watermark are provided. A device for authenticating a user includes one or more processors configured to prepare information including a watermark and a request for user credentials in response to a request for service requiring authentication, wherein the watermark comprises at least one of an image, text, a sound, a photo, and a combination thereof that is chosen by the user, and match received user credentials to stored user credential information. The device also includes a network interface component coupled to a network, the network interface component configured to receive the request for the service requiring authentication, and transmit the information including the watermark and the request for user credentials. The device further includes a memory, the memory storing the user credential information for matching to received user credentials.
-
Citations
20 Claims
-
1. A device for authenticating a user, comprising:
-
one or more processors configured to; prepare information including a watermark and a request for user credentials in response to a request for service requiring authentication, wherein the watermark comprises at least one of an image, text, a sound, a photo, and a combination thereof that is chosen by the user; and match received user credentials to stored user credential information; a network interface component coupled to a network, the network interface component configured to; receive the request for the service requiring authentication; and transmit the information including the watermark and the request for user credentials; and a memory, the memory storing the user credential information for matching to received user credentials. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium having instructions for execution by one or more processors that, when executed, cause the one or more processors to perform a method for authenticating a user, the method comprising:
-
receiving a request for a service that requires authentication; transmitting information including a watermark and a request for user credentials, wherein the watermark comprises at least one of an image, text, a sound, a photo, and a combination thereof that is chosen by the user; determining if received user credentials match stored user credential information, if user credentials are received; and authenticating the user and allowing the request for service if the received user credentials match the stored user credential information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium having instructions for execution by one or more processors that, when executed, cause the one or more processors to perform a method for authenticating a user, the method comprising:
-
transmitting a request for service; receiving information including a request for user credentials and a watermark, the watermark having been chosen by the user; displaying the received watermark to the user; and transmitting received user credential information if user enters the credential information in response to the watermark being an expected watermark, wherein the user does not enter the credential information if the watermark is not an expected watermark. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification