PERSONAL AUTHENTICATIONS ON COMPUTING DEVICES
First Claim
1. A computer device, comprising:
- a computer-user interface configured to receive a string of characters as a personal authentication statement input by a user; and
a parser configured to parse a user-authentication token and a computer objects-authentication token from the personal authentication statement input by the user,wherein the computer objects-authentication token identifies at least one concealed computer object, andwherein the computer device is configured to reveal at least one concealed computer object upon authentication of the user and verification that the authenticated user is authorized to access the at least one concealed computer object.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer device receives a personal authentication statement from a user seeking to access concealed computer objects or applications on the computer device. A parser syntactically parses the personal authentication statement to extract a user-authentication token and a computer objects-authentication token. The computer objects-authentication token can identify one or more concealed computer objects on the computer device. The computer device reveals the one or more concealed computer objects to the user upon authentication of the user and verification that the authenticated user is authorized to access the concealed computer objects.
-
Citations
20 Claims
-
1. A computer device, comprising:
-
a computer-user interface configured to receive a string of characters as a personal authentication statement input by a user; and a parser configured to parse a user-authentication token and a computer objects-authentication token from the personal authentication statement input by the user, wherein the computer objects-authentication token identifies at least one concealed computer object, and wherein the computer device is configured to reveal at least one concealed computer object upon authentication of the user and verification that the authenticated user is authorized to access the at least one concealed computer object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
in a microprocessor-based computer device, receiving a string of characters as a personal authentication statement input at a computer-user interface by a user; parsing a user-authentication token and a computer objects-authentication token from the personal authentication statement; authenticating the user contingent on the parsed user-authentication token; identifying at least one concealed computer object contingent on the parsed computer objects-authentication token; and upon verifying that the authenticated user is authorized to access the identified at least one concealed computer object, revealing the identified at least one concealed computer object to the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium, comprising:
-
instructions capable of being executed on a microprocessor, which instructions when executed allow a computer device to process a string of characters as a personal authentication statement input by a user at a computer-user interface; parse a user-authentication token and a computer objects-authentication token from the personal authentication statement input by the user; and reveal at least one concealed computer object upon authentication of the user and verification that the authenticated user is authorized to access the identified at least one concealed computer object. - View Dependent Claims (19, 20)
-
Specification