IDENTITY VERIFICATION VIA SELECTION OF SENSIBLE OUTPUT FROM RECORDED DIGITAL DATA
First Claim
1. A method comprising:
- sampling digital data according to a sampling function operating on a computer from a data stream for generating visible output during one or more observation sessions between at least two network nodes, wherein the one or more observation sessions are conducted for a primary purpose other than image recognition training and are each initiated under a defined user account;
associating the sampled digital data stored on a computer-readable medium an identifier for the user account under which the one or more observation sessions are initiated;
authenticating access for a later session under the user account, in response to receiving input from a client indicating selection of sensible output generated from the sampled digital data from a challenge matrix comprising the sensible output generated from the sampled digital data and decoy digital data.
0 Assignments
0 Petitions
Accused Products
Abstract
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs.
-
Citations
22 Claims
-
1. A method comprising:
-
sampling digital data according to a sampling function operating on a computer from a data stream for generating visible output during one or more observation sessions between at least two network nodes, wherein the one or more observation sessions are conducted for a primary purpose other than image recognition training and are each initiated under a defined user account; associating the sampled digital data stored on a computer-readable medium an identifier for the user account under which the one or more observation sessions are initiated; authenticating access for a later session under the user account, in response to receiving input from a client indicating selection of sensible output generated from the sampled digital data from a challenge matrix comprising the sensible output generated from the sampled digital data and decoy digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising processor operating instructions, configured for causing a computer to:
-
sample a data stream for independently generating visible image output during one or more prior sessions with a client, thus producing data sampled according to a sampling function; store the sampled data in a database in association with an identifier for an account under which the first session is operated; and permit access for the subsequent session in response to receiving input indicating successful discrimination between the sensible output generated from the sampled data and sensible output generated from decoy data in a challenge matrix used to secure access to a subsequent session initiated under the account identifier - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method comprising:
-
hosting, by at least one computer, a secure online process in which images are output at a client device in response to data from the hosting means; sampling the data from the hosting independently of the secure online process to generate stored sample data sampled according to a sampling function and configured for replicating images output during the secure online process; and presenting images generated from the stored sample data with decoy images to authenticate a client initiating a subsequent process.
-
Specification