SYSTEM AND METHOD OF ENCODING CONTENT AND AN IMAGE
First Claim
Patent Images
1. A method of verifying the identity of a user at an authentication server comprising:
- receiving user data relating to a signature gesture entered by a user at a computing device, the user data comprising a plurality of sample points;
verifying the user data at the authentication server by comparing to reference signature data;
encoding a verification message within a digital image; and
notifying the user that their identity has been verified on the basis of the user data received from the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying the identity of a user at an authentication server that includes receiving user data relating to a signature gesture entered by a user at a computing device, the user data having a plurality of sample points, verifying the user data at the authentication server by comparing to reference signature data, encoding a verification message within a digital image, and notifying the user that their identity has been verified on the basis of the user data received from the computing device.
94 Citations
39 Claims
-
1. A method of verifying the identity of a user at an authentication server comprising:
-
receiving user data relating to a signature gesture entered by a user at a computing device, the user data comprising a plurality of sample points; verifying the user data at the authentication server by comparing to reference signature data; encoding a verification message within a digital image; and notifying the user that their identity has been verified on the basis of the user data received from the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for verifying the identify of a user, the method comprising:
-
receiving a sign-in request from a first computing device at an authentication server; and sending an instruction from the authentication server to a first computing device to provide signature data from a selected computing device wherein the signature data is entered at the selected computing device. - View Dependent Claims (21, 22, 23, 24, 27, 31)
-
-
25. An authentication server for verifying the identity of a user comprising:
-
inputs for receiving user data relating to a signature gesture entered by a user at a computing device, the user data comprising a plurality of sample points; a processor arranged to verify the user data by comparing to reference signature data and to encode a verification message within a digital image; and outputs arranged to notify the user that their identity has been verified on the basis of the user data received from the computing device.
-
-
26. A method of verifying the identity of a user comprising:
-
capturing user data as a user enters a signature gesture at a computing device, the user data comprising a plurality of sample points; sending the user data to an authentication server; verifying the user data at the authentication server by comparing to reference signature data; encoding a verification message within a digital image; and notifying the user that their identity has been verified on the basis of the user data received from the computing device.
-
-
28. A registration method for an identity verification system, the method comprising:
-
receiving n signature gestures from a user, each of the n signature gestures representing a different form of the user'"'"'s signature; storing each signature gesture within a user profile as a reference signature gesture; and associating each of the n signatures with a different security level defined within a security policy. - View Dependent Claims (29, 30, 32)
-
-
33. An authentication server for an identity verification system, the server comprising:
-
inputs arranged to receive n signature gestures from a user, each of the n signature gestures representing a different form of the user'"'"'s signature; a data store arranged to store each signature gesture within a user profile as a reference signature gesture; a processor arranged to associate each of the n signatures with a different security level defined within a security policy. - View Dependent Claims (34, 36, 37)
-
-
35. A method of verifying the identity of a user and granting access to a restricted resource on the basis of a pre-defined security policy, the method comprising:
-
receiving a request for access to the restricted resource; determining a security level associated with the received request on the basis of the pre-defined security policy; accessing a user profile, the user profile comprising a stored reference signature gesture associated with each security level within the predefined security policy; determining the appropriate reference signature gesture depending on the received access request; notifying the user of signature gesture sign-in requirements based on the access request and the determined security level; receiving the required signature gesture from the user; and
,comparing the received signature gesture with the reference signature gesture to determine the identity of the user and in the event that the user is verified to grant access to the restricted resource.
-
-
38. A method of verifying the identity of a user on the basis of a signature gesture captured via a computing device having an input device and a display screen comprising:
-
prior to capturing the signature gesture with the input device, displaying an animation to the user via the display screen capturing the signature gesture with the input device; and verifying the identity of the user on the basis of the captured signature gesture. - View Dependent Claims (39)
-
Specification