INPUT VALIDATION, USER AND DATA AUTHENTICATION ON POTENTIALLY COMPROMISED MOBILE DEVICES
First Claim
1. A computer-implemented method for authenticating a user and user input to a back-end system and for validating the user input, the method being executed using one or more processors and comprising:
- receiving, by the one or more processors, a unique user identifier and user input;
generating, by the one or more processors, a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge comprising a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input;
transmitting the personalized image recognition challenge for display on a device;
receiving, by the one or more processors, a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images; and
authenticating the user and the user input based on the response.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable storage media for authenticating a user and user input to a back-end system and for validating the user input. In some implementations, actions include receiving a unique user identifier and user input, generating a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge including a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input, transmitting the personalized image recognition challenge for display on a device, receiving a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images, and authenticating the user and the user input based on the response.
-
Citations
16 Claims
-
1. A computer-implemented method for authenticating a user and user input to a back-end system and for validating the user input, the method being executed using one or more processors and comprising:
-
receiving, by the one or more processors, a unique user identifier and user input; generating, by the one or more processors, a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge comprising a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input; transmitting the personalized image recognition challenge for display on a device; receiving, by the one or more processors, a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images; and authenticating the user and the user input based on the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium coupled to one or more processors and having instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to perform operations for authenticating a user and user input to a back-end system and for validating the user input, the operations comprising:
-
receiving a unique user identifier and user input; generating a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge comprising a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input; transmitting the personalized image recognition challenge for display on a device; receiving a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images; and authenticating the user and the user input based on the response.
-
-
16. A system, comprising:
-
a computing device; and a computer-readable storage device coupled to the computing device and having instructions stored thereon which, when executed by the computing device, cause the computing device to perform operations for authenticating a user and user input to a back-end system and for validating the user input, the operations comprising; receiving a unique user identifier and user input; generating a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge comprising a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input; transmitting the personalized image recognition challenge for display on a device; receiving a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images; and authenticating the user and the user input based on the response.
-
Specification