ACCESS CONTROL FOR A RESOURCE
First Claim
1. An access control method for a resource in a computer system comprising:
- generating a challenge image including a user challenge;
generating a mask image including a mask;
generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and
granting access to the resource on receipt of a correct response by a user of the computer system to the challenge,wherein the user challenge is at least 70% masked by the mask,wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images, andwherein the composite image is dynamic by the mask randomly moving in the composite image periodically.
1 Assignment
0 Petitions
Accused Products
Abstract
An access controller comprising: a data store storing: a challenge image including a user challenge; a mask image including a mask; a composite image generator to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image; and a display to display the dynamic composite image to a user; a user input receiver, wherein the access controller to grants access to the resource on receipt, via the user input receiver, of a correct response by a user to the challenge, wherein that the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image, and wherein the composite image is dynamic by the mask randomly moving in the composite image periodically.
15 Citations
20 Claims
-
1. An access control method for a resource in a computer system comprising:
-
generating a challenge image including a user challenge; generating a mask image including a mask; generating a dynamic composite image comprising the challenge image and the mask image superimposed such that the user challenge is partially masked by the mask; and granting access to the resource on receipt of a correct response by a user of the computer system to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images, andwherein the composite image is dynamic by the mask randomly moving in the composite image periodically. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 20)
-
-
15. An access controller for a resource in a computer system, the access controller comprising:
-
a data store having stored therein; a challenge image including a user challenge, and a mask image including a mask; a composite image generator adapted to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image, a display adapted to display the dynamic composite image to a user; and a user input receiver, wherein the access controller is adapted to grant access to the resource on receipt, via the user input receiver, of a correct response by a user of the computer system to the challenge, wherein the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image by the mask and the challenge having one or more of;
identical colors, textures or images, andwherein the composite image is dynamic by the mask randomly moving in the composite image periodically. - View Dependent Claims (16, 17, 18, 19)
-
Specification