PRESSURE-BASED AUTHENTICATION
First Claim
1. A method for securing data using alternative value identification schemes, the method comprising:
- receiving, by the one or more computer processors, user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user, a time, and a name of the user;
receiving, by the one or more computer processors, an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters, wherein the pressure-based authentication includes both a pressure value and a color based on the pressure value;
determining, by the one or more computer processors, whether the one or more authentication parameters match the user registration data; and
responsive to determining that the authentication data matches the registration data, authenticating, by the one or more computer processors, access for the user.
2 Assignments
0 Petitions
Accused Products
Abstract
In an approach to securing data using alternative value identification schemes, one or more computer processors receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user. The one or more computer processors receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters. The one or more computer processors determine whether the one or more authentication parameters match the user registration data. Responsive to determining that the authentication data matches the registration data, The one or more computer processors authenticate access for the user.
-
Citations
20 Claims
-
1. A method for securing data using alternative value identification schemes, the method comprising:
-
receiving, by the one or more computer processors, user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user, a time, and a name of the user; receiving, by the one or more computer processors, an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters, wherein the pressure-based authentication includes both a pressure value and a color based on the pressure value; determining, by the one or more computer processors, whether the one or more authentication parameters match the user registration data; and responsive to determining that the authentication data matches the registration data, authenticating, by the one or more computer processors, access for the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product for securing data using alternative value identification schemes, the computer program product comprising:
-
one or more computer readable storage devices and program instructions stored on the one or more computer readable storage devices, the stored program instructions comprising; program instructions to receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user, a time, and a name of the user; program instructions to receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters, wherein the pressure-based authentication includes both a pressure value and a color based on the pressure value; program instructions to determine whether the one or more authentication parameters match the user registration data; and responsive to determining that the authentication data matches the registration data, program instructions to authenticate access for the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system for securing data using alternative value identification schemes, the computer system comprising:
-
one or more computer processors; one or more computer readable storage devices; program instructions stored on the one or more computer readable storage devices for execution by at least one of the one or more computer processors, the stored program instructions comprising; program instructions to receive user registration data, wherein the user registration data includes one or more authentication parameters, wherein the one or more authentication parameters includes one or more physical pressure-based inputs by a user, a time, and a name of the user; program instructions to receive an access request requiring an authentication from the user, wherein the access request includes the one or more physical pressure-based inputs by the user associated with the one or more authentication parameters, wherein the pressure-based authentication includes both a pressure value and a color based on the pressure value; program instructions to determine whether the one or more authentication parameters match the user registration data; and responsive to determining that the authentication data matches the registration data, program instructions to authenticate access for the user. - View Dependent Claims (20)
-
Specification