HOLOGRAPHIC OBJECT AND USER ACTION COMBINATION-BASED AUTHENTICATION MECHANISM
First Claim
1. A method for authenticating a user of a computer system, wherein the computer system comprises at least one holographic image display device and at least one user monitoring device, the method comprising:
- displaying, in response to a request for access by a user and via the at least one holographic image display device, one or more holographic objects in a field of view of at least one user;
identifying via data received from said at least one user monitoring device, movement of the at least one user interacting with the displayed one or more holographic objects;
comparing the identified user movement to a predefined set of authentication information for the at least one user that links user authentication to a movement defined within confidence limits of the at least one user interacting with the displayed one or more holographic objects; and
when the identified user movement indicates the at least one user interacted with the displayed one or more objects within the defined confidence limits, then authenticating the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Aspects of the present invention provide an approach for authentication of a user of a computer system by displaying holographic objects in a bounded field of view of a user, identifying movement of the user interacting with the holographic objects, comparing the interacting movement to authentication information linking user authentication to a movement defined within confidence limits, and when the identified user movement indicates the user interacted with the displayed holographic objects within the defined confidence limits, authenticating the user on the computer system.
-
Citations
20 Claims
-
1. A method for authenticating a user of a computer system, wherein the computer system comprises at least one holographic image display device and at least one user monitoring device, the method comprising:
-
displaying, in response to a request for access by a user and via the at least one holographic image display device, one or more holographic objects in a field of view of at least one user; identifying via data received from said at least one user monitoring device, movement of the at least one user interacting with the displayed one or more holographic objects; comparing the identified user movement to a predefined set of authentication information for the at least one user that links user authentication to a movement defined within confidence limits of the at least one user interacting with the displayed one or more holographic objects; and when the identified user movement indicates the at least one user interacted with the displayed one or more objects within the defined confidence limits, then authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for authenticating a user, comprising:
-
a holographic image display device; a user monitoring device; a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to the bus that when executing the instructions causes the system to perform a method, comprising; displaying, in response to a request for access by a user and via the at least one holographic image display device, one or more objects in a field of view of at least one user; identifying via data received from said at least one user monitoring device movement of the at least one user interacting with the displayed one or more holographic objects; comparing the identified user movement to a predefined set of authentication information for the at least one user that links user authentication to a movement defined within confidence limits of the at least one user interacting with the displayed one or more holographic objects; and when the identified user movement indicates the at least one user interacted with the displayed one or more holographic objects within the defined confidence limits, then authenticating the user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embodied in a computer readable medium that, when executed by a computer device, performs a method for authenticating a user of a computer system comprising at least one image display device and at least one user monitoring device, the method comprising:
-
displaying, in response to a request for access by a user and via the at least one image display device, one or more objects in a field of view of at least one user; identifying via data received from said at least one user monitoring device movement of the at least one user interacting with the displayed one or more objects; comparing the identified user movement to a predefined set of authentication information for the at least one user that links user authentication to a movement defined within confidence limits of the at least one user interacting with the displayed one or more holographic objects; and when the identified user movement indicates the at least one user interacted with the displayed one or more objects within the defined confidence limits, then authenticating the user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification