Visual access to restricted functions represented on a graphical user interface
First Claim
1. A computer system with a computer memory and a central processing system operating under an operating system with a graphical user interface having icons representing various functions to be performed, said computer system being characterized by having a security code access system comprising:
- a) code selection means including;
i) a plurality of code icons appearing of the graphical user interface,ii) a plurality of target sites andiii) selection means for use in a security process which includes selecting two or more code icons among the plurality of code icons in a selection sequence and moving them to at least one target site of the plurality of target sites,b) a security code access sequence, including at least one target site, stored in the computer memory;
c) comparison means for comparing the selection sequence to the access sequence; and
d) a restricted function capable of being executed on the central processing unit only when the comparison means indicates that the selection sequence matches the access sequence so that access to and use of the restricted function is limited to users who select the code icons in the security code access sequence.
0 Assignments
0 Petitions
Accused Products
Abstract
Computer users access and/or execute a selected restricted function on a computer using a graphical user interface (GUI) by entering an iconic password that is defined by selecting two or more visual icons, called code icons, in a sequence called an iconic password sequence. The entered sequence is compared to a target sequence that represents the restricted function. If the entered sequence matches the target sequence, the user is permitted to execute/access the restricted function. The number of possible combinations in the target sequence, and therefore system security, can be increased by inputting both a code icon and a target site for one or more of the components of the target sequence.
-
Citations
15 Claims
-
1. A computer system with a computer memory and a central processing system operating under an operating system with a graphical user interface having icons representing various functions to be performed, said computer system being characterized by having a security code access system comprising:
-
a) code selection means including; i) a plurality of code icons appearing of the graphical user interface, ii) a plurality of target sites and iii) selection means for use in a security process which includes selecting two or more code icons among the plurality of code icons in a selection sequence and moving them to at least one target site of the plurality of target sites, b) a security code access sequence, including at least one target site, stored in the computer memory; c) comparison means for comparing the selection sequence to the access sequence; and d) a restricted function capable of being executed on the central processing unit only when the comparison means indicates that the selection sequence matches the access sequence so that access to and use of the restricted function is limited to users who select the code icons in the security code access sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computer system with a computer memory and a central processing system operating under an operating system with a graphical user interface having icons representing various functions to be performed, said computer system being characterized by method for a security code access procedure comprising:
-
a) providing a plurality of code icons and target sites on said graphical user interface and having selection means for use in a selection process involving choosing two or more of the code icons and moving them to at least one of the target sites among the plurality of code icons and target sites in a selection sequence; b) storing a sequence constituting a security access code of two or more code icons and at least one target site in the computer memory; c) comparing the icons and at least one target site selected and the order of their selection in the selection sequence with the sequence constituting the security access code; d) allowing access to a restricted function only when the comparison indicates that the icons selected and the order of their selection in the selection sequence matches the access sequence to limit access to the restricted function to users selecting the code icons in the access code sequence. - View Dependent Claims (12, 13, 14, 15)
-
Specification