×

Authorized user verification by sequential pattern recognition and access code acquisition

  • US 6,246,769 B1
  • Filed: 02/24/2000
  • Issued: 06/12/2001
  • Est. Priority Date: 02/24/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method of verifying the identification of an authorized user of a set of protected resources within an employed system during a transaction with any singular set member by requiring said authorized user to recall a single secret sequential matrix pattern located within a standardized geometric matrix, and using said recalled secret sequential matrix pattern to decode a random transaction specific access code located within said standardized geometric matrix for the purpose of gaining access to any singular member of said set of protected resources, whereby:

  • a) a single secret sequential matrix pattern is chosen within the standardized geometric matrix by the authorized user of specified length designated by the system in order to provide an adequate level of security for all members of the set of protected system resources;

    b) a length adjusting means of the transaction specific access code within the authorized user'"'"'s secret sequential matrix pattern is provided on a transaction to transaction basis;

    c) a matrix position, not associated with the authorized user'"'"'s secret sequential matrix pattern, is chosen by the authorized user to communicate the transaction specific access code length chosen by the system;

    d) a means is provided to store and recall a plurality of secret sequential matrix patterns and corresponding code length matrix positions within the standardized geometric matrix by the system;

    e) a means is provided to change the characters displayed within the standardized geometric matrix from transaction-to-transaction by the system;

    f) the transaction specific access code located within the authorized user'"'"'s secret sequential matrix pattern is randomly selected by the system, and not related to any fixed sequence of events;

    g) a means is employed that is capable of receiving and processing account identification data from a potential authorized user for the purpose of initial and preliminary identification in the form of direct data input from a keyboard, a credit card magnetic strip, a smart card, a biometric scan or any other form of potential authorized user identification data input, and can relate said identification data input to the authorized user'"'"'s secret sequential matrix pattern and corresponding code length matrix position within the standardized geometric matrix stored within the system memory;

    h) a means is employed that is capable of generating the random transaction specific access code within the authorized user'"'"'s secret sequential matrix pattern on a transaction to transaction basis, and whereby said transaction specific code is stored in a system memory location;

    i) a means is employed that can calculate the transaction specific code length for a particular transaction and place the results of that calculation in the authorized user'"'"'s secret matrix position dedicated to code length, and where by results of said calculation are recorded in a system memory location;

    j) a means is employed that is capable of displaying the geometric matrix containing the transaction specific code within the authorized user'"'"'s secret sequential matrix pattern along with other matrix characters to a potential authorized user, and subsequently transmitting said user sequential input of the decoded transaction specific code into the system for verification;

    k) a means is employed that can compare a user'"'"'s decoded and entered input and the corresponding transaction specific code stored in system memory and allow the transaction to proceed if the two codes are exactly identical in character sequence and length, or terminate the transaction if the codes are not exactly identical;

    l) a means is employed that can deny access to a user if a specific number of incorrect code input attempts are initiated by said user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×