System, method and article of manufacture for knowledge-based password protection of computers and other systems
First Claim
Patent Images
1. A method for password protecting user access, comprising:
- (a) displaying a composite image to a user, the composite image including a plurality of images relevant to a knowledge-based password known to the user;
(b) requiring the user to perform a sequence of actions to one or more of the plurality of images included in the composite image to produce a marked-up composite image;
an action in the sequence of actions including drawing in the composite image at least one of a graphical shape connecting two of the images, and a graphical shape around an image;
(c) comparing the performed sequence of actions indicated by the marked-up composite image with a predefined sequence of actions consistent with the knowledge-based password; and
(d) permitting user access when the performed sequence of actions matches the predefined sequence of actions.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method and article of manufacture are provided for password protecting user access to a computer system. One or more images are displayed to a user. The user is then required to perform a sequence of actions involving the images. The performed sequence of actions is compared with a predefined sequence of actions. If the performed sequence of actions matches the predefined sequence of actions, user access is permitted.
110 Citations
18 Claims
-
1. A method for password protecting user access, comprising:
-
(a) displaying a composite image to a user, the composite image including a plurality of images relevant to a knowledge-based password known to the user; (b) requiring the user to perform a sequence of actions to one or more of the plurality of images included in the composite image to produce a marked-up composite image;
an action in the sequence of actions including drawing in the composite image at least one of a graphical shape connecting two of the images, and a graphical shape around an image;(c) comparing the performed sequence of actions indicated by the marked-up composite image with a predefined sequence of actions consistent with the knowledge-based password; and (d) permitting user access when the performed sequence of actions matches the predefined sequence of actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program embodied on a computer readable medium for password protecting user access to a computer, comprising:
-
(a) a code segment that displays a composite image to a user, the the composite image including a plurality of images relevant to a knowledge-based password known to the user; (b) a code segment that requires the user to perform a sequence of actions to one or more images included in the composite image to produce a marked-up composite image;
an action in the sequence of actions including drawing in the composite image at least one of a graphical shape connecting two of the images and a graphical shape around an image.(c) a code segment that compares the performed sequence of actions indicated by the marked-up composite image with a predefined sequence of actions consistent with the knowledge based password; and (d) a code segment that permits user access to a computer when the performed sequence of actions matches the predefined sequence of actions. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for password protecting user access to a computer, comprising:
-
(a) logic that displays a composite image to a user, the composite image including a plurality of images relevant to a knowledge-based password known to the user; (b) logic that requires the user to perform a sequence of actions to one or more images included in the composite image to produce a marked-up composite image;
an action in the sequence of actions including drawing in the composite image at least one of a graphical shape connecting two of the images and a graphical shape around an image;(c) logic that compares the performed sequence of actions indicated by the marked-up composite image with a predefined sequence of actions consistent with the knowledge-based password; and (d) logic that permits user access to a computer when the performed sequence of actions matches the predefined sequence of actions.
-
Specification