System and method for user authentication
First Claim
1. A method for authenticating a user of a device, said method comprising:
- generating at least one arrangement comprising a sub-set of a plurality of stored objects, said sub-set comprising at least one authenticating object that forms at least part of a user'"'"'s authentication key and said sub-set further comprising at least one non-authenticating object, wherein said generating comprises randomly selecting a position within said at least one arrangement for said at least one authenticating object and randomly selecting said at least one non-authenticating object from said plurality of stored objects;
presenting to a user said generated at least one arrangement;
receiving input that comprises a selection of at least one of said objects from said at least one arrangement; and
determining whether said selection identifies said authentication key.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the present invention, a method for authenticating a user of a device comprises: generating at least one arrangement comprising a sub-set of a plurality of stored objects, the sub-set comprising at least one authenticating object that forms at least part of a user'"'"'s authentication key and the sub-set further comprising at least one non-authenticating object, wherein such generating comprises randomly selecting a position within the at least one arrangement for the at least one authenticating object and randomly selecting the at least one non-authenticating object from the plurality of stored objects; presenting to a user the generated at least one arrangement; receiving input that comprises a selection of at least one of the objects from the at least one arrangement; and determining whether the selection identifies the authentication key.
-
Citations
38 Claims
-
1. A method for authenticating a user of a device, said method comprising:
-
generating at least one arrangement comprising a sub-set of a plurality of stored objects, said sub-set comprising at least one authenticating object that forms at least part of a user'"'"'s authentication key and said sub-set further comprising at least one non-authenticating object, wherein said generating comprises randomly selecting a position within said at least one arrangement for said at least one authenticating object and randomly selecting said at least one non-authenticating object from said plurality of stored objects; presenting to a user said generated at least one arrangement; receiving input that comprises a selection of at least one of said objects from said at least one arrangement; and determining whether said selection identifies said authentication key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
means for generating at least one arrangement comprising a sub-set of a plurality of stored objects, said sub-set comprising at least one authenticating object that forms at least part of a user'"'"'s authentication key and said sub-set further comprising at least one non-authenticating object, wherein said generating means randomly selects a position within said at least one arrangement for said at least one authenticating object and randomly selects said at least one non-authenticating object from said plurality of stored objects; means for presenting to a user said at least one arrangement; means for receiving input that comprises a selection of at least one of said objects from said at least one arrangement; and means for determining whether received input is a selection of said authentication key, wherein a user is authenticated if said input is determined to be a selection of said authentication key. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A method for authenticating a user of a device, said method comprising:
-
for a user authentication session, presenting at least one arrangement comprising a sub-set of a plurality of stored objects, said sub-set comprising at least one authenticating object that forms at least part of a user'"'"'s authentication key and said sub-set further comprising at least one non-authenticating object randomly selected from said plurality of stored objects, wherein said at least one authenticating object is randomly positioned within said at least one arrangement; receiving input that comprises a selection of at least one of said objects from said at least one arrangement; and determining whether said selection identifies said authentication key. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification