Method of authentication using familiar photographs
First Claim
1. A method of authenticating a user operating an access device comprising:
- causing the display, on the access device, of a plurality of photographs to the user, at least one of the photographs being selected at the time of authentication from the user'"'"'s personal collection of photographs and being already familiar to the user so that no prior training by the user is needed, the remaining displayed photographs being decoy photographs;
accepting an input selection from the user identifying one of the displayed photographs; and
allowing access when the user'"'"'s selection identifies the displayed photograph from the user'"'"'s personal photograph collection.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticating a user operating an un-trusted access device includes causing the display, on the un-trusted access device, of a plurality of photographs to the user, at least one of the photographs being from the user'"'"'s personal photograph collection and already familiar to the user, remaining photographs being decoy photographs, accepting an input selection from the user identifying one of the displayed photographs, and allowing access when the user'"'"'s selection correctly identifies a sequence of displayed photographs from the user'"'"'s photograph collection. No user training prior to using the authentication system is needed and no pre-selection of a password or photograph is necessary.
-
Citations
28 Claims
-
1. A method of authenticating a user operating an access device comprising:
-
causing the display, on the access device, of a plurality of photographs to the user, at least one of the photographs being selected at the time of authentication from the user'"'"'s personal collection of photographs and being already familiar to the user so that no prior training by the user is needed, the remaining displayed photographs being decoy photographs; accepting an input selection from the user identifying one of the displayed photographs; and allowing access when the user'"'"'s selection identifies the displayed photograph from the user'"'"'s personal photograph collection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An article comprising:
- a storage medium having a plurality of machine readable instructions, wherein when the instructions are executed by a processor, the instructions provide for authenticating a user operating an access device by causing the display, on the access device, of a plurality of photographs to the user, at least one of the photographs being selected at the time of authentication from the user'"'"'s personal collection of photographs and being already familiar to the user so that no prior training by the user is needed, the remaining displayed photographs being decoy photographs, accepting an input selection from the user identifying one of the displayed photographs, and allowing access when the user'"'"'s selection identifies the displayed photograph from the user'"'"'s personal photograph collection.
- View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
21. A system for authenticating a user of an access device comprising:
-
a photograph database having a plurality of photographs from the user'"'"'s personal photograph collection and a plurality of decoy photographs; a photograph authentication module to cause the display, on the access device, of a plurality of photographs to the user, at least one of the photographs being selected from the user'"'"'s personal collection and being already familiar to the user so that no prior training by the user is needed, the remaining displayed photographs being decoy photographs, to accept an input selection from the user identifying one of the displayed photographs, and to allow access when the user'"'"'s selection identifies the displayed photograph from the user'"'"'s personal photograph collection, wherein the photograph authentication module selects, at the time of authentication, the photograph from the user'"'"'s photograph collection to be displayed on the access device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification