Online data encryption and decryption
First Claim
1. An authentication system comprising:
- a server computer communicatively coupled with one or more user computers via a computer network, wherein the server computer is configured to;
receive, from a user computer in the one or more user computers, an identifier that uniquely identifies a user;
retrieve, based on the identifier, a first image associated with the user, wherein the first image was previously selected by the user;
retrieve a second image that represents an entry interface;
modify the second image to generate a third image, wherein the second and third images are visually substantially similar but have different file sizes;
generate a personalized graphical interface that includes the first image and the third image; and
transmit the personalized graphical interface to the user computer.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user'"'"'s computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
152 Citations
19 Claims
-
1. An authentication system comprising:
a server computer communicatively coupled with one or more user computers via a computer network, wherein the server computer is configured to; receive, from a user computer in the one or more user computers, an identifier that uniquely identifies a user; retrieve, based on the identifier, a first image associated with the user, wherein the first image was previously selected by the user; retrieve a second image that represents an entry interface; modify the second image to generate a third image, wherein the second and third images are visually substantially similar but have different file sizes; generate a personalized graphical interface that includes the first image and the third image; and transmit the personalized graphical interface to the user computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 15, 16)
-
8. An authentication system comprising:
a server computer communicatively coupled with one or more user computers via a computer network, wherein the server computer is configured to; receive, from a user computer in the one or more user computers, a user identifier that uniquely identifies a user and a user computer identifier that uniquely identifies the user computer; compare the user computer identifier with a predefined list of user computer identifiers associated with the user identifier; if the user computer identifier is included in the predefined list; retrieve, based on the user identifier, a first image associated with the user, wherein the first image was previously selected by the user; generate a personalized graphical interface that includes the first image and a second image, the second image representing an entry interface; and transmit the personalized graphical interface to the user computer; else if the user computer identifier is not included in the predefined list; transmit a set of challenge questions to the user computer.
-
12. An authentication system comprising:
a server computer communicatively coupled with one or more user computers via a computer network, wherein the server computer is configured to; receive, from a user computer in the one or more user computers, an identifier that uniquely identifies a user; retrieve, based on the identifier, a first image associated with the user, wherein the first image was previously selected by the user; retrieve a second image that represents an entry interface and shift encrypt the second image to generate a third image; generate a personalized graphical interface that includes the first image and the third image; and transmit the personalized graphical interface to the user computer. - View Dependent Claims (13, 14)
-
17. A method performed by a server computer for authenticating one or more users, the method comprising:
-
receiving, by the server computer from a user computer, an identifier that uniquely identifies a user; retrieving, by the server computer based on the identifier, a first image associated with the user, wherein the first image was previously selected by the user; retrieving, by the server computer, a second image that represents an entry interface; modifying, by the server computer, the second image to generate a third image, wherein the second and third images are visually substantially similar but have different file sizes; generating, by the server computer, a personalized graphical interface that includes the first image and the third image; and transmitting, by the server computer, the personalized graphical interface to the user computer.
-
-
18. A method performed by a server computer for authenticating one or more users, the method comprising:
-
receiving, by the server computer from a user computer, a user identifier that uniquely identifies a user and a user computer identifier that uniquely identifies the user computer; comparing, by the server computer, the user computer identifier with a predefined list of user computer identifiers associated with the user identifier; if the user computer identifier is included in the predefined list; retrieving, by the server computer based on the user identifier, a first image associated with the user, wherein the first image was previously selected by the user; generating, by the server computer, a personalized graphical interface that includes the first image and a second image, the second image representing an entry interface; and transmitting, by the server computer, the personalized graphical interface to the user computer; else if the user computer identifier is not included in the predefined list; transmitting, by the server computer, a set of challenge questions to the user computer.
-
-
19. A method performed by a server computer for authenticating one or more users, the method comprising:
-
receiving, by the server computer from a user computer, an identifier that uniquely identifies a user; retrieving, by the server computer based on the identifier, a first image associated with the user, wherein the first image was previously selected by the user; retrieving, by the server computer, a second image that represents an entry interface and shift encrypting the second image to generate a third image; generating, by the server computer, a personalized graphical interface that includes the first image and the third image; and transmitting, by the server computer, the personalized graphical interface to the user computer.
-
Specification