System and method for user authentication with enhanced passwords
First Claim
1. A method for user authentication, the method involving the use of a database storing a selected access code and the same or another database storing a selected certain pace, rhythm, or tempo, wherein said selected certain pace, rhythm, or tempo is associated with said selected access code, said method comprising:
- providing a user with at least one the following to assist the user with entering the access code;
a visual timing aid, an auditory timing aid, and a tactile timing aid;
receiving an access code from the user and determining a pace, rhythm, or tempo at which the access code was entered by the user;
determining that the entered access code matches a stored access code character sequence and that the certain pace, rhythm, or tempo at which the access code was entered matches a stored certain pace, rhythm, or tempo for the stored access code; and
granting access based, at least in part, on the determination that (i) the entered access code matches the stored access code character sequence, and (ii) the certain pace, rhythm, or tempo of the access code as entered by the user matches the stored certain pace, rhythm, or tempo for the stored access code.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for enhancing passwords, access codes, and personal identification munbers by making them pace, rhythm, or tempo sensitive. The password includes a sequence of characters and an associated timing element. To access a restricted device or funcion a user enters the correct character sequence according to the correct pace, rhythm, or tempo. The entered sequence and timing elementare compared with stored values and access is granted only if the entered and stored values match. In an alternative embodiment the stored timing element is set, and periodically altered, by a computer or program without consent from the user and visual, auditory, and/or tactile prompts indicate the correct timing element to the user during the authentication process. The meaning of the prompts are provided to the user in advance.
-
Citations
59 Claims
-
1. A method for user authentication, the method involving the use of a database storing a selected access code and the same or another database storing a selected certain pace, rhythm, or tempo, wherein said selected certain pace, rhythm, or tempo is associated with said selected access code, said method comprising:
-
providing a user with at least one the following to assist the user with entering the access code;
a visual timing aid, an auditory timing aid, and a tactile timing aid;receiving an access code from the user and determining a pace, rhythm, or tempo at which the access code was entered by the user; determining that the entered access code matches a stored access code character sequence and that the certain pace, rhythm, or tempo at which the access code was entered matches a stored certain pace, rhythm, or tempo for the stored access code; and granting access based, at least in part, on the determination that (i) the entered access code matches the stored access code character sequence, and (ii) the certain pace, rhythm, or tempo of the access code as entered by the user matches the stored certain pace, rhythm, or tempo for the stored access code. - View Dependent Claims (2, 3)
-
-
4. A method for user authentication, comprising:
-
entering a first access code into a database; entering a certain pace, rhythm, or tempo into a database and associating said selected certain pace, rhythm, or tempo with said first access code; receiving a second access code from a user and determining a pace, rhythm, or tempo at which the second access code was entered by the user; determining that the entered second access code matches the stored first access code and that the certain pace, rhythm, or tempo at which the second access code was entered matches the stored certain pace, rhythm, or tempo for the stored first access code; and granting access to the user based, at least in part, on the determination that (i) the entered second access code matches the stored first access code, and (ii) the certain pace, rhythm, or tempo of the second access code as entered by the user matches the stored certain pace, rhythm, or tempo for the stored first access code; wherein the stored certain pace, rhythm, or tempo for the stored first access code is set and alterable by a computer without consent from the user; and
further comprising providing prompts from the computer while receiving the second access code, wherein the prompts indicate to the user the stored certain pace, rhythm, or tempo for the stored first access code. - View Dependent Claims (5, 6)
-
-
7. A system for user authentication, the system comprising:
-
a computer and a computer memory; an input device permitting input by a user; a user-defined password including a sequence of characters, wherein the sequence of characters of the user-defined password is stored in the computer memory; a computer generated timing element, the timing element defined by predetermined pauses associated with the sequence of characters, wherein the system is configured to provide user authentication when the user inputs the password sequence of characters with the input device according to the predetermined pauses of the timing element, and wherein the timing element is alterable by the computer without consent by the user; and a mechanism configured to provide the user with at least one of a visual, auditory, and tactile timing aid to assist the user with entering the access code. - View Dependent Claims (8, 9, 10)
-
-
11. A system for user authentication, the system comprising:
-
a computer and a computer memory; an input device permitting input by a user; a user-defined password including a sequence of characters, wherein the sequence of characters of the user-defined password is stored in the computer memory; and a computer generated timing element, the timing element defined by predetermined pauses associated with the sequence of characters, wherein the timing element is alterable by the computer without consent by the user, and wherein the system is configured to provide user authentication when the user inputs the password sequence of characters with the input device according to the predetermined pauses of the timing element; a ghost character feature, the ghost character feature capable of being locked and unlocked by the user; the ghost character feature permitting the user to input, during the pauses in the password or access code, additional characters; and the computer being configured to ignore the additional characters when the ghost character feature is unlocked.
-
-
12. A computer-readable storage device comprising computer readable instructions that, if executed by a computer, cause the computer to carry out a method for user authentication, the method involving the use of a database storing a selected access code and the same or another database storing a selected certain pace, rhythm, or tempo, wherein said selected certain pace, rhythm, or tempo is associated with said selected access code, the method comprising:
-
providing a user with at least one of a visual, auditory, and tactile timing prompt to assist the user with entering the access code; receiving an access code from the user and determining a pace, rhythm, or tempo at which the access code was entered by the user; determining that the entered access code matches a stored access code character sequence and that the pace, rhythm, or tempo at which the access code was entered matches the certain pace, rhythm, or tempo associated with the stored access code. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-implemented method for user authentication, wherein the computer is coupled to a database including a first access code for a user and a pace, rhythm, or tempo associated with said first access code, comprising:
-
providing, via an output device, at least one of a visual, auditory, and tactile timing prompt; receiving, via an input device, a second access code and determining a pace, rhythm, or tempo at which the second access code was entered; and authenticating the user by determining that the entered second access code matches the stored first access code and that the pace, rhythm, or tempo at which the second access code was entered matches the stored pace, rhythm, or tempo associated with the stored first access code. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A computer-implemented system for user authentication, wherein the computer is coupled to a database including a first access code for a user and a pace, rhythm, or tempo associated with said first access code, comprising:
-
means for providing the user with at least one of a visual, auditory, and tactile timing prompt to assist the user with entering the access code; means for receiving a second access code from the user and determining a pace, rhythm, or tempo at which the second access code was entered by the user; means for authenticating the user by determining that the entered second access code matches the stored first access code and that the pace, rhythm, or tempo at which the second access code was entered matches the stored pace, rhythm, or tempo associated with the stored first access code; and means for granting access to the user to a domain. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
Specification