Online data encryption and decryption
First Claim
1. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:
- code that causes the computer system to receive an identifier associated with a user of a user computer;
code that causes the computer system to, at a time of a first authentication session, send a first distorted graphical interface to the user computer, wherein the first distorted graphical interface is operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the first distorted graphical interface is personalized for the user by the computer system based on the identifier, and wherein the first distorted graphical interface is distorted using a first mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter; and
code that causes the computer system to, at a time of a second authentication session, send a second distorted graphical interface to the user computer that is distinct from the first distorted graphical interface, wherein the second distorted graphical interface is also operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the second distorted graphical interface is also personalized for the user by the computer system based on the identifier, wherein the second distorted graphical interface is distorted using a second mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter, and wherein the second mathematical algorithm is different from the first mathematical algorithm.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user'"'"'s computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
-
Citations
6 Claims
-
1. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:
-
code that causes the computer system to receive an identifier associated with a user of a user computer; code that causes the computer system to, at a time of a first authentication session, send a first distorted graphical interface to the user computer, wherein the first distorted graphical interface is operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the first distorted graphical interface is personalized for the user by the computer system based on the identifier, and wherein the first distorted graphical interface is distorted using a first mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter; andcode that causes the computer system to, at a time of a second authentication session, send a second distorted graphical interface to the user computer that is distinct from the first distorted graphical interface, wherein the second distorted graphical interface is also operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the second distorted graphical interface is also personalized for the user by the computer system based on the identifier, wherein the second distorted graphical interface is distorted using a second mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter, and wherein the second mathematical algorithm is different from the first mathematical algorithm. - View Dependent Claims (2, 3)
-
-
4. A method for providing an authentication interface, the method comprising
receiving, at a server, an identifier associated with a user of a user computer; -
at a time of a first authentication session, sending a first distorted graphical interface from the server to the user computer, wherein the first distorted graphical interface is operable by the user of the user computer to enter authentication information to be sent to the server, wherein the first distorted graphical interface is personalized for the user by the server based on the identifier, and wherein the first distorted graphical interface is distorted using a first mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter;at a time of a second authentication session, sending a second distorted graphical interface from the server to the user computer that is distinct from the first distorted graphical interface, wherein the second distorted graphical interface is also operable by the user of the user computer to enter authentication information to be sent to the server, wherein the second distorted graphical interface is also personalized for the user by the server based on the identifier, and wherein the second distorted graphical interface is distorted using a second mathematical algorithm selected from a group consisting of;
a texture filter, a distortion filter, a noise filter, and a pixel filter, and wherein the second mathematical algorithm is different from the first mathematical algorithm. - View Dependent Claims (5, 6)
-
Specification