×

Online data encryption and decryption

  • US 7,822,990 B2
  • Filed: 12/22/2005
  • Issued: 10/26/2010
  • Est. Priority Date: 07/07/2004
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:

  • code that causes the computer system to receive an identifier associated with a user of a user computer;

    code that causes the computer system to, at a time of a first authentication session, send a first distorted graphical interface to the user computer, wherein the first distorted graphical interface is operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the first distorted graphical interface is personalized for the user by the computer system based on the identifier, and wherein the first distorted graphical interface is distorted using a first mathematical algorithm selected from a group consisting of;

    a texture filter, a distortion filter, a noise filter, and a pixel filter; and

    code that causes the computer system to, at a time of a second authentication session, send a second distorted graphical interface to the user computer that is distinct from the first distorted graphical interface, wherein the second distorted graphical interface is also operable by the user of the user computer to enter authentication information to be sent to the computer system, wherein the second distorted graphical interface is also personalized for the user by the computer system based on the identifier, wherein the second distorted graphical interface is distorted using a second mathematical algorithm selected from a group consisting of;

    a texture filter, a distortion filter, a noise filter, and a pixel filter, and wherein the second mathematical algorithm is different from the first mathematical algorithm.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×