×

Security using physical objects

  • US 8,001,613 B2
  • Filed: 06/23/2006
  • Issued: 08/16/2011
  • Est. Priority Date: 06/23/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling access to restricted content in a computing system, comprising the steps of:

  • registering a security pattern on the computing system, wherein registering the security pattern includes;

    detecting a security object proximal the display of the computer system,detecting physical attributes of the security object including a physical shape of the security object, a physical pattern on the security object, a position of the security object in relation to the display, and an angular orientation of the security object in relation to the display,generating a list of the physical attributes of the security object in relation to the display,upon selection, displaying an attribute menu on the display, wherein the attribute menu displays selectable options that comprise the generated list of physical attributes for the security object that is proximal to the display of the computer system, wherein the selectable options are used to determine attributes of the security object to include in the security pattern;

    receiving a user selection of one or more of the selectable options from the displayed attribute menu—

    wherein receiving user selection of the position of the security object includes receiving user specification of a position-based percentage margin of error and receiving user selection of the angular orientation of the security object includes receiving user specification of an angle-based percentage margin of error,generating the security pattern for granting access to the secured content based on the user selection from the attribute menu, andregistering and storing the security pattern in association with security credentials for a user;

    after registering and storing the security-pattern in association with security credentials for the user;

    generating a prompt that requests security credentials,detecting an object proximal the display of the computing system,detecting physical attributes of the detected object in relation to the display,determining whether any of the detected physical attributes of the detected object matches the security pattern of the security object,when the detected physical attributes of the detected object matches the stored security pattern of the security object, providing the security credentials and causing the computer system to provide access to the restricted content, andwhen the detected physical attributes of the detected object do not match the stored security pattern of the security object, maintaining the restriction to the restricted content of the computer system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×