Security using physical objects
First Claim
1. A method for controlling access to restricted content in a computing system, comprising the steps of:
- registering a security pattern on the computing system, wherein registering the security pattern includes;
detecting a security object proximal the display of the computer system,detecting physical attributes of the security object including a physical shape of the security object, a physical pattern on the security object, a position of the security object in relation to the display, and an angular orientation of the security object in relation to the display,generating a list of the physical attributes of the security object in relation to the display,upon selection, displaying an attribute menu on the display, wherein the attribute menu displays selectable options that comprise the generated list of physical attributes for the security object that is proximal to the display of the computer system, wherein the selectable options are used to determine attributes of the security object to include in the security pattern;
receiving a user selection of one or more of the selectable options from the displayed attribute menu—
wherein receiving user selection of the position of the security object includes receiving user specification of a position-based percentage margin of error and receiving user selection of the angular orientation of the security object includes receiving user specification of an angle-based percentage margin of error,generating the security pattern for granting access to the secured content based on the user selection from the attribute menu, andregistering and storing the security pattern in association with security credentials for a user;
after registering and storing the security-pattern in association with security credentials for the user;
generating a prompt that requests security credentials,detecting an object proximal the display of the computing system,detecting physical attributes of the detected object in relation to the display,determining whether any of the detected physical attributes of the detected object matches the security pattern of the security object,when the detected physical attributes of the detected object matches the stored security pattern of the security object, providing the security credentials and causing the computer system to provide access to the restricted content, andwhen the detected physical attributes of the detected object do not match the stored security pattern of the security object, maintaining the restriction to the restricted content of the computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
A password-type security system may be employed using the placement of physical objects as a security pattern that is to be matched before access to secured content is granted. The system may be implemented on a computing system that uses a display that can detect, e.g., via optical circuitry, the visual characteristics of the display surface. The system can visually detect the placement of objects, their orientations, locations, color, printed patterns, etc. The user may define a security pattern as comprising one or more objects placed at locations on the screen, or at a predetermined rotation angle. The outline shape of an object may be treated as a required pattern, such that access to secured content is permitted only if the object having that outline shape is detected on the display surface. Similarly, printed patterns on objects may also be detected and used as part of security patterns.
-
Citations
14 Claims
-
1. A method for controlling access to restricted content in a computing system, comprising the steps of:
-
registering a security pattern on the computing system, wherein registering the security pattern includes; detecting a security object proximal the display of the computer system, detecting physical attributes of the security object including a physical shape of the security object, a physical pattern on the security object, a position of the security object in relation to the display, and an angular orientation of the security object in relation to the display, generating a list of the physical attributes of the security object in relation to the display, upon selection, displaying an attribute menu on the display, wherein the attribute menu displays selectable options that comprise the generated list of physical attributes for the security object that is proximal to the display of the computer system, wherein the selectable options are used to determine attributes of the security object to include in the security pattern; receiving a user selection of one or more of the selectable options from the displayed attribute menu—
wherein receiving user selection of the position of the security object includes receiving user specification of a position-based percentage margin of error and receiving user selection of the angular orientation of the security object includes receiving user specification of an angle-based percentage margin of error,generating the security pattern for granting access to the secured content based on the user selection from the attribute menu, and registering and storing the security pattern in association with security credentials for a user; after registering and storing the security-pattern in association with security credentials for the user; generating a prompt that requests security credentials, detecting an object proximal the display of the computing system, detecting physical attributes of the detected object in relation to the display, determining whether any of the detected physical attributes of the detected object matches the security pattern of the security object, when the detected physical attributes of the detected object matches the stored security pattern of the security object, providing the security credentials and causing the computer system to provide access to the restricted content, and when the detected physical attributes of the detected object do not match the stored security pattern of the security object, maintaining the restriction to the restricted content of the computer system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A memory having computer executable instructions for controlling access to restricted content in a computing system, the instructions comprising:
-
registering a security pattern, wherein registering the security pattern includes; detecting a security object proximal the display, detecting physical attributes of the security object including a physical shape of the security object, a physical pattern on the security object, a position of the security object in relation to the display, and an angular orientation of the security object in relation to the display, generating a list of the attributes of the security object in relation to the display, displaying an attribute menu on the display, wherein the attribute menu displays selectable options that comprise the generated list of attributes of the security object that is proximal to the display of the computer system, wherein the selectable options are used to determine attributes to include in the security pattern; receiving a user selection of one or more of the selectable options from the displayed attribute menu; generating the security pattern for granting access to the secured content based on the user selection from the attribute menu, and registering and storing the security pattern in association with security credentials for a user; detecting an object proximal the display; detecting attributes of the detected object in relation to the display; determining whether any of the detected attributes of the detected object matches the stored security pattern of the security object; when the detected attributes of the detected object matches the stored security pattern of the security object, providing security credentials for a user to access to the restricted content; and when the detected attributes of the detected object does not match the stored security pattern of the security object, maintaining the restriction to the restricted content. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for controlling access to secured content in a computing system, the instructions comprising:
-
a processor; and a computer readable storage medium having computer executable instructions stored thereon, wherein the computer executable instructions are executed by the process and perform actions, comprising; registering a security pattern, wherein registering the security pattern includes; detecting a security object proximal the display, detecting physical attributes of the security object including a physical shape of the security object, a physical pattern on the security object, a position of the security object in relation to the display, and an angular orientation of the security object in relation to the display, generating a list of the attributes of the security object in relation to the display, displaying an attribute menu on the display, wherein the attribute menu displays selectable options that comprise the generated list of physical attributes for the security object that is proximal to the display, wherein the selectable options are used to determine attributes to include in the security pattern; receiving a user selection of one or more of the selectable options from the displayed attribute menu, generating the security pattern for granting access to the secured content based on the user selection from the attribute menu, and registering and storing the security pattern in association with security credentials for a user; detecting an object proximal the display; detecting attributes of the detected object in relation to the display; determining whether any of the detected attributes of the detected object matches the stored security pattern of the security object; when the detected attributes of the detected object matches the stored security pattern of the security object, providing security credentials for a user to access to the restricted content; and when the detected attributes of the detected object does not match the stored security pattern of the security object, maintaining the restriction to the restricted content. - View Dependent Claims (12, 13, 14)
-
Specification