Systems and methods for authenticating users
First Claim
Patent Images
1. A computer-implemented method for authenticating users, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- during a user configuration phase;
receiving a selection of an image to be used for mutual assurance with a user, andassociating the image with the user by providing information that identifies the image in a profile of the user;
identifying the image associated with the user;
modifying the image based on a prompt message to create a modified image that displays the prompt message by overlaying the prompt message over the image to create the modified image;
identifying, within the profile of the user, user-related information that is specific to the user;
during a user login phase;
displaying the modified image,identifying a password associated with the user, wherein the password is distinct from the user-related information,receiving user input from the user provided in response to the prompt message,determining that the user input comprises an expected response to the prompt message, wherein the expected response includes a combination of the password and the user-related information and at least one of the prompt message and the expected response is based on the user-related information, andauthenticating the user based on the determination.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for authenticating users may include identifying an image associated with a user for mutual assurance during an authentication process. The computer-implemented method may also include modifying the image based on a prompt message to create a modified image that displays the prompt message. The computer-implemented method may further include determining that user input comprises an expected response to the prompt message. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
19 Claims
-
1. A computer-implemented method for authenticating users, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
during a user configuration phase; receiving a selection of an image to be used for mutual assurance with a user, and associating the image with the user by providing information that identifies the image in a profile of the user; identifying the image associated with the user; modifying the image based on a prompt message to create a modified image that displays the prompt message by overlaying the prompt message over the image to create the modified image; identifying, within the profile of the user, user-related information that is specific to the user; during a user login phase; displaying the modified image, identifying a password associated with the user, wherein the password is distinct from the user-related information, receiving user input from the user provided in response to the prompt message, determining that the user input comprises an expected response to the prompt message, wherein the expected response includes a combination of the password and the user-related information and at least one of the prompt message and the expected response is based on the user-related information, and authenticating the user based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for authenticating users, the system comprising:
-
a profile setup module programmed to, during a user configuration phase; receive a selection of an image to be used for mutual assurance with a user, and associate the image with the user by providing information that identifies the image in a profile of the user; an image identification module programmed to identify the image associated with the user for mutual assurance during an authentication process; an image modification module programmed to modify the image based on a prompt message to create a modified image that displays the prompt message by overlaying the prompt message over the image to create the modified image; a user-related information identification module programmed to identify, within the profile of the user, user-related information that is specific to the user; a display module programmed to display the modified image; a password identification module programmed to, during a user login phase, identify a password associated with the user; an input module programmed to receive user input from the user provided in response to the prompt message; a determination module programmed to, during the user login phase, determine that the user input comprises an expected response to the prompt message, wherein the expected response includes a combination of the password and the user-related information and at least one of the prompt message and the expected response is based on the user-related information; an authentication module programmed to authenticate the user based on the determination; at least one processor configured to execute the profile setup module, the image identification module, the image modification module, the user-related information identification module, the display module, the password identification module, the input module, the determination module, and the authentication module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
during a user configuration phase; receive a selection of an image to be used for mutual assurance with a user, and associate the image with the user by providing information that identifies the image in a profile of the user; identify the image associated with the user; modify the image based on a prompt message to create a modified image that displays the prompt message by overlaying the prompt message over the image to create the modified image; identify, within the profile of the user, user-related information that is specific to the user; during a user login phase; display the modified image, identify a password associated with the user, wherein the password is distinct from the user-related information, receive user input from the user provided in response to the prompt message, determine that the user input comprises an expected response to the prompt message, wherein the expected response includes a combination of the password and the user-related information and at least one of the prompt message and the expected response is based on the user-related information, and authenticate the user based on the determination.
-
Specification