Method and system for image-based user authentication
First Claim
Patent Images
1. A method for authenticating a user, comprising in one or more computer systems:
- during a user authentication operation, receiving a user identifier input that comprises an identifier for a user;
displaying a set of images to the user;
generating a mapping function that determines a correlation between each image of the set of images and at least one character, wherein the mapping function is generated according to the identifier for the user and is different from a mapping function generated according to a different identifier for another user;
receiving an image sequence comprising a sequence of images selected by the user from the set of images; and
authenticating the user based on the identifier and the image sequence.
2 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments provide a system that authenticates a user. During operation, the system obtains an identifier for the user from an identification card associated with the user and displays a set of images to the user. Next, the system receives an image sequence comprising a sequence of images selected by the user from the set of images. Finally, the system authenticates the user based on the identifier and the image sequence.
120 Citations
15 Claims
-
1. A method for authenticating a user, comprising in one or more computer systems:
-
during a user authentication operation, receiving a user identifier input that comprises an identifier for a user; displaying a set of images to the user; generating a mapping function that determines a correlation between each image of the set of images and at least one character, wherein the mapping function is generated according to the identifier for the user and is different from a mapping function generated according to a different identifier for another user; receiving an image sequence comprising a sequence of images selected by the user from the set of images; and authenticating the user based on the identifier and the image sequence. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for authenticating a user, comprising:
-
a computer system configured to perform the operations of; a user identification module configured to, during a user authentication operation, receive a user identifier input that comprises an identifier for a user; a password module configured to; display a set of images to the user; generate, a mapping function that determines a correlation between each image of the set of images and at least one character, wherein the map function is generated according to the identifier for the user and is different from a mapping function generated according to a different identifier for another user; and receive an image sequence comprising a sequence of images selected by the user from the set of images; and an authentication manager configured to authenticate the user based on the identifier and the image sequence. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for authenticating a user, the method comprising:
-
during a user authentication operation, receiving a user identifier input that comprises an identifier for a user; displaying a set of images to the user; generating a mapping function that determines a correlation between each image of the set of images and at least one character, wherein the mapping function is generated according to the identifier for the user and is different from a mapping function generated according to a different identifier for another user; receiving an image sequence comprising a sequence of images selected by the user from the set of images; and authenticating the user based on the identifier and the image sequence. - View Dependent Claims (12, 13, 14, 15)
-
Specification