Online data encryption and decryption
First Claim
1. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:
- code that causes the computer system to send, to a user computer, a graphical interface comprising a set of alphanumeric symbols and session-based mapping instructions that uniquely between authentication sessions handed by the computer server correlate each alphanumeric symbol of the graphical interface with a corresponding symbol;
code that causes the computer system to receive, from the user computer, encrypted authentication data comprising a sequence of symbols different from authentication data for a user, wherein the encrypted authentication data is generated by the user computer in response to;
receiving, via the graphical interface, a sequence of alphanumeric symbols from the user corresponding to the authentication data for the user; and
generating the sequence of symbols of the encrypted authentication data based on the sequence of alphanumeric symbols of the graphical interface and the mapping instructions; and
code that causes the computer system to decrypt the encrypted authentication data to obtain the authentication data for the user.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user'"'"'s computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows.
113 Citations
17 Claims
-
1. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:
-
code that causes the computer system to send, to a user computer, a graphical interface comprising a set of alphanumeric symbols and session-based mapping instructions that uniquely between authentication sessions handed by the computer server correlate each alphanumeric symbol of the graphical interface with a corresponding symbol; code that causes the computer system to receive, from the user computer, encrypted authentication data comprising a sequence of symbols different from authentication data for a user, wherein the encrypted authentication data is generated by the user computer in response to; receiving, via the graphical interface, a sequence of alphanumeric symbols from the user corresponding to the authentication data for the user; and generating the sequence of symbols of the encrypted authentication data based on the sequence of alphanumeric symbols of the graphical interface and the mapping instructions; and code that causes the computer system to decrypt the encrypted authentication data to obtain the authentication data for the user. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable storage medium having stored thereon program code executable by a computer system, the program code comprising:
-
code that causes the computer system to send, at a time of a first authentication session, a graphical interface to a user computer, wherein the graphical interface comprises a plurality of user interface elements operable by a user of the user computer to enter authentication information to be sent to the computer system, and wherein overall layout of the plurality of user interface elements of the graphical interface is distorted during the first authentication session in a first manner on a display of the user computer; and code that causes the computer system to send, at a time of a second authentication session, the graphical interface to the user computer, wherein the overall layout of the plurality of user interface elements of the graphical interface is distorted during the second authentication session in a second manner on the display of the user computer that is distinct from the first manner. - View Dependent Claims (6)
-
-
7. A method for providing an authentication interface, the method comprising:
-
sending, from a server to a user computer, a graphical interface comprising a set of alphanumeric symbols and session-based mapping instructions that uniquely between authentication sessions handed by the computer server correlate each alphanumeric symbol of the graphical interface with a corresponding symbol; receiving, at the server from the user computer, encrypted authentication data comprising a sequence of symbols different from authentication data for a user, wherein the encrypted authentication data is generated by the user computer in response to; receiving, via the graphical interface, a sequence of alphanumeric symbols from the user corresponding to the authentication data for the user; and generating the sequence of symbols of the encrypted authentication data based on the sequence of alphanumeric symbols of the graphical interface and the mapping instructions; and decrypting, at the server, the encrypted authentication data to obtain the authentication data for the user. - View Dependent Claims (8, 9, 10)
-
-
11. A method for providing an authentication interface, the method comprising:
-
at a time of a first authentication session, sending a graphical interface from a server to a user computer, wherein the graphical interface comprises a plurality of user interface elements operable by a user of the user computer to enter authentication information to be sent to the server, and wherein overall layout of the plurality of user interface elements of the graphical interface is distorted during the first authentication session in a first manner on a display of the user computer; and at a time of a second authentication session, sending the graphical interface again from the server to the user computer, wherein the overall layout of the plurality of user interface elements of the graphical interface is distorted during the second authentication session in a second manner on the display of the user computer that is distinct from the first manner. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification