Motion-detecting device user authentication
First Claim
Patent Images
1. A method for user authentication, the method comprising:
- receiving, at a gaming console, a gaming console-specific user authentication input, wherein the gaming console-specific user authentication is a pre-determined motion to a motion-sensing game controller;
converting the gaming console-specific user authentication input to a numeric value;
applying one of a private-key encryption routine or a public-key encryption routine to the numeric value to create a password;
applying a hash algorithm to the password to create a hashed password;
communicating the hashed password to a the network entity; and
receiving verification of user authentication based on password verification at the network entity.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the capabilities of platforms other than conventional personal computers and laptops, such as gaming consoles and wireless devices. Unique intrinsic user activities, such as controller motions or activities, built-in hardware signatures or other input data are used as the authentication mechanism, so as to provide a higher degree of security in the overall authentication process by lessening the likelihood of password replication or interception during network communication.
10 Citations
20 Claims
-
1. A method for user authentication, the method comprising:
-
receiving, at a gaming console, a gaming console-specific user authentication input, wherein the gaming console-specific user authentication is a pre-determined motion to a motion-sensing game controller; converting the gaming console-specific user authentication input to a numeric value; applying one of a private-key encryption routine or a public-key encryption routine to the numeric value to create a password; applying a hash algorithm to the password to create a hashed password; communicating the hashed password to a the network entity; and receiving verification of user authentication based on password verification at the network entity. - View Dependent Claims (2, 3)
-
-
4. A method for user authentication, the method comprising:
-
receiving, at a motion-detecting device, a user authentication input that comprises a user-configured pre-determined motion to the device; converting, at the motion-detecting device, the user authentication input to a numeric value, wherein the numeric value represents one or more vectors; applying, at the motion-sensing device, an encryption routine to the numeric value to create a password; communicating, from the motion-detecting device, the password to a network entity; and receiving, at the motion-detecting device, verification of user authorization based on password verification at the network entity. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A system for authenticating a user, the system comprising:
-
a motion-detecting device including a computing platform having at least one processor and a memory in communication with the processor; and an application operable to be loaded into the memory of the motion-detecting device and executed on the device, wherein the application includes; a user authentication routine operable to (1) receive a user authentication input that comprises a user-configured pre-determined motion to the device, (2) convert the user authentication input to a numeric value, wherein the numeric value represents one or more vectors, (3) apply an encryption routine to the numeric value to create a password, (4) communicate the password to a network entity and (5) receive verification of user authorization based on password verification at the network entity. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product, comprising:
a non-transitory computer-readable medium comprising; a first set of codes for causing a motion-detecting device to receive a user authentication input that comprises a user-configured pre-determined motion to the device; a second set of codes for causing the motion-detecting device to convert the user authentication input to a numeric value, wherein the numeric value represents one or more vectors; a third set of codes for causing the motion-detecting device to apply an encryption routine to the numeric value to create a password; a fourth set of codes for causing the motion-detecting device to communicate the password to a network entity; and a fifth set of codes for causing the motion-detecting device to receive verification of user authentication based on password verification at the network entity. - View Dependent Claims (16, 17, 18, 19, 20)
Specification