Authentication method, authentication device and computer-readable medium storing instructions for authentication processing capable of ensuring security and usability
First Claim
1. An authentication method, provided in a system having a display and a storage device, comprising the steps of:
- registering an object selected for a user from among a plurality of visually distinguishable objects as a key object in said storage device, said plurality of visually distinguishable objects, from which said key object is selected for said user, being prepared in advance;
after registering said key object for said user, and during an authentication process of the user, presenting a plurality of objects to said display including said registered key object associated with said user for user selection of said registered key object for authenticating said user;
accepting selection of an object by the user to be authenticated; and
performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user, whereinthe step of registering said key object includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method in a system having a display and a storage device is provided. The authentication method includes the steps of registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in the storage device; and presenting the plurality of objects to the display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user. The step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in the storage device.
50 Citations
19 Claims
-
1. An authentication method, provided in a system having a display and a storage device, comprising the steps of:
-
registering an object selected for a user from among a plurality of visually distinguishable objects as a key object in said storage device, said plurality of visually distinguishable objects, from which said key object is selected for said user, being prepared in advance; after registering said key object for said user, and during an authentication process of the user, presenting a plurality of objects to said display including said registered key object associated with said user for user selection of said registered key object for authenticating said user; accepting selection of an object by the user to be authenticated; and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the step of registering said key object includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication device comprising:
-
a display; a storage device; and a processor operative to (i) register an object selected for a user from among a plurality of visually distinguishable objects as a key object in said storage device, said plurality of visually distinguishable object, from which said key object is selected for said user, being prepared in advance, (ii) present, after registering said key object for said user, and during an authentication process of said user, a plurality of objects to said display including said registered key object associated with said user, for user selection of said registered key object for authenticating said user, (iii) accept selection of an object by said user to be authenticated, and (iv) perform authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the processor is configured to determine a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium, with instructions stored thereon for authentication processing, which when executed by a processor of a computer, cause the computer to:
-
register an object selected for a user from among a plurality of visually distinguishable objects as a key object in a storage device, said plurality of visually distinguishable object, from which said key object is selected for said user, being prepared in advance; present, after registering said key object for said user, and during an authentication of the user, a plurality of objects to a display including said registered key object associated with said user for user selection of said registered key object for authenticating said user; accept selection of an object by the user to be authenticated; and perform authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the step of registering said key object includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (17, 18, 19)
-
Specification