Identity verification via selection of sensible output from recorded digital data
First Claim
1. A method comprising:
- sampling digital data according to a sampling function operating on a computer from a data stream used for generating sensible output during a first session between at least two network nodes initiated under a defined user account, wherein the first session is conducted for a primary purpose other than image recognition training;
storing the sampled digital data on a computer-readable medium in association with an identifier for the user account under which the first session is initiated;
transmitting the sampled digital data and decoy digital data configured for generating discrete sensible outputs to a client for use in an authentication session for a subsequent session under the user account;
authenticating access for the subsequent session in response to receiving input from the client indicating selection of sensible output generated from the sampled digital data from a challenge matrix comprising the sensible output generated from the sampled digital data and the decoy digital data.
0 Assignments
0 Petitions
Accused Products
Abstract
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs.
-
Citations
24 Claims
-
1. A method comprising:
-
sampling digital data according to a sampling function operating on a computer from a data stream used for generating sensible output during a first session between at least two network nodes initiated under a defined user account, wherein the first session is conducted for a primary purpose other than image recognition training; storing the sampled digital data on a computer-readable medium in association with an identifier for the user account under which the first session is initiated; transmitting the sampled digital data and decoy digital data configured for generating discrete sensible outputs to a client for use in an authentication session for a subsequent session under the user account; authenticating access for the subsequent session in response to receiving input from the client indicating selection of sensible output generated from the sampled digital data from a challenge matrix comprising the sensible output generated from the sampled digital data and the decoy digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus comprising processor operating instructions, configured for causing a computer to:
-
sample a data stream for independently generating visible image output during a first session with a client, to produce data sampled according to a sampling function; store the sampled data in a database in association with an identifier for an account under which the first session is operated; transmit at least selected ones of the sampled data and decoy data configured for generating visible image outputs to a client, for use in a challenge matrix used to secure access to a subsequent session initiated under the account identifier; and permit access for the subsequent session in response to receiving input indicating successful discrimination between the sensible output generated from the sampled data and sensible output generated from the decoy data in the challenge matrix. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A system, comprising:
-
hosting means for hosting a secure online process in which images are output at a client device in response to data from the hosting means; sampling means for sampling the data from the hosting means independently of the secure online process to generate stored sample data sampled according to a sampling function and configured for replicating images output during the secure online process; and testing means for presenting images generated from the stored sample data with decoy images to authenticate a client initiating a subsequent process. - View Dependent Claims (23)
-
-
24. A method comprising:
-
sampling at least one digital data sample by operating a digital camera under the control of a computer during a first session between the computer and a host node initiated under a defined user account; storing the sampled digital data on a computer-readable medium in association with an identifier for the user account under which the first session is initiated; transmitting the sampled digital data and decoy digital data configured for generating discrete images to a client for use in an authentication session for a subsequent session initiated at a client under the user account; and authenticating access for the subsequent session in response to receiving input from the client indicating selection of an image generated from the sampled digital data sample from a challenge matrix comprising the image generated from the sampled digital data sample and decoy images generated from the decoy digital data.
-
Specification