Language independent login
First Claim
Patent Images
1. A method for preventing illegitimate access to a user computing machine comprising:
- setting an authentication routine in the user computing machine;
generating a virtual keyboard on the user computing machine;
entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor;
comparing the entered user identification with a secure user identification previously stored in the user computing machine; and
validating the user access to the user computing machine if a match occurs, otherwise denying access;
wherein the secure user identification is produced using a computation of a mathematical formula combined with a predefined sequence of a location of keys on the virtual keyboard, the mathematical formula indicating which row positions (RP) on the virtual keyboard are to be selected by the user, wherein the mathematical formula is based on a character (CH) and a number of rows (NbR) available on the virtual keyboard, wherein each selected row position (RP) is given by;
RP=(CH modulo NbR)+1, and the predefined sequence indicating an intersecting column position in each selected row on the virtual keyboard to be selected by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access.
15 Citations
15 Claims
-
1. A method for preventing illegitimate access to a user computing machine comprising:
-
setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access; wherein the secure user identification is produced using a computation of a mathematical formula combined with a predefined sequence of a location of keys on the virtual keyboard, the mathematical formula indicating which row positions (RP) on the virtual keyboard are to be selected by the user, wherein the mathematical formula is based on a character (CH) and a number of rows (NbR) available on the virtual keyboard, wherein each selected row position (RP) is given by;
RP=(CH modulo NbR)+1, and the predefined sequence indicating an intersecting column position in each selected row on the virtual keyboard to be selected by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for performing a method for preventing illegitimate access to a user computing machine, the method comprising:
-
setting an authentication routine in the user computing machine; generating, using the computer machine, a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing, using the computer machine, the entered user identification with a secure user identification previously stored in the user computing machine; and validating, using the computer machine, the user access to the user computing machine if a match occurs, otherwise denying access; wherein the secure user identification is produced using a computation of a mathematical formula combined with a predefined sequence of a location of keys on the virtual keyboard, the mathematical formula indicating which row positions (RP) on the virtual keyboard are to be selected by the user, wherein the mathematical formula is based on a character (CH) and a number of rows (NbR) available on the virtual keyboard, wherein each selected row position (RP) is given by;
RP=(CH modulo NbR)+1, and the predefined sequence indicating an intersecting column position in each selected row on the virtual keyboard to be selected by the user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program stored on a non-transitory computer readable medium, which when executed, prevents illegitimate access to a user computing machine, comprising program code for:
-
setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access; wherein the secure user identification is produced using a computation of a mathematical formula combined with a predefined sequence of a location of keys on the virtual keyboard, the mathematical formula indicating which row positions (RP) on the virtual keyboard are to be selected by the user, wherein the mathematical formula is based on a character (CH) and a number of rows (NbR) available on the virtual keyboard, wherein each selected row position (RP) is given by;
RP=(CH modulo NbR)+1, and the predefined sequence indicating an intersecting column position in each selected row on the virtual keyboard to be selected by the user.
-
Specification