System and method for enhancing self-service security applications
First Claim
1. An authentication system configured to enable a user to setup an interactive authentication environment on an electronic device for restricting unauthorized access, the system comprising:
- a customization module configured to enable the user to customize and setup the interactive authentication environment on the electronic device;
one or more input mediums configured to enable the user to actively interact with the interactive authentication environment to define one or more access patterns within a three-dimensional virtual environment that are required to be imitated in order to gain authentication and to gain post-authentication access; and
a database to store the defined access patterns,wherein the interactive authentication environment comprises a game-based three-dimensional virtual environment.
18 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention may enable a user of an electronic device to setup a game-based environment within the electronic device that can be used as an authentication platform to prevent access by illegitimate or unauthorized users. The communication device may include a display screen, a processor, and a memory coupled to the processor. The memory may include a database and an instruction set. The database may store pre-defined access patterns that can be used in the authentication process. Further, the instruction set may include instructions executable by the processor to monitor inputs made by a new user in the game based environment. Furthermore, the instructions executable by the processor may match the inputs of the new user with the pre-defined access patterns to check the authentication of a new user.
-
Citations
22 Claims
-
1. An authentication system configured to enable a user to setup an interactive authentication environment on an electronic device for restricting unauthorized access, the system comprising:
-
a customization module configured to enable the user to customize and setup the interactive authentication environment on the electronic device; one or more input mediums configured to enable the user to actively interact with the interactive authentication environment to define one or more access patterns within a three-dimensional virtual environment that are required to be imitated in order to gain authentication and to gain post-authentication access; and a database to store the defined access patterns, wherein the interactive authentication environment comprises a game-based three-dimensional virtual environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An authentication system configured to enable a user to actively interact with an interactive authentication environment for authentication and for gaining post-authentication access to data and applications, the system comprising:
-
one or more input mediums to enable the user to actively interact with the interactive authentication environment by providing a sequence of inputs, wherein the interactive authentication environment comprises a game-based three-dimensional virtual environment; a monitoring module configured to monitor an input pattern from the sequence of inputs given by the user to the interactive authentication environment; a decoding module configured to decode an instruction hidden in the input pattern by matching the input pattern with one or more pre-defined access patterns that had been defined within a three-dimensional virtual environment; and an execution module configured to execute the decoded instruction hidden in the input pattern received from the user. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method of deploying an interactive authentication environment on an electronic device as a security application for enabling only legitimate users to gain authentication for accessing the electronic device and to gain post-authentication access to data and applications stored in the electronic device or in an enterprise database, the method comprising:
-
enabling a user to actively interact with the interactive authentication environment by providing an input pattern to gain authentication for access, wherein the interactive authentication environment comprises a game-based three-dimensional virtual environment; authenticating the user to gain access on successful match of the input pattern with a pre-defined access pattern that had been defined within a three-dimensional virtual environment; enable the user to actively interact further with the interactive authentication environment for gaining post-authentication data access by providing a second input pattern; and authenticating the user to gain access to data or an application on successful match of the second input pattern with another pre-defined access pattern that had been defined within a three-dimensional virtual environment. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification