Graphical image password authentication method
First Claim
1. A method for secure authentication, said method comprising:
- creating a user account for a user using a computer processor, the user account comprising account information including a username, an image selected from a plurality of images, and a background color selected from a plurality of colors for the background color of the image;
allowing a user to access a computer via a computer user interface; and
a) presenting a plurality of random images having random background colors in random order using a computer processor on the user interface, at least two of the plurality of random images are the same image with a respective different background color, one of the plurality of random images is the image with background color associated with the user account;
b) receiving a selection from the user of one of the images presented on the computer user interface; and
c) authenticating the user as an authorized user using a computer processor if the user selected the image with background color corresponding to the user account;
d) determining an IP address for the user interface and authenticating the user without presenting the plurality of images and receiving a selection from the user of an image, if the IP address is an approved IP address.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user'"'"'s computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alternative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image.
-
Citations
15 Claims
-
1. A method for secure authentication, said method comprising:
-
creating a user account for a user using a computer processor, the user account comprising account information including a username, an image selected from a plurality of images, and a background color selected from a plurality of colors for the background color of the image; allowing a user to access a computer via a computer user interface; and a) presenting a plurality of random images having random background colors in random order using a computer processor on the user interface, at least two of the plurality of random images are the same image with a respective different background color, one of the plurality of random images is the image with background color associated with the user account; b) receiving a selection from the user of one of the images presented on the computer user interface; and c) authenticating the user as an authorized user using a computer processor if the user selected the image with background color corresponding to the user account; d) determining an IP address for the user interface and authenticating the user without presenting the plurality of images and receiving a selection from the user of an image, if the IP address is an approved IP address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for secure authentication, said method comprising:
-
(a) creating a user account for a user using a computer processor, the user account comprising account information including a username, an image selected from a plurality of images, and a background color selected from a plurality of colors for the background color of the image; (b) allowing a user to access a computer via a computer user interface; (c) determining an IP address for the computer user interface using a computer processor; (d) comparing the IP address with IP addresses in an IP address database using a computer processor; wherein, if the IP address is in the database of IP addresses, (e) identifying the user interface as an authorized IP address and authenticating the user as an authorized user; and if the IP address is not in the database of IP addresses the method further comprises; (f) presenting a plurality of random images having random background colors in random order on the user interface, one of the plurality of random images is the image with the background color associated with the user account; (g) receiving a selection from the user of one of the images presented on the user interface; and (h) authenticating the user as an authorized user if the user selected the image with background color corresponding to the user account. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system having secure authentication, said system comprising:
-
a computer user interface; computer memory; and a computer processor adapted for executing computer instruction, said instruction comprising; determining an IP address for the computer user interface using the computer processor; comparing the IP address with IP addresses in an IP address database using a computer processor; wherein, if the IP address is in the database of IP addresses, identifying the user interface as an authorized IP address and authenticating the user as an authorized user; and if the IP address is not in the database of IP addresses the method further comprises; presenting a plurality of random images having random background colors in random order on the user interface, one of the plurality of random images is the image with the background color associated with the user account; receiving a selection from the user of one of the images presented on the user interface; and authenticating the user as an authorized user if the user selected the image with background color corresponding to the user account.
-
Specification