Graphical encryption and display of codes and text
First Claim
Patent Images
1. A method implemented on a computer comprising the steps of:
- receiving, at the computer, a first string of alphanumeric characters;
breaking the first string of alphanumeric characters into multiple pieces;
assigning the multiple pieces of the first string of alphanumeric characters to a first number of pre-chosen image categories, wherein the first number of pre-chosen image categories are chosen and sequentially ordered by a user and each one of the pre-chosen image categories comprise a group of images sharing a common attribute perceived by a human;
randomly selecting images from the first number of pre-chosen image categories;
assigning dummy pieces of alphanumeric characters to a second number of image categories not selected by the user, andfacilitating presentation of a matrix of the randomly selected images from the first number of image categories and the second number of image categories to the user,wherein images in the first number of image categories correspond to more than one alphanumeric character and at least one of the images in the first number of images categories correspond to both a number character and alphabetic character,wherein images in the first number of image categories are configured to be selected by a user tapping or selecting the images without entering the corresponding alphanumeric character.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides an image-based encryption and decryption technique where the user uses pre-chosen image categories to create an encryption/decryption key. The encryption key can be used to encrypt alphanumeric strings such as a confirmation code or other information. The user uses the decryption key, i.e., knowledge of the chosen image categories) to decrypt and recover the original message. For example, upon presentation of a grid of images, the user selects certain images contained therein that match the pre-chosen image categories to recover the original message.
4 Citations
14 Claims
-
1. A method implemented on a computer comprising the steps of:
-
receiving, at the computer, a first string of alphanumeric characters; breaking the first string of alphanumeric characters into multiple pieces; assigning the multiple pieces of the first string of alphanumeric characters to a first number of pre-chosen image categories, wherein the first number of pre-chosen image categories are chosen and sequentially ordered by a user and each one of the pre-chosen image categories comprise a group of images sharing a common attribute perceived by a human; randomly selecting images from the first number of pre-chosen image categories; assigning dummy pieces of alphanumeric characters to a second number of image categories not selected by the user, and facilitating presentation of a matrix of the randomly selected images from the first number of image categories and the second number of image categories to the user, wherein images in the first number of image categories correspond to more than one alphanumeric character and at least one of the images in the first number of images categories correspond to both a number character and alphabetic character, wherein images in the first number of image categories are configured to be selected by a user tapping or selecting the images without entering the corresponding alphanumeric character. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An encryption method implemented on a computer, the method comprising the steps of:
-
receiving a data string; segmenting the data string into a plurality of segments; assigning a randomly selected encryption image to each of the plurality of segments, wherein the randomly selected encryption images correspond to two or more pre-chosen image categories, wherein the two or more pre-chosen image categories are chosen and sequentially ordered by a user and each one of the pre-chosen image categories comprise a group of images sharing a common attribute perceived by a human; facilitating a presentation of a plurality of images to the user, wherein the plurality of images comprises the randomly selected encryption images and one or more non-encryption images, wherein the non-encryption images do not correspond to the two or more pre-chosen image categories, wherein the randomly selected encryption images correspond to more than one alphanumeric character and at least one of the randomly selected encryption images correspond to both a number character and alphabetic character, wherein the randomly selected encryption images are configured to be selected by a user tapping or selecting the images without entering the corresponding alphanumeric character. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A decryption method implemented on a computer, the method comprising the steps of:
-
receiving a presentation of a plurality of images, wherein the plurality of images comprises two or more encryption images and one or more non-encryption images, wherein the encryption images correspond to and are randomly selected from two one or more pre-chosen image categories and the non-encryption images do not correspond to the two more pre-chosen image categories, and the encryption images are associated with a particular segment of a data string, wherein the two or more pre-chosen image categories are chosen and sequentially ordered by a user; receiving an indication that the user has selected the one two or more encryption images, wherein the indication comprises the particular encryption images that the user has selected and the order by which those particular encryption images have been selected, wherein the encryption images correspond to more than one alphanumeric character and at least one of the encryption images correspond to both a number character and alphabetic character, wherein the encryption images are configured to be selected by a user tapping or selecting the images without entering the corresponding alphanumeric character; identifying the particular segments of the data string corresponding to the indication; and identifying the data string. - View Dependent Claims (12, 13, 14)
-
Specification