Please download the dossier by clicking on the dossier button x
×

Input validation, user and data authentication on potentially compromised mobile devices

  • US 9,025,834 B2
  • Filed: 05/29/2013
  • Issued: 05/05/2015
  • Est. Priority Date: 05/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for authenticating a user and user input to a back-end system and for validating the user input, the method being executed using one or more processors and comprising:

  • receiving, by the one or more processors, a unique user identifier and user input;

    generating, by the one or more processors, a personalized image recognition challenge based on the unique user identifier and the user input, the personalized image recognition challenge comprising a plurality of images and a written message, the written message instructing a user to select a particular image of the plurality of images to validate the user input, wherein generating the personalized image recognition challenge comprises;

    querying a database based on the unique user identifier to identify a plurality of personalized images associated with the unique user identifier, each personalized image being associated with a catchword, andselecting one or more personalized images from the plurality of personalized images, the one or more personalized images being included in the personalized image recognition challenge;

    transmitting the personalized image recognition challenge for display on a device;

    receiving, by the one or more processors, a response to the personalized image recognition challenge, the response comprising a selection of an image from the plurality of images; and

    authenticating the user and the user input based on the response.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×