Password protection using pattern
First Claim
1. A method of establishing a user identity, said method comprising:
- displaying a two dimensional grid having individual elements on a display at a first computing device;
generating, by a computer user, a two-dimensional pattern in said grid of said display of said first computing device by inserting symbols by said user into said grid, wherein said inserted symbols form a password;
generating one or more other symbols at said first computing device within said grid, wherein said other symbols do not include said password;
receiving, on said first computing device, a user identifier from said computer user;
transmitting said user identifier and said grid with said user inserted symbols and said other symbols from said first computing device to a second computing device without transmitting said pattern, said inserted symbols or said other symbols outside of said grid;
after said transmitting operation, determining a set of coordinates that define said pattern at said second computing device; and
storing said set of coordinates, said user identifier and said password in association with one another in persistent storage of said second computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A user generates a pattern in a matrix (or two-dimensional grid) and enters a user name and an associated password. This username, password and pattern are stored locally on a computing device or are transmitted to a remote computer server for later authentication. Upon authentication, an input matrix is displayed. The user enters the password into the matrix in the form of the pattern, and also enters the username. The computer retrieves the previously stored pattern and password with the username. The previously stored pattern is used to read the input password from the input matrix. A match with the stored password indicates authentication. Alternatively, the input matrix only includes the pattern and password is entered separately. The input matrix may also be filled with random characters to improve security. The stored pattern is compared to the input pattern using image analysis or by comparing a set of coordinates.
79 Citations
22 Claims
-
1. A method of establishing a user identity, said method comprising:
-
displaying a two dimensional grid having individual elements on a display at a first computing device; generating, by a computer user, a two-dimensional pattern in said grid of said display of said first computing device by inserting symbols by said user into said grid, wherein said inserted symbols form a password; generating one or more other symbols at said first computing device within said grid, wherein said other symbols do not include said password; receiving, on said first computing device, a user identifier from said computer user; transmitting said user identifier and said grid with said user inserted symbols and said other symbols from said first computing device to a second computing device without transmitting said pattern, said inserted symbols or said other symbols outside of said grid; after said transmitting operation, determining a set of coordinates that define said pattern at said second computing device; and storing said set of coordinates, said user identifier and said password in association with one another in persistent storage of said second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of authenticating a user, said method comprising
displaying, on a first computing device, a two-dimensional grid having individual elements; -
receiving input at said first computing device from a user of said first computing device that defines a pattern on said grid wherein said user input that defines said pattern includes one or more symbols that are inserted into said grid by said user; receiving a password input from said user on said first computing device in the form of said inserted symbols; generating one or more symbols within said grid at said first computer device wherein said generated symbols are different from said user inserted symbols and do not include said password; receiving a user identifier from said user at said first computing device; and transmitting said user identifier and said grid with said user inserted symbols and said generated symbols from said first computing device to a second computing device without indicating which symbols in said grid were inserted by said user and without transmitting said pattern or said user inserted symbols outside of said grid; and authenticating said user using said pattern, said password input and said user identifier at said second computing device using a stored pattern, a stored password and a stored user identifier in persistent storage of said second computing device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method of authenticating a user, said method comprising:
-
receiving input at a computer server from a computing device, wherein said input indicates a request for a grid of a desired size from a user; after said receiving of said input, receiving, at said computer server, a two-dimensional grid with individual elements from said computing device, wherein a plurality of said elements include symbols that were inserted into said grid by said user and other symbols that were generated by said computing device and wherein said received grid is of said desired size as requested by said user and wherein said computer server does not receive any information from said computing device indicating which symbols in said grid were inserted by said user and wherein said computer server does not receive any information outside of said grid from said computing device that indicates said symbols inserted by said user; receiving, at said computer server, a user identifier from said computing device wherein said user identifier is associated with said grid received from said computing device; retrieving, at said computer server, a previously stored pattern from persistent storage using said user identifier; retrieving, at said computer server, a previously stored password from persistent storage using said user identifier; after said receiving of said input and said receiving of said two-dimensional grid of said desired size as requested by said user, using, at said server computer, said stored pattern to select symbols from said received grid that correspond to said stored pattern, said selected symbols forming an input password; comparing, at said server computer, said input password to said previously stored password; and authenticating said user at said server computer when said input password matches said previously stored password. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification