Increasing entropy for password and key generation on a mobile device
First Claim
1. A method comprising:
- establishing a pre-determined set of cryptographic information for a computing device, wherein said pre-determined set of cryptographic information comprises two or more input elements and one or more interface input behavior metrics associated with the two or more input elements, wherein the two or more input elements are selected by a user of the computing device, in a given sequence, from a collection of multiple items of non-alpha-numeric data stored on the computing device, and wherein said one or more interface input behavior metrics comprise one or more of (i) touch pressure of input via the computing device interface, (ii) touch angle of input via the computing device interface, (iii) directionality of input via the computing device interface, (iv) a distinct number of iterations of an action in connection with input via the computing device interface, and (v) velocity of input via the computing device interface;
generating a prompt via the computing device interface in connection with an authentication request to access a protected resource associated with the computing device;
processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and
resolving the authentication request based on said processing.
18 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus and articles of manufacture for increasing entropy for password and key generation on a mobile device are provided herein. A method includes establishing a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface input behavior metrics associated with the one or more input elements; generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and resolving the authentication request based on said processing.
23 Citations
20 Claims
-
1. A method comprising:
-
establishing a pre-determined set of cryptographic information for a computing device, wherein said pre-determined set of cryptographic information comprises two or more input elements and one or more interface input behavior metrics associated with the two or more input elements, wherein the two or more input elements are selected by a user of the computing device, in a given sequence, from a collection of multiple items of non-alpha-numeric data stored on the computing device, and wherein said one or more interface input behavior metrics comprise one or more of (i) touch pressure of input via the computing device interface, (ii) touch angle of input via the computing device interface, (iii) directionality of input via the computing device interface, (iv) a distinct number of iterations of an action in connection with input via the computing device interface, and (v) velocity of input via the computing device interface; generating a prompt via the computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and resolving the authentication request based on said processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 16)
-
-
10. An article of manufacture comprising a processor-readable storage medium having processor-readable instructions tangibly embodied thereon which, when implemented, cause a processor to carry out steps comprising:
-
establishing a pre-determined set of cryptographic information for a computing device, wherein said pre-determined set of cryptographic information comprises two or more input elements and one or more interface input behavior metrics associated with the two or more input elements, wherein the two or more input elements are selected by a user of the computing device, in a given sequence, from a collection of multiple items of non-alpha-numeric data stored on the computing device, and wherein said one or more interface input behavior metrics comprise one or more of (i) touch pressure of input via the computing device interface, (ii) touch angle of input via the computing device interface, (iii) directionality of input via the computing device interface, (iv) a distinct number of iterations of an action in connection with input via the computing device interface, and (v) velocity of input via the computing device interface; generating a prompt via the computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and resolving the authentication request based on said processing. - View Dependent Claims (19)
-
-
11. An apparatus comprising:
-
a memory; and at least one processor coupled to the memory; and a plurality of modules executing on the at least one processor, wherein the plurality of modules comprise; a cryptographic information module configured to establish a pre-determined set of cryptographic information for a computing device, wherein said pre-determined set of cryptographic information comprises two or more input elements and one or more interface input behavior metrics associated with the two or more input elements, wherein the two or more input elements are selected by a user of the computing device, in a given sequence, from a collection of multiple items of non-alpha-numeric data stored on the computing device, and wherein said one or more interface input behavior metrics comprise one or more of (i) touch pressure of input via the computing device interface, (ii) touch angle of input via the computing device interface, (iii) directionality of input via the computing device interface, (iv) a distinct number of iterations of an action in connection with input via the computing device interface, and (v) velocity of input via the computing device interface; an interface module configured to generate a prompt via the computing device interface in connection with an authentication request to access a protected resource associated with the computing device; an authentication module configured to process input cryptographic information entered via the computing device interface in response to the prompt against the pre-determined set of cryptographic information; and a processing module configured to resolving the authentication request based on said processing. - View Dependent Claims (20)
-
-
12. A method comprising:
-
generating each of multiple input elements to be associated with a computing device in response to user activity in connection with the computing device, wherein said generating each of the multiple input elements comprises fetching each of the multiple input elements from a collection of non-alpha-numeric data stored on the computing device; displaying the multiple generated input elements via an interface of the computing device; determining one or more input modality parameters associated with the multiple generated input elements, wherein said one or more input modality parameters comprise one or more of (i) touch pressure of input via the computing device interface, (ii) touch angle of input via the computing device interface, (iii) directionality of input via the computing device interface, (iv) a distinct number of iterations of an action in connection with input via the computing device interface, and (v) velocity of input via the computing device interface; generating a prompt via the computing device interface; and processing input cryptographic information entered via the computing device interface in response to the prompt against the multiple generated input elements and the one or more input modality parameters, wherein said processing comprises; establishing the multiple generated input elements and the one or more input modality parameters as a pre-determined set of cryptographic information to be used in connection with an authentication request to access a protected resource associated with the computing device if the input cryptographic information matches the multiple generated input elements and the one or more input modality parameters. - View Dependent Claims (13, 14, 15, 17, 18)
-
Specification