Method of using text and picture formatting options as part of credentials for user authentication, as a part of electronic signature and as a part of challenge for user verification
First Claim
1. A computer-implemented process of authenticating a user requesting access to protected resource using credentials that are personalized using formatting options, the process comprising:
- using a computing device to perform the steps of;
capturing credentials from the user which are formatted using formatting options, wherein the credentials comprise one or more of formatted user name, formatted password or formatted numerical PIN, and wherein the formatting options comprise Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, and character effects;
comparing the captured formatted credentials against formatted credentials stored on a server that are designated by the user as valid credentials prior to requesting access;
flagging the captured credentials as valid and allowing the user to have access when the comparison indicates that a match occurs;
flagging the captured credentials as invalid and rejecting the request for access when the comparison indicates that a match does not occur;
alerting the user via alert communication methods chosen by the user including email, text message, voice message, voice call, SMS, audible alarm, or visual clues; and
logging the user request and the steps performed by the computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
We propose a method that uses formatting options of Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, Character Effects, Picture coloring, as a part of user passwords, credentials, electronic signature, challenge for user authentication and captcha verification. User personalizes user name and or password or text by choosing combination of proposed factors for each character or word in password. Method includes optional time range where user would have different password and factor combinations for each time range. We also propose a method to use these factors for multi-factor authentication where user is required to format given text as per remotely sent instructions. We propose variation of proposed method that would send text and the instruction to format it using different factors through separate communication channels.
For user verification, our method asks user to format the given text or given picture as instructed using different formatting options.
40 Citations
16 Claims
-
1. A computer-implemented process of authenticating a user requesting access to protected resource using credentials that are personalized using formatting options, the process comprising:
-
using a computing device to perform the steps of; capturing credentials from the user which are formatted using formatting options, wherein the credentials comprise one or more of formatted user name, formatted password or formatted numerical PIN, and wherein the formatting options comprise Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, and character effects; comparing the captured formatted credentials against formatted credentials stored on a server that are designated by the user as valid credentials prior to requesting access; flagging the captured credentials as valid and allowing the user to have access when the comparison indicates that a match occurs; flagging the captured credentials as invalid and rejecting the request for access when the comparison indicates that a match does not occur; alerting the user via alert communication methods chosen by the user including email, text message, voice message, voice call, SMS, audible alarm, or visual clues; and logging the user request and the steps performed by the computing device. - View Dependent Claims (2, 3, 5, 6, 8, 13)
-
-
4. A computer-implemented process of authenticating a user requesting access to protected resource using credentials that are personalized using formatting options, the process comprising:
-
using a computing device to perform the steps of; capturing credentials from the user which are formatted using formatting options, wherein the credentials comprise a formatted picture selected out of many and formatted by the user, and wherein the formatting options comprise applying picture effects, tinting, filtering, folding, cropping, coloring, cutting, zooming, styling, picture bordering, and framing; comparing the captured formatted credentials against formatted credentials stored on a server that are designated by the user as valid credentials prior to requesting access; flagging the captured credentials as valid and allowing the user to have access when the comparison indicates that a match occurs; flagging the captured credentials as invalid and rejecting the request for access when the comparison indicates that a match does not occur; alerting the user via alert communication methods chosen by the user including email, text message, voice message, voice call, SMS, audible alarm, or visual clues; and logging the user request and the steps performed by the computing device.
-
-
7. A computer-implemented user authentication process that is independently invokable for authenticating a user request to access a protected resource or to supplement authenticating a user requesting access to the protected resource, the process comprising:
-
using a computing device to perform the steps of; delivering formatting instructions, which instruct the user how to format a given text using formatting options comprising of Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, and character effects, to the user over an alternate channel including Email, SMS, voice message, picture message, video message, or hardware device given to user to receive instructions remotely; providing the text to the user to format; capturing the text on which the user has applied formatting using the formatting instructions; comparing the captured formatted text against a stored text on a server that is formatted using same instructions sent to the user using the alternate channel; flagging the captured text as correctly formatted and alternate authentication process as success when the comparison indicates that a match occurs; flagging the captured text as incorrectly formatted and alternate authentication process as failure when the comparison indicates that a match does not occur; alerting user via alert communication methods of user including email, text message, voice message, voice call, SMS, audible alarm, or visual clues; and logging the steps performed by the computing device. - View Dependent Claims (9, 10, 11, 14, 15, 16)
-
-
12. A computer-implemented user authentication process that is independently invokable for authenticating a user request to access a protected resource or to supplement authenticating a user requesting access to the protected resource, the process comprising:
-
using a computing device to perform the steps of; delivering formatting instructions, which instruct the user how to format a given picture using formatting options comprising of applying picture effects, tinting, filtering, folding, cropping, coloring, cutting, zooming, styling, picture bordering, and framing, to the user over an alternate channel including Email, SMS, voice message, picture message, video message, or hardware device given to user to receive instructions remotely; providing the picture to the user to format; capturing the picture on which the user has applied formatting using the formatting instructions; comparing the captured formatted text against a stored picture on a server that is formatted using same instructions sent to the user using the alternate channel; flagging the captured image as correctly formatted and alternate authentication process as success when the comparison indicates that a match occurs; flagging the captured image as incorrectly formatted and alternate authentication process as failure when the comparison indicates that a match does not occur; alerting user via alert communication methods of user including email, text message, voice message, voice call, SMS, audible alarm, or visual clues; and logging the steps performed by the computing device.
-
Specification