Token authentication for touch sensitive display devices
First Claim
Patent Images
1. A system comprising:
- a processor;
a data bus coupled to the processor; and
a non-transitory computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus, the computer program code used for authenticating a user and comprising instructions executable by the processor and configured for;
presenting an indicia on a touch sensitive input device portion, the indicia indicating where an authentication token should be placed on the touch sensitive input device portion;
detecting whether a physical object is placed upon a portion of a touch sensitive input device portion of a data processing system in response to the request;
analyzing the physical object;
performing comparison operations to compare the physical object to an authentication physical object, the comparison operations comprising comparing at least one physical characteristic of the physical object with a similar characteristic of the authentication physical object, the at least one physical characteristic being selected from a group comprising a size of the physical object, dimensions of the physical object, an orientation of the physical object and a shape of the physical object; and
authenticating the user if the physical object placed upon the portion of the touch sensitive input device corresponds to the authentication physical object, the authenticating generating an authentication authorization to allow the user access to a device associated with the touch sensitive input device portion.
1 Assignment
0 Petitions
Accused Products
Abstract
A token-based method for authenticating a user includes placing a predetermined token (i.e., physical object) at a predetermined location on a touch sensitive device to generate an authentication authorization rather than a traditional text-based, smartcard or biometric method of user authentication. In various embodiments, a plurality of tokens is placed upon the touch sensitive device in a predetermined sequence at predetermined locations to generate an authentication authorization.
-
Citations
14 Claims
-
1. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus, the computer program code used for authenticating a user and comprising instructions executable by the processor and configured for; presenting an indicia on a touch sensitive input device portion, the indicia indicating where an authentication token should be placed on the touch sensitive input device portion; detecting whether a physical object is placed upon a portion of a touch sensitive input device portion of a data processing system in response to the request; analyzing the physical object; performing comparison operations to compare the physical object to an authentication physical object, the comparison operations comprising comparing at least one physical characteristic of the physical object with a similar characteristic of the authentication physical object, the at least one physical characteristic being selected from a group comprising a size of the physical object, dimensions of the physical object, an orientation of the physical object and a shape of the physical object; and authenticating the user if the physical object placed upon the portion of the touch sensitive input device corresponds to the authentication physical object, the authenticating generating an authentication authorization to allow the user access to a device associated with the touch sensitive input device portion. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions configured for:
-
detecting whether a physical object is placed upon a portion of a touch sensitive input device portion of a data processing system in response to the request; analyzing the physical object; performing comparison operations to compare the physical object to an authentication physical object, the comparison operations comprising comparing at least one physical characteristic of the physical object with a similar characteristic of the authentication physical object, the at least one physical characteristic being selected from a group comprising a size of the physical object, dimensions of the physical object, an orientation of the physical object and a shape of the physical object; and authenticating the user if the physical object placed upon the portion of the touch sensitive input device corresponds to the authentication physical object, the authenticating generating an authentication authorization to allow the user access to a device associated with the touch sensitive input device portion. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
Specification