System and method of encoding content and an image
First Claim
Patent Images
1. A registration method for verifying the identity of a user and granting access to a restricted resource on the basis of a pre-defined security policy, the method comprising:
- receiving, at an authentication server from a computing device n signature gestures from a user, each of the n signature gestures representing a different level of signature complexity, and where the n signature gestures comprise at least a full form and a partial form of the user'"'"'s signature;
storing in a data store associated with the authentication server each of the n signature gestures within a user profile as a reference signature gesture; and
associating at a processor of the authentication server, in a registration step, each of the n reference signature gestures with a different security level defined within a security policy, wherein the processor is operable to subsequently compare received signature gestures associated with a user request for access to the restricted resource with one or more of the stored n reference signature gestures in order to verify the identity of the user, and, in the event the that the user is verified, to grant access to the restricted resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of verifying the identity of a user at an authentication server that includes receiving user data relating to a signature gesture entered by a user at a computing device, the user data having a plurality of sample points, verifying the user data at the authentication server by comparing to reference signature data, encoding a verification message within a digital image, and notifying the user that their identity has been verified on the basis of the user data received from the computing device.
-
Citations
7 Claims
-
1. A registration method for verifying the identity of a user and granting access to a restricted resource on the basis of a pre-defined security policy, the method comprising:
-
receiving, at an authentication server from a computing device n signature gestures from a user, each of the n signature gestures representing a different level of signature complexity, and where the n signature gestures comprise at least a full form and a partial form of the user'"'"'s signature; storing in a data store associated with the authentication server each of the n signature gestures within a user profile as a reference signature gesture; and associating at a processor of the authentication server, in a registration step, each of the n reference signature gestures with a different security level defined within a security policy, wherein the processor is operable to subsequently compare received signature gestures associated with a user request for access to the restricted resource with one or more of the stored n reference signature gestures in order to verify the identity of the user, and, in the event the that the user is verified, to grant access to the restricted resource. - View Dependent Claims (2, 3)
-
-
4. An authentication server for verifying the identity of a user and granting access to a restricted resource on the basis of a pre-defined security policy, the authentication server comprising:
-
inputs arranged to receive n signature gestures from a user, each of the n signature gestures representing a different level of signature complexity, and comprising at least a full form and a partial form of the user'"'"'s signature; a data store associated with the authentication server arranged to store each of the n signature gestures within a user profile as a reference signature gesture; a processor arranged to associate each of the n reference signature gestures with a different security level defined within the security policy; inputs arranged to receive user data relating to a signature gesture entered by a user at a computing device, the user data associated with a user request for access to the restricted resource, the user data comprising a plurality of sample points, wherein the processor is operable to verify the user data by comparing the user data to the reference signature gestures, and to encode a verification message within a digital image; and outputs arranged to notify the user that the identity of the user has been verified on the basis of the user data received from the computing device.
-
-
5. A method of verifying the identity of a user and granting access to a restricted resource on the basis of a pre-defined security policy, the method comprising:
-
receiving a request for access to the restricted resource; determining a security level associated with the received request on the basis of the pre-defined security policy; accessing a user profile, the user profile comprising a stored reference signature gesture associated with each security level within the predefined security policy; determining the stored reference signature gesture associated with the security level associated with the received access request; notifying the user of signature gesture sign-in requirements based on the access request and the determined security level; receiving the required signature gesture from the user; and comparing the received signature gesture with the reference signature gesture to determine the identity of the user and in the event that the user is verified to grant access to the restricted resource. - View Dependent Claims (6, 7)
-
Specification