Dynamic secure login authentication
First Claim
1. A method comprising:
- obtaining login information from a user device for accessing a private account associated with a transaction, the private account associated with a predetermined pattern obtained from a predetermined trace applied to original symbols of an original matrix;
determining that the login information does not match private account authentication information of the private account;
in response to the determining that the login information does not match the private account authentication information, generating a user matrix with a plurality of dynamic symbols for an alternate authentication of the private account;
generating a system password from the dynamic symbols by applying the predetermined pattern on the user matrix;
presenting the user matrix with the plurality of dynamic symbols electronically on the user device;
receiving a user password obtained by applying a user-provided trace pattern on at least two of the dynamic symbols of the user matrix;
determining whether the system password matches the user password; and
in response to a determination that the system password matches the user password, confirming the alternate authentication of the private account to allow processing of the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for performing a secured transaction using a network including a server in communication with the network is provided. The server has a processor and a memory to store private account information from registered users and store commands that when executed by the processor cause the server to perform a method including: providing a login configuration to a user, including a matrix of dynamic symbols; determining an expected password for the user based on a trace pattern from the user and the symbols in the matrix; receiving a password from the user; and determining whether the password matches the expected password. A non-transitory machine-readable medium including a plurality of machine-readable instructions which when executed by one or more processors of a server controlled by a service provider are adapted to cause the server to perform a method as above is also provided.
48 Citations
20 Claims
-
1. A method comprising:
-
obtaining login information from a user device for accessing a private account associated with a transaction, the private account associated with a predetermined pattern obtained from a predetermined trace applied to original symbols of an original matrix; determining that the login information does not match private account authentication information of the private account; in response to the determining that the login information does not match the private account authentication information, generating a user matrix with a plurality of dynamic symbols for an alternate authentication of the private account; generating a system password from the dynamic symbols by applying the predetermined pattern on the user matrix; presenting the user matrix with the plurality of dynamic symbols electronically on the user device; receiving a user password obtained by applying a user-provided trace pattern on at least two of the dynamic symbols of the user matrix; determining whether the system password matches the user password; and in response to a determination that the system password matches the user password, confirming the alternate authentication of the private account to allow processing of the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
requesting login information from a user device for accessing a private account associated with a transaction, the private account associated with a predetermined pattern obtained from a predetermined trace applied to original symbols of an original matrix; determining that the login information does not match private account authentication information of the private account; in response to the determining that the login information does not match the private account authentication information, generating a user matrix with dynamic symbols for an alternate authentication of the private account; generating a system password from the dynamic symbols by applying the predetermined pattern on the user matrix; presenting the user matrix with the dynamic symbols electronically on the user device; receiving a user password obtained by applying a user-provided trace pattern on at least two of the dynamic symbols of the user matrix; determining whether the system password matches the user password; and in response to a determination that the system password matches the user password, confirming the alternate authentication of the private account to allow processing of the transaction. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to execute instructions from the non-transitory memory to perform operations comprising; requesting login information from a user device for accessing a private account associated with a transaction, the private account associated with a predetermined pattern obtained from a predetermined trace applied to original symbols of an original matrix; determining that the login information does not match private account authentication information of the private account; in response to the determining that the login information does not match the private account authentication information, generating a user matrix with a plurality of dynamic symbols for an alternate authentication of the private account; generating a system password from the dynamic symbols by applying the predetermined pattern on the user matrix; presenting the user matrix with the dynamic symbols electronically on the user device; receiving a user password obtained by applying a user-provided trace pattern on at least two of the dynamic symbols of the user matrix; determining whether the system password matches the user password; and in response to a determination that the system password matches the user password, confirming the alternate authentication of the private account to allow processing of the transaction. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification