Hardening security images
First Claim
1. A method of performing electronic authentication, comprising:
- generating a modified electronic image by altering at least a pixel of an electronic image, the electronic image being an image that has been previously viewed by a user during a setup process;
in response to receiving an authentication request from the user, causing the modified electronic image to be displayed to the user via an electronic display along with one or more other electronic images;
determining whether the user is able to recognize the modified electronic image; and
in response to determining that the user is able to recognize the modified electronic image, granting the authenticating request.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for electronic authentication. A modified electronic image is generated by altering at least a pixel of an electronic image. The electronic image is an image that has been previously viewed by a user during a setup process. In response to receiving an authentication request from the user, the modified electronic image is displayed to the user via an electronic display along with one or more other electronic images. A determination is made as to whether the user is able to recognize the modified electronic image. In response to determination that the user is able to recognize the modified electronic image, the authenticating request is granted.
-
Citations
22 Claims
-
1. A method of performing electronic authentication, comprising:
-
generating a modified electronic image by altering at least a pixel of an electronic image, the electronic image being an image that has been previously viewed by a user during a setup process; in response to receiving an authentication request from the user, causing the modified electronic image to be displayed to the user via an electronic display along with one or more other electronic images; determining whether the user is able to recognize the modified electronic image; and in response to determining that the user is able to recognize the modified electronic image, granting the authenticating request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 21, 22)
-
-
9. A system for performing electronic authentication, the system comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; generating a modified electronic image by altering at least a pixel of an electronic image, the electronic image being an image that has been previously viewed by a user during a setup process; in response to receiving an authentication request from the user, causing the modified electronic image to be displayed to the user via an electronic display along with one or more other electronic images; determining whether the user is able to recognize the modified electronic image; and in response to determining that the user is able to recognize the modified electronic image, granting the authenticating request. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
generating a modified electronic image, the electronic image being an image that has been previously viewed by a user during a setup process, wherein the generating comprises; modifying the electronic image by altering at least a pixel of the electronic image; comparing a first sum of all bytes of the electronic image before the electronic image is modified with a second sum of all bytes of the electronic image after the electronic image has been modified; and altering additional pixels of the modified electronic image in response to the first sum being equal to the second sum; in response to receiving an authentication request from the user, causing the modified electronic image to be displayed to the user via an electronic display along with one or more other electronic images; determining whether the user is able to recognize the modified electronic image; and in response to determining that the user is able to recognize the modified electronic image, granting the authenticating request. - View Dependent Claims (18, 19, 20)
-
Specification