×

User authentication system and method

  • US 9,811,650 B2
  • Filed: 12/30/2015
  • Issued: 11/07/2017
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A user authentication system for authenticating a user in a computer environment, comprising:

  • an authentication database for storing an authentication object, the authentication object defined by a first plurality of three-dimensional vertices;

    an augmented reality device, comprising;

    a gesture analyzer configured to recognize a plurality of gestures performed by a user; and

    an object renderer communicatively coupled to the gesture analyzer, the object renderer configured to;

    (i) render a virtual three-dimensional object for display to the user;

    (ii) modify the shape of the virtual three-dimensional object in any number of ways in a manner associated with each particular gesture performed by the user and render a modified virtual three-dimensional object while the user performs the plurality of gestures; and

    (iii) provide a completed modified virtual three-dimensional object defined by a second plurality of three-dimensional vertices for authentication upon receiving a prompt indicating that the user is ready to authenticate the modified virtual three-dimensional object, the shape of the modified virtual three-dimensional object continuing to be modified in any number of ways in a manner associated with each particular gesture until receiving the prompt; and

    a verification subsystem communicatively coupled to the augmented reality device and the authentication database, the verification subsystem configured to;

    (i) compare the second plurality of three-dimensional vertices to the first plurality of three dimensional vertices; and

    (ii) authenticate the user if the second plurality of three-dimensional vertices matches the first plurality of three-dimensional vertices by at least greater than a pre-defined threshold, the threshold level required for a successful authentication varying based at least in part on the number of vertices defining the authentication object and/or the number of vertices defining the modified three-dimensional object.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×