Antialiasing for picture passwords and other touch displays
First Claim
1. A client device for authenticating a user, comprising:
- one or more processors; and
memory containing instructions executable by the one or more processors whereby the client device is operable to;
obtain a first sequence of one or more input actions associated with an image displayed at the client device;
obtain a partial hash from a proof of knowledge server where a hash used for authentication of the user is n bits, the partial hash is k bits of the hash used for authentication of the user, and k is less than n;
calculate a hash for a second sequence of one or more input actions, wherein the second sequence of the one or more input actions is based on the first sequence of the one or more input actions;
determine if a part of the calculated hash matches the partial hash;
in response to determining that the part of the calculated hash matches the partial hash, send a communication to the proof of knowledge server to authenticate the user based on the calculated hash for the second sequence of the one or more input actions;
obtain a response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions; and
based on the response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions, permit or deny access.
0 Assignments
0 Petitions
Accused Products
Abstract
Antialiasing for picture passwords and other touch displays is disclosed. In some embodiments a client device for authenticating a user is operable to obtain a sequence of input actions for an image and obtain a partial hash from a Proof of Knowledge (PoK) server where the partial hash is part of a hash used for authentication of the user. The client device is also operable to calculate a hash for the sequence and determine if a part of the hash matches the partial hash. If the part of the hash matches the partial hash, the client device sends a communication to the PoK server to authenticate the user based on the hash for the sequence of the one or more input actions and obtain a response indicating whether the user is authenticated. In this way, sending some hashes to the proof of knowledge server may not be necessary, saving resources.
114 Citations
13 Claims
-
1. A client device for authenticating a user, comprising:
-
one or more processors; and memory containing instructions executable by the one or more processors whereby the client device is operable to; obtain a first sequence of one or more input actions associated with an image displayed at the client device; obtain a partial hash from a proof of knowledge server where a hash used for authentication of the user is n bits, the partial hash is k bits of the hash used for authentication of the user, and k is less than n; calculate a hash for a second sequence of one or more input actions, wherein the second sequence of the one or more input actions is based on the first sequence of the one or more input actions; determine if a part of the calculated hash matches the partial hash; in response to determining that the part of the calculated hash matches the partial hash, send a communication to the proof of knowledge server to authenticate the user based on the calculated hash for the second sequence of the one or more input actions; obtain a response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions; and based on the response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions, permit or deny access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a client device for authenticating a user and a proof of knowledge server, the client device comprising; one or more processors; and memory containing instructions executable by the one or more processors whereby the client device is operable to; obtain a first sequence of one or more input actions associated with an image displayed at the client device; obtain a partial hash from the proof of knowledge server where a hash used for authentication of the user is n bits, the partial hash is k bits of the hash used for authentication of the user, and k is less than n; calculate a hash for a second sequence of one or more input actions, wherein the second sequence of the one or more input actions is based on the first sequence of the one or more input actions; determine if a part of the calculated hash matches the partial hash; in response to determining that the part of the calculated hash matches the partial hash, send a communication to a proof of knowledge server to authenticate the user based on the calculated hash for the second sequence of the one or more input actions; obtain a response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions; and based on the response from the proof of knowledge server based on the calculated hash for the second sequence of the one or more input actions, permit or deny access; and the proof of knowledge server comprising; one or more processors; and memory containing instructions executable by the one or more processors whereby the proof of knowledge server is operable to; send a communication to a client device containing a partial hash where the partial hash is a value derived from an original hash of an original sequence of one or more original input actions used to authenticate a user; receive a communication from a client device containing a calculated hash for the second sequence of one or more input actions; and send a response based on the calculated hash for the second sequence of the one or more input actions. - View Dependent Claims (12, 13)
-
Specification