Authentication Method, Authentication Device and Computer-Readable Medium Storing Instructions for Authentication Processing Capable of Ensuring Security and Usability
First Claim
1. An authentication method, provided in a system having a display and a storage device, comprising the steps of:
- registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in said storage device; and
presenting the plurality of objects to said display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user, whereinthe step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method in a system having a display and a storage device is provided. The authentication method includes the steps of registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in the storage device; and presenting the plurality of objects to the display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user. The step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in the storage device.
59 Citations
19 Claims
-
1. An authentication method, provided in a system having a display and a storage device, comprising the steps of:
-
registering an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in said storage device; and presenting the plurality of objects to said display, accepting selection of an object by a user to be authenticated, and performing authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication device comprising:
-
a display; a storage device; and a processor operative to; register an object selected for each user from among a plurality of distinguishable objects prepared in advance as a key object in said storage device, and present the plurality of objects to said display, accept selection of an object by a user to be authenticated, and perform authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the processor is configured to determine a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium, with instructions stored thereon for authentication processing, which when executed by a processor of a computer, cause the computer to:
-
register an object selected for each user from among a plurality of visually distinguishable objects prepared in advance as a key object in a storage device; and present the plurality of objects to a display, accept selection of an object by a user to be authenticated, and perform authentication based on matching/mismatching of the selected object with the key object registered in association with the user, wherein the step of registering includes a step of determining a degree of freedom of selection of the object at the time of registration of the key object according to a degree of overlapping of the key object already registered in said storage device. - View Dependent Claims (17, 18, 19)
-
Specification