METHOD FOR AUTHENTICATION AND VERIFICATION OF USER IDENTITY
First Claim
1. A method for authentication and verification of an identity of a user, said method comprising:
- determining, on a device, a user'"'"'s textual credentials for authenticating the user as a user of a service;
adding at least one hidden keystroke to said user'"'"'s textual credentials;
wherein said hidden keystroke is generated by an action of said user that does not generate a textual character in a textbox in which a credential is typed but does generate at least one time stamp and a key code.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention is a method for authentication and verification of the identity of a user. The method comprises adding at least one hidden keystroke to the user'"'"'s textual credentials. A hidden keystroke is an action by a user that does not generate a textual character in a textbox in which a credential is typed but does generate time stamps and a key code. The user may be required to add the hidden keystroke/s at specific location/s in his/her textual credential field. The method of the invention can be used to authenticate and verify users wanting to access addresses, websites, devices, documents, and web pages on a communication network, or a specific application installed on the user'"'"'s device or to access devices requiring confirmation of the user in order to be activated. The invention is also a document or address on a device or on a communication network or a device that can be accessed or activated only by providing one or more hidden keystrokes in a credential field comprised of a string of keystrokes
42 Citations
12 Claims
-
1. A method for authentication and verification of an identity of a user, said method comprising:
-
determining, on a device, a user'"'"'s textual credentials for authenticating the user as a user of a service; adding at least one hidden keystroke to said user'"'"'s textual credentials; wherein said hidden keystroke is generated by an action of said user that does not generate a textual character in a textbox in which a credential is typed but does generate at least one time stamp and a key code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. (canceled)
-
12. A device comprising:
at least one processor, wherein said processor is configure to; determine a user'"'"'s textual credentials for authenticating the user as a user of a service; and add at least one hidden keystroke to said user'"'"'s textual credentials, wherein said at least one hidden keystroke is generated by a user action that does not generate a textual character in a textbox in which a credential is typed but does generate at least one time stamp and a key code.
Specification