Obscuring visual login
First Claim
1. One or more non-transitory computer readable media having computer readable instructions stored-thereon for authenticating a user of a computing device, the computing device having a memory storing a base image and an overlay image, the base image having a particular base image reference point, and the overlay image having a particular overlay image reference point, the instructions comprising instructions for:
- generating a modified base image, the modified base image including a plurality of base image reference points and the particular base image reference point;
generating a modified overlay image, the modified overlay image including a plurality of overlay image reference points and the particular overlay image reference point;
displaying, on a display, the modified base image overlaid by the modified overlay image;
receiving an input for moving one of the modified base image or the modified overlay image;
moving the one of the modified base image or the modified overlay image in response to the input;
assigning a security level requirement for authenticating the user; and
in response to alignment of the particular base image reference point on the modified base image with the particular overlay image reference point on the modified overlay image after the moving and meeting the security level requirement, indicating positive authentication.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. A security level requirement is assigned and positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after the moving in a manner that meets the security level requirement.
74 Citations
19 Claims
-
1. One or more non-transitory computer readable media having computer readable instructions stored-thereon for authenticating a user of a computing device, the computing device having a memory storing a base image and an overlay image, the base image having a particular base image reference point, and the overlay image having a particular overlay image reference point, the instructions comprising instructions for:
-
generating a modified base image, the modified base image including a plurality of base image reference points and the particular base image reference point; generating a modified overlay image, the modified overlay image including a plurality of overlay image reference points and the particular overlay image reference point; displaying, on a display, the modified base image overlaid by the modified overlay image; receiving an input for moving one of the modified base image or the modified overlay image; moving the one of the modified base image or the modified overlay image in response to the input; assigning a security level requirement for authenticating the user; and in response to alignment of the particular base image reference point on the modified base image with the particular overlay image reference point on the modified overlay image after the moving and meeting the security level requirement, indicating positive authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of authenticating a user of a computing device, the computing device having a memory storing a base image and an overlay image, the base image having a particular base image reference point, and the overlay image having a particular overlay image reference point, the method comprising:
-
generating a modified base image, the modified base image including a plurality of base image reference points and the particular base image reference point; generating a modified overlay image, the modified overlay image including a plurality of overlay image reference points and the particular overlay image reference point; displaying, on a display, the modified base image overlaid by the modified overlay image; receiving an input for moving one of the modified base image or the modified overlay image; moving the one of the modified base image or the modified overlay image in response to the input; assigning a security level requirement for authenticating the user; and in response to alignment of the particular base image reference point on the modified base image with the particular overlay image reference point on the modified overlay image after the moving and meeting the security level requirement, indicating positive authentication. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a processor; a display; and one or more computer readable media having computer readable instructions stored thereon that when executed by the processor implement instructions for authenticating a user of the computing device, the computing device having a memory storing a base image and an overlay image, the base image having a particular base image reference point, and the overlay image having a particular overlay image reference point, the instructions including instructions for;
generating a modified base image, the modified base image including a plurality of base image reference points and the particular base image reference point;
generating a modified overlay image, the modified overlay image including a plurality of overlay image reference points and the particular overlay image reference point;
displaying, on the display, the modified base image overlaid by the modified overlay image;
receiving an input for moving one of the modified base image or the modified overlay image;
moving the one of the modified base image or the modified overlay image in response to the input;
assigning a security level requirement for authenticating the user; and
in response to alignment of the particular base image reference point on the modified base image with the particular overlay image reference point on the modified overlay image after the moving and meeting the security level requirement, indicating positive authentication. - View Dependent Claims (16, 17, 18, 19)
-
Specification