Personal authentications on computing devices
First Claim
Patent Images
1. A computer device, comprising:
- a computer-user interface configured to receive a string of characters as a personal authentication statement input by a user, the string of characters including a concatenation of a user-authentication token and a computer objects-authentication token; and
a parser configured to parse and extract the user-authentication token and the computer objects-authentication token from the personal authentication statement input by the user,wherein the computer objects-authentication token identifies at least one concealed computer object, andwherein the computer device is configured to reveal at least one concealed computer object upon authentication of the user based on the extracted user-authentication token and verification that the authenticated user is authorized to access the at least one concealed computer object based on the extracted computer objects-authentication token.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer device receives a personal authentication statement from a user seeking to access concealed computer objects or applications on the computer device. A parser syntactically parses the personal authentication statement to extract a user-authentication token and a computer objects-authentication token. The computer objects-authentication token can identify one or more concealed computer objects on the computer device. The computer device reveals the one or more concealed computer objects to the user upon authentication of the user and verification that the authenticated user is authorized to access the concealed computer objects.
55 Citations
20 Claims
-
1. A computer device, comprising:
-
a computer-user interface configured to receive a string of characters as a personal authentication statement input by a user, the string of characters including a concatenation of a user-authentication token and a computer objects-authentication token; and a parser configured to parse and extract the user-authentication token and the computer objects-authentication token from the personal authentication statement input by the user, wherein the computer objects-authentication token identifies at least one concealed computer object, and wherein the computer device is configured to reveal at least one concealed computer object upon authentication of the user based on the extracted user-authentication token and verification that the authenticated user is authorized to access the at least one concealed computer object based on the extracted computer objects-authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
in a microprocessor-based computer device, receiving a string of characters as a personal authentication statement input at a computer-user interface by a user, the string of characters including a concatenation of a user-authentication token and a computer objects-authentication token; parsing and extracting the user-authentication token and the computer objects-authentication token from the personal authentication statement; authenticating the user contingent on the parsed user-authentication token; identifying at least one concealed computer object contingent on the parsed computer objects-authentication token; and upon verifying that the authenticated user is authorized to access the identified at least one concealed computer object, revealing the identified at least one concealed computer object to the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable medium, comprising:
-
instructions capable of being executed on a microprocessor, which instructions when executed allow a computer device to process a string of characters as a personal authentication statement input by a user at a computer-user interface; parse and extract the user-authentication token and the computer objects-authentication token from the personal authentication statement input by the user; and reveal at least one concealed computer object upon authentication of the user based on the extracted user-authentication token and verification that the authenticated user is authorized to access the identified at least one concealed computer object based on the extracted computer objects-authentication token. - View Dependent Claims (19, 20)
-
Specification