USRE47518E1 - Image or pictographic based computer login systems and methods - Google Patents
Image or pictographic based computer login systems and methods Download PDFInfo
- Publication number
- USRE47518E1 USRE47518E1 US15/405,205 US201715405205A USRE47518E US RE47518 E1 USRE47518 E1 US RE47518E1 US 201715405205 A US201715405205 A US 201715405205A US RE47518 E USRE47518 E US RE47518E
- Authority
- US
- United States
- Prior art keywords
- image
- user
- input
- shape
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present invention generally relates to systems, methods, and computer-readable media for providing an image or pictographic based login procedure for computer systems or networks. While useful in non-electronic ink environments, such systems and methods may find particular usefulness in login procedures for pen-based computing systems and/or other systems that accept electronic ink input.
- GUIs graphical user interfaces
- Typical computer systems are optimized for accepting user input from one or more discrete input devices, such as a keyboard for entering text and a pointing device, such as a mouse with one or more buttons, for operating the user interface.
- a GUI is the user interface for the Windows® computer operating system (available from Microsoft Corporation of Redmond, Wash.).
- the ubiquitous keyboard and mouse interface provides for fast creation and modification of documents, spreadsheets, database fields, drawings, photos, web pages, emails, and the like.
- pen-based computing systems such as tablet personal computers (“tablet PCs”), personal digital assistants (“PDAs”), and the like
- user input advantageously may be introduced as “electronic ink” using an electronic “pen” or stylus (e.g., mimicking writing with a pen or pencil on a piece of paper).
- pen-based computing systems all user input is capable of being entered and manipulated using an electronic pen input device, and the user interface is fully controllable using only the electronic pen.
- a pen-based computer system As pen-based computing systems become more popular, many computer activities such as access in a computer system become more difficult to implement. For example, in a computer system in which a user logs into an individualized account or inputs security information to enter a restricted site, a pen-based computer system creates difficulties for the user to conveniently and efficiently maneuver the pen or stylus to accomplish the task.
- a display is presented to the user containing a field in which the user enters a userid and a field in which the user enters a corresponding password.
- a user inputs information via a keyboard. Therefore, if inputting data via a keyboard is problematic (e.g., a keyboard is not available or not conveniently accessible), a user may not be able to input data as necessary. In such a system lacking a conveniently available keyboard, a user would be unable to successfully access information because of the inability to enter authentication information into the system.
- a user In the traditional method of gaining access to a private account, a user typically enters a password via a keyboard.
- a password that has a higher level of security i.e., a completely random string of characters that is not otherwise associated with the user
- the user often forgets the password and must expend effort in having the password reset, obtaining the password from a system administrator, etc.
- the user may select a password that is easy to remember, such as the user's date of birth.
- passwords are easy to “crack” and provide very little security to the user. This defeats the purpose of having the security system in the first place.
- Such systems and methods may include: (a) displaying a first image on a computer display screen; (b) receiving a first user input indicating a portion of the first image (e.g., via an electronic ink input system); (c) determining if the first user input corresponds to a first acceptable user input for user authentication (e.g., via a computer processor system); and (d) proceeding with a user authentication procedure when the first user input corresponds to the first acceptable user input for user authentication.
- systems and methods in accordance with examples of this invention may further include: displaying a second image on the computer display screen; receiving a second user input indicating a portion of the second image; and determining if the second user input corresponds to a second acceptable user input for authentication. If desired, user access to the computer system or network may be allowed when the first and/or second user inputs correspond to the acceptable user inputs for user authentication.
- aspects of the invention further relate to computer-readable media including computer-executable instructions stored thereon for providing image or pictographic based authentication procedures for computer systems or networks like those described above.
- FIG. 1 illustrates a schematic diagram of an example general-purpose digital computing environment in which at least some aspects of the present invention may be implemented
- FIG. 2 illustrates an example pen-based personal computing environment in which at least some aspects of the present invention may be implemented
- FIG. 3 illustrates an example of one aspect of the present invention in which an image is selected for use as an authentication tool
- FIGS. 4A, 4B, and 4C illustrate an example of one aspect of the invention in which a user selects a portion of an image on a display in a user authentication procedure.
- aspects of the present invention relate to systems, methods, and computer-readable media for an image or pictographic login procedure.
- the following description is divided into sub-sections to assist the reader.
- the sub-sections include: Terms; General Description of Various Aspects of the Invention; Example Hardware; Example Systems, Methods, and Computer-Readable Media According to the Invention; and Conclusion.
- Pen Any type of user input device useful in entering electronic ink into and/or otherwise manipulating or controlling an electronic document, a user interface, and/or a computer operating system.
- pen any type of user input device useful in entering electronic ink into and/or otherwise manipulating or controlling an electronic document, a user interface, and/or a computer operating system.
- pen and “stylus” may be used interchangeably in this specification.
- Computer-Readable Medium means any available media that can be accessed by a user on a computer system.
- “computer-readable media” may include computer storage media and communication media.
- “Computer storage media” includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules or other data.
- “Computer storage media” includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology; CD-ROM, digital versatile disks (DVD) or other optical storage devices; magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices; or any other medium that can be used to store the desired information and that can be accessed by a computer.
- Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media, such as a wired network or direct-wired connection, and wireless media, such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of “computer-readable media.”
- aspects of the present invention relate to systems, methods, and computer-readable media for providing an image or pictographic based authentication procedure for computer systems or networks.
- the authentication procedure of the present invention may be applied in any application where authorization of a user is desired. For example, a system may require authentication of a user before allowing the user to “log in” to the user's account. In this situation, a user desiring access to his personal account on a system may apply the authentication procedure of the present invention to gain access to the account while preventing other unauthorized users from accessing the account.
- the authentication procedure of the present invention may be applied to accessing protected or private sites, for example, on an intranet or on the internet and/or for accessing or logging on to individual computers or systems, local area networks, wide area networks, or the like.
- Methods in accordance with at least some examples of this invention may include: (a) displaying a first image on a computer display screen; (b) receiving a first user input indicating a portion of the first image; (c) determining if the first user input corresponds to a first acceptable login user input; and (d) proceeding with a user login procedure when the first user input corresponds to the first acceptable login user input.
- methods in accordance with at least some examples of this invention further may include: displaying a second image on the computer display screen (the second image may be the same as the first image, an enlargement of part of the first image, a completely new image, etc.); receiving a second user input indicating a portion of the second image; and determining if the second user input corresponds to a second acceptable login user input. If desired, user access to the computer system or network may be allowed when the first and/or second user inputs correspond to the acceptable login user inputs.
- Systems in accordance with at least some examples of this invention may include: (a) a computer display screen; (b) an input system for receiving user input (e.g., such as a digitizer for receiving electronic ink input); and (c) a processor system (e.g., including one or more processors) programmed and adapted to: (i) display a first image on a computer display screen, (ii) determine if a first user input indicating a portion of the first image corresponds to a first acceptable login user input, and (iii) proceed with a user login procedure when the first user input corresponds to the first acceptable login user input.
- a processor system e.g., including one or more processors
- the processor system when the system proceeds with the user login procedure, is further programmed and adapted to: (iv) display a second image on the computer display screen, and (v) determine if a second user input indicating a portion of the second image corresponds to a second acceptable login user input. If desired, the processor system may allow user access to the computer system or network when the first and/or second user inputs correspond to the acceptable login user inputs.
- Systems and methods according to at least some examples of this invention may accept user input (e.g., the first and/or second user inputs described above) as electronic ink input.
- user input e.g., the first and/or second user inputs described above
- the various portions of the image may be “indicated” during the login procedure by drawing a predetermined shape at, near, or at least partially around the portion of the first image using electronic ink.
- various other aspects or characteristics of the input may be controlled, varied, and/or selected as part of the login procedure without departing from the invention.
- ink color, ink thickness, pen tip shape, or other ink characteristics may be varied; characteristics of the input shape or shapes drawn by the user may be varied; the number of times a portion of an image is encircled may be controlled or varied; directional characteristics (e.g., line direction, pen movement direction, etc.) of the input may be varied; initial image selection to initiate the login procedure may be required (e.g., from a pallet of displayed image thumbnails); intermediate image selection to continue the login procedure may be required (e.g., from a pallet of displayed image thumbnails); the location(s) and/or number of “breaks” in an encirculation or other input characteristic may be varied; the pictographic login features may be used in combination with other login procedures or features, such as password entry, image selection; etc.
- Various other aspects of the input required during login may be varied, controlled, and used as part of the login security features without departing from this invention.
- Still additional aspects of the invention relate to computer-readable media including computer-executable instructions stored thereon for providing image or pictographic based login procedures for computer systems or networks.
- FIG. 1 illustrates a schematic diagram of a general-purpose digital computing environment that may be used to implement various aspects of the present invention.
- a computer 100 includes a processing unit 110 , a system memory 120 , and a system bus 130 that couples various system components (including the system memory 120 ) to the processing unit 110 .
- the system bus 130 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
- the system memory 120 may include read only memory (“ROM”) 140 and random access memory (“RAM”) 150 .
- ROM read only memory
- RAM random access memory
- a basic input/output system 160 (“BIOS”), which contains the basic routines that help to transfer information between elements within the computer 100 (such as during start-up), is stored in the ROM 140 .
- the computer 100 also may include a hard disk drive 170 for reading from and writing to a hard disk (not shown), a magnetic disk drive 180 for reading from or writing to a removable magnetic disk 190 , and/or an optical disk drive 191 for reading from or writing to a removable optical disk 199 , such as a CD ROM or other optical media.
- the hard disk drive 170 , magnetic disk drive 180 , and optical disk drive 191 are connected to the system bus 130 by a hard disk drive interface 192 , a magnetic disk drive interface 193 , and an optical disk drive interface 194 , respectively.
- These drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules, and other data for the personal computer 100 . It will be appreciated by those skilled in the art that other types of computer-readable media that can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, BERNOULLI cartridges, random access memories, read only memories, and the like, also may be used in the example operating environment.
- a number of program modules can be stored on the hard disk drive 170 , magnetic disk 190 , optical disk 199 , ROM 140 , or RAM 150 , including an operating system 195 , one or more application programs 196 , other program modules 197 , and program data 198 .
- a user can enter commands and information into the computer 100 through input devices, such as a keyboard 101 and pointing device 102 (such as a mouse).
- Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
- serial port interface 106 may be connected to the processing unit 110 through a serial port interface 106 that is coupled to the system bus 130 , but they also may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB), and the like. Further still, these devices may be coupled directly to the system bus 130 via an appropriate interface (not shown).
- USB universal serial bus
- a monitor 107 or other type of display device also may be connected to the system bus 130 via an interface, such as a video adapter 108 .
- personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
- a pen digitizer 165 and accompanying pen or stylus 166 are provided in order to digitally capture freehand input.
- the pen digitizer 165 may be directly coupled to the processing unit 110 , or it may be coupled to the processing unit 110 in any suitable manner, such as via a parallel port or another interface and the system bus 130 as is known in the art.
- the digitizer 165 is shown apart from the monitor 107 in FIG. 1 , the usable input area of the digitizer 165 may be co-extensive with the display area of the monitor 107 . Further still, the digitizer 165 may be integrated in the monitor 107 , or it may exist as a separate device overlaying or otherwise appended to the monitor 107 .
- the computer 100 can operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 109 .
- the remote computer 109 can be a server, a router, a network PC, a peer device or other common network node, and it typically may include many or all of the elements described above relative to the computer 100 , although for simplicity, only a memory storage device 111 has been illustrated in FIG. 1 .
- the logical connections depicted in FIG. 1 include a local area network (LAN) 112 and a wide area network (WAN) 113 .
- LAN local area network
- WAN wide area network
- the computer 100 When used in a LAN networking environment, the computer 100 may be connected to the local area network 112 through a network interface or adapter 114 .
- the personal computer 100 When used in a WAN networking environment, the personal computer 100 typically includes a modem 115 or other means for establishing a communications link over the wide area network 113 , such as the Internet.
- the modem 115 which may be internal or external to the computer 100 , may be connected to the system bus 130 via the serial port interface 106 .
- program modules depicted relative to the personal computer 100 may be stored in a remote memory storage device.
- network connections shown are examples and other techniques for establishing a communications link between the computers can be used.
- the existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP, UDP, and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server.
- Any of various conventional web browsers can be used to display and manipulate data on web pages.
- FIG. 1 environment shows one example environment
- other computing environments also may be used in systems and methods according to this invention.
- one or more examples of the present invention may use an environment having fewer than all of the various aspects shown in FIG. 1 and described above, and these aspects may appear in various combinations and subcombinations that will be apparent to one of ordinary skill. Additional features from those shown in FIG. 1 also may be included in environments useful with this invention.
- FIG. 2 illustrates a pen-based personal computer (“PC”) 201 that may be used in accordance with various aspects of the present invention. Any or all of the features, subsystems, and functions in the system of FIG. 1 can be included in the computer of FIG. 2 .
- the pen-based personal computer system 201 includes a large display surface 202 , e.g., a digitizing flat panel display, such as a liquid crystal display (“LCD”) screen, on which a plurality of windows 203 is displayed.
- a digitizing flat panel display such as a liquid crystal display (“LCD”) screen
- LCD liquid crystal display
- stylus 204 a user can select, highlight, and write on the digitizing display area and thereby enter electronic ink data into the system.
- suitable digitizing display panels include electromagnetic pen digitizers, such as pen digitizers available from Mutoh Co.
- the pen-based computing system 201 interprets gestures made using stylus 204 in order to manipulate data, enter text as electronic ink, and execute conventional computer application tasks, such as creating, editing, and modifying spreadsheets, word processing programs, and the like.
- the stylus 204 may be equipped with buttons or other features to augment its capabilities.
- a stylus 204 could be implemented as a “pencil” or “pen,” in which one end constitutes a writing portion and the other end constitutes an “eraser” end 205 , and which, when moved across the display, indicates portions of electronic ink on the display that are to be erased.
- Other types of input devices such as a mouse, trackball, keyboard, or the like also may be used.
- a user's own finger could be used as an input device, e.g., for selecting or indicating portions of the displayed image on a touch-sensitive or proximity-sensitive display. Consequently, the term “user input device,” as used herein, is intended to have a broad definition and encompasses many variations on well-known input devices.
- electronic ink e.g., of the type described above
- pen-based computing systems that accept user input via an electronic pen and/or display at least some forms of input as “electronic ink,” e.g., of the type described above, have increased in popularity.
- Use of electronic ink input as opposed to conventional pen and paper is advantageous in many respects.
- electronic ink input may be electronically stored, filed, and cataloged for future use, which enables it to be easily maintained, located, and shared with others.
- electronic ink input can be recognized and converted to conventional machine-generated text (e.g., text insertable into, readable by, and useful by conventional computers), it can be electronically stored, searched, and otherwise used on the computer, for example, in conventional word processing documents and programs, in spreadsheets, in email programs, in document management programs, in web browsers, and the like.
- Handwriting recognition systems are commercially available that allow handwritten electronic ink input to be converted to machine-generated text.
- One example of a handwriting recognizer is that provided with the Windows XP Tablet PC EditionTM operating system (available from Microsoft Corporation of Redmond, Wash.), although other handwriting recognizers also are known and may be used in computer systems in accordance with this invention.
- pen-based computer operating systems provide an ink platform through direct modification of GINA.dll or as a set of component object model (“COM”) services that an operating system and/or an application program can use to capture, manipulate, recognize, and store ink and/or other pen actions or events.
- the ink platform also may include a mark-up language including a language like the extensible markup language (“XML”). Additional examples of the ink platform may use the distributed component object model (“DCOM”) implementation. Yet further implementations may be used including the Win32 programming model and the .Net programming model from Microsoft Corporation. Such platforms are commercially available and known in the art.
- Electronic ink data may be stored in an ink serialized format (“ISF”) or in any other suitable or desired manner, including in conventional manners known to those skilled in the art.
- ISF ink serialized format
- aspects of this invention may be used in conjunction with other types of pen-based computing systems and/or other devices that accept data as electronic ink and/or that accept, process, or display electronic pen or stylus input, such as: hand-held or palm-top computing systems; personal digital assistants; pocket personal computers; mobile and cellular telephones, pagers, and other communication devices; watches; appliances; and any other devices or systems that include monitors or other display devices and/or digitizers that present printed or graphical information to users and/or allow input using an electronic pen or stylus or that can process electronic ink collected by another device (e.g., a conventional desktop computer that can process electronic ink collected by a tablet PC).
- a conventional desktop computer that can process electronic ink collected by a tablet PC
- aspects of the present invention relate generally to systems and methods that may utilize an image in user authorization or authentication (e.g., secure website logins, computer system or network logins, and/or other security situations).
- a user may select a preferred image, for example from a menu of possible image choices or a personal image provided by the user, which is presented to the user on a display.
- the selected image when displayed to the user, may be used in any authorization or authentication procedure in which the identity of the user needs to be ascertained. For example, when a user logs onto a computer system, it is typically desired that security of the system be maintained so that user data is not compromised by other users. Thus, methods and systems are desired that safeguard individual user accounts for the respective user.
- the image selected conforms to predetermined characteristics and specifications to be optimized for use as a user authentication tool.
- the predetermined characteristics and specification of the selected image may be selected, for example, on the needs of the user in any given system or network and may include, but is not limited to, image complexity, size or resolution.
- the image may contain a medium to high level of complexity such that a user may easily select a predetermined area in the image when a portion of the image is selected by the user for authentication.
- increased complexity of the image increases accuracy of selection of the predetermined portion of the image, allowing the user to accurately pinpoint the portion of the image corresponding to the login selection.
- a complex image also is advantageous from a security standpoint in that it prevents or inhibits unauthorized users from easily guessing the portion of the image to be indicated for successful login or authentication.
- FIG. 3 illustrates an example of one aspect of the present invention in which an image is selected for use as an authentication tool.
- a selection of images is presented to a user on a display such that the user may select a desired image for use in the authentication procedure.
- Any number of images in any order or format may be used.
- a display of multiple images may be presented on a display in a grid format (e.g., as thumbnail images) as illustrated in FIG. 3 .
- a user could electronically page through a library of images (e.g., using a “NEXT” or “PREVIOUS” button) and select the authentication image from this library.
- a user may import his/her own image, if desired.
- a user-provided image should conform to minimum resolution and complexity standards to ensure that the image provides a high level of security and privacy in the login process.
- FIGS. 4A, 4B, and 4C illustrate an example of one aspect of the invention in which a user selects a portion of an image on a display in a first step of user authentication according to the present invention.
- FIG. 4A is an image previously selected by the user as a pictographic login image of the present invention, and when a procedure requiring user authentication is initiated (e.g., a computer is turned on, access to a secure website or data file is requested, etc.), this image is displayed to this user.
- the image has sufficient complexity and resolution to provide accuracy in selection of a portion of the image, reproducibility of selection of the proper portion of the image, and facility of the user to identify the desired portion of the image to select.
- the image selected in this example is an image of snow-covered mountains.
- FIG. 4B is the display of FIG. 4A after the user has selected a portion of the image for login or authentication purposes.
- User selection of a portion of the image may be accomplished by any variety of input devices such as but not limited to a mouse, a pen, a stylus, a finger, etc.
- the user For proper authentication, the user must select the area of the image that has been designated as the area of the image to select for successful log in.
- the area of the image to select for log-in has been previously selected by the user, and that same area of the image must be subsequently selected to successfully complete the log-in or authentication procedure.
- There are many other features of the selection of the image portion that may optionally be used to increase privacy and security.
- the shape used to select the portion of the image may also be set to require user input in a certain shape such that the user must not only select the proper portion of the image, but he/she also must select the portion of the image using a predetermined shape.
- the predetermined shape used in the present example is a circle although the invention is not limited to any particular shape. Any shape may be used, and optionally required, for authentication, without departing from the invention.
- Another potential method of enhancing security is to require preselected input characteristics relating to additional features of the image selection before authentication may be granted.
- the direction of drawing the selection may be pre-selected such that the user may have to draw the image selection in a particular order or direction.
- the direction of selecting the proper portion of the image may be optionally limited to drawing the selection in a clockwise direction or in a counter-clockwise direction.
- the system may require user input of the selection to start at a particular spot on the circle (e.g., the 8 o'clock position) in order to successfully authenticate. In these ways, the user may be required to draw the selection in a predetermined manner or authentication may not occur.
- the color of the electronic ink used for the selection may be optionally regulated in order to provide enhanced security.
- the user may be required to draw the selection of the image with a particular color of ink, e.g., red, selected from a color pallet included with the authentication image. If this option is included in the authentication procedure, a user selecting the proper portion of the image may still fail to gain access or authorization if the user draws the selection with an improperly selected color. In this way, security is further increased such that an unauthorized person would have great difficulty in accessing the private account, data, or other information of another user.
- a particular color of ink e.g., red
- the selection of the portion of the image by the user may not be the precise preselected area identified by the user during the security system set-up procedure. Due to variability and inaccuracies of the input by a human user, an authorized user may fail to draw a selection around the precise desired area in the image. Rather, due to human error or slight variations in selecting the proper portion of the image, the selection may be slightly skewed from the precise location of the portion of the image. The tolerance of the skew may depend on the individual system or network and may be calculated or adjusted based on the needs of the user, for example.
- the login and authentication method and system of the present invention provide for a tolerance in the selection of the portion of the image for user authorization.
- the authorization process will proceed. Only if the selection is outside a predetermined tolerance level from the predetermined area will the system not permit the user to log in (or at least to continue into the login procedure).
- This tolerance may depend on many factors such as the complexity of the image, the resolution of the image used for authentication, or the input means, to name a few.
- systems and methods according to at least some examples of this invention may allow a user and/or a system administrator to select the tolerance level to maximize security while permitting authentication within an acceptable range of the pre-selected input.
- the system and method of the present invention proceeds with the authorization procedure.
- Proceeding with the authorization procedure may include any number of outcomes depending on the needs of the user or the parameters of the computer system.
- the authorization procedure may proceed by completing the authorization process.
- the computer may complete other login procedures (e.g., open windows to secure information, launch programs designated in a start-up menu, etc.).
- the authorization procedure may proceed with other security and/or authentication steps that may be required by systems and methods according to at least some examples of this invention prior to full completion of authorization and login.
- another image may optionally be displayed as part of the authorization process. In this example as illustrated in FIG. 4C , an enlarged portion of the previous image is displayed on the screen. Alternatively, a different image altogether may be used.
- a second image is displayed after selection of the portion of the first image.
- the second image contains a portion that is further used for authentication of the user. For example, if the user properly selected the correct portion of the first image (as shown in FIG. 4B ), the second image may appear, and proper selection by the user of a pre-selected portion in the second image enables continued authentication and/or login. For added security, a second image optionally still will be displayed even if the correct portion of the first image was not properly selected in the first step. In this way, an unauthorized user trying to compromise the system will not be tipped off as to whether the first selection was correct or erroneous immediately after the selection of a portion of the first image.
- the user selects a portion of the second image.
- there may be additional features to enhance security in selection of the portion of the second image including, but not limited to, specifying the color of the ink used to make the selection, restricting the manner or shape used in selecting the portion of the image, etc. If the user properly selects a pre-determined portion of the second image within an acceptable tolerance, the authentication process may continue.
- the process repeats as described until the final image is properly processed and the proper portion of the final image is selected. If all of the selections were proper, the login and authentication process is complete and the user logs into the system under his Userid in his account. If any one selection was erroneous, login/authentication fails. A message may optionally be displayed to the user indicating that authorization has failed.
- a traditional display in which a user is requested to input a userid and/or a password may be combined with the authentication method of the present invention to enhance security.
- an unauthorized user may access the account if he/she is able to obtain the authorized user's password. By logging into the account improperly, the unauthorized user compromises security.
- multiple forms of security used in conjunction can further prevent an unauthorized user from improperly gaining access to another user's account information.
- information may be hidden within the image displayed.
- steganography may be used in which information is hidden in the image such that only the user knows of the existence of the information.
- key information of, but not limited to, the form (login name plus the key data) and hashed in one selection may be hidden steganographically into an image.
- the hidden information such as the key code or login name, is selected. If a match occurs at the completion of the authorization process between the stored information (e.g., key or login name) and the steganographically hidden information selected by the user, login is successful.
- Ink color (or other characteristics, such as thickness); shape(s) drawn; number of “encirculations;” directional characteristics (e.g., line direction, pen movement direction, etc.); position with respect to image (which may move from login to login); absolute position on the digitizer irrespective of image position; initial image selection by user; intermediate image selection by user; location(s) or number of “breaks” in an encirculation; use encirculation login in combination with other login procedures, such as password entry, image selection, etc.;
- the present invention also relates to computer-readable media including computer-executable instructions stored thereon for performing various methods and operating various systems, including the systems and/or methods described above.
- the computer-readable media may constitute computer-executable instructions stored on the various specific examples of computer-readable media described above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (34)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/405,205 USRE47518E1 (en) | 2005-03-08 | 2017-01-12 | Image or pictographic based computer login systems and methods |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/073,742 US7953983B2 (en) | 2005-03-08 | 2005-03-08 | Image or pictographic based computer login systems and methods |
US13/409,877 USRE44725E1 (en) | 2005-03-08 | 2012-03-01 | Image or pictographic based computer login systems and methods |
US14/156,044 USRE46301E1 (en) | 2005-03-08 | 2014-01-15 | Image or pictographic based computer login systems and methods |
US15/405,205 USRE47518E1 (en) | 2005-03-08 | 2017-01-12 | Image or pictographic based computer login systems and methods |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/073,742 Reissue US7953983B2 (en) | 2005-03-08 | 2005-03-08 | Image or pictographic based computer login systems and methods |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE47518E1 true USRE47518E1 (en) | 2019-07-16 |
Family
ID=36972393
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/073,742 Ceased US7953983B2 (en) | 2005-03-08 | 2005-03-08 | Image or pictographic based computer login systems and methods |
US13/409,877 Active 2028-05-21 USRE44725E1 (en) | 2005-03-08 | 2012-03-01 | Image or pictographic based computer login systems and methods |
US14/156,044 Ceased USRE46301E1 (en) | 2005-03-08 | 2014-01-15 | Image or pictographic based computer login systems and methods |
US15/405,205 Active 2028-05-21 USRE47518E1 (en) | 2005-03-08 | 2017-01-12 | Image or pictographic based computer login systems and methods |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/073,742 Ceased US7953983B2 (en) | 2005-03-08 | 2005-03-08 | Image or pictographic based computer login systems and methods |
US13/409,877 Active 2028-05-21 USRE44725E1 (en) | 2005-03-08 | 2012-03-01 | Image or pictographic based computer login systems and methods |
US14/156,044 Ceased USRE46301E1 (en) | 2005-03-08 | 2014-01-15 | Image or pictographic based computer login systems and methods |
Country Status (1)
Country | Link |
---|---|
US (4) | US7953983B2 (en) |
Families Citing this family (93)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8063878B2 (en) | 2005-01-20 | 2011-11-22 | The Invention Science Fund I, Llc | Permanent electronic paper |
US7865734B2 (en) | 2005-05-12 | 2011-01-04 | The Invention Science Fund I, Llc | Write accessibility for electronic paper |
US7774606B2 (en) | 2005-01-20 | 2010-08-10 | The Invention Science Fund I, Inc | Write accessibility for electronic paper |
US7669245B2 (en) * | 2005-06-08 | 2010-02-23 | Searete, Llc | User accessibility to electronic paper |
US8640259B2 (en) | 2005-01-20 | 2014-01-28 | The Invention Science Fund I, Llc | Notarizable electronic paper |
US7856555B2 (en) | 2005-01-20 | 2010-12-21 | The Invention Science Fund I, Llc | Write accessibility for electronic paper |
US8281142B2 (en) | 2005-01-20 | 2012-10-02 | The Invention Science Fund I, Llc | Notarizable electronic paper |
US7739510B2 (en) | 2005-05-12 | 2010-06-15 | The Invention Science Fund I, Inc | Alert options for electronic-paper verification |
US7953983B2 (en) | 2005-03-08 | 2011-05-31 | Microsoft Corporation | Image or pictographic based computer login systems and methods |
US20070083919A1 (en) * | 2005-10-11 | 2007-04-12 | Guy Heffez | Secure Image Protocol |
JP4887800B2 (en) * | 2006-01-24 | 2012-02-29 | 富士ゼロックス株式会社 | Document processing system |
EP1835714B1 (en) * | 2006-03-16 | 2014-05-07 | Océ-Technologies B.V. | Printing via kickstart function |
EP2020114A4 (en) | 2006-05-24 | 2014-01-22 | Vidoop L L C | Graphical image authentication and security system |
US20070277224A1 (en) | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US8117458B2 (en) * | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
US20080028205A1 (en) * | 2006-07-31 | 2008-01-31 | Cui Qing Yang | Method and apparatus for authenticating a user |
US8301897B2 (en) * | 2006-08-23 | 2012-10-30 | Cisco Technology, Inc. | Challenge-based authentication protocol |
US8434133B2 (en) * | 2006-10-06 | 2013-04-30 | Fmr Llc | Single-party, secure multi-channel authentication |
US8671444B2 (en) * | 2006-10-06 | 2014-03-11 | Fmr Llc | Single-party, secure multi-channel authentication for access to a resource |
US8474028B2 (en) * | 2006-10-06 | 2013-06-25 | Fmr Llc | Multi-party, secure multi-channel authentication |
EP2074546A1 (en) * | 2006-10-06 | 2009-07-01 | FMR Corporation | Secure multi-channel authentication |
US20080104410A1 (en) * | 2006-10-25 | 2008-05-01 | Brown Daniel R | Electronic clinical system having two-factor user authentication prior to controlled action and method of use |
US20080115192A1 (en) * | 2006-11-07 | 2008-05-15 | Rajandra Laxman Kulkarni | Customizable authentication for service provisioning |
US8356333B2 (en) * | 2006-12-12 | 2013-01-15 | Bespoke Innovations Sarl | System and method for verifying networked sites |
US20080172750A1 (en) * | 2007-01-16 | 2008-07-17 | Keithley Craig J | Self validation of user authentication requests |
US20090121471A1 (en) * | 2007-01-31 | 2009-05-14 | Gaffney Gene F | Method and system for producing documents, websites, and the like having security features |
US7740281B2 (en) * | 2007-01-31 | 2010-06-22 | The Ergonomic Group | Method and system for producing certified documents and the like |
KR20090120475A (en) * | 2007-02-05 | 2009-11-24 | 비둡 엘엘씨 | Methods and systems for delivering sponsored out-of-band passwords |
US20110047605A1 (en) * | 2007-02-06 | 2011-02-24 | Vidoop, Llc | System And Method For Authenticating A User To A Computer System |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
US20100250937A1 (en) * | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
US20080231040A1 (en) * | 2007-03-19 | 2008-09-25 | Gaffney Gene F | Security document with fade-way portion |
US11257080B2 (en) | 2007-05-04 | 2022-02-22 | Michael Sasha John | Fraud deterrence for secure transactions |
US20090064321A1 (en) * | 2007-08-29 | 2009-03-05 | Dick Richard S | Methods for Providing User Authentication in a Computer Network or System |
US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
US8726355B2 (en) * | 2008-06-24 | 2014-05-13 | Gary Stephen Shuster | Identity verification via selection of sensible output from recorded digital data |
US8086745B2 (en) * | 2008-08-29 | 2011-12-27 | Fuji Xerox Co., Ltd | Graphical system and method for user authentication |
US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
US8347103B2 (en) * | 2009-01-13 | 2013-01-01 | Nic, Inc. | System and method for authenticating a user using a graphical password |
US8458485B2 (en) * | 2009-06-17 | 2013-06-04 | Microsoft Corporation | Image-based unlock functionality on a computing device |
GB0910545D0 (en) * | 2009-06-18 | 2009-07-29 | Therefore Ltd | Picturesafe |
US8458774B2 (en) * | 2009-11-02 | 2013-06-04 | Authentify Inc. | Method for secure site and user authentication |
US8813183B2 (en) * | 2010-02-11 | 2014-08-19 | Antique Books, Inc. | Method and system for processor or web logon |
US20110231656A1 (en) * | 2010-03-16 | 2011-09-22 | Telcordia Technologies, Inc. | System and methods for authenticating a receiver in an on-demand sender-receiver transaction |
US8832810B2 (en) | 2010-07-09 | 2014-09-09 | At&T Intellectual Property I, L.P. | Methods, systems, and products for authenticating users |
US9141150B1 (en) * | 2010-09-15 | 2015-09-22 | Alarm.Com Incorporated | Authentication and control interface of a security system |
US8631487B2 (en) | 2010-12-16 | 2014-01-14 | Research In Motion Limited | Simple algebraic and multi-layer passwords |
US8650635B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Pressure sensitive multi-layer passwords |
US8635676B2 (en) | 2010-12-16 | 2014-01-21 | Blackberry Limited | Visual or touchscreen password entry |
US8661530B2 (en) | 2010-12-16 | 2014-02-25 | Blackberry Limited | Multi-layer orientation-changing password |
US8863271B2 (en) | 2010-12-16 | 2014-10-14 | Blackberry Limited | Password entry using 3D image with spatial alignment |
US8745694B2 (en) | 2010-12-16 | 2014-06-03 | Research In Motion Limited | Adjusting the position of an endpoint reference for increasing security during device log-on |
US9135426B2 (en) | 2010-12-16 | 2015-09-15 | Blackberry Limited | Password entry using moving images |
US9258123B2 (en) | 2010-12-16 | 2016-02-09 | Blackberry Limited | Multi-layered color-sensitive passwords |
US8769641B2 (en) | 2010-12-16 | 2014-07-01 | Blackberry Limited | Multi-layer multi-point or pathway-based passwords |
US8650624B2 (en) | 2010-12-16 | 2014-02-11 | Blackberry Limited | Obscuring visual login |
US8931083B2 (en) | 2010-12-16 | 2015-01-06 | Blackberry Limited | Multi-layer multi-point or randomized passwords |
US8769668B2 (en) | 2011-05-09 | 2014-07-01 | Blackberry Limited | Touchscreen password entry |
AU2011202415B1 (en) * | 2011-05-24 | 2012-04-12 | Microsoft Technology Licensing, Llc | Picture gesture authentication |
JP5143258B2 (en) * | 2011-06-17 | 2013-02-13 | 株式会社東芝 | Information processing apparatus, information processing method, and control program |
US8627096B2 (en) * | 2011-07-14 | 2014-01-07 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
US8504842B1 (en) * | 2012-03-23 | 2013-08-06 | Google Inc. | Alternative unlocking patterns |
US8881251B1 (en) * | 2012-05-30 | 2014-11-04 | RememberIN, Inc. | Electronic authentication using pictures and images |
US8973095B2 (en) | 2012-06-25 | 2015-03-03 | Intel Corporation | Authenticating a user of a system via an authentication image mechanism |
US9069932B2 (en) | 2012-07-06 | 2015-06-30 | Blackberry Limited | User-rotatable three-dimensionally rendered object for unlocking a computing device |
US20140195974A1 (en) * | 2012-08-29 | 2014-07-10 | Identity Validation Products, Llc | Method and apparatus for using a finger swipe interface to control a system |
US8752151B2 (en) * | 2012-10-09 | 2014-06-10 | At&T Intellectual Property I, L.P. | Methods, systems, and products for authentication of users |
US8694791B1 (en) | 2012-10-15 | 2014-04-08 | Google Inc. | Transitioning between access states of a computing device |
JP2014106813A (en) * | 2012-11-28 | 2014-06-09 | International Business Maschines Corporation | Authentication device, authentication program, and authentication method |
GB2509314B (en) * | 2012-12-27 | 2014-11-26 | Ziyad Saleh M Alsalloum | Geographical passwords |
US9172692B2 (en) | 2013-03-14 | 2015-10-27 | William M. Langley | Systems and methods for securely transferring authentication information between a user and an electronic resource |
US9813411B2 (en) | 2013-04-05 | 2017-11-07 | Antique Books, Inc. | Method and system of providing a picture password proof of knowledge as a web service |
US9875351B2 (en) | 2013-07-16 | 2018-01-23 | Nokia Technologies Oy | Methods, apparatuses, and computer program products for hiding access to information in an image |
US9323435B2 (en) | 2014-04-22 | 2016-04-26 | Robert H. Thibadeau, SR. | Method and system of providing a picture password for relatively smaller displays |
EP3134841A2 (en) | 2014-04-22 | 2017-03-01 | Antique Books Inc. | Method and system of providing a picture password for relatively smaller displays |
US9490981B2 (en) | 2014-06-02 | 2016-11-08 | Robert H. Thibadeau, SR. | Antialiasing for picture passwords and other touch displays |
EP3149985A1 (en) | 2014-06-02 | 2017-04-05 | Antique Books Inc. | Advanced proof of knowledge authentication |
US11615663B1 (en) * | 2014-06-17 | 2023-03-28 | Amazon Technologies, Inc. | User authentication system |
WO2016025504A1 (en) | 2014-08-11 | 2016-02-18 | Antique Books, Inc. | Methods and systems for securing proofs of knowledge for privacy |
US9449166B2 (en) * | 2014-12-05 | 2016-09-20 | Intel Corporation | Performing authentication based on user shape manipulation |
US10127376B1 (en) * | 2014-12-31 | 2018-11-13 | EMC IP Holding Company LLC | Graphical password generation |
WO2016191376A1 (en) | 2015-05-22 | 2016-12-01 | Antique Books, Inc. | Initial provisioning through shared proofs of knowledge and crowdsourced identification |
US10630675B2 (en) | 2016-04-14 | 2020-04-21 | Microsoft Technology Licensing, Llc | Generating web service picture passwords with user-specific cypher keys |
US10235532B2 (en) * | 2016-09-23 | 2019-03-19 | Harman International Industries, Incorporated | Device access control |
CN107026842B (en) * | 2016-11-24 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Method and device for generating security problem and verifying identity |
US10817066B2 (en) * | 2016-12-05 | 2020-10-27 | Google Llc | Information privacy in virtual reality |
US10333913B2 (en) | 2017-05-15 | 2019-06-25 | International Business Machines Corporation | Dynamic object passwords |
WO2020121302A1 (en) * | 2018-12-10 | 2020-06-18 | Conflu3Nce, Ltd. | System and method for user recognition based on cognitive interactions |
KR20220040761A (en) * | 2020-09-24 | 2022-03-31 | 삼성전자주식회사 | Electronic apparatus and method of controlling the same |
Citations (127)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5224179A (en) | 1988-12-20 | 1993-06-29 | At&T Bell Laboratories | Image skeletonization method |
US5465084A (en) | 1990-03-27 | 1995-11-07 | Cottrell; Stephen R. | Method to provide security for a computer and a device therefor |
US5485531A (en) | 1987-12-17 | 1996-01-16 | Fuji Electric Co., Ltd. | Character-feature extraction device |
US5539840A (en) | 1993-10-19 | 1996-07-23 | Canon Inc. | Multifont optical character recognition using a box connectivity approach |
US5559961A (en) * | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US5599610A (en) | 1994-02-04 | 1997-02-04 | Fabrite Laminating Corp. | Trilaminate fabric for surgical gowns and drapes |
US5608387A (en) | 1991-11-30 | 1997-03-04 | Davies; John H. E. | Personal identification devices and access control systems |
US5778069A (en) | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
US6075905A (en) | 1996-07-17 | 2000-06-13 | Sarnoff Corporation | Method and apparatus for mosaic image construction |
US6118872A (en) | 1997-09-05 | 2000-09-12 | Fujitsu Limited | Apparatus and method for controlling secret data by using positions of input image points on an image and a sequence of the positions |
US6185316B1 (en) | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US6209104B1 (en) | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6278453B1 (en) | 1997-06-13 | 2001-08-21 | Starfish Software, Inc. | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
WO2001077792A2 (en) | 2000-04-07 | 2001-10-18 | Rsa Security Inc. | System and method for authenticating a user |
US20010037468A1 (en) | 2000-04-11 | 2001-11-01 | Gaddis M. Norton | Method and apparatus for creating unique image passwords |
US20010044906A1 (en) | 1998-04-21 | 2001-11-22 | Dimitri Kanevsky | Random visual patterns used to obtain secured access |
DE10024179A1 (en) * | 2000-05-17 | 2001-11-22 | Gero Decker | Access control method acts as an alternative to existing password systems, etc. and uses selection of an area of a mathematical image, e.g. a fractal image, that is then used as a password type area to gain access |
US20020029341A1 (en) | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
US6393305B1 (en) | 1999-06-07 | 2002-05-21 | Nokia Mobile Phones Limited | Secure wireless communication user identification by voice recognition |
US20020141643A1 (en) | 2001-02-15 | 2002-10-03 | Denny Jaeger | Method for creating and operating control systems |
US6516092B1 (en) | 1998-05-29 | 2003-02-04 | Cognex Corporation | Robust sub-model shape-finder |
US20030054800A1 (en) | 2001-09-17 | 2003-03-20 | Nec Corporation | Individual authentication method for portable communication equipment and program product therefore |
US20030093699A1 (en) | 2001-11-15 | 2003-05-15 | International Business Machines Corporation | Graphical passwords for use in a data processing network |
WO2003048909A2 (en) | 2001-12-04 | 2003-06-12 | Applied Neural Computing, L.L.C. | Validating the identity of a user using a pointing device |
US20030128396A1 (en) | 2002-01-07 | 2003-07-10 | Xerox Corporation | Image type classification using edge features |
US20030179913A1 (en) | 2002-03-19 | 2003-09-25 | Fujitsu Limited | Handwritten signature authentication program, method and apparatus |
US20040010722A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Computer system and method of controlling booting of the same |
US20040034801A1 (en) * | 2001-02-15 | 2004-02-19 | Denny Jaeger | Method for creating and using computer passwords |
US6720860B1 (en) | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
US20040085351A1 (en) | 2002-09-20 | 2004-05-06 | Nokia Corporation | Method of deactivating device lock state, and electronic device |
US20040155991A1 (en) | 2002-11-21 | 2004-08-12 | Lowles Robert J. | System and method of integrating a touchscreen within an LCD |
US20040169638A1 (en) | 2002-12-09 | 2004-09-02 | Kaplan Adam S. | Method and apparatus for user interface |
US6788304B1 (en) | 1998-06-11 | 2004-09-07 | Evans & Sutherland Computer Corporation | Method and system for antialiased procedural solid texturing |
US20040193882A1 (en) | 2003-03-26 | 2004-09-30 | Authenticatid Corp. | System, method and computer program product for authenticating a client |
US20040230843A1 (en) | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
US20040260955A1 (en) * | 2003-06-19 | 2004-12-23 | Nokia Corporation | Method and system for producing a graphical password, and a terminal device |
US6868190B1 (en) | 2000-10-19 | 2005-03-15 | Eastman Kodak Company | Methods for automatically and semi-automatically transforming digital image data to provide a desired image look |
US20050141747A1 (en) | 2003-12-05 | 2005-06-30 | Yun-Qing Shi | System and method for robust reversible data hiding and data recovery in the spatial domain |
US6934860B1 (en) | 2000-05-08 | 2005-08-23 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
US6948068B2 (en) | 2000-08-15 | 2005-09-20 | Spectra Systems Corporation | Method and apparatus for reading digital watermarks with a hand-held reader device |
US20050210418A1 (en) | 2004-03-23 | 2005-09-22 | Marvit David L | Non-uniform gesture precision |
US20050210417A1 (en) | 2004-03-23 | 2005-09-22 | Marvit David L | User definable gestures for motion controlled handheld devices |
US6958759B2 (en) * | 2001-08-28 | 2005-10-25 | General Instrument Corporation | Method and apparatus for preserving, enlarging and supplementing image content displayed in a graphical user interface |
US6959394B1 (en) | 2000-09-29 | 2005-10-25 | Intel Corporation | Splitting knowledge of a password |
US20060010400A1 (en) | 2004-06-28 | 2006-01-12 | Microsoft Corporation | Recognizing gestures and using gestures for interacting with software applications |
US20060020617A1 (en) | 2002-11-18 | 2006-01-26 | Siemens Aktiengesellschaft | Method for processing data packets in a data network which has a mobile function |
US20060174339A1 (en) | 2005-01-29 | 2006-08-03 | Hai Tao | An arrangement and method of graphical password authentication |
US20060206918A1 (en) | 2005-03-01 | 2006-09-14 | Mclean Ivan H | System and method for using a visual password scheme |
US20070016958A1 (en) | 2005-07-12 | 2007-01-18 | International Business Machines Corporation | Allowing any computer users access to use only a selection of the available applications |
US20070047772A1 (en) | 2005-08-25 | 2007-03-01 | Matey James R | Methods and systems for biometric identification |
US20070071285A1 (en) | 2005-09-26 | 2007-03-29 | Cognisign Llc | Apparatus and method for trajectory-based identification of digital data content |
JP2007094613A (en) | 2005-09-28 | 2007-04-12 | Dainippon Printing Co Ltd | User switching management system for shared use terminal |
CN1957355A (en) | 2004-04-01 | 2007-05-02 | 道夫·雅各布森 | Mouse work identification |
US20070115091A1 (en) | 2005-11-22 | 2007-05-24 | Kyocera Wireless Corp. | System and method for unlocking wireless communications device |
US20070150842A1 (en) | 2005-12-23 | 2007-06-28 | Imran Chaudhri | Unlocking a device by performing gestures on an unlock image |
US7240367B2 (en) | 2002-08-09 | 2007-07-03 | Seoung-Bae Park | User interface and method for inputting password and password system using the same |
US7243239B2 (en) | 2002-06-28 | 2007-07-10 | Microsoft Corporation | Click passwords |
US7257241B2 (en) | 2005-01-07 | 2007-08-14 | Motorola, Inc. | Dynamic thresholding for a fingerprint matching system |
US7279646B2 (en) | 2001-05-25 | 2007-10-09 | Intel Corporation | Digital signature collection and authentication |
US20070277224A1 (en) | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
KR100856919B1 (en) | 2006-12-01 | 2008-09-05 | 한국전자통신연구원 | Method and Apparatus for user input based on gesture |
JP2008217716A (en) | 2007-03-07 | 2008-09-18 | Sharp Corp | Authentication device, image forming apparatus, authentication system, authentication program, recording medium and authentication method |
US20080230598A1 (en) | 2002-01-15 | 2008-09-25 | William Kress Bodin | Free-space Gesture Recognition for Transaction Security and Command Processing |
US20080244700A1 (en) | 2006-05-24 | 2008-10-02 | Osborn Steven L | Methods and systems for graphical image authentication |
US20080244013A1 (en) | 2007-03-30 | 2008-10-02 | Alexander Kropivny | Method, Apparatus, System, Medium, and Signals for Publishing Content Created During a Communication |
US20080263361A1 (en) | 2007-04-20 | 2008-10-23 | Microsoft Corporation | Cryptographically strong key derivation using password, audio-visual and mental means |
CN101296457A (en) | 2008-06-25 | 2008-10-29 | 深圳华为通信技术有限公司 | Screen operation method and device |
US20090038006A1 (en) | 2007-08-02 | 2009-02-05 | Traenkenschuh John L | User authentication with image password |
WO2009022242A1 (en) | 2007-08-13 | 2009-02-19 | Sony Ericsson Mobile Communications Ab | Graphical image authentication |
US20090055910A1 (en) | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
US20090083847A1 (en) | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090085936A1 (en) | 2007-09-29 | 2009-04-02 | Htc Corporation | Image processing method |
US20090094247A1 (en) | 2007-10-03 | 2009-04-09 | Fredlund John R | Image storage system, device and method |
US7536556B2 (en) | 2001-07-27 | 2009-05-19 | Yulia Vladimirovna Fedorova | Method and device for entering a computer database password |
US20090138725A1 (en) | 2007-11-28 | 2009-05-28 | Sriganesh Madhvanath | Authentication System and Method |
US20090172810A1 (en) | 2007-12-28 | 2009-07-02 | Sungkyunkwan University Foundation For Corporate Collaboration | Apparatus and method for inputting graphical password using wheel interface in embedded system |
US20090199295A1 (en) | 2008-02-02 | 2009-08-06 | Yung-Ho Shih | Image password authentication system of portable electronic apparatus and method for the same |
US20090210939A1 (en) | 2008-02-20 | 2009-08-20 | Microsoft Corporation | Sketch-based password authentication |
US7593000B1 (en) | 2008-05-17 | 2009-09-22 | David H. Chin | Touch-based authentication of a mobile device through user generated pattern creation |
US20090244013A1 (en) | 2008-03-27 | 2009-10-01 | Research In Motion Limited | Electronic device and tactile touch screen display |
US20090259855A1 (en) | 2008-04-15 | 2009-10-15 | Apple Inc. | Code Image Personalization For A Computing Device |
US20090313693A1 (en) | 2008-06-16 | 2009-12-17 | Rogers Sean Scott | Method and system for graphical passcode security |
US20100013762A1 (en) | 2008-07-18 | 2010-01-21 | Alcatel- Lucent | User device for gesture based exchange of information, methods for gesture based exchange of information between a plurality of user devices, and related devices and systems |
US20100031200A1 (en) | 2008-07-30 | 2010-02-04 | Arima Communications Corp. | Method of inputting a hand-drawn pattern password |
EP2150915A2 (en) | 2007-05-30 | 2010-02-10 | Pamci Networks Denmark APS | Secure login protocol |
US20100043062A1 (en) | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
JP2010097340A (en) | 2008-10-15 | 2010-04-30 | Canon Inc | Information processor and method for controlling information processor |
US20100128002A1 (en) | 2008-11-26 | 2010-05-27 | William Stacy | Touch-sensitive display method and apparatus |
US20100131294A1 (en) | 2008-11-26 | 2010-05-27 | Medhi Venon | Mobile medical device image and series navigation |
US7743256B2 (en) | 2005-05-02 | 2010-06-22 | Vince Yang | Method for verifying authorized access |
US20100156843A1 (en) | 2008-12-23 | 2010-06-24 | Research In Motion Limited | Piezoelectric actuator arrangement |
TW201026004A (en) | 2008-12-30 | 2010-07-01 | yi-hong Zheng | Method of judging gesture command by Hamilton linking-type sub-picture and device thereof |
US20100180336A1 (en) | 2009-01-13 | 2010-07-15 | Nolan Jones | System and Method for Authenticating a User Using a Graphical Password |
US20100186074A1 (en) | 2009-01-16 | 2010-07-22 | Angelos Stavrou | Authentication Using Graphical Passwords |
US20100211551A1 (en) | 2007-07-20 | 2010-08-19 | Olaworks, Inc. | Method, system, and computer readable recording medium for filtering obscene contents |
CN201569981U (en) | 2009-12-30 | 2010-09-01 | 刘坤 | Three dimensional gesture computer input system |
US20100223276A1 (en) | 2007-03-27 | 2010-09-02 | Faleh Jassem Al-Shameri | Automated Generation of Metadata for Mining Image and Text Data |
US7793108B2 (en) | 2007-02-27 | 2010-09-07 | International Business Machines Corporation | Method of creating password schemes for devices |
JP2010211433A (en) | 2009-03-10 | 2010-09-24 | Hitachi Ltd | Authentication system |
US20100250937A1 (en) | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
US7831294B2 (en) | 2004-10-07 | 2010-11-09 | Stereotaxis, Inc. | System and method of surgical imagining with anatomical overlay for navigation of surgical devices |
US20100325721A1 (en) | 2009-06-17 | 2010-12-23 | Microsoft Corporation | Image-based unlock functionality on a computing device |
US20100322485A1 (en) | 2009-06-18 | 2010-12-23 | Research In Motion Limited | Graphical authentication |
US20100328201A1 (en) | 2004-03-23 | 2010-12-30 | Fujitsu Limited | Gesture Based User Interface Supporting Preexisting Symbols |
US7873382B2 (en) | 2003-04-29 | 2011-01-18 | Sony Ericsson Mobile Communications Ab | Mobile apparatus with remote lock and control function |
US20110016405A1 (en) | 2009-07-17 | 2011-01-20 | Qualcomm Incorporated | Automatic interafacing between a master device and object device |
US20110031139A1 (en) | 2006-07-26 | 2011-02-10 | James Joseph Macor | Protection, authentication, identification device for a physical object specimen |
US20110055507A1 (en) | 2009-08-31 | 2011-03-03 | Netac Technology Co. Ltd. | System and method for restricting the function of a storage device based on geographical location |
WO2011049292A2 (en) | 2009-10-22 | 2011-04-28 | (주)소프트크림 | Method for inputting a password using a touch screen |
KR20110044131A (en) | 2009-10-22 | 2011-04-28 | (주)소프트크림 | Password input method based on touch screen |
CN201821481U (en) | 2010-04-20 | 2011-05-04 | 苏州瀚瑞微电子有限公司 | Touch earphone device |
US7941834B2 (en) | 2007-04-05 | 2011-05-10 | Microsoft Corporation | Secure web-based user authentication |
US7953983B2 (en) | 2005-03-08 | 2011-05-31 | Microsoft Corporation | Image or pictographic based computer login systems and methods |
US7970240B1 (en) | 2001-12-17 | 2011-06-28 | Google Inc. | Method and apparatus for archiving and visualizing digital images |
US20110156867A1 (en) | 2009-12-30 | 2011-06-30 | Carlos Carrizo | Gesture-based signature authentication |
US20110197259A1 (en) | 2010-02-11 | 2011-08-11 | Antique Books, Inc. | Method and system for processor or web logon |
US20110247067A1 (en) | 2010-04-02 | 2011-10-06 | Sony Corporation | Display apparatus, authentication method, and program |
AU2011202415B1 (en) | 2011-05-24 | 2012-04-12 | Microsoft Technology Licensing, Llc | Picture gesture authentication |
US20120123920A1 (en) | 2010-11-10 | 2012-05-17 | Fraser Norman M | User Authentication System and Method Thereof |
US20120126940A1 (en) | 2010-11-19 | 2012-05-24 | Research In Motion Limited | Detection of duress condition at a communication device |
EP2466513A1 (en) | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Visual or touchscreen password entry |
EP2466518A1 (en) | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Password entry using 3D image with spatial alignment |
US20120166944A1 (en) | 2010-12-23 | 2012-06-28 | Stephen Hayden Cotterill | Device, Method, and Graphical User Interface for Switching Between Two User Interfaces |
US8286102B1 (en) | 2010-05-27 | 2012-10-09 | Adobe Systems Incorporated | System and method for image processing using multi-touch gestures |
US20130163201A1 (en) | 2011-12-26 | 2013-06-27 | Tzu-Hung Wang | Electronic device |
US8504842B1 (en) | 2012-03-23 | 2013-08-06 | Google Inc. | Alternative unlocking patterns |
-
2005
- 2005-03-08 US US11/073,742 patent/US7953983B2/en not_active Ceased
-
2012
- 2012-03-01 US US13/409,877 patent/USRE44725E1/en active Active
-
2014
- 2014-01-15 US US14/156,044 patent/USRE46301E1/en not_active Ceased
-
2017
- 2017-01-12 US US15/405,205 patent/USRE47518E1/en active Active
Patent Citations (147)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5485531A (en) | 1987-12-17 | 1996-01-16 | Fuji Electric Co., Ltd. | Character-feature extraction device |
US5224179A (en) | 1988-12-20 | 1993-06-29 | At&T Bell Laboratories | Image skeletonization method |
US5465084A (en) | 1990-03-27 | 1995-11-07 | Cottrell; Stephen R. | Method to provide security for a computer and a device therefor |
US5608387A (en) | 1991-11-30 | 1997-03-04 | Davies; John H. E. | Personal identification devices and access control systems |
US5539840A (en) | 1993-10-19 | 1996-07-23 | Canon Inc. | Multifont optical character recognition using a box connectivity approach |
US5599610A (en) | 1994-02-04 | 1997-02-04 | Fabrite Laminating Corp. | Trilaminate fabric for surgical gowns and drapes |
US5559961A (en) * | 1994-04-04 | 1996-09-24 | Lucent Technologies Inc. | Graphical password |
US5778069A (en) | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
US6075905A (en) | 1996-07-17 | 2000-06-13 | Sarnoff Corporation | Method and apparatus for mosaic image construction |
US6209104B1 (en) | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
US6278453B1 (en) | 1997-06-13 | 2001-08-21 | Starfish Software, Inc. | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
US6118872A (en) | 1997-09-05 | 2000-09-12 | Fujitsu Limited | Apparatus and method for controlling secret data by using positions of input image points on an image and a sequence of the positions |
US6185316B1 (en) | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US20010044906A1 (en) | 1998-04-21 | 2001-11-22 | Dimitri Kanevsky | Random visual patterns used to obtain secured access |
US6516092B1 (en) | 1998-05-29 | 2003-02-04 | Cognex Corporation | Robust sub-model shape-finder |
US6788304B1 (en) | 1998-06-11 | 2004-09-07 | Evans & Sutherland Computer Corporation | Method and system for antialiased procedural solid texturing |
US20020029341A1 (en) | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
US6393305B1 (en) | 1999-06-07 | 2002-05-21 | Nokia Mobile Phones Limited | Secure wireless communication user identification by voice recognition |
WO2001077792A2 (en) | 2000-04-07 | 2001-10-18 | Rsa Security Inc. | System and method for authenticating a user |
US20010037468A1 (en) | 2000-04-11 | 2001-11-01 | Gaddis M. Norton | Method and apparatus for creating unique image passwords |
US6934860B1 (en) | 2000-05-08 | 2005-08-23 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
DE10024179A1 (en) * | 2000-05-17 | 2001-11-22 | Gero Decker | Access control method acts as an alternative to existing password systems, etc. and uses selection of an area of a mathematical image, e.g. a fractal image, that is then used as a password type area to gain access |
US6720860B1 (en) | 2000-06-30 | 2004-04-13 | International Business Machines Corporation | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
US6948068B2 (en) | 2000-08-15 | 2005-09-20 | Spectra Systems Corporation | Method and apparatus for reading digital watermarks with a hand-held reader device |
US6959394B1 (en) | 2000-09-29 | 2005-10-25 | Intel Corporation | Splitting knowledge of a password |
US6868190B1 (en) | 2000-10-19 | 2005-03-15 | Eastman Kodak Company | Methods for automatically and semi-automatically transforming digital image data to provide a desired image look |
US20020141643A1 (en) | 2001-02-15 | 2002-10-03 | Denny Jaeger | Method for creating and operating control systems |
US20040034801A1 (en) * | 2001-02-15 | 2004-02-19 | Denny Jaeger | Method for creating and using computer passwords |
US7279646B2 (en) | 2001-05-25 | 2007-10-09 | Intel Corporation | Digital signature collection and authentication |
US7536556B2 (en) | 2001-07-27 | 2009-05-19 | Yulia Vladimirovna Fedorova | Method and device for entering a computer database password |
US6958759B2 (en) * | 2001-08-28 | 2005-10-25 | General Instrument Corporation | Method and apparatus for preserving, enlarging and supplementing image content displayed in a graphical user interface |
JP2003091509A (en) | 2001-09-17 | 2003-03-28 | Nec Corp | Personal authentication method for portable communication equipment and program describing the same |
US20030054800A1 (en) | 2001-09-17 | 2003-03-20 | Nec Corporation | Individual authentication method for portable communication equipment and program product therefore |
US20030093699A1 (en) | 2001-11-15 | 2003-05-15 | International Business Machines Corporation | Graphical passwords for use in a data processing network |
WO2003048909A2 (en) | 2001-12-04 | 2003-06-12 | Applied Neural Computing, L.L.C. | Validating the identity of a user using a pointing device |
US7970240B1 (en) | 2001-12-17 | 2011-06-28 | Google Inc. | Method and apparatus for archiving and visualizing digital images |
US20030128396A1 (en) | 2002-01-07 | 2003-07-10 | Xerox Corporation | Image type classification using edge features |
US20080230598A1 (en) | 2002-01-15 | 2008-09-25 | William Kress Bodin | Free-space Gesture Recognition for Transaction Security and Command Processing |
US20030179913A1 (en) | 2002-03-19 | 2003-09-25 | Fujitsu Limited | Handwritten signature authentication program, method and apparatus |
JP2003271965A (en) | 2002-03-19 | 2003-09-26 | Fujitsu Ltd | Program, method and device for authentication of hand- written signature |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
US7734930B2 (en) | 2002-06-28 | 2010-06-08 | Microsoft Corporation | Click passwords |
US7243239B2 (en) | 2002-06-28 | 2007-07-10 | Microsoft Corporation | Click passwords |
US20040010722A1 (en) * | 2002-07-10 | 2004-01-15 | Samsung Electronics Co., Ltd. | Computer system and method of controlling booting of the same |
US7240367B2 (en) | 2002-08-09 | 2007-07-03 | Seoung-Bae Park | User interface and method for inputting password and password system using the same |
US20040085351A1 (en) | 2002-09-20 | 2004-05-06 | Nokia Corporation | Method of deactivating device lock state, and electronic device |
US20060020617A1 (en) | 2002-11-18 | 2006-01-26 | Siemens Aktiengesellschaft | Method for processing data packets in a data network which has a mobile function |
US20040155991A1 (en) | 2002-11-21 | 2004-08-12 | Lowles Robert J. | System and method of integrating a touchscreen within an LCD |
US20040169638A1 (en) | 2002-12-09 | 2004-09-02 | Kaplan Adam S. | Method and apparatus for user interface |
US20040193882A1 (en) | 2003-03-26 | 2004-09-30 | Authenticatid Corp. | System, method and computer program product for authenticating a client |
US7873382B2 (en) | 2003-04-29 | 2011-01-18 | Sony Ericsson Mobile Communications Ab | Mobile apparatus with remote lock and control function |
US20040260955A1 (en) * | 2003-06-19 | 2004-12-23 | Nokia Corporation | Method and system for producing a graphical password, and a terminal device |
US20040230843A1 (en) | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
US20050141747A1 (en) | 2003-12-05 | 2005-06-30 | Yun-Qing Shi | System and method for robust reversible data hiding and data recovery in the spatial domain |
US20050210417A1 (en) | 2004-03-23 | 2005-09-22 | Marvit David L | User definable gestures for motion controlled handheld devices |
US20050210418A1 (en) | 2004-03-23 | 2005-09-22 | Marvit David L | Non-uniform gesture precision |
US20100328201A1 (en) | 2004-03-23 | 2010-12-30 | Fujitsu Limited | Gesture Based User Interface Supporting Preexisting Symbols |
CN1957355A (en) | 2004-04-01 | 2007-05-02 | 道夫·雅各布森 | Mouse work identification |
US20060010400A1 (en) | 2004-06-28 | 2006-01-12 | Microsoft Corporation | Recognizing gestures and using gestures for interacting with software applications |
US7831294B2 (en) | 2004-10-07 | 2010-11-09 | Stereotaxis, Inc. | System and method of surgical imagining with anatomical overlay for navigation of surgical devices |
US7257241B2 (en) | 2005-01-07 | 2007-08-14 | Motorola, Inc. | Dynamic thresholding for a fingerprint matching system |
US20060174339A1 (en) | 2005-01-29 | 2006-08-03 | Hai Tao | An arrangement and method of graphical password authentication |
TW200701140A (en) | 2005-03-01 | 2007-01-01 | Qualcomm Inc | System and method for using a visual password scheme |
US20060206918A1 (en) | 2005-03-01 | 2006-09-14 | Mclean Ivan H | System and method for using a visual password scheme |
USRE44725E1 (en) | 2005-03-08 | 2014-01-21 | Microsoft Corporation | Image or pictographic based computer login systems and methods |
US7953983B2 (en) | 2005-03-08 | 2011-05-31 | Microsoft Corporation | Image or pictographic based computer login systems and methods |
US7743256B2 (en) | 2005-05-02 | 2010-06-22 | Vince Yang | Method for verifying authorized access |
US20070016958A1 (en) | 2005-07-12 | 2007-01-18 | International Business Machines Corporation | Allowing any computer users access to use only a selection of the available applications |
US20070047772A1 (en) | 2005-08-25 | 2007-03-01 | Matey James R | Methods and systems for biometric identification |
US20070071285A1 (en) | 2005-09-26 | 2007-03-29 | Cognisign Llc | Apparatus and method for trajectory-based identification of digital data content |
JP2007094613A (en) | 2005-09-28 | 2007-04-12 | Dainippon Printing Co Ltd | User switching management system for shared use terminal |
US20070115091A1 (en) | 2005-11-22 | 2007-05-24 | Kyocera Wireless Corp. | System and method for unlocking wireless communications device |
CN101371258A (en) | 2005-12-23 | 2009-02-18 | 苹果公司 | Unlocking a device by performing gestures on an unlock image |
US7657849B2 (en) | 2005-12-23 | 2010-02-02 | Apple Inc. | Unlocking a device by performing gestures on an unlock image |
US20070150842A1 (en) | 2005-12-23 | 2007-06-28 | Imran Chaudhri | Unlocking a device by performing gestures on an unlock image |
US20080244700A1 (en) | 2006-05-24 | 2008-10-02 | Osborn Steven L | Methods and systems for graphical image authentication |
US20070277224A1 (en) | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US20110031139A1 (en) | 2006-07-26 | 2011-02-10 | James Joseph Macor | Protection, authentication, identification device for a physical object specimen |
KR100856919B1 (en) | 2006-12-01 | 2008-09-05 | 한국전자통신연구원 | Method and Apparatus for user input based on gesture |
US7793108B2 (en) | 2007-02-27 | 2010-09-07 | International Business Machines Corporation | Method of creating password schemes for devices |
US20100250937A1 (en) | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
JP2008217716A (en) | 2007-03-07 | 2008-09-18 | Sharp Corp | Authentication device, image forming apparatus, authentication system, authentication program, recording medium and authentication method |
US20100223276A1 (en) | 2007-03-27 | 2010-09-02 | Faleh Jassem Al-Shameri | Automated Generation of Metadata for Mining Image and Text Data |
US20080244013A1 (en) | 2007-03-30 | 2008-10-02 | Alexander Kropivny | Method, Apparatus, System, Medium, and Signals for Publishing Content Created During a Communication |
US7941834B2 (en) | 2007-04-05 | 2011-05-10 | Microsoft Corporation | Secure web-based user authentication |
US20080263361A1 (en) | 2007-04-20 | 2008-10-23 | Microsoft Corporation | Cryptographically strong key derivation using password, audio-visual and mental means |
EP2150915A2 (en) | 2007-05-30 | 2010-02-10 | Pamci Networks Denmark APS | Secure login protocol |
US20100211551A1 (en) | 2007-07-20 | 2010-08-19 | Olaworks, Inc. | Method, system, and computer readable recording medium for filtering obscene contents |
US20090038006A1 (en) | 2007-08-02 | 2009-02-05 | Traenkenschuh John L | User authentication with image password |
WO2009022242A1 (en) | 2007-08-13 | 2009-02-19 | Sony Ericsson Mobile Communications Ab | Graphical image authentication |
US20090055910A1 (en) | 2007-08-20 | 2009-02-26 | Lee Mark C | System and methods for weak authentication data reinforcement |
US20100043062A1 (en) | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
US20090083847A1 (en) | 2007-09-24 | 2009-03-26 | Apple Inc. | Embedded authentication systems in an electronic device |
US20090085936A1 (en) | 2007-09-29 | 2009-04-02 | Htc Corporation | Image processing method |
US20090094247A1 (en) | 2007-10-03 | 2009-04-09 | Fredlund John R | Image storage system, device and method |
US20090138725A1 (en) | 2007-11-28 | 2009-05-28 | Sriganesh Madhvanath | Authentication System and Method |
US20090172810A1 (en) | 2007-12-28 | 2009-07-02 | Sungkyunkwan University Foundation For Corporate Collaboration | Apparatus and method for inputting graphical password using wheel interface in embedded system |
US20090199295A1 (en) | 2008-02-02 | 2009-08-06 | Yung-Ho Shih | Image password authentication system of portable electronic apparatus and method for the same |
US8024775B2 (en) | 2008-02-20 | 2011-09-20 | Microsoft Corporation | Sketch-based password authentication |
US20090210939A1 (en) | 2008-02-20 | 2009-08-20 | Microsoft Corporation | Sketch-based password authentication |
US20090244013A1 (en) | 2008-03-27 | 2009-10-01 | Research In Motion Limited | Electronic device and tactile touch screen display |
US20090259855A1 (en) | 2008-04-15 | 2009-10-15 | Apple Inc. | Code Image Personalization For A Computing Device |
US7593000B1 (en) | 2008-05-17 | 2009-09-22 | David H. Chin | Touch-based authentication of a mobile device through user generated pattern creation |
CN102067150A (en) | 2008-06-16 | 2011-05-18 | 高通股份有限公司 | Method and system for graphical passcode security |
WO2010005662A1 (en) | 2008-06-16 | 2010-01-14 | Qualcomm Incorporated | Method and system for graphical passcode security |
US20090313693A1 (en) | 2008-06-16 | 2009-12-17 | Rogers Sean Scott | Method and system for graphical passcode security |
CN101296457A (en) | 2008-06-25 | 2008-10-29 | 深圳华为通信技术有限公司 | Screen operation method and device |
US20100013762A1 (en) | 2008-07-18 | 2010-01-21 | Alcatel- Lucent | User device for gesture based exchange of information, methods for gesture based exchange of information between a plurality of user devices, and related devices and systems |
US20100031200A1 (en) | 2008-07-30 | 2010-02-04 | Arima Communications Corp. | Method of inputting a hand-drawn pattern password |
JP2010097340A (en) | 2008-10-15 | 2010-04-30 | Canon Inc | Information processor and method for controlling information processor |
US20100128002A1 (en) | 2008-11-26 | 2010-05-27 | William Stacy | Touch-sensitive display method and apparatus |
US20100131294A1 (en) | 2008-11-26 | 2010-05-27 | Medhi Venon | Mobile medical device image and series navigation |
US20100156843A1 (en) | 2008-12-23 | 2010-06-24 | Research In Motion Limited | Piezoelectric actuator arrangement |
TW201026004A (en) | 2008-12-30 | 2010-07-01 | yi-hong Zheng | Method of judging gesture command by Hamilton linking-type sub-picture and device thereof |
US20100180336A1 (en) | 2009-01-13 | 2010-07-15 | Nolan Jones | System and Method for Authenticating a User Using a Graphical Password |
US20100186074A1 (en) | 2009-01-16 | 2010-07-22 | Angelos Stavrou | Authentication Using Graphical Passwords |
JP2010211433A (en) | 2009-03-10 | 2010-09-24 | Hitachi Ltd | Authentication system |
US8458485B2 (en) | 2009-06-17 | 2013-06-04 | Microsoft Corporation | Image-based unlock functionality on a computing device |
US20100325721A1 (en) | 2009-06-17 | 2010-12-23 | Microsoft Corporation | Image-based unlock functionality on a computing device |
US20130247171A1 (en) | 2009-06-17 | 2013-09-19 | Microsoft Corporation | Image-based unlock functionality on a computing device |
US20100322485A1 (en) | 2009-06-18 | 2010-12-23 | Research In Motion Limited | Graphical authentication |
US20110016405A1 (en) | 2009-07-17 | 2011-01-20 | Qualcomm Incorporated | Automatic interafacing between a master device and object device |
US20110055507A1 (en) | 2009-08-31 | 2011-03-03 | Netac Technology Co. Ltd. | System and method for restricting the function of a storage device based on geographical location |
WO2011049292A2 (en) | 2009-10-22 | 2011-04-28 | (주)소프트크림 | Method for inputting a password using a touch screen |
KR20110044131A (en) | 2009-10-22 | 2011-04-28 | (주)소프트크림 | Password input method based on touch screen |
US20110156867A1 (en) | 2009-12-30 | 2011-06-30 | Carlos Carrizo | Gesture-based signature authentication |
CN201569981U (en) | 2009-12-30 | 2010-09-01 | 刘坤 | Three dimensional gesture computer input system |
WO2011100017A1 (en) | 2010-02-11 | 2011-08-18 | Antique Books, Inc. | Method and system for processor or web logon |
US20110197259A1 (en) | 2010-02-11 | 2011-08-11 | Antique Books, Inc. | Method and system for processor or web logon |
US20110247067A1 (en) | 2010-04-02 | 2011-10-06 | Sony Corporation | Display apparatus, authentication method, and program |
CN201821481U (en) | 2010-04-20 | 2011-05-04 | 苏州瀚瑞微电子有限公司 | Touch earphone device |
US8286102B1 (en) | 2010-05-27 | 2012-10-09 | Adobe Systems Incorporated | System and method for image processing using multi-touch gestures |
US20120123920A1 (en) | 2010-11-10 | 2012-05-17 | Fraser Norman M | User Authentication System and Method Thereof |
US20120126940A1 (en) | 2010-11-19 | 2012-05-24 | Research In Motion Limited | Detection of duress condition at a communication device |
EP2466513A1 (en) | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Visual or touchscreen password entry |
EP2466518A1 (en) | 2010-12-16 | 2012-06-20 | Research In Motion Limited | Password entry using 3D image with spatial alignment |
US20120166944A1 (en) | 2010-12-23 | 2012-06-28 | Stephen Hayden Cotterill | Device, Method, and Graphical User Interface for Switching Between Two User Interfaces |
US20120304284A1 (en) | 2011-05-24 | 2012-11-29 | Microsoft Corporation | Picture gesture authentication |
US20130047252A1 (en) | 2011-05-24 | 2013-02-21 | Microsoft Corporation | Picture Gesture Authentication |
AU2011202415B1 (en) | 2011-05-24 | 2012-04-12 | Microsoft Technology Licensing, Llc | Picture gesture authentication |
WO2012161727A1 (en) | 2011-05-24 | 2012-11-29 | Microsoft Corporation | Picture gesture authentication |
US8650636B2 (en) | 2011-05-24 | 2014-02-11 | Microsoft Corporation | Picture gesture authentication |
EP2715597A1 (en) | 2011-05-24 | 2014-04-09 | Microsoft Corporation | Picture gesture authentication |
US8910253B2 (en) | 2011-05-24 | 2014-12-09 | Microsoft Corporation | Picture gesture authentication |
US20130163201A1 (en) | 2011-12-26 | 2013-06-27 | Tzu-Hung Wang | Electronic device |
US8504842B1 (en) | 2012-03-23 | 2013-08-06 | Google Inc. | Alternative unlocking patterns |
Non-Patent Citations (110)
Title |
---|
"Drawing Passwords", Published in IBM Technical Disclosure Bulletin, International Business Machines Corporation, vol. 40, Issue 5, May 1, 1997, 4 Pages. |
"Extended European Search Report Issued in European Patent Application No. 09711593.5", dated Jun. 9, 2011, 7 Pages. |
"Extended Search Report Issued in European Patent Application No. 11866405.1", dated Oct. 1, 2014, 7 Pages. |
"Final Office Action Issued in U.S. Appl. No. 11/073,742", dated Mar. 25, 2010, 14 Pages. |
"Final Office Action Issued in U.S. Appl. No. 11/073,742", dated May 12, 2009, 17 Pages. |
"Final Office Action Issued In U.S. Appl. No. 13/163,201", dated May 2, 2013, 32 Pages. |
"Final Office Action Issued in U.S. Appl. No. 13/409,877", dated Jan. 23, 2013, 7 Pages. |
"Final Office Action Issued in U.S. Appl. No. 14/156,044", dated Apr. 3, 2015, 20 Pages. |
"Final Office Action Issued in U.S. Appl. No. 14/156,044", dated Mar. 17, 2016, 19 Pages. |
"First Office Action and Search Report Issued in Chinese Patent Application No. 201180071045.2", dated May 25, 2015, 17 Pages. |
"International Search Report and Written Opinion Issued in PCT Application No. PCT/US2011/055507", dated Apr. 10, 2012, 9 Pages. |
"International Search Report and Written Opinion Issued in PCT Patent Application No. PCT/US2010/58825", dated Feb. 2, 2011, 1 page. |
"International Search Report Issued in PCT Application No. PCT/US2009/032771", dated Aug. 27, 2009, 6 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 10/187,311", dated May 1, 2006, 21 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 10/187,311", dated Nov. 7, 2005, 17 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 10/187,311", dated Oct. 17, 2006, 19 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 11/073,742", dated Aug. 25, 2010, 15 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 11/073,742", dated Oct. 14, 2009, 15 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 11/073,742", dated Oct. 16, 2008, 16 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 11/775,159", dated Dec. 18, 2008, 16 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 11/775,159", dated Jul. 23, 2009, 17 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 12/034,254", dated Dec. 22, 2010, 11 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 12/485,952", dated Dec. 1, 2011, 14 Pages. |
"Non Final Office Action Issued In U.S. Appl. No. 13/163,201", dated Oct. 10, 2012, 29 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 13/409,877", dated Aug. 1, 2012, 6 Pages. |
"Non Final Office Action Issued In U.S. Appl. No. 13/656,594", dated Apr. 23, 2014, 24 Pages. |
"Non Final Office Action Issued In U.S. Appl. No. 13/656,594", dated May 30, 2013, 19 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 14/156,044", dated Nov. 18, 2014, 25 Pages. |
"Non Final Office Action Issued in U.S. Appl. No. 14/156,044", dated Sep. 30, 2015, 21 Pages. |
"Non-Final Office Action Issued In U.S. Appl. No. 13/656,594", dated Jan. 4, 2013, 17 Pages. |
"Notice of Allowance Issued in U.S. Appl. No. 11/073,742", dated Feb. 22, 2011, 12 Pages. |
"Notice of Allowance Issued in U.S. Appl. No. 13/409,877", dated Aug. 30, 2013, 8 Pages. |
"Notice of Allowance Issued in U.S. Appl. No. 14/156,044", dated Oct. 7, 2016, 9 Pages. |
"Notice of Re-Examination Issued in Chinese Patent Application No. 201180071045.2", dated Mar. 26, 2018, 12 Pages. |
"Office Action And Search Report Issued In Australian Patent Application No. 2011202415", dated Nov. 24, 2011, 5 Pages. |
"Office Action Issued In Australian Patent Application No. 2011202415", dated Feb. 22, 2012, 1 Page. |
"Office Action issued in Canadian Patent Application No. 2,990,808", dated Apr. 12, 2019, 3 Pages. |
"Office Action Issued In Canadian Patent Application No. 2836052", dated Jul. 31, 2017, 4 Pages. |
"Office Action Issued in Candian Patent APplication No. 2,990,803", dated Apr. 12, 2019, 3 Pages. |
"Office Action Issued In Chilean Patent Application No. 3341-2013", dated Feb. 9, 2016, 6 Pages. |
"Office Action Issued In Chilean Patent Application No. 3341-2013", dated Jul. 14, 2015, 7 Pages. |
"Office Action Issued In Chinese Patent Application No. 201180071045.2", dated Mar. 8, 2017, 13 Pages. |
"Office Action Issued In Colombian Patent Application No. 13299227", dated Jul. 13, 2018, 21 Pages. |
"Office Action Issued In Colombian Patent Application No. 13299227", dated Nov. 20, 2015, 11 Pages. |
"Office Action Issued In Colombian Patent Application No. 13299227", dated Sep. 24, 2014, 12 Pages. |
"Office Action Issued In European Patent Application No. 11866405.1", dated Feb. 27, 2018, 4 Pages. |
"Office Action Issued In Indonesian Patent Application No. W00201305431", dated Nov. 29, 2017, 5 Pages. |
"Office Action Issued In Japanese Patent Application No. 2014-512815", dated Jan. 26, 2016, 8 Pages. |
"Office Action Issued In Japanese Patent Application No. 2014-512815", dated Jul. 28, 2015, 7 Pages. |
"Office Action Issued In Korean Patent Application No. 10-2013-7031038", dated Jul. 10, 2017, 16 Pages. |
"Office Action Issued In Malaysian Patent Application No. PI2013702224", dated Jun. 30, 2017, 3 Pages. |
"Office Action Issued In Mexican Patent Application No. MX/a/2013/013742", dated Jun. 10, 2016, 7 Pages. |
"Office Action Issued In New Zealand Patent Application No. 618124", dated May 14, 2014, 2 Pages. |
"Office Action Issued In Philippines Patent Application No. 12013502354", dated Dec. 14, 2015, 2 Pages. |
"Office Action Issued In Russian Patent Application No. 2013152162", dated Sep. 11, 2015, 5 Pages. |
"Office Action Issued in Taiwan Patent Application No. 101118546", dated Nov. 30, 2015, 9 Pages. |
"Office Action Issued In Taiwan Patent Application No. 105111115", dated Sep. 21, 2016, 9 Pages. |
"Second Office Action Issued In Chinese Patent Application No. 201180071045.2", dated Feb. 1, 2016, 17 Pages. |
"Third Office Action Issued In Chinese Patent Application No. 201180071045.2", dated Aug. 16, 2016, 15 Pages. |
"Ultra-Mobile PC Your life. At the touch of your finger", Retrieved From: https://web.archive.org/web/20110331143047/http://www.microsoft.com/windows/products/winfamily/umpc/default.mspx, Retrieved Date: Mar. 25, 2011, 1 Page. |
Angeli, et al., "Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems", In International Journal of Human Computer Studies, vol. 63, Nos. 1-2, Jul. 1, 2005, 34 Pages. |
Angeli, et al., "Usability and User Authentication: Pictorial Passwords vs. Pin", In Book, Contemporary Ergonomics, Jan. 2003, 6 Pages. |
Angeli, et al., "VIP: A Visual Approach to User Authentication", In Proceedings of the Working Conference on Advanced Visual Interfaces, May 22, 2002, pp. 316-323. |
Ballard, Dana H., "Generalizing the Hough Transform to Detect Arbitrary Shapes", In Journal of Pattern Recognition, vol. 13, No. 2, Jan. 1, 1981, pp. 111-122. |
Bishop, et al., "Improving System Security via Proactive Password Checking", In Journal of Computers and Security, vol. 14, No. 3, Apr. 1995, 16 Pages. |
Brostoff, et al., "Are Passfaces More Usable than Passwords A Field Trial Investigation", In Journal of People and Computers XIV-Usability or Else!, Jan. 2000, 20 Pages. |
Brostoff, et al., "Are Passfaces More Usable than Passwords A Field Trial Investigation", In Journal of People and Computers XIV—Usability or Else!, Jan. 2000, 20 Pages. |
Chalkias, et al., "Multi-Grid Graphical Password Scheme", In Proceedings of the 6th International Conference on Artificial Intelligence and Digital Communications, Aug. 18, 2006, 11 Pages. |
Curtis, et al., "Computer Generated Watercolor", In Proceedings of the 24th Annual Conference on Computer Graphics and Interactive Techniques, Aug. 3, 1997, 10 Pages. |
Dhamija, et al., "Deja Vu: A User Study Using Images for Authentication", In Proceedings of 9th Conference on USENIX Security Symposium, vol. 9, Aug. 14, 2000, 14 Pages. |
Dhamija, Rachna, "Hash Visualization in User Authentication", In Proceedings of CHI '00 Extended Abstracts on Human Factors in Computing Systems, Apr. 1, 2000, 2 Pages. |
Diaz, et al., "A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods", In Proceedings of 12th IEEE International Conference on Frontiers in Handwriting Recognition, Nov. 16, 2010, 6 Pages. |
Dirik, et al., "Modeling User Choice in the PassPoints Graphical Password Scheme", In Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS), Jul. 2007, 9 Pages. |
Doja, et al., "Virtual Password: Virtual Environment Based User Authentication", In Proceedings of the International Conference on Security & Management, Jul. 14, 2008, 6 Pages. |
Du, et al., "A Scalable Integrated Region-Based Image Retrieval System", In Proceedings of the International Conference on Image Processing, Oct. 7, 2001, 4 Pages. |
Feldmeier, et al., "UNIX Password Security Ten Years Later", In Proceedings of Conference on the Theory and Application of Cryptology, Aug. 20, 1989, 20 Pages. |
Hoff, et al., "Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware", In Proceedings of the 26th Annual Conference on Computer Graphics and Interactive Techniques, Jul. 1, 1999, 10 Pages. |
Ian Jermyn, Alain May, Fabian Monrose, Michael Riter, Avi Rubin, "The Design and Analysis of Graphical Passwords", Aug. 1999, Proceedings of the 8th USENIX Security Symposium, pp. 1-15. * |
Jansen, et al., "Picture Password: A Visual Login Technique for Mobile Devices", In NIST Interagency/Internal Report (NISTIR)-7030, Jul. 1, 2003, 20 Pages. |
Jansen, Wayne, "Authenticating Mobile Device Users Through Image Selection", In Proceedings of WIT Transactions on Information and Communication Technologies, vol. 30, Apr. 7, 2004, 10 Pages. |
Jermyn, et al., "The Design and Analysis of Graphical Passwords", In Proceedings of the 8th USENIX Security Symposium, Aug. 26, 1999, 15 Pages. |
Juels, Ari, "At the Juncture of Cryptography and Humanity", In Proceedings of First Workshop on Human Interactive Proofs, Jan. 2002, 4 Pages. |
Kara, et al., "Hierarchical Parsing and Recognition of Hand-Sketched Diagrams", In Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, Oct. 24, 2004, 10 Pages. |
Khandelwal, et al., "User Authentication by Secured Graphical Password Implementation", In Proceedings of International Journal of Computer Applications, vol. 1, Issue 25, Nov. 25, 2010, pp. 100-104. |
Klein, Daniel V., "Foiling the Cracker A Survey of and Improvements to, Password Security", In Proceedings of the 2nd USENIX Security Workshop, Aug. 14, 1990, 11 Pages. |
Lipton, David L., "Logical Authentication Methods", Published in Newsletter ACM SIGSAC Review, vol. 4, Issue 2, Jan. 1986, pp. 9-20. |
Morris, et al., "Password Security A Case History", Published in Magazine of Communications of the ACM, vol. 22, Issue 11, Nov. 1, 1979, pp. 594-597. |
Nali, et al., "Analyzing User Choice in Graphical Passwords", Published in Technical Report, School of Information Technology and Engineering, University of Ottawa, May 27, 2004, 6 Pages. |
Naveen, et al., "Password Management Using Doodles", In Proceedings of the 9th International Conference on Multimodal Interfaces, Nov. 12, 2007, 5 Pages. |
Oka, et al., "Scribble-a-Secret: Similarity-Based Password Authentication Using Sketches", In Proceedings of 19th International Conference on Pattern Recognition, Dec. 8, 2008, 4 Pages. |
Oka, Ryuichi, "A New Cellular Automaton Structure for Macroscopic Linear-Curved Features Extraction", In Proceedings of the 4th International Joint Conference on Pattern Recognition, Nov. 7, 1978, pp. 654-656. |
Paulson, Linda Dailey., "Taking a Graphical Approach to the Password", In Journal of IEEE Computer, vol. 35, Issue 7, Jul. 2002, 1 Page. |
Perlin, Ken, "An Image Synthesizer", In Proceedings of the 12th Annual Conference on Computer Graphics and Interactive Techniques vol. 19, No. 3, Jul. 22, 1985, 11 Pages. |
Perra, et al., "A Framework for Image Based Authentication", In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, Mar. 18, 2005, pp. 521-524. |
Perrig, et al., "Hash Visualization a New Technique to Improve Real World Security", In Proceedings of International Workshop on Cryptographic Techniques and E-Commerce, 1999, 8 Pages. |
Sobrado, Leonardo, et al., "Graphical Passwords", Published in An electronic Bulletin of Undergraduate Research, vol. 4, 2002, 8 Pages. |
Sun, et al., "An Interactive and Secure User Authentication Scheme for Mobile Devices", In Proceedings of IEEE International Symposium on Circuits and Systems, May 18, 2008, pp. 2973-2976. |
Suo, et al., "Graphical Passwords: A Survey", In Proceedings of 21st Annual Computer Security Applications Conference, Dec. 5, 2005, 10 pages. |
Takada, et al., "Awase-E: Image-based Authentication For Mobile Phones Using User's Favorite Images", In Proceedings of International Conference on Mobile Human-Computer Interaction, Sep. 8, 2003, 5 Pages. |
Varenhorst, et al., "Passdoodles: a Lightweight Authentication Method", Retrieved From: http://people.csail.mit.edu/emax/public_html/papers/sow-2004/varenhorst.pdf, Jul. 27, 2004, 14 Pages. |
Venkatesan, et al., "Robust Image Hashing", In Proceedings of IEEE International Conference on Image Processing, vol. 3, Jan. 2000, 3 Pages. |
Wang, et al., "SIMPLicity: Semantics-Sensitive Integrated Matching for Picture Libraries", In Proceedings of IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, Issue 9, Sep. 2001, 17 Pages. |
Weiss, et al., "PassShapes-Utilizing Stroke Based Authentication to Increase Password Memorability", In Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges, Oct. 20, 2008, 10 Pages. |
Weiss, et al., "PassShapes—Utilizing Stroke Based Authentication to Increase Password Memorability", In Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges, Oct. 20, 2008, 10 Pages. |
Wertheimer, Max, "Laws of Organization in Perceptual Forms", In a Source Book of Gestait Psychology. Chapter 5 Routledge and Kegan Paul Ltd., Jan. 1923, 18 Pages. |
Wiedenbeck, et al., "Authentication Using Graphical Passwords: Effects of Tolerance and Image Choice", In Proceedings of Symposium on Usable Privacy and Security, Jul. 6, 2005, 12 Pages. |
Wood, et al., "The Rorschach Inkblot Test: A Case of Overstatement", In Journal of Assessment,vol. 6, Issue 4, Dec. 1999, pp. 341-351. |
Yan, Jianxin Jeff., "A Note on Proactive Password Checking", In Proceedings of the Workshop on New Security Paradigms, Sep. 10, 2001, 9 Pages. |
Yan, Jianxin, et al., "The Memorability And Security Of Passwords-Some Empirical Results", In Technical Report No. UCAM-CL-TR-500, University of Cambridge, Computer Laboratory, Sep. 2000, 13 Pages. |
Yan, Jianxin, et al., "The Memorability And Security Of Passwords—Some Empirical Results", In Technical Report No. UCAM-CL-TR-500, University of Cambridge, Computer Laboratory, Sep. 2000, 13 Pages. |
Also Published As
Publication number | Publication date |
---|---|
USRE44725E1 (en) | 2014-01-21 |
US7953983B2 (en) | 2011-05-31 |
USRE46301E1 (en) | 2017-02-07 |
US20060206717A1 (en) | 2006-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE47518E1 (en) | Image or pictographic based computer login systems and methods | |
US11989394B2 (en) | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs | |
US8683582B2 (en) | Method and system for graphical passcode security | |
Jansen | Authenticating users on handheld devices | |
US10325086B2 (en) | Computing device with graphical authentication interface | |
US9280281B2 (en) | System and method for providing gesture-based user identification | |
US20140029811A1 (en) | User-authenticating, digital data recording pen | |
US7484106B2 (en) | Pre-login data access | |
US9030293B1 (en) | Secure passcode entry | |
US20160156472A1 (en) | Token Authentication for Touch Sensitive Display Devices | |
US20180137268A1 (en) | Authentication screen | |
US9424416B1 (en) | Accessing applications from secured states | |
US8914865B2 (en) | Data storage and access facilitating techniques | |
JP5332956B2 (en) | Information processing apparatus, item display control method, item use control method, and program | |
JP2009211533A (en) | Access authentication system | |
KR102629007B1 (en) | Method and ststem for user authentication | |
US20220300590A1 (en) | Method for protecting software applications of electronic computing devices | |
US20170244863A1 (en) | Information processing apparatus, conference support method, and conference support program | |
JP7477683B2 (en) | Information processing device, information processing method, and program | |
US20220129529A1 (en) | Biometric-validated character password authentication procedure | |
WO2018189718A1 (en) | Configurable multi-dot based authentication system and method thereof | |
WO2019239424A1 (en) | Electronic device and multi-type and multi-locking methods thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION COMPANY, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HOLT, ERIK L.;KOWALCZYK, MATTHEW E.;HUMPHRIES, RUSSELL;SIGNING DATES FROM 20050303 TO 20050307;REEL/FRAME:044702/0584 Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:044702/0847 Effective date: 20141014 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |