image based login procedures for computer systems include: (a) displaying a first image on a computer screen; (b) receiving user input indicating a portion of the first image; (c) determining if the user input corresponds to a first acceptable user input for user authentication; and (d) proceeding with the authentication procedure when this user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with this authentication procedure, the systems and methods further may include: displaying a second image on the screen; receiving new user input indicating a portion of the second image; and determining if this new input corresponds to a second acceptable user input for user authentication.
|
0. 8. A system, comprising:
a display screen;
an input system for receiving user input; and
a processor system programmed to:
display a first image on the display screen in response to a first user's initiation of a procedure requiring authentication of the first user as an authorized user, wherein the first image comprises a designated portion of the first image that was previously selected by the authorized user as a portion of the first image that must be properly selected when the first image is displayed to the first user for user authentication;
receive a first user input via the input system, wherein the first user input indicates a user-selected portion of the displayed first image,
wherein the first user input comprises a shape that is drawn at least partially around the user-selected portion of the displayed first image; and
determine that the first user input constitutes a proper selection of the designated portion of the first image for user authentication, when the first user input satisfies pre-specified conditions for proper selection of the designated portion of the first image;
wherein the pre-specified conditions include:
a first condition that the user-selected portion of the displayed first image corresponds to the designated portion of the first image at least within a permitted level of variation between the user-selected portion of the displayed first image and the designated portion of the first image,
a second condition that the shape that is drawn at least partially around the user-selected portion of the displayed first image matches a predetermined shape, and
a third condition that the shape that is drawn at least partially around the user-selected portion of the displayed first image is drawn by starting at a predetermined spot of the predetermined shape.
0. 29. A method comprising:
displaying an image on a display screen in response to an initiation of an authentication procedure, wherein the image comprises a predesignated portion of the image that was previously selected as a portion of the image to be selected when the image is displayed for authentication;
receiving a first input via an input system, wherein the first input indicates a selected portion of the displayed image, wherein the first input comprises a shape that is drawn at least partially around the selected portion of the displayed image; and
determining that the first input constitutes a proper selection of the predesignated portion of the image for authentication when the first input satisfies pre-specified conditions for proper selection of the predesignated portion of the image, wherein the pre-specified conditions comprises:
a condition that the first input matches a predetermined shape within a permitted level of variation, wherein the permitted level of variation is based on the complexity of the image; and
a condition that a first direction that the shape is drawn in the first input matches a first predetermined direction from a first predetermined starting spot; and
authenticating the first input based in part on the permitted level of variation.
0. 21. A device comprising:
a processor; and
a memory coupled with the processor, the memory storing executable instructions that, based on execution by the processor, configure the processor to effectuate operations comprising:
displaying an image on a display screen in response to an initiation of an authentication procedure, wherein the image comprises a predesignated portion of the image that was previously selected as a portion of the image to be selected when the image is displayed for authentication;
receiving a first input via an input system, wherein the first input indicates a selected portion of the displayed image, wherein the first input comprises a shape that is drawn at least partially around the selected portion of the displayed image; and
determining that the first input constitutes a proper selection of the predesignated portion of the image for authentication when the first input satisfies pre-specified conditions for proper selection of the predesignated portion of the image, wherein the pre-specified conditions comprises:
a condition that the first input matches a predetermined shape within a permitted level of variation, wherein the permitted level of variation is based on the complexity of the image; and
a condition that a first direction that the shape is drawn in the first input matches a first predetermined direction from a first predetermined starting spot; and
authenticating the first input based in part on the permitted level of variation.
0. 15. A system comprising:
a display screen;
a processor communicatively connected with the display screen; and
a memory coupled with the processor, the memory storing executable instructions that when executed by the processor cause the processor to effectuate operations comprising:
providing instructions to display an image on the display screen in response to an initiation of an authentication procedure, wherein the image comprises predesignated portions of the image that were previously selected as portions of the image to be selected when the image is displayed for authentication;
receiving a first input via an input system, wherein the first input indicates a first selected portion of the displayed image, wherein the first input comprises a first shape;
receiving a second input via the input system, wherein the second input indicates a second selected portion of the displayed image, wherein the second input comprises a second shape; and
determining that the first input and the second input are part of proper selection of the predesignated portions of the image for authentication when the first input and the second input satisfy pre-specified conditions for proper selection of the predesignated portions of the image, wherein the pre-specified conditions comprise:
a condition that each of the first input and the second input match a predetermined shape within a permitted level of variation, wherein the permitted level of variation is based on the complexity of the image and wherein the predetermined shape comprises at least one of: a straight line, a curved line, or a closed shape;
a condition that a first direction that the first shape is drawn in the first input matches a first predetermined direction from a first predetermined starting spot; and
a condition that a second direction that the second shape is drawn in the second input matches a second predetermined direction; and
authenticating the first input and the second input based in part on the permitted level of variation.
0. 1. A user authentication method, comprising acts of:
displaying a first image on a display screen;
receiving a first user input comprising a first shape that is drawn around a portion of the displayed first image;
performing a first authentication step comprising verifying that the portion of the displayed first image around which the first shape is drawn, matches a designated portion of the first image that is predetermined for user authentication;
displaying a second image on the display screen, wherein displaying of the second image provides no indication of a result of the first authentication step;
receiving a second user input comprising a second shape that is drawn around a portion of the displayed second image;
performing a second authentication step comprising verifying that the portion of the displayed second image around which the second shape is drawn, matches a designated portion of the second image that is predetermined for user authentication; and
determining that a user is successfully authenticated upon successful completion of the first and second authentication steps;
wherein at least one of the first or second authentication steps further comprising:
verifying that the respective first or second shape matches a predetermined shape, and
verifying that a direction in which the respective first or second shape is drawn matches a predetermined direction.
0. 2. The method according to
allowing the user to access a computer system when the user is determined to be successfully authenticated.
0. 3. The method according to
0. 4. The method according to
0. 5. The method according to
0. 6. The method according to
0. 7. A computer-readable storage medium including computer-executable instructions stored thereon for performing steps of:
displaying a first image on a display screen;
receiving a first user input comprising a first shape that is drawn around a portion of the displayed first image;
performing a first authentication step comprising verifying that the portion of the displayed first image around which the first shape is drawn, matches a designated portion of the first image that is predetermined for user authentication;
displaying a second image on the display screen, wherein displaying of the second image provides no indication of a result of the first authentication step;
receiving a second user input comprising a second shape that is drawn around a portion of the displayed second image;
performing a second authentication step comprising verifying that the portion of the displayed second image around which the second shape is drawn, matches a designated portion of the second image that is predetermined for user authentication; and
determining that a user is successfully authenticated upon successful completion of the first and second authentication steps;
wherein at least one of the first or second authentication steps further comprising:
verifying that the respective first or second shape matches a predetermined shape, and
verifying that the direction in which the respective first or second shape is drawn matches a predetermined direction.
0. 9. The system according to
display a second image on the display screen, wherein displaying the second image provides no indication of an improper selection of the designated portion of the first image, and further wherein the second image comprises a designated portion of the second image that was previously selected by the authorized user as a portion of the second image that must be properly selected when the second image is displayed to the first user for user authentication, and
receive a second user input via the input system, wherein the second user input indicates a user-selected portion of the displayed second image, and determine if the second user input constitutes a proper selection of the designated portion of the second image for user authentication.
0. 10. The system according to
0. 11. The system according to
0. 12. The system according to
0. 13. The system according to
0. 14. The system according to
0. 16. The system of claim 15, wherein the permitted level of variation is further based on the resolution of the image.
0. 17. The system of claim 15, wherein the permitted level of variation is further based on a type of the input.
0. 18. The system of claim 15, wherein the image is a user provided image.
0. 19. The system of claim 15, wherein the input system comprises a touch input system.
0. 20. The system of claim 15, the operations further comprise authenticating the first and second inputs based on the first and second inputs meeting the pre-specified conditions.
0. 22. The device of claim 21, wherein the shape is substantially circular.
0. 23. The device of claim 21, wherein the image is a user provided image.
0. 24. The device of claim 21, wherein the input system comprises a touch input system.
0. 25. The device of claim 21, the processor further configured to: require that a predetermined number of shapes is received via the input system for authentication.
0. 26. The device of claim 21 where the pre-specified conditions further comprise a condition that the first input matches a predetermined shape comprising at least one of a curved line or a closed shape.
0. 27. The device of claim 21, wherein the permitted level of variation is further based on the resolution of the image.
0. 28. The device of claim 21, wherein the permitted level of variation is further based on a type of the input.
0. 30. The method of claim 29, wherein the shape is substantially circular.
0. 31. The method of claim 29, wherein the image is a user provided image.
0. 32. The method of claim 29, wherein the input system comprises a touch input system.
0. 33. The method of claim 29, wherein the permitted level of variation is further based on the resolution of the image.
0. 34. The method of claim 29, the permitted level of variation is further based on input means.
|
More than one reissue application has been filed for the reissue of U.S. Pat. No. 7,953,983. This application is a continuation reissue of U.S. application Ser. No. 14/156,044, filed Jan. 15, 2014, which is a continuation reissue of U.S. Pat. No. RE44,725, filed Mar. 1, 2012, which is an application for reissue of U.S. Pat. No. 7,953,983 B2, issued May 31, 2011.
The present invention generally relates to systems, methods, and computer-readable media for providing an image or pictographic based login procedure for computer systems or networks. While useful in non-electronic ink environments, such systems and methods may find particular usefulness in login procedures for pen-based computing systems and/or other systems that accept electronic ink input.
Typical computer systems, especially computer systems using graphical user interfaces (“GUIs”), are optimized for accepting user input from one or more discrete input devices, such as a keyboard for entering text and a pointing device, such as a mouse with one or more buttons, for operating the user interface. An example of such a GUI is the user interface for the Windows® computer operating system (available from Microsoft Corporation of Redmond, Wash.). The ubiquitous keyboard and mouse interface provides for fast creation and modification of documents, spreadsheets, database fields, drawings, photos, web pages, emails, and the like.
Recently, however, pen-based computing systems, such as tablet personal computers (“tablet PCs”), personal digital assistants (“PDAs”), and the like, have been increasing in popularity. With pen-based computing systems, user input advantageously may be introduced as “electronic ink” using an electronic “pen” or stylus (e.g., mimicking writing with a pen or pencil on a piece of paper). Indeed, in at least some pen-based computing systems, all user input is capable of being entered and manipulated using an electronic pen input device, and the user interface is fully controllable using only the electronic pen.
As pen-based computing systems become more popular, many computer activities such as access in a computer system become more difficult to implement. For example, in a computer system in which a user logs into an individualized account or inputs security information to enter a restricted site, a pen-based computer system creates difficulties for the user to conveniently and efficiently maneuver the pen or stylus to accomplish the task.
In a typical computer system, a display is presented to the user containing a field in which the user enters a userid and a field in which the user enters a corresponding password. Typically, a user inputs information via a keyboard. Therefore, if inputting data via a keyboard is problematic (e.g., a keyboard is not available or not conveniently accessible), a user may not be able to input data as necessary. In such a system lacking a conveniently available keyboard, a user would be unable to successfully access information because of the inability to enter authentication information into the system.
In the traditional method of gaining access to a private account, a user typically enters a password via a keyboard. A password that has a higher level of security (i.e., a completely random string of characters that is not otherwise associated with the user) is typically difficult to remember. Thus, the user often forgets the password and must expend effort in having the password reset, obtaining the password from a system administrator, etc. To avoid this inconvenience, the user may select a password that is easy to remember, such as the user's date of birth. However, such passwords are easy to “crack” and provide very little security to the user. This defeats the purpose of having the security system in the first place. Thus, the typical computer user is caught in a dilemma of trying to maintain a high level of security while at the same time creating a password that the user can remember. Often, this balance is difficult to achieve. Therefore, a system and method for providing security is needed that is easy to use for the user with minimal demands on the user's memory while providing a high level of security against unauthorized users.
The above-noted issues associated with data input of security information, compromise of password security information or loss of security in computing systems can lead to user frustration. Accordingly, there is a need in the art for improved input of security information, e.g., for use with pen-based computing systems and in other situations where keyboards are inconvenient or unavailable.
Aspects of the present invention relate to systems, methods, and computer-readable media for providing image or pictographic based login procedures for computer systems or networks. Such systems and methods may include: (a) displaying a first image on a computer display screen; (b) receiving a first user input indicating a portion of the first image (e.g., via an electronic ink input system); (c) determining if the first user input corresponds to a first acceptable user input for user authentication (e.g., via a computer processor system); and (d) proceeding with a user authentication procedure when the first user input corresponds to the first acceptable user input for user authentication. Additionally or optionally, when proceeding with the user authentication procedure, systems and methods in accordance with examples of this invention may further include: displaying a second image on the computer display screen; receiving a second user input indicating a portion of the second image; and determining if the second user input corresponds to a second acceptable user input for authentication. If desired, user access to the computer system or network may be allowed when the first and/or second user inputs correspond to the acceptable user inputs for user authentication. Aspects of the invention further relate to computer-readable media including computer-executable instructions stored thereon for providing image or pictographic based authentication procedures for computer systems or networks like those described above.
The above and other objects, features, and advantages of the present invention will be more readily apparent and more fully understood from the following detailed description, taken in conjunction with the appended drawings, in which:
When the same reference number is used in more than one of the attached drawings, it is intended to refer to the same or similar parts, features, or steps in the various different drawings.
As described above, aspects of the present invention relate to systems, methods, and computer-readable media for an image or pictographic login procedure. The following description is divided into sub-sections to assist the reader. The sub-sections include: Terms; General Description of Various Aspects of the Invention; Example Hardware; Example Systems, Methods, and Computer-Readable Media According to the Invention; and Conclusion.
I. Terms
The following terms are used in this specification and, unless otherwise specified or clear from the context, the terms have the meanings provided below:
“Pen”—Any type of user input device useful in entering electronic ink into and/or otherwise manipulating or controlling an electronic document, a user interface, and/or a computer operating system. The terms “pen” and “stylus” may be used interchangeably in this specification.
“Computer-Readable Medium” means any available media that can be accessed by a user on a computer system. By way of example, and not limitation, “computer-readable media” may include computer storage media and communication media. “Computer storage media” includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules or other data. “Computer storage media” includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology; CD-ROM, digital versatile disks (DVD) or other optical storage devices; magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices; or any other medium that can be used to store the desired information and that can be accessed by a computer. “Communication media” typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media, such as a wired network or direct-wired connection, and wireless media, such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of “computer-readable media.”
II. General Description of Various Aspects of the Invention
As generally described above, aspects of the present invention relate to systems, methods, and computer-readable media for providing an image or pictographic based authentication procedure for computer systems or networks. The authentication procedure of the present invention may be applied in any application where authorization of a user is desired. For example, a system may require authentication of a user before allowing the user to “log in” to the user's account. In this situation, a user desiring access to his personal account on a system may apply the authentication procedure of the present invention to gain access to the account while preventing other unauthorized users from accessing the account. Also, the authentication procedure of the present invention may be applied to accessing protected or private sites, for example, on an intranet or on the internet and/or for accessing or logging on to individual computers or systems, local area networks, wide area networks, or the like. Methods in accordance with at least some examples of this invention may include: (a) displaying a first image on a computer display screen; (b) receiving a first user input indicating a portion of the first image; (c) determining if the first user input corresponds to a first acceptable login user input; and (d) proceeding with a user login procedure when the first user input corresponds to the first acceptable login user input. Additionally or optionally, when proceeding with the user login procedure, methods in accordance with at least some examples of this invention further may include: displaying a second image on the computer display screen (the second image may be the same as the first image, an enlargement of part of the first image, a completely new image, etc.); receiving a second user input indicating a portion of the second image; and determining if the second user input corresponds to a second acceptable login user input. If desired, user access to the computer system or network may be allowed when the first and/or second user inputs correspond to the acceptable login user inputs.
Systems in accordance with at least some examples of this invention may include: (a) a computer display screen; (b) an input system for receiving user input (e.g., such as a digitizer for receiving electronic ink input); and (c) a processor system (e.g., including one or more processors) programmed and adapted to: (i) display a first image on a computer display screen, (ii) determine if a first user input indicating a portion of the first image corresponds to a first acceptable login user input, and (iii) proceed with a user login procedure when the first user input corresponds to the first acceptable login user input. In at least some examples of systems in accordance with this invention, when the system proceeds with the user login procedure, the processor system is further programmed and adapted to: (iv) display a second image on the computer display screen, and (v) determine if a second user input indicating a portion of the second image corresponds to a second acceptable login user input. If desired, the processor system may allow user access to the computer system or network when the first and/or second user inputs correspond to the acceptable login user inputs.
Systems and methods according to at least some examples of this invention may accept user input (e.g., the first and/or second user inputs described above) as electronic ink input. For example, the various portions of the image may be “indicated” during the login procedure by drawing a predetermined shape at, near, or at least partially around the portion of the first image using electronic ink. Of course, various other aspects or characteristics of the input may be controlled, varied, and/or selected as part of the login procedure without departing from the invention. For example, ink color, ink thickness, pen tip shape, or other ink characteristics may be varied; characteristics of the input shape or shapes drawn by the user may be varied; the number of times a portion of an image is encircled may be controlled or varied; directional characteristics (e.g., line direction, pen movement direction, etc.) of the input may be varied; initial image selection to initiate the login procedure may be required (e.g., from a pallet of displayed image thumbnails); intermediate image selection to continue the login procedure may be required (e.g., from a pallet of displayed image thumbnails); the location(s) and/or number of “breaks” in an encirculation or other input characteristic may be varied; the pictographic login features may be used in combination with other login procedures or features, such as password entry, image selection; etc. Various other aspects of the input required during login may be varied, controlled, and used as part of the login security features without departing from this invention.
Still additional aspects of the invention relate to computer-readable media including computer-executable instructions stored thereon for providing image or pictographic based login procedures for computer systems or networks.
III. Example Hardware
A basic input/output system 160 (“BIOS”), which contains the basic routines that help to transfer information between elements within the computer 100 (such as during start-up), is stored in the ROM 140. The computer 100 also may include a hard disk drive 170 for reading from and writing to a hard disk (not shown), a magnetic disk drive 180 for reading from or writing to a removable magnetic disk 190, and/or an optical disk drive 191 for reading from or writing to a removable optical disk 199, such as a CD ROM or other optical media. The hard disk drive 170, magnetic disk drive 180, and optical disk drive 191 are connected to the system bus 130 by a hard disk drive interface 192, a magnetic disk drive interface 193, and an optical disk drive interface 194, respectively. These drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules, and other data for the personal computer 100. It will be appreciated by those skilled in the art that other types of computer-readable media that can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, BERNOULLI cartridges, random access memories, read only memories, and the like, also may be used in the example operating environment.
A number of program modules can be stored on the hard disk drive 170, magnetic disk 190, optical disk 199, ROM 140, or RAM 150, including an operating system 195, one or more application programs 196, other program modules 197, and program data 198. A user can enter commands and information into the computer 100 through input devices, such as a keyboard 101 and pointing device 102 (such as a mouse). Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices may be connected to the processing unit 110 through a serial port interface 106 that is coupled to the system bus 130, but they also may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB), and the like. Further still, these devices may be coupled directly to the system bus 130 via an appropriate interface (not shown).
A monitor 107 or other type of display device also may be connected to the system bus 130 via an interface, such as a video adapter 108. In addition to the monitor 107, personal computers typically include other peripheral output devices (not shown), such as speakers and printers. In one example, a pen digitizer 165 and accompanying pen or stylus 166 are provided in order to digitally capture freehand input. Although a connection between the pen digitizer 165 and the serial port interface 106 is shown in
The computer 100 can operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 109. The remote computer 109 can be a server, a router, a network PC, a peer device or other common network node, and it typically may include many or all of the elements described above relative to the computer 100, although for simplicity, only a memory storage device 111 has been illustrated in
When used in a LAN networking environment, the computer 100 may be connected to the local area network 112 through a network interface or adapter 114. When used in a WAN networking environment, the personal computer 100 typically includes a modem 115 or other means for establishing a communications link over the wide area network 113, such as the Internet. The modem 115, which may be internal or external to the computer 100, may be connected to the system bus 130 via the serial port interface 106. In a networked environment, program modules depicted relative to the personal computer 100, or portions thereof, may be stored in a remote memory storage device.
It will be appreciated that the network connections shown are examples and other techniques for establishing a communications link between the computers can be used. The existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP, UDP, and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server. Any of various conventional web browsers can be used to display and manipulate data on web pages.
Although the
The stylus 204 may be equipped with buttons or other features to augment its capabilities. In one example, a stylus 204 could be implemented as a “pencil” or “pen,” in which one end constitutes a writing portion and the other end constitutes an “eraser” end 205, and which, when moved across the display, indicates portions of electronic ink on the display that are to be erased. Other types of input devices, such as a mouse, trackball, keyboard, or the like also may be used. Additionally, a user's own finger could be used as an input device, e.g., for selecting or indicating portions of the displayed image on a touch-sensitive or proximity-sensitive display. Consequently, the term “user input device,” as used herein, is intended to have a broad definition and encompasses many variations on well-known input devices.
Recently, pen-based computing systems that accept user input via an electronic pen and/or display at least some forms of input as “electronic ink,” e.g., of the type described above, have increased in popularity. Use of electronic ink input as opposed to conventional pen and paper is advantageous in many respects. For example, electronic ink input may be electronically stored, filed, and cataloged for future use, which enables it to be easily maintained, located, and shared with others. Additionally, because electronic ink input can be recognized and converted to conventional machine-generated text (e.g., text insertable into, readable by, and useful by conventional computers), it can be electronically stored, searched, and otherwise used on the computer, for example, in conventional word processing documents and programs, in spreadsheets, in email programs, in document management programs, in web browsers, and the like. Handwriting recognition systems are commercially available that allow handwritten electronic ink input to be converted to machine-generated text. One example of a handwriting recognizer is that provided with the Windows XP Tablet PC Edition™ operating system (available from Microsoft Corporation of Redmond, Wash.), although other handwriting recognizers also are known and may be used in computer systems in accordance with this invention.
In various examples, pen-based computer operating systems provide an ink platform through direct modification of GINA.dll or as a set of component object model (“COM”) services that an operating system and/or an application program can use to capture, manipulate, recognize, and store ink and/or other pen actions or events. The ink platform also may include a mark-up language including a language like the extensible markup language (“XML”). Additional examples of the ink platform may use the distributed component object model (“DCOM”) implementation. Yet further implementations may be used including the Win32 programming model and the .Net programming model from Microsoft Corporation. Such platforms are commercially available and known in the art. Electronic ink data may be stored in an ink serialized format (“ISF”) or in any other suitable or desired manner, including in conventional manners known to those skilled in the art.
In addition to use with full performance pen-based computing systems or “tablet PCs” (e.g., convertible laptops or “slate” type tablet PCs), aspects of this invention may be used in conjunction with other types of pen-based computing systems and/or other devices that accept data as electronic ink and/or that accept, process, or display electronic pen or stylus input, such as: hand-held or palm-top computing systems; personal digital assistants; pocket personal computers; mobile and cellular telephones, pagers, and other communication devices; watches; appliances; and any other devices or systems that include monitors or other display devices and/or digitizers that present printed or graphical information to users and/or allow input using an electronic pen or stylus or that can process electronic ink collected by another device (e.g., a conventional desktop computer that can process electronic ink collected by a tablet PC).
Features of the invention now will be described in conjunction with the remaining figures, which illustrate various examples of the invention and/or contain information to help explain the invention. The specific figures and information contained in this detailed description should be construed as providing examples of the invention and not as limiting the invention.
IV. Example Systems, Methods, and Computer-Readable Media According to the Invention
A. Examples of Environments and/or Input Situations that May Benefit from Implementation of Systems and Methods According to the Invention
As described above, aspects of the present invention relate generally to systems and methods that may utilize an image in user authorization or authentication (e.g., secure website logins, computer system or network logins, and/or other security situations). A user may select a preferred image, for example from a menu of possible image choices or a personal image provided by the user, which is presented to the user on a display. The selected image, when displayed to the user, may be used in any authorization or authentication procedure in which the identity of the user needs to be ascertained. For example, when a user logs onto a computer system, it is typically desired that security of the system be maintained so that user data is not compromised by other users. Thus, methods and systems are desired that safeguard individual user accounts for the respective user.
The image selected conforms to predetermined characteristics and specifications to be optimized for use as a user authentication tool. The predetermined characteristics and specification of the selected image may be selected, for example, on the needs of the user in any given system or network and may include, but is not limited to, image complexity, size or resolution. For example, the image may contain a medium to high level of complexity such that a user may easily select a predetermined area in the image when a portion of the image is selected by the user for authentication. Also, increased complexity of the image increases accuracy of selection of the predetermined portion of the image, allowing the user to accurately pinpoint the portion of the image corresponding to the login selection. A complex image also is advantageous from a security standpoint in that it prevents or inhibits unauthorized users from easily guessing the portion of the image to be indicated for successful login or authentication.
Another potential method of enhancing security is to require preselected input characteristics relating to additional features of the image selection before authentication may be granted. For example, the direction of drawing the selection may be pre-selected such that the user may have to draw the image selection in a particular order or direction. In this example, the direction of selecting the proper portion of the image may be optionally limited to drawing the selection in a clockwise direction or in a counter-clockwise direction. As another example, the system may require user input of the selection to start at a particular spot on the circle (e.g., the 8 o'clock position) in order to successfully authenticate. In these ways, the user may be required to draw the selection in a predetermined manner or authentication may not occur. Also, the color of the electronic ink used for the selection may be optionally regulated in order to provide enhanced security. For example, the user may be required to draw the selection of the image with a particular color of ink, e.g., red, selected from a color pallet included with the authentication image. If this option is included in the authentication procedure, a user selecting the proper portion of the image may still fail to gain access or authorization if the user draws the selection with an improperly selected color. In this way, security is further increased such that an unauthorized person would have great difficulty in accessing the private account, data, or other information of another user.
To provide a high level of integrity of selection of the proper portion or area of the login image, the selection of the portion of the image by the user may not be the precise preselected area identified by the user during the security system set-up procedure. Due to variability and inaccuracies of the input by a human user, an authorized user may fail to draw a selection around the precise desired area in the image. Rather, due to human error or slight variations in selecting the proper portion of the image, the selection may be slightly skewed from the precise location of the portion of the image. The tolerance of the skew may depend on the individual system or network and may be calculated or adjusted based on the needs of the user, for example. Thus, the login and authentication method and system of the present invention provide for a tolerance in the selection of the portion of the image for user authorization. In this example, if the selection of the portion of the image for authorization is not precisely correct but is still within an allowable range from the originally designated selection area, the authorization process will proceed. Only if the selection is outside a predetermined tolerance level from the predetermined area will the system not permit the user to log in (or at least to continue into the login procedure). This tolerance may depend on many factors such as the complexity of the image, the resolution of the image used for authentication, or the input means, to name a few. Optionally, if desired, systems and methods according to at least some examples of this invention may allow a user and/or a system administrator to select the tolerance level to maximize security while permitting authentication within an acceptable range of the pre-selected input.
After the user properly selects the predetermined portion of the image for authentication as indicated in
As
In
If there are further images from which to select a portion from, the process repeats as described until the final image is properly processed and the proper portion of the final image is selected. If all of the selections were proper, the login and authentication process is complete and the user logs into the system under his Userid in his account. If any one selection was erroneous, login/authentication fails. A message may optionally be displayed to the user indicating that authorization has failed.
Also, for added security, traditional methods of authentication may be combined with the authentication methods of the present invention. For example, a traditional display in which a user is requested to input a userid and/or a password may be combined with the authentication method of the present invention to enhance security. In a traditional system in which only a userid and password is used, an unauthorized user may access the account if he/she is able to obtain the authorized user's password. By logging into the account improperly, the unauthorized user compromises security. However, in this example of the present invention in which authorization by image selection is combined by the traditional method(s) of authentication, multiple forms of security used in conjunction can further prevent an unauthorized user from improperly gaining access to another user's account information.
In another example of another aspect of the present invention, information may be hidden within the image displayed. There are many known method of hiding information within an image which may be incorporated in the present invention. For example, steganography may be used in which information is hidden in the image such that only the user knows of the existence of the information. For example, key information of, but not limited to, the form (login name plus the key data) and hashed in one selection may be hidden steganographically into an image. As the user selects the proper portion of each consecutive image, the hidden information, such as the key code or login name, is selected. If a match occurs at the completion of the authorization process between the stored information (e.g., key or login name) and the steganographically hidden information selected by the user, login is successful.
As referred to above, there are many potential features that may be included and/or varied in the authentication of the present invention. Some of these variations include:
Ink color (or other characteristics, such as thickness); shape(s) drawn; number of “encirculations;” directional characteristics (e.g., line direction, pen movement direction, etc.); position with respect to image (which may move from login to login); absolute position on the digitizer irrespective of image position; initial image selection by user; intermediate image selection by user; location(s) or number of “breaks” in an encirculation; use encirculation login in combination with other login procedures, such as password entry, image selection, etc.;
Finally, the present invention also relates to computer-readable media including computer-executable instructions stored thereon for performing various methods and operating various systems, including the systems and/or methods described above. The computer-readable media may constitute computer-executable instructions stored on the various specific examples of computer-readable media described above.
V. Conclusion
Various examples of the present invention have been described above, and it will be understood by those of ordinary skill that the present invention includes within its scope all combinations and subcombinations of these examples. Additionally, those skilled in the art will recognize that the above examples simply exemplify various aspects of the invention. The various specific steps and/or architectural elements described above can be changed, functions may be added, deleted, combined, and/or changed in order without departing from the invention. Thus, various changes and modifications may be made without departing from the spirit and scope of the invention, as defined in the appended claims.
Kowalczyk, Matthew E., Humphries, Russell, Holt, Erik L.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5224179, | Dec 20 1988 | AT&T Bell Laboratories | Image skeletonization method |
5465084, | Mar 27 1990 | Method to provide security for a computer and a device therefor | |
5485531, | Dec 17 1987 | FUJI ELECTRIC CO , LTD ; Fuji Facom Corporation | Character-feature extraction device |
5539840, | Oct 19 1993 | CANON INC | Multifont optical character recognition using a box connectivity approach |
5559961, | Apr 04 1994 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | Graphical password |
5599610, | Feb 04 1994 | Fabrite Laminating Corp. | Trilaminate fabric for surgical gowns and drapes |
5608387, | Nov 30 1991 | VISAGE DEVELOPMENTS LIMITED | Personal identification devices and access control systems |
5778069, | Apr 10 1996 | Microsoft Technology Licensing, LLC | Non-biased pseudo random number generator |
6075905, | Jul 17 1996 | Sarnoff Corporation | Method and apparatus for mosaic image construction |
6118872, | Sep 05 1997 | Fujitsu Limited | Apparatus and method for controlling secret data by using positions of input image points on an image and a sequence of the positions |
6185316, | Nov 12 1997 | Unisys Corporation | Self-authentication apparatus and method |
6209104, | Dec 10 1996 | ACCULLINK, INC | Secure data entry and visual authentication system and method |
6278453, | Jun 13 1997 | Google Technology Holdings LLC | Graphical password methodology for a microprocessor device accepting non-alphanumeric user input |
6393305, | Jun 07 1999 | Nokia Technologies Oy | Secure wireless communication user identification by voice recognition |
6516092, | May 29 1998 | RUSS WEINZIMMER; Cognex Corporation | Robust sub-model shape-finder |
6720860, | Jun 30 2000 | SNAP INC | Password protection using spatial and temporal variation in a high-resolution touch sensitive display |
6788304, | Jun 11 1998 | Rockwell Collins Simulation And Training Solutions LLC | Method and system for antialiased procedural solid texturing |
6868190, | Oct 19 2000 | Monument Peak Ventures, LLC | Methods for automatically and semi-automatically transforming digital image data to provide a desired image look |
6934860, | May 08 2000 | Xerox Corporation | System, method and article of manufacture for knowledge-based password protection of computers and other systems |
6948068, | Aug 15 2000 | Spectra Systems Corporation | Method and apparatus for reading digital watermarks with a hand-held reader device |
6958759, | Aug 28 2001 | Google Technology Holdings LLC | Method and apparatus for preserving, enlarging and supplementing image content displayed in a graphical user interface |
6959394, | Sep 29 2000 | Intel Corporation | Splitting knowledge of a password |
7219368, | Feb 11 1999 | RSA Security LLC | Robust visual passwords |
7240367, | Aug 09 2002 | Seoung-Bae, Park; Shinbitech Co., Ltd. | User interface and method for inputting password and password system using the same |
7243239, | Jun 28 2002 | Microsoft Technology Licensing, LLC | Click passwords |
7257241, | Jan 07 2005 | Motorola, Inc.; Motorola, Inc | Dynamic thresholding for a fingerprint matching system |
7279646, | May 25 2001 | Intel Corporation | Digital signature collection and authentication |
7383570, | Apr 25 2002 | INTERTRUST TECHNOLOGIES CORP | Secure authentication systems and methods |
7536556, | Jul 27 2001 | Method and device for entering a computer database password | |
7593000, | May 17 2008 | David H., Chin | Touch-based authentication of a mobile device through user generated pattern creation |
7657849, | Dec 23 2005 | Apple Inc | Unlocking a device by performing gestures on an unlock image |
7734930, | Jun 28 2002 | Microsoft Technology Licensing, LLC | Click passwords |
7743256, | May 02 2005 | Method for verifying authorized access | |
7793108, | Feb 27 2007 | International Business Machines Corporation | Method of creating password schemes for devices |
7831294, | Oct 07 2004 | STEREOTAXIS, INC | System and method of surgical imagining with anatomical overlay for navigation of surgical devices |
7873382, | Apr 29 2003 | SNAPTRACK, INC | Mobile apparatus with remote lock and control function |
7941834, | Apr 05 2007 | Microsoft Technology Licensing, LLC | Secure web-based user authentication |
7953983, | Mar 08 2005 | Microsoft Technology Licensing, LLC | Image or pictographic based computer login systems and methods |
7970240, | Dec 17 2001 | GOOGLE LLC | Method and apparatus for archiving and visualizing digital images |
8024775, | Feb 20 2008 | Microsoft Technology Licensing, LLC | Sketch-based password authentication |
8286102, | May 27 2010 | Adobe Inc | System and method for image processing using multi-touch gestures |
8458485, | Jun 17 2009 | Microsoft Technology Licensing, LLC | Image-based unlock functionality on a computing device |
8504842, | Mar 23 2012 | GOOGLE LLC | Alternative unlocking patterns |
8650636, | May 24 2011 | Microsoft Technology Licensing, LLC | Picture gesture authentication |
8910253, | May 24 2011 | Microsoft Technology Licensing, LLC | Picture gesture authentication |
20010037468, | |||
20010044906, | |||
20020029341, | |||
20020141643, | |||
20030054800, | |||
20030093699, | |||
20030128396, | |||
20030179913, | |||
20040010722, | |||
20040034801, | |||
20040085351, | |||
20040155991, | |||
20040169638, | |||
20040193882, | |||
20040230843, | |||
20040260955, | |||
20050141747, | |||
20050210417, | |||
20050210418, | |||
20060010400, | |||
20060020617, | |||
20060174339, | |||
20060206918, | |||
20070016958, | |||
20070047772, | |||
20070071285, | |||
20070115091, | |||
20070150842, | |||
20070277224, | |||
20080230598, | |||
20080244013, | |||
20080244700, | |||
20080263361, | |||
20090038006, | |||
20090055910, | |||
20090083847, | |||
20090085936, | |||
20090094247, | |||
20090138725, | |||
20090172810, | |||
20090199295, | |||
20090210939, | |||
20090244013, | |||
20090259855, | |||
20090313693, | |||
20100013762, | |||
20100031200, | |||
20100043062, | |||
20100128002, | |||
20100131294, | |||
20100156843, | |||
20100180336, | |||
20100186074, | |||
20100211551, | |||
20100223276, | |||
20100250937, | |||
20100322485, | |||
20100325721, | |||
20100328201, | |||
20110016405, | |||
20110031139, | |||
20110055507, | |||
20110156867, | |||
20110197259, | |||
20110247067, | |||
20120123920, | |||
20120126940, | |||
20120166944, | |||
20120304284, | |||
20130047252, | |||
20130163201, | |||
20130247171, | |||
AU2011202415, | |||
CN101296457, | |||
CN101371258, | |||
CN102067150, | |||
CN1957355, | |||
CN201569981, | |||
CN201821481, | |||
DE10024179, | |||
EP2150915, | |||
EP2466513, | |||
EP2466518, | |||
EP2715597, | |||
JP2003091509, | |||
JP2003271965, | |||
JP2007094613, | |||
JP2008217716, | |||
JP2010097340, | |||
JP2010211433, | |||
KR100856919, | |||
KR1020110044131, | |||
RE44725, | Mar 08 2005 | Microsoft Technology Licensing, LLC | Image or pictographic based computer login systems and methods |
TW200701140, | |||
TW201026004, | |||
WO3048909, | |||
WO177792, | |||
WO2009022242, | |||
WO2010005662, | |||
WO2011049292, | |||
WO2011100017, | |||
WO2012161727, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 03 2005 | HOLT, ERIK L | MICROSOFT CORPORATION COMPANY | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044702 | /0584 | |
Mar 03 2005 | HUMPHRIES, RUSSELL | MICROSOFT CORPORATION COMPANY | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044702 | /0584 | |
Mar 07 2005 | KOWALCZYK, MATTHEW E | MICROSOFT CORPORATION COMPANY | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044702 | /0584 | |
Oct 14 2014 | Microsoft Corporation | Microsoft Technology Licensing, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044702 | /0847 | |
Jan 12 2017 | Microsoft Technology Licensing, LLC | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Nov 16 2022 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jul 16 2022 | 4 years fee payment window open |
Jan 16 2023 | 6 months grace period start (w surcharge) |
Jul 16 2023 | patent expiry (for year 4) |
Jul 16 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jul 16 2026 | 8 years fee payment window open |
Jan 16 2027 | 6 months grace period start (w surcharge) |
Jul 16 2027 | patent expiry (for year 8) |
Jul 16 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jul 16 2030 | 12 years fee payment window open |
Jan 16 2031 | 6 months grace period start (w surcharge) |
Jul 16 2031 | patent expiry (for year 12) |
Jul 16 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |