Click passwords

Electrical computers and digital processing systems: support – System access control based on user identification by... – Pin/password generator device

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S182000, C713S183000, C713S185000, C726S002000, C726S003000, C726S006000, C726S018000, C340S005540, C382S123000, C382S160000, C382S173000

Reexamination Certificate

active

07734930

ABSTRACT:
Methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles. Further, the tiling optionally relies on probability and/or entropy. An exemplary password system includes an image; a grid associated with the image, the grid composed of polygons; an index associated with each polygon; and an offset associated with each polygon wherein password identification relies on one or more indices and one or more offsets.

REFERENCES:
patent: 5465084 (1995-11-01), Cottrell
patent: 5559961 (1996-09-01), Blonder
patent: 5608387 (1997-03-01), Davies
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 6075905 (2000-06-01), Herman
patent: 6185316 (2001-02-01), Buffam
patent: 6209104 (2001-03-01), Jalili
patent: 6393305 (2002-05-01), Ulvinen et al.
patent: 6516092 (2003-02-01), Bachelder et al.
patent: 6720860 (2004-04-01), Narayanaswami
patent: 6788304 (2004-09-01), Hart et al.
patent: 6868190 (2005-03-01), Morton
patent: 6948068 (2005-09-01), Lawandy et al.
patent: 6959394 (2005-10-01), Brickell et al.
patent: 7219368 (2007-05-01), Juels et al.
patent: 7243239 (2007-07-01), Kirovski et al.
patent: 7383570 (2008-06-01), Pinkas et al.
patent: 2001/0037468 (2001-11-01), Gaddis
patent: 2001/0044906 (2001-11-01), Kanevsky et al.
patent: 2002/0029341 (2002-03-01), Juels et al.
patent: 2003/0093699 (2003-05-01), Banning et al.
Kenneth E Hoff III et al, Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware, pp. 277-286, ACM, 1999.
R. Venkatesan et al , Robust Image Hashing, pp. 664-666 , IEEE, 2000.
Jianxin Jeff Yan, A Note on Proactive Password Checking, pp. 127-135, ACM, 2002.
Jianxin Yan et al, The memorability and security of passwords—some empirical results, pp. 1-13, Technical Report, University of Cambridge, Computer Laboratory, Sep. 2000.
Ian Jermyn et al, “The Design and Analysis of Graphical Passwords”, pp. 1-14, USENIX Association, 1999.
Ian Jermyn et al, The Design and Analysis of Graphical Passwords, pp. 1-14, Proceedings of the 8thUSENIX Security Symposium, Aug. 1999.
Linda Dailey Paulson, Taking a Graphical Approach to the Password, pp. 1-1, News Briefs, Jul. 2002.
Ari Juels, At the Juncture of Cryptography and Humanity, pp. 1-4, RSA Laboratories, 2002.
Kenneth E. Hoff III et al, Fast Computation of Generalized Voronoi Diagrams Using Graphical Hardware, pp. 277-286 , ACM 1999.
Birget, et al., “Graphical Passwords”, pp. 1-8, Rutgers, 2002.
Bishop, et al. “Improving System Security via Proactive Password Checking”, Computers and Security, vol. 14, No. 3, pp. 233 through249, 1995.
Brostoff, et al. Are Passfaces More Usable than Passwords A Field Trial Investigation, SIGSAC ACM Special Interest Group on Security, Audit, and Control, pp. 41through 50, 2001.
Curtis, et al. “Computer Generated Watercolor”, SIGGRAPH '97, Los Angeles, CA, 10 pp. Aug. 1997.
Dhamija, et al. “Deja vu, A User Study Using Images for Authentication”, 9th USENIX Security Symposium, 14 pp. Aug. 2000.
Dhamija, “Hash Visualization in User Authentication”, Proceedings of the Computer Human Interaction 2000 Conference, 2 pp, Apr. 2000.
Feldmeier, et al. “UNIX Password Security Ten Years Later”, Proceedings of Crypto'89, published as Lecture Notes in Computer Science, No. 435, Springer Verlag, pp. 44 through 63, 1989.
Jermyn, et al. “The Design and Analysis of Graphical Passwords”, 8th USENIX Security Symposium, 15 pp. Aug. 1999.
Kenneth, et al, “Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware”, pp. 277-286, ACM, 1999.
Klein, “Foiling the Cracker A Survey of and Improvements to, Password Security”, Proceedings of the Second USENIX Security Workshop, 11 pp. Aug. 2, 1990.
Lipton, “Logical Authentication Methods”, pp. 9-20, ACM SIGSAC Review, vol. 4, Issue 2, 1986.
Morris, et al. “Password Security A Case History”, Communications of the ACM, vol. 22, No. 11, pp. 594 through 597 Nov. 1979.
Perlin, “An Image Synthesizer”, Computer Graphics, vol. 19, No. 3, pp. 287-296 Jul. 1985.
Perrig, et al., Hash Visualization a New Technique to Improve Real World Security, Proceedings of the 1999 International Workshop on Cryptographic Techniques and E Commerce, pp. 131-138 1999.
Sobrado, “Graphical Passwords”, at <<http://rutgersscholar. rutgers.edu/volume04/sobrbirg/sobrbing.htm>>, Leonardo Sobrado and Jean-Camille Birget, 2002, pp. 8.
Venkatesan, et al., Robust Image Hashing, pp. 664-666, IEEE, 2000.
Wertheimer, “Laws of Organization in Perceptual Forms”, A Source Book of Gestalt Psychology by Willis D. Ellis, Chapter 5, Routledge and Kegan Paul Ltd., London, pp. 71 through 88 1938.
Wood, et al. “The Rorschach Inkblot Test: A Case of Overstatement”, Assessment, vol. 6, No. 4, pp. 341 through 351 1999.
Yan, et al. “The Memorability and Security of Passwords Some Empirical Results”, Technical Report No. 500, Computer Laboratory, University of Cambridge, 11 pp. 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Click passwords does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Click passwords, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Click passwords will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4150550

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.