Information security – Access control or authentication
Reexamination Certificate
2007-05-15
2007-05-15
Jung, David (Department: 2134)
Information security
Access control or authentication
C726S004000, C726S017000
Reexamination Certificate
active
09815560
ABSTRACT:
Enrollment and authentication of a user based on a sequence of discrete graphical choices is described. A graphical interface presents various images and memory cues that a user may associate with their original graphical choices. Enrollment may require the input to have a security parameter value that meets or exceeds a threshold. An acceptable sequence of graphical choices is converted to a sequence of values and mapped to a sequence of codewords. Both a hash of the sequence of codewords and a sequence of offsets are stored for use in authenticating the user. An offset is the difference between a value and its corresponding codeword. Authentication requires the user to enter another sequence of discrete graphical choices that is approximately the same as original. The offsets are summed with the corresponding values before mapping to codewords. Authentication requires the sequence of codewords, or a hash thereof, to match.
REFERENCES:
patent: 5226091 (1993-07-01), Howell et al.
patent: 5241594 (1993-08-01), Kung
patent: 5416840 (1995-05-01), Cane et al.
patent: 5425102 (1995-06-01), Moy
patent: 5465084 (1995-11-01), Cottrell
patent: 5559961 (1996-09-01), Blonder
patent: 5680470 (1997-10-01), Moussa et al.
patent: 5892824 (1999-04-01), Beatson et al.
patent: 6069968 (2000-05-01), Shaw et al.
patent: 6209104 (2001-03-01), Jalili
patent: 0 633 519 (1995-01-01), None
patent: 0 677 801 (1995-10-01), None
patent: 0 901 060 (1998-03-01), None
patent: WO 96/18139 (1995-11-01), None
patent: WO 97/43736 (1997-11-01), None
patent: WO 97/43736 (1998-02-01), None
patent: WO 99/21073 (1998-10-01), None
patent: WO 98/52115 (1998-11-01), None
http://www.cotse.com/tools/stega.htm.
Semantic multimedia authentication with model vector signature Ching-Yung Lin; Tseng, B.L.; Multimedia and Expo, 2004. ICME '04. 2004 IEEE International Conference on vol. 1, Jun. 27-30, 2004 pp. 435-438 vol. 1.
An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks Zhishou Zhang; Qibin Sun; Susie Wee; Wai-Choong Wong; Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on vol. 2, May 14-19, 2006 pp. 11-293-11-296.
A Reversible Watermarking Scheme for JPEG-2000 Compressed Images Emmanuel, S.; Heng Chee Kiang; Das, A.; Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on Jul. 6-8, 2005 pp. 69-72.
V-go by passlogix (1 page), [on-line]. Passlogix, Inc. [retrieved on Dec. 8, 1999]. Retrieved from the Internet: <URL: http://www.passlogix.com/welcome.html>.
V-go Overview (3 pages), [on-line]. Passlogix, Inc., 1999 [retrieved on Dec. 8, 1999]. Retrieved from the Internet: <URL: http://www.passlogix.com/product/product.asp>.
Password Window Gallery (2 pages), [On-line]. Passlogix, Inc., 1999 [retrieved on Dec. 8, 1999]. Retrieved from the Internet: <URL: http://www.passlogix.com/product/gallery.asp>.
Monrose et al., “Password Hardening Based on Keystroke Dynamics,” Proceedings of the 6thACM Conference on Computer and Communications Security, pp. 73-82, Singapore (Nov. 1-4, 1999).
Graphical Passwords (2 pages), [on-line]. Monrose, Fabian [retrieved Sep. 10, 1999]. Retrieved from the Internet: <URL: http://csl.cs.nyu.edu/fabian/pilot/gpw.html>.
Rao et al., “Private-Key Algebraic-Code Encryptions” IEEE Transactions on Information Theory 35, No. 4, New York, US (Jul. 1989).
Rick, “Observations on the Application of Error Correcting Codes to Public Key Encryption” IEEE Transaction on Information Theory (1990).
Xinmei, “Digital Signature Scheme Based on Error-Correcting Codes” Electronics Letters, vol. 26, No. 13 (Jun. 21, 1990).
Chang et al., “Cryptographic Authentication of Passwords,” Proceedings of the 25thAnnual IEEE International Carnahan Conference on Security Technology, pp. 126-130, Taipei, Taiwan, ROC (Oct. 1-3, 1991).
Alabbadi et al., “Integrated Security and Error Control for Communication Networks Using the McEliece Cryptosystem” IEEE (Oct. 14, 1992).
“Hardware Accelerator is Public's Key to Card Security” New Electronics 27, No. 4 (Apr. 1994).
Frankel et al., “Witness-Based Cryptographic Program Checking and Applications (an announcement)” PODC (May 23, 1996).
Matsumoto, “Human-Computer Cryptography: An Attempt,” Proceedings of the 3rdACM Conference on Computer and Communications Security, pp. 68-75, New Delhi, India (Mar. 14, 1996).
Jermyn et al., “The Design and Analysis of Graphical Passwords,” Eighth USENIX Security Symposium, Washington, D.C., USA (Aug. 23-26, 1999).
Perrig et al., “Hash Visulaization: A New Technique to Improve Real-World Security,” Cryptographic Techniques and E-Commerce (CrypTEC '99), pp. 1-8, Hong-Kong (Jul. 5-8, 1999).
Bensinger, “Human Memory and the Graphical Password,” (7 pages), [online]. Passlogix, Inc. 1998 [retrieved Sep. 7, 2000]. Retrieved from the Internet: <URL: http://www.passlogix.com/technology/white.asp?type=consumer>.
V-go Usable Security Technology (7 pages), [on-line]. Passlogix, Inc., 1999 [retrieved Sep. 7, 2000]. Retrieved from the Internet: <URL: http://www.passlogix.com/technology/white.asp?type=consumer>.
Boroditsky, “Passwords—Security Weaknesses & User Limitations,” (2 pages), [on-line]. Passlogix, Inc., 1998 [retrieved Sep. 7, 2000]. Retrieved from the Internet: <URL: <http://www.passlogix.com/technology/white.asp?type=consumer>.
Dhamija et al., “Déjà Vu: A User Study Using Images for Authentication,” 9thUsenix Security Symposium, pp. 1-14, Denver (Aug. 16, 2000).
NIST/NSA, “FIPS 180-2: Secure Hash Standard (SHS)”, Aug. 2002.
Frykholm Niklas
Juels Ari
Jung David
RSA Security Inc.
Wilmer Cutler Pickering Hale and Dorr LLP
LandOfFree
Robust visual passwords does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Robust visual passwords, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Robust visual passwords will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3775031