Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2003-04-30
2009-06-16
Zand, Kambiz (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S183000, C715S741000
Reexamination Certificate
active
07549170
ABSTRACT:
A system and method that uses authentication inkblots to help computer system users first select and later recall authentication information from high entropy information spaces. An inkblot authentication module generates authentication inkblots from authentication inkblot seeds. On request, a security authority generates, stores and supplies an authentication inkblot seed set for a user. In response to an authentication inkblot, a user inputs one or more alphanumeric characters. The responses to one or more authentication inkblots serve as authentication information. A user-computable hash of the natural language description of the authentication inkblot is utilized to speed authentication information entry and provide for compatibility with conventional password-based authentication. Authentication with an authentication information match ratio of less than 100% is possible. Authentication inkblot generation methods are disclosed, as well as a detailed inkblot authentication protocol which makes it difficult for users to opt-out of high entropy authentication information generation.
REFERENCES:
patent: 5465084 (1995-11-01), Cottrell
patent: 5559961 (1996-09-01), Blonder
patent: 5608387 (1997-03-01), Davies
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 6075905 (2000-06-01), Herman et al.
patent: 6185316 (2001-02-01), Buffam
patent: 6209104 (2001-03-01), Jalili
patent: 6393305 (2002-05-01), Ulvinen et al.
patent: 6516092 (2003-02-01), Bachelder et al.
patent: 6720860 (2004-04-01), Narayanaswami
patent: 6788304 (2004-09-01), Hart et al.
patent: 6868190 (2005-03-01), Morton
patent: 6948068 (2005-09-01), Lawandy et al.
patent: 7219368 (2007-05-01), Juels et al.
patent: 7243239 (2007-07-01), Kirovski et al.
patent: 7383570 (2008-06-01), Pinkas et al.
patent: 2001/0037468 (2001-11-01), Gaddis
patent: 2001/0044906 (2001-11-01), Kanevsky et al.
patent: 2002/0029341 (2002-03-01), Juels et al.
Dhamija et al., “Deja Vu: A User Study Using Images for Authentication”, 2000, SIMS/CS, University of California Berkeley.
Sobrado, “Graphical Passwords”, 2002, “The Rutgers Scholar, vol. 4”.
Lipton, “Logical Authentication Methods”, Spring 1986, “ACM SIGSAC Review, vol. 4, Iss. 2”, pp. 9-20.
Birget, et al., “Graphical Passwords”, pp. 1-8, Rutgers, 2002.
Kenneth, et al., “Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware”, pp. 277-286, ACM, 1999.
Venkatesan et al., “Robust Image Hashing” IEEE 2000, pp. 664-666.
Hoff, “Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware”, ACM, 1999, pp.#227-pp. 286.
Yan, “A Note of Proactive Password Checking”, Computer Laboratory, University of Cambridge, ACM, 2002, pp.#664-pp. #666.
Simon Daniel R.
Stubblefield Adam
Lee & Hayes PLLC
Microsoft Corporation
Powers William S
Zand Kambiz
LandOfFree
System and method of inkblot authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of inkblot authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of inkblot authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4128087