System and method of inkblot authentication

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S183000, C715S741000

Reexamination Certificate

active

07549170

ABSTRACT:
A system and method that uses authentication inkblots to help computer system users first select and later recall authentication information from high entropy information spaces. An inkblot authentication module generates authentication inkblots from authentication inkblot seeds. On request, a security authority generates, stores and supplies an authentication inkblot seed set for a user. In response to an authentication inkblot, a user inputs one or more alphanumeric characters. The responses to one or more authentication inkblots serve as authentication information. A user-computable hash of the natural language description of the authentication inkblot is utilized to speed authentication information entry and provide for compatibility with conventional password-based authentication. Authentication with an authentication information match ratio of less than 100% is possible. Authentication inkblot generation methods are disclosed, as well as a detailed inkblot authentication protocol which makes it difficult for users to opt-out of high entropy authentication information generation.

REFERENCES:
patent: 5465084 (1995-11-01), Cottrell
patent: 5559961 (1996-09-01), Blonder
patent: 5608387 (1997-03-01), Davies
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 6075905 (2000-06-01), Herman et al.
patent: 6185316 (2001-02-01), Buffam
patent: 6209104 (2001-03-01), Jalili
patent: 6393305 (2002-05-01), Ulvinen et al.
patent: 6516092 (2003-02-01), Bachelder et al.
patent: 6720860 (2004-04-01), Narayanaswami
patent: 6788304 (2004-09-01), Hart et al.
patent: 6868190 (2005-03-01), Morton
patent: 6948068 (2005-09-01), Lawandy et al.
patent: 7219368 (2007-05-01), Juels et al.
patent: 7243239 (2007-07-01), Kirovski et al.
patent: 7383570 (2008-06-01), Pinkas et al.
patent: 2001/0037468 (2001-11-01), Gaddis
patent: 2001/0044906 (2001-11-01), Kanevsky et al.
patent: 2002/0029341 (2002-03-01), Juels et al.
Dhamija et al., “Deja Vu: A User Study Using Images for Authentication”, 2000, SIMS/CS, University of California Berkeley.
Sobrado, “Graphical Passwords”, 2002, “The Rutgers Scholar, vol. 4”.
Lipton, “Logical Authentication Methods”, Spring 1986, “ACM SIGSAC Review, vol. 4, Iss. 2”, pp. 9-20.
Birget, et al., “Graphical Passwords”, pp. 1-8, Rutgers, 2002.
Kenneth, et al., “Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware”, pp. 277-286, ACM, 1999.
Venkatesan et al., “Robust Image Hashing” IEEE 2000, pp. 664-666.
Hoff, “Fast Computation of Generalized Voronoi Diagrams Using Graphics Hardware”, ACM, 1999, pp.#227-pp. 286.
Yan, “A Note of Proactive Password Checking”, Computer Laboratory, University of Cambridge, ACM, 2002, pp.#664-pp. #666.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method of inkblot authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method of inkblot authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of inkblot authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4128087

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.