Graphic color-based authentication

    公开(公告)号:US11222105B2

    公开(公告)日:2022-01-11

    申请号:US16217733

    申请日:2018-12-12

    Abstract: An example method includes enabling, by the user processing system, a user to associate a color with at least one of the plurality of pixels of a graphic, and generating a passcode. The passcode is based at least in part on the color associated with the at least one of the plurality of pixels. The method further includes transmitting, by the user processing system, the passcode to a host processing system. The method further includes determining, by the host processing system, whether the passcode matches an expected passcode that is based at least in part on a reference graphic comprising a plurality of reference pixels, each of the plurality of reference pixels having a color or a null value associated therewith. The method further includes, responsive to determining that the passcode matches the expected passcode, authorizing, by the host processing system, the user processing system to access a restricted resource.

    MATRIX TRANSFORMATION-BASED AUTHENTICATION
    2.
    发明申请

    公开(公告)号:US20200320180A1

    公开(公告)日:2020-10-08

    申请号:US16373040

    申请日:2019-04-02

    Abstract: Methods, systems and computer program products for providing matrix transformation-based authentication are provided. Aspects include storing an original matrix having a plurality of cells. Each of the plurality of cells is in a selected state or an unselected state. Aspects also include receiving an original pin from a user device. The original pin includes a plurality of characters. Aspects also include selecting a bit operation. Aspects also include generating a modified matrix based on the original matrix, the original pin, and the bit operation. Aspects also include transmitting the modified matrix to the user device. Responsive to receiving a user authentication request comprising an authentication pin and an authentication matrix, aspects further include authenticating a user.

    Multi-level matrix passwords
    3.
    发明授权

    公开(公告)号:US10558790B2

    公开(公告)日:2020-02-11

    申请号:US15609221

    申请日:2017-05-31

    Abstract: During a password entry, a matrix is traversed to select a position. The matrix includes several levels, each level in the several levels including at least one position where data can be entered, where a second level in the matrix forms a sub-level of a first level, and where the second level is reachable only from a particular position in the first level. In response to an input, a mode of the selected position is changed such that the position becomes unchangeable and unselectable during a remainder of the password entry. The selected position is encoded in an auth-step. In response to an indication of an end of the password entry, an auth-code is transmitted. The auth-code includes a set of auth-steps, and the set of auth-steps includes the auth-step.

    Dynamic object passwords
    4.
    发明授权

    公开(公告)号:US10333913B2

    公开(公告)日:2019-06-25

    申请号:US15595583

    申请日:2017-05-15

    Abstract: A construction of a dynamic object password (DOP) is initiated by selecting an object from a set of objects in a step of the construction. A transformation is applied to the object to form a transformed object by altering a dynamic aspect of the object. A placement operation is performed on the transformed object relative to a field position of the DOP. As a part of the step, a triple is generated including an identifier of the selected object, an identifier of the transformation, and an identifier of the placement operation. The triple is transmitted as a part of transmitting an authorization code, the authorization code forming the DOP.

    Encoding and decoding data in two-dimensional symbology

    公开(公告)号:US09946912B2

    公开(公告)日:2018-04-17

    申请号:US15432339

    申请日:2017-02-14

    CPC classification number: G06K7/1447 G06K7/1417 G06K19/06037 G06K19/06103

    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented comprises assigning a first color representative of a 0-bit and a second color representative of a 1-bit. The method further comprises designating a starting cell pair and an ending cell pair. The method also comprises generating, by a processing device, the 2D symbology. The 2D symbology comprises a series of cells in a cell space starting with the starting cell pair and ending with the ending cell pair. Each cell between the starting cell pair and the ending cell pair corresponds to a bit of a binary string and has a common cell length. The cells corresponding to a 0-bit are colored the first color and the cells corresponding to a 1-bit are colored the second color.

    ENCODING AND DECODING DATA IN TWO-DIMENSIONAL SYMBOLOGY

    公开(公告)号:US20170169268A1

    公开(公告)日:2017-06-15

    申请号:US15404221

    申请日:2017-01-12

    CPC classification number: G06K7/1417 G06K19/06037 G06K19/06103

    Abstract: Examples of techniques for encoding data in a 2D symbology are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes assigning a first data symbol representative of a 0-bit and a second data symbol representative of a 1-bit, each of the first data symbol and the second data symbol include a line segment. The method further includes designating a starting indicator and an ending indicator. The method also includes generating, by a processing device, the 2D symbology. The 2D symbology includes a series of data symbols representing a binary string. Each data symbol in the series of data symbols are positioned in an end-to-end orientation starting at the starting indicator and ending at the ending indicator. The series of data symbols include 0-bit symbols represented by the first data symbol and 1-bit symbols represented by the second data symbol.

    Video-based authentication
    9.
    发明授权

    公开(公告)号:US11409856B2

    公开(公告)日:2022-08-09

    申请号:US16369863

    申请日:2019-03-29

    Abstract: Methods, systems and computer program products for providing video-based authentication are provided. Aspects include receiving a master video comprising a recording of a first plurality of objects. Aspects also include identifying each of the first plurality of objects using image recognition techniques. Aspects also include receiving a user selection of a plurality of authentication objects, where the plurality of authentication objects are a subset of the first plurality of objects. Aspects also include receiving a user authentication request comprising an authentication video. The authentication video is a recording of a second plurality of objects. Aspects also include identifying each of the second plurality of objects using image recognition techniques. Aspects also include authenticating a user associated with the user authentication request in response to determining that identifications of a subset of objects of the second plurality of objects match identifications of the plurality of authentication objects.

    SECURE EMBEDDED WATERMARKS
    10.
    发明申请

    公开(公告)号:US20220030702A1

    公开(公告)日:2022-01-27

    申请号:US16939006

    申请日:2020-07-26

    Abstract: An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.

Patent Agency Ranking