Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system and method based on random partial digitized path recognition

A path and data field technology, applied in the field of user identification system, can solve the problems that the system is not widely adopted, credit card fraud, user comfort level limitation, etc.

Inactive Publication Date: 2012-02-29
AUTHERNATIVE INC
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 2. Another question is about password combination capabilities for typical passwords within the complexity of the "comfort level" for most users
The easy-to-think defensive line might be to increase the length of the static password
Unfortunately, as we've already discussed, this capability has been greatly limited by the user's "comfort level"
Thus, SSPR-based security systems appear to be in a dilemma, as the minimum password length (3-4 alphanumeric characters) must be increased to withstand increasingly efficient combinatorial attacks, while the overall static password length had to stay the same and be limited to 6-7 alphanumeric characters
[0009] 2. In addition, a large number of security issues have emerged in large-scale systems, such as flaws in state / national voting systems, credit card fraud in health data banks and financial service organizations, privacy and security gaps, vulnerabilities in Microsoft 2000 and XP operating systems, etc., This leads to the need to improve or rebuild large-scale security systems
[0033] 7. Scammers
Otherwise, the system has no chance of widespread adoption
[0051] 4. Client and server need to perform mutual authentication of each other
However, there is no known method (other than SSPR) that is widely accepted by the public and industry
Furthermore, none allow for a comprehensive security system and user authentication method covering the entire list of requirements listed above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method based on random partial digitized path recognition
  • Authentication system and method based on random partial digitized path recognition
  • Authentication system and method based on random partial digitized path recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] refer to Figure 1 to Figure 6 A detailed description of embodiments of the invention is provided.

[0079] figure 1 The basic communication setup of a representative RPDPR authentication process according to the present invention is shown. The client subsystem 1010 communicates with the server subsystem 1030 through a communication medium, such as a local area network or a wide area network communication subsystem 1020 . Protected network objects 1130 control access to resources, such as secure websites identified by URLs, links to secure networks, and the like.

[0080] To establish access, the client subsystem 1010 and the server subsystem 1030 execute a pre-authentication session 3040 . In a pre-authentication session 3040 , a user account is established in the server subsystem 1030 , a user name and a secret digitized path represented by an ordered data set of data fields are selected by the user and stored in the server subsystem 1030 . This ordered data set def...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication server (1030) provides a clue to a client (1010) indicating a random partial subset of a full pattern that characterizes a full digitized path on a frame of reference, and the client enters a data to fulfill an authentication factor suggested by the clue. The full pattern consists of an ordered set of data fields, which store parameters that specify the full digitized path on a reference grid for recognition. The server presents an instance of a graphical representation of the frame of reference, including an array of random indicators at data field coordinates in the frame of reference (3050). The server accepts indicators from the array of indicators at data field coordinates in the frame of reference. The server accepts indicators from the array of indicators corresponding to coordinates along said digitized path identified by the random partial subset as input data to fulfill the authentication factor.

Description

technical field [0001] The present invention relates generally to user authentication systems for computer and network security access control systems; more particularly to improved authentication factors based on "what user knows" in client / server network architectures and other architectures . Background technique [0002] The most widely used method of user authentication is referred to herein as the Standard Static Password Recognition (SSPR) algorithm. The SSPR algorithm simply requires the user to enter a username and password for authentication. This is a "what does the user know" type of differentiator. Other types of authentication factors are less widely used and include "what the user has" (card key) and "what the user is" (fingerprint). The "what does the user have" and "what is the user" types of authentication factors require specialized hardware devices on the input terminals, such as card readers, tokens, fingerprint sensors, etc. Much more expensive and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00G06F21/36G06F21/83
CPCH04L63/083G06F21/36G06F21/83
Inventor 莱恩·L·米兹拉
Owner AUTHERNATIVE INC