FIELD: physics, computer engineering.
SUBSTANCE: invention relates to user authentication. An anti-peep user authentication method comprises preliminary formation of a set of N graphic symbols, where N is a natural number, the value of which is limited by the possible number of graphic symbols which can be placed on a screen with a quality which enables recognition of said graphic symbols, providing the user with a selection from said set for storing a group of S secret graphic symbols sk, where k=1…K, where K is the number of graphic symbols in the group S, selected based on the ease of memorisation by the user, carrying out the i-th step of inputting authentication information, wherein i=1…I, where I is the total number of steps, by displaying on the screen Ni graphic symbols randomly selected from the set, among which an si-th secret symbol is placed in an arbitrary position, the secret symbol being selected from the group S of secret symbols, forming an invisible secret area Ai, fixing a point hi of user action on the screen, generating a positive result of carrying out the i-th step of inputting authentication information upon satisfying the condition of association of the fixed point of action of the invisible secret area hi∈Ai and a negative result otherwise, generating a positive decision on authentication after obtaining positive results of carrying out all I steps of the user inputting authentication information a negative decision otherwise, wherein the graphic symbols from the set N are arranged on the screen in the form a table, in which symbols have random coordinates (Xsi,Ysi), where Xsi=1…a and Ysi=1…b (a is the number of rows in the table, b is the number of columns in the table), further providing the user with a gesture from a database of secret gestures for memorisation, each gesture being formed by a pair of numbers (d1,d2), where d1 and d2 are natural numbers, wherein d1 and d2 are less than or equal to the greater value between a and b (d1,d2≤max{a,b}), when carrying out the i-th authentication step, forming the invisible secret area in the form of a set of graphic symbols of the table having coordinates (XSi±md1, YSi±md2), where m is natural number, wherein md1 and md2 are less than or equal to the greater value between a and b (md1,md2≤max{a,b}), and fixing the points of user action on the screen by selecting any symbol from the invisible secret area.
EFFECT: high efficiency of user authentication.
4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD TO AUTHENTICATE USERS BASED ON GRAPHIC PASSWORD THAT VARIES IN TIME | 2010 |
|
RU2445685C2 |
ANTI-PEEP USER AUTHENTICATION METHOD | 2009 |
|
RU2424554C2 |
USER AUTHENTICATION SYSTEM IN INDUSTRIAL ENVIRONMENT | 2018 |
|
RU2690221C1 |
SYSTEM AND METHOD FOR RADIO FREQUENCY IDENTIFICATION OF ELECTROSURGICAL APPLIANCES | 2019 |
|
RU2781421C1 |
METHOD AND SYSTEM FOR AUTHENTICATION AND PAYMENT USING MOBILE TERMINAL | 2013 |
|
RU2568782C1 |
METHOD OF PREVENTING DISCLOSURE ENTERED INFORMATION TO OBSERVER | 2005 |
|
RU2376626C2 |
SYSTEM AND METHOD FOR MULTIFACETED AUTHENTICATION OF PERSONALITY BASED ON BLOCKCHAIN | 2016 |
|
RU2667801C1 |
PORTABLE DATA CARRIER WITH PROTECTION FROM UNSANCTIONED ACCESS, PROVIDED DUE TO SEPARATION OF KEY ON SEVERAL PORTIONS | 2000 |
|
RU2251218C2 |
APPARATUS FOR DIAGNOSING FAULTS OF SMOKING DEVICES WITH ELECTRIC CONTROL | 2016 |
|
RU2709650C2 |
AUTHENTICATION INTERFACE | 2005 |
|
RU2408144C2 |
Authors
Dates
2015-02-20—Published
2013-05-14—Filed