ANTI-PEEP USER AUTHENTICATION METHOD Russian patent published in 2015 - IPC G06F21/31 G06F12/14 

Abstract RU 2541868 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to user authentication. An anti-peep user authentication method comprises preliminary formation of a set of N graphic symbols, where N is a natural number, the value of which is limited by the possible number of graphic symbols which can be placed on a screen with a quality which enables recognition of said graphic symbols, providing the user with a selection from said set for storing a group of S secret graphic symbols sk, where k=1…K, where K is the number of graphic symbols in the group S, selected based on the ease of memorisation by the user, carrying out the i-th step of inputting authentication information, wherein i=1…I, where I is the total number of steps, by displaying on the screen Ni graphic symbols randomly selected from the set, among which an si-th secret symbol is placed in an arbitrary position, the secret symbol being selected from the group S of secret symbols, forming an invisible secret area Ai, fixing a point hi of user action on the screen, generating a positive result of carrying out the i-th step of inputting authentication information upon satisfying the condition of association of the fixed point of action of the invisible secret area hi∈Ai and a negative result otherwise, generating a positive decision on authentication after obtaining positive results of carrying out all I steps of the user inputting authentication information a negative decision otherwise, wherein the graphic symbols from the set N are arranged on the screen in the form a table, in which symbols have random coordinates (Xsi,Ysi), where Xsi=1…a and Ysi=1…b (a is the number of rows in the table, b is the number of columns in the table), further providing the user with a gesture from a database of secret gestures for memorisation, each gesture being formed by a pair of numbers (d1,d2), where d1 and d2 are natural numbers, wherein d1 and d2 are less than or equal to the greater value between a and b (d1,d2≤max{a,b}), when carrying out the i-th authentication step, forming the invisible secret area in the form of a set of graphic symbols of the table having coordinates (XSi±md1, YSi±md2), where m is natural number, wherein md1 and md2 are less than or equal to the greater value between a and b (md1,md2≤max{a,b}), and fixing the points of user action on the screen by selecting any symbol from the invisible secret area.

EFFECT: high efficiency of user authentication.

4 dwg

Similar patents RU2541868C2

Title Year Author Number
METHOD TO AUTHENTICATE USERS BASED ON GRAPHIC PASSWORD THAT VARIES IN TIME 2010
  • Minakov Vladimir Aleksandrovich
  • Grigor'Ev Sergej Vadimovich
  • Miroshnikov Vjacheslav Viktorovich
RU2445685C2
ANTI-PEEP USER AUTHENTICATION METHOD 2009
  • Burushkin Aleksej Anatol'Evich
  • Minakov Vladimir Aleksandrovich
RU2424554C2
USER AUTHENTICATION SYSTEM IN INDUSTRIAL ENVIRONMENT 2018
  • Kurnosov Sergej Andreevich
  • Bardin Aleksandr Konstantinovich
  • Varibrus Aleksandr Vladimirovich
  • Zakharov Ilya Olegovich
  • Kulakov Ilya Aleksandrovich
RU2690221C1
SYSTEM AND METHOD FOR RADIO FREQUENCY IDENTIFICATION OF ELECTROSURGICAL APPLIANCES 2019
  • Kanadi, Zherom, M.D.
  • Raj, Laksmi
  • Jan, Feng
  • Sumanasena, Buddika
  • Zhuan, Tajsen
RU2781421C1
METHOD AND SYSTEM FOR AUTHENTICATION AND PAYMENT USING MOBILE TERMINAL 2013
  • Avano Koiti
  • Simitsu Khirojuki
RU2568782C1
METHOD OF PREVENTING DISCLOSURE ENTERED INFORMATION TO OBSERVER 2005
  • Park Seung-Bae
RU2376626C2
SYSTEM AND METHOD FOR MULTIFACETED AUTHENTICATION OF PERSONALITY BASED ON BLOCKCHAIN 2016
  • Endrejd Markus
RU2667801C1
PORTABLE DATA CARRIER WITH PROTECTION FROM UNSANCTIONED ACCESS, PROVIDED DUE TO SEPARATION OF KEY ON SEVERAL PORTIONS 2000
  • Germann Dreksler
  • Kharal'D Fater
RU2251218C2
APPARATUS FOR DIAGNOSING FAULTS OF SMOKING DEVICES WITH ELECTRIC CONTROL 2016
  • Fernando, Feliks
  • Brifkani, Nori Moyad
  • Edarshe, Stefan Antoni
RU2709650C2
AUTHENTICATION INTERFACE 2005
  • Ruziski Dehvid M.
  • Khong Dzhejms Kh.
  • Maknil Brajan K.
  • Guzak Kris Dzh.
  • Ventts Brajan D.
  • Shutts Klaus Ju.
  • Richards Stefan
  • Perlin Ehrik K.
  • Ilak Kristian
  • Risor Sterling M.
  • Flo Ehrik R.
  • Stefens Dzhon
  • Khutts Bendzhamin A.
RU2408144C2

RU 2 541 868 C2

Authors

Arkhipov Valerij Viktorovich

Jakovlev Viktor Alekseevich

Dates

2015-02-20Published

2013-05-14Filed