News Column

Researchers Submit Patent Application, "Graphical Object-Based User Authentication for Computerized Devices", for Approval

September 4, 2014



By a News Reporter-Staff News Editor at Politics & Government Week -- From Washington, D.C., VerticalNews journalists report that a patent application by the inventors Choi, Won Young (Seoul, KR); Lee, Un Sang (Gyeonggi-do, KR); Jeong, Un Hi (Seoul, KR); Moon, Soo Sung (Seoul, KR); Song, In Tae (Seoul, KR); Song, Ji Seong (Seoul, KR), filed on February 14, 2013, was made available online on August 21, 2014.

The patent's assignee is Lg Cns Co., Ltd.

News editors obtained the following quote from the background information supplied by the inventors: "As computerized/electronic devices become more pervasive, the need to provide device security grows. Specifically, with the widespread use of portable devices (e.g., smart phones, tablets, etc.), user's personal information and/or private data is increasingly at risk. Many such devices allow for a device lock/password-based access control system whereby a user may input a string of letters and/or numbers to access the device. Such strings may be input using the device's keypad, keyboard, and/or touch screen. Unfortunately, the current password-based system may be highly insecure as passwords are often easy to guess and/or decode.

"U.S. Pat. No. 5,430,827 discloses an approach whereby passwords are spoken by users and stored as speech models in a database. The database also contains a plurality of reference voice (RV) speech models based on speech inputs by various persons. Each RV speech model includes characters, digits, or phrases comprising user assigned passwords.

"U.S. Pat. No. 5,559,961 discloses an approach whereby graphical password arrangement displays a predetermined graphical image and requires a user to 'touch' predetermined areas of the image in a predetermined sequence, as a means of entering a password.

"U.S. Pat. No. 6,973,575 discloses a system and method for providing a password to a user using voice recognition technology. The user's voice signature is captured and stored in order to identify the user. When the user forgets or otherwise loses a password needed to log into a computer system, he telephones a password reset system.

"U.S. Pat. No. 7,243,239 discloses methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile, and optionally determines offsets for select tiles.

"U.S. Pat. No. 7,539,874 discloses a method, system, and whereby program defeating unauthorized keystroke logging during password entry are provided. Secure password entry is facilitated by displaying a password prompt comprising a changing stream of random characters, where a particular character within the stream of random characters is displayed at a visibly detectable higher frequency.

"U.S. Pat. No. 7,734,930 discloses methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles.

"Unfortunately, the previous approaches fail to address the issues of the related art."

As a supplement to the background information on this patent application, VerticalNews correspondents also obtained the inventors' summary information for this patent application: "In general, embodiments of the present invention provide an approach for graphical object-based user authentication for computerized/electronic devices (e.g., touch screen devices, cell phones, computerized tablets, handheld devices, etc.). In a typical embodiment, when a user attempts to access a computerized device (device), the user will be presented with a plurality of graphical objects (e.g., icons, shortcuts, shapes, patterns, etc.). The user may then select a particular graphical object (e.g., via a touch screen) and perform one or more user interactions therewith. Such user interactions may include (but are not limited to) physical manipulations (e.g., swipes, taps, multiple taps, taps and holds, any combination thereof, etc.) of the graphical object, and/or audio/video manipulations (e.g., voice prompts, facial recognition, any combination thereof, etc.) made in conjunction with the selection of the graphical object. The graphical object(s) selected and the user interaction performed will then be compared to previously stored authentication information (e.g., graphical objects and user corresponding interactions) to determine whether the access to the computerized device should be granted to the user.

"A first aspect of the present invention provides a computer-implemented method for graphical object-based access control of computerized devices, comprising: receiving a designation of a set of authentication credentials for accessing a computerized device, the set of authentication credentials comprising at least one graphical object selected from among a plurality of graphical objects and at least one user interaction with the at least one graphical object; storing the set of authentication credentials in a computer storage device; receiving a selection of a particular graphical object from the set of graphical objects from a proposed user; and determining whether the selection of the particular graphical object and any particular user interaction with the particular graphical object match the set of authentication credentials stored in the computer storage device.

"A second aspect of the present invention provides a system for graphical object-based access control of computerized devices, comprising: a memory medium comprising instructions; a bus coupled to the memory medium; and a processor coupled to the bus that when executing the instructions causes the system to: receive a designation of a set of authentication credentials for accessing a computerized device, the set of authentication credentials comprising at least one graphical object selected from among a plurality of graphical objects and at least one user interaction with the at least one graphical object; store the set of authentication credentials in a computer storage device; receive a selection of a particular graphical object from the set of graphical objects from a proposed user; and determine whether the selection of the particular graphical object and any particular user interaction with the particular graphical object match the set of authentication credentials stored in the computer storage device.

"A third aspect of the present invention provides a computer program product for graphical object-based access control of computerized devices, the computer program product comprising a computer readable storage media, and program instructions stored on the computer readable storage media, to: receive a designation of a set of authentication credentials for accessing a computerized device, the set of authentication credentials comprising at least one graphical object selected from among a plurality of graphical objects and at least one user interaction with the at least one graphical object; store the set of authentication credentials in a computer storage device; receive a selection of a particular graphical object from the set of graphical objects from a proposed user; and determine whether the selection of the particular graphical object and any particular user interaction with the particular graphical object match the set of authentication credentials stored in the computer storage device.

"A fourth aspect of the present invention provides a method for deploying a system graphical object-based access control of computerized devices, comprising: providing a computer infrastructure being operable to: receive a designation of a set of authentication credentials for accessing a computerized device, the set of authentication credentials comprising at least one graphical object selected from among a plurality of graphical objects and at least one user interaction with the at least one graphical object; store the set of authentication credentials in a computer storage device; receive a selection of a particular graphical object from the set of graphical objects from a proposed user; and determine whether the selection of the particular graphical object and any particular user interaction with the particular graphical object match the set of authentication credentials stored in the computer storage device.

BRIEF DESCRIPTION OF THE DRAWINGS

"These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:

"FIG. 1 depicts a computing node according to an embodiment of the present invention.

"FIG. 2 depicts a system diagram according to an embodiment of the present invention.

"FIG. 3 depicts an illustrative computerized/electronic device according to an embodiment of the present invention.

"FIG. 4 depicts a method flow diagram according to an embodiment of the present invention.

"FIG. 5 depicts another method flow diagram according to an embodiment of the present invention.

"The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements."

For additional information on this patent application, see: Choi, Won Young; Lee, Un Sang; Jeong, Un Hi; Moon, Soo Sung; Song, In Tae; Song, Ji Seong. Graphical Object-Based User Authentication for Computerized Devices. Filed February 14, 2013 and posted August 21, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=69&p=2&f=G&l=50&d=PG01&S1=20140814.PD.&OS=PD/20140814&RS=PD/20140814

Keywords for this news article include: Lg Cns Co. Ltd.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Politics & Government Week


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters