Method and apparatus for authenticating a user

التفاصيل البيبلوغرافية
العنوان: Method and apparatus for authenticating a user
Document Number: 20080028205
تاريخ النشر: January 31, 2008
Appl. No: 11/497210
Application Filed: July 31, 2006
مستخلص: A system that authenticates a user on a computer system. During operation, the system receives an authentication request from the user. Next, the system receives a first multimedia data item from the user. The system then performs a transformation on the first multimedia data item. Next, the system determines if the transformation of the first multimedia data item matches authentication data for the user, wherein the authentication data for the user is a transformation of a second multimedia data item. If so, the system authenticates the user.
Inventors: Yang, Cui Qing (San Diego, CA, US)
Claim: 1. A method for authenticating a user on a computer system, comprising: receiving an authentication request from the user; receiving a first multimedia data item from the user; performing a transformation on the first multimedia data item; determining if the transformation of the first multimedia data item matches authentication data for the user, wherein the authentication data for the user is a transformation of a second multimedia data item; and if so, authenticating the user.
Claim: 2. The method of claim 1, wherein prior to receiving the authentication request from the user, the method further comprises generating the second multimedia data item by: receiving a request to create authentication data for the user; receiving the second multimedia data item from the user; performing a transformation on the second multimedia data item; associating the transformation of the second multimedia data item with the user to serve as the authentication data for the user; and storing the authentication data for the user on the computer system.
Claim: 3. The method of claim 1, wherein performing the transformation on the first multimedia data item involves: using a hashing function on the first multimedia data item; and encoding a binary representation of a result of a hashing function on the first multimedia data item.
Claim: 4. The method of claim 1, wherein the first multimedia data item is a portion of a first multimedia file; and wherein the first multimedia data item is generated by applying a pattern selected by the user to the first multimedia file.
Claim: 5. The method of claim 4, wherein the second multimedia data item is a portion of a second multimedia file; and wherein the second multimedia data item is generated by applying a pattern selected by the user to the second multimedia file.
Claim: 6. The method of claim 5, wherein prior to receiving the first multimedia data item, the method further comprises producing the authentication data for the user by: presenting a list of multimedia files to the user, wherein the list of multimedia files includes the first multimedia file; receiving a selection of the first multimedia file from the user; in response to the selection of the first multimedia file, displaying the first multimedia file to the user; presenting a list of patterns to the user; receiving a selection of the pattern from the user; and in response to the selection of the pattern, superimposing the selected pattern onto the first multimedia file to produce the authentication data for the user, wherein the user can move the selected pattern to a new position within the first multimedia file.
Claim: 7. The method of claim 6, wherein if a new multimedia file, a new pattern, and a new position are received from the user, the method further comprises superimposing the new pattern over the new position in the new multimedia file.
Claim: 8. The method of claim 5, wherein a multimedia file can include: an image file; an audio file; a video file; a text file; a combination of multimedia files; and any other multimedia file.
Claim: 9. The method of claim 8, wherein if the multimedia file is an image file, the pattern can include: a circle; a square; a triangle; a checkerboard pattern; a specified shape; a specified pattern; a combination of shapes; and a combination of patterns.
Claim: 10. The method of claim 8, wherein if the multimedia file is a video file, the pattern can include: a circle; a square; a triangle; a checkerboard pattern; a frame in the video file; a set of frames in the video file; a time interval; a specified shape; a specified pattern; a combination of shapes; and a combination of patterns.
Claim: 11. The method of claim 8, wherein if the multimedia file is an audio file, the pattern can include: a time interval; a set of time intervals; a set of notes; a track within the audio file; and a combination of patterns.
Claim: 12. The method of claim 8, wherein if the multimedia file is a text file, the pattern can include: a page of text; a paragraph of text; a selection of text; a set of selected text; and a combination of patterns.
Claim: 13. The method of claim 4, wherein attributes for the pattern can be modified by the user; and wherein the attributes for the pattern can include: a length; a width; a size; a time; a color; and any other attribute for the pattern.
Claim: 14. The method of claim 4, wherein a location for a placement of a pattern in a multimedia file is associated with a feature of the first multimedia file; wherein the feature of the first multimedia file can include: an object within the first multimedia file; a time index within the first multimedia file; a note within the first multimedia file; and a melody within the first multimedia file.
Claim: 15. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for authenticating a user on a computer system, wherein the method comprises: receiving an authentication request from the user; receiving a first multimedia data item from the user; performing a transformation on the first multimedia data item; determining if the transformation of the first multimedia data item matches authentication data for the user, wherein the authentication data for the user is a transformation of a second multimedia data item; and if so, authenticating the user.
Claim: 16. The computer-readable storage medium of claim 15, wherein prior to receiving the authentication request from the user, the method further comprises generating the second multimedia data item by: receiving a request to create authentication data for the user; receiving the second multimedia data item from the user; performing a transformation on the second multimedia data item; associating the transformation of the second multimedia data item with the user to serve as the authentication data for the user; and storing the authentication data for the user on the computer system.
Claim: 17. The computer-readable storage medium of claim 15, wherein performing the transformation on the first multimedia data item involves: using a hashing function on the first multimedia data item; and encoding a binary representation of a result of a hashing function on the first multimedia data item.
Claim: 18. The computer-readable storage medium of claim 15, wherein the first multimedia data item is a portion of a first multimedia file; and wherein the first multimedia data item is generated by applying a pattern selected by the user to the first multimedia file.
Claim: 19. The computer-readable storage medium of claim 18, wherein the second multimedia data item is a portion of a second multimedia file; and wherein the second multimedia data item is generated by applying a pattern selected by the user to the second multimedia file.
Claim: 20. The computer-readable storage medium of claim 19, wherein prior to receiving the first multimedia data item, the method further comprises producing the authentication data for the user by: presenting a list of multimedia files to the user, wherein the list of multimedia files includes the first multimedia file; receiving a selection of the first multimedia file from the user; in response to the selection of the first multimedia file, displaying the first multimedia file to the user; presenting a list of patterns to the user; receiving a selection of the pattern from the user; and in response to the selection of the pattern, superimposing the selected pattern onto the first multimedia file to produce the authentication data for the user, wherein the user can move the selected pattern to a new position within the first multimedia file.
Claim: 21. The computer-readable storage medium of claim 20, wherein if a new multimedia file, a new pattern, and a new position are received from the user, the method further comprises superimposing the new pattern over the new position in the new multimedia file.
Claim: 22. The computer-readable storage medium of claim 19, wherein a multimedia file can include: an image file; an audio file; a video file; a text file; a combination of multimedia files; and any other multimedia file.
Claim: 23. The computer-readable storage medium of claim 22, wherein if the multimedia file is an image file, the pattern can include: a circle; a square; a triangle; a checkerboard pattern; a specified shape; a specified pattern; a combination of shapes; and a combination of patterns.
Claim: 24. The computer-readable storage medium of claim 22, wherein if the multimedia file is a video file, the pattern can include: a circle; a square; a triangle; a checkerboard pattern; a frame in the video file; a set of frames in the video file; a time interval; a specified shape; a specified pattern; a combination of shapes; and a combination of patterns.
Claim: 25. The computer-readable storage medium of claim 22, wherein if the multimedia file is an audio file, the pattern can include: a time interval; a set of time intervals; a set of notes; a track within the audio file; and a combination of patterns.
Claim: 26. The computer-readable storage medium of claim 22, wherein if the multimedia file is a text file, the pattern can include: a page of text; a paragraph of text; a selection of text; a set of selected text; and a combination of patterns.
Claim: 27. The computer-readable storage medium of claim 18, wherein attributes for the pattern can be modified by the user; and wherein the attributes for the pattern can include: a length; a width; a size; a time; a color; and any other attribute for the pattern.
Claim: 28. An apparatus that authenticates a user on a computer system, comprising: an authentication mechanism configured to: receive an authentication request from the user; receive a first multimedia data item from the user; perform a transformation on the first multimedia data item; determine if the transformation of the first multimedia data item matches authentication data for the user, wherein the authentication data for the user is a transformation of a second multimedia data item; and if so, to authenticate the user.
Claim: 29. The apparatus of claim 28, wherein prior to receiving the authentication request from the user, the authentication mechanism is configured to generate the second multimedia data item by: receiving a request to create authentication data for the user; receiving the second multimedia data item from the user; perform a transformation on the second multimedia data item; associating the transformation of the second multimedia data item with the user to serve as the authentication data for the user; and storing the authentication data for the user on the computer system.
Claim: 30. The apparatus of claim 28, wherein while performing the transformation on the first multimedia data item, the authentication mechanism is configured to: use a hashing function on the first multimedia data item; and to encode a binary representation of a result of a hashing function on the first multimedia data item.
Current U.S. Class: 713/156
Current International Class: 04
رقم الانضمام: edspap.20080028205
قاعدة البيانات: USPTO Patent Applications