The field relates generally to providing user authentication and device access, and in particular, to a system and method for providing graphical dynamic user authentication and device access.
The use of mobile or electronic devices has become widespread these days. These devices provide the user with a variety of functionalities ranging from wireless telephonic communication, Internet access, online financial transactions, online shopping, etc. Thus, today's mobile devices help the users with all features that were traditionally possible with only non-mobile computing systems. Examples of such mobile electronic devices include: mobile devices, smart phones, watches, glasses, cellular phones, personal digital assistants (PDAs), digital cameras, mobile computers and tablets, etc. With such an increased prominence, these electronic devices are being used for a varied range of personal activities. Most of these activities like mobile banking, e-commerce etc. require the usage of sensitive information which is often stored in the user's personal electronic devices. These devices also carry significant personal details of the users like key contacts, e-mail messages, photos, and videos etc. which carry great personal value. However, unfortunately, these mobile devices are quite susceptible to loss, theft and unauthorized usage. These devices often carry private, confidential and/or difficult to replace data, whose unauthorized use/misuse may lead to unpleasant consequences.
The existing methods for authenticating users onto traditional electronic device may involve typing a unique password and/or unique PIN number onto the mobile or electronic device keypad. However, this involves the user to remember complex character/alpha-numeric passwords which may be required to be changed periodically making it still hard an exercise for the user to remember.
Another popular hand-held device keypad lock and unlock mechanism is triggered by pressing a specific key for longer than a predetermined period of time, for example, pressing the star key (*) for more than 3 seconds.
The mobile devices with touch sensitive interface have become prevalent. The user authentication methods developed for these devices take into consideration the touch sensitive input devices into account. These techniques require the user to draw specific patterns on the screen and the users then are authenticated based on the similarity of this pattern with the stored pattern. The problem with such kind of approaches is that, any person, who has a chance to peep at the pattern, can easily draw the same pattern in the absence of the genuine owner and/or user of the device. This kind of misuse is popularly referred to as “Shoulder Surfing”. Even when a user of the device keeps a complex pattern, like his signature, a malicious person can video record the pattern and imitate the same in the absence of the user. Thus, security of the mobile device may be breached resulting in theft and/or misappropriation of the confidential information that may be stored in the mobile device.
Another problem with existing user authentication technique is that they are static in nature, however users are provided the option periodically or otherwise to change the password and/or the pattern to access the device but not in the way that they need to present different pattern every time to access/unlock.
In view of forgoing discussion, there is a need for providing dynamic user authentication technique and the consequent granting or denying of resources and services access in order to prevent unauthorized usage of electronic devices.
The disclosed technologies can overcome the limitation mentioned above by providing graphical dynamic user authentication and device access. This is being accomplished by providing a system and method which creates the graphical dynamic pattern for user authentication on fly and dynamic patterns generation and application based access reduces the threat of shoulder surfing to a greater extent.
According to the present embodiment, a method for providing graphical dynamic user authentication and device access is disclosed. The method involves maintaining a database in an electronic device, wherein the database comprises a plurality of entities in a plurality of fields then prompting at least one user to generate at least one action rule at the time of first usage of the electronic device by selecting an entity among the plurality of entities from one or more of the plurality of fields thereafter storing the at least one action rule in a repository of the electronic device then prompting the at least one user to apply the at least one action rule at the time of unlocking and finally granting the at least one user an access to the electronic device if the at least one applied action successfully passes the rule identical to the at least one stored action rule for the user.
In an additional embodiment, a system for providing graphical dynamic user authentication and device access is disclosed. The system includes a database maintenance component, an action rule generation component, an action rule storage component, a user prompt component and an access grant component. The database maintenance component configured to maintain a database in an electronic device, wherein the database comprises a plurality of entities in a plurality of fields. The action rule generation component configured to prompt at least one user to generate at least one action rule at the time of first usage of the electronic device by selecting an entity among the plurality of entities from each of the plurality of fields. The action rule storage component configured to store the at least one action rule in a repository of the electronic device. The user prompt component configured to prompt the at least one user to apply the at least one action rule at the time of unlocking. The access grant component configured to grant the at least one user, an access to the electronic device if the at least one applied action successfully passes the rule identical to the at least one stored action rule for the user.
In another embodiment, a non-transitory computer readable medium for providing dynamic user authentication and device access is disclosed. This involves a non-transitory computer readable medium having stored thereon instructions for providing graphical dynamic user authentication and device access. The computer program code is adapted to maintaining a database in an electronic device, wherein the database comprises a plurality of entities in a plurality of fields then prompting at least one user to generate at least one action rule at the time of first usage of the electronic device by selecting an entity among the plurality of entities from one or more of the plurality of fields thereafter storing the at least one action rule in a repository of the electronic device then prompting the at least one user to apply the at least one action rule at the time of unlocking and finally granting the at least one user an access to the electronic device if the at least one applied action successfully passes the rule identical to the at least one stored action rule for the user.
Various embodiments of the invention will, hereinafter, be described in conjunction with the appended drawings provided to illustrate, and not to limit the invention, wherein like designations denote like elements, and in which:
The foregoing has broadly outlined the features and technical advantages of the present disclosure in order that the detailed description of the disclosure that follows may be better understood. Additional features and advantages of the disclosure will be described hereinafter which form the subject of the claims of the disclosure. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the disclosure as set forth in the appended claims. The novel features which are believed to be characteristic of the disclosure, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present disclosure.
With reference to
According to another embodiment of the invention, a user is allowed to change the at least one action rule. Also, the method enables the setting of different set of action rules for different users. For instance, an electronic device is accessed by more than one user in such scenario both the user can generate two separate set of action rule in order to get access to a device.
According to an exemplary embodiment of the invention an exemplary action rule which at least one user apply at the time of unlocking for accessing an electronic device is depicted below. According to one embodiment of the invention at least one user is prompted to apply the at least one action rule at the time of unlocking of the electronic device 308 and granting an access to the electronic device if the at least one applied action rule is identical to the at least one stored action rule for the user 310. According to an exemplary embodiment of the invention, an example of rule generation is depicted in TABLE 1.
The user can generate action rule in any combination. The exemplary patterns based on the above table may be:
For instance, at the time of unlocking of electronic device the pattern which may come randomly could be a. i.e. select the red dots that form a rectangle. Similarly, next time while unlocking of device the next pattern could be b i.e select the left side dots that lie on a straight line. At each time of unlocking of device the pattern would be generated randomly with different combinations and access to the electronic device would be granted if the at least one applied action rule is identical to the at least one stored action rule for the user.
The above mentioned invention is not limited to touch sensitive screens. It may be adapted to work with non-touch sensitive screens and/or devices.
The above mentioned description is presented to enable a person of ordinary skill in the art to make and use the invention and is provided in the context of the requirement for obtaining a patent. Various modifications to the preferred embodiment will be readily apparent to those skilled in the art and the generic principles of the present invention may be applied to other embodiments, and some features of the present invention may be used without the corresponding use of other features. Accordingly, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
Number | Date | Country | Kind |
---|---|---|---|
5878/CHE/2013 | Dec 2013 | IN | national |