IMAGE-BASED LOGIN AND AUTHENTICATION
Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method furthe...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
29.02.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method further includes generating a hash number for the at least one target image, where the hash number identifies the at least one target image, and concealing the hash number in the at least one target image, where the concealing of the hash number provides security in an authentication of the at least one target image. The method further includes generating an encrypted identification token, where the encrypted identification token includes the hash number. The method further includes associating the encrypted identification token with the user, and storing the encrypted identification token in a database for authentication of at least one target image and the user. |
---|---|
Bibliography: | Application Number: US202318233281 |