IMAGE-BASED LOGIN AND AUTHENTICATION

Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method furthe...

Full description

Saved in:
Bibliographic Details
Main Authors Newnam, Robert, Sansom, Ben, Buts, Alexander, Chen, Ta-Wei
Format Patent
LanguageEnglish
Published 29.02.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method further includes generating a hash number for the at least one target image, where the hash number identifies the at least one target image, and concealing the hash number in the at least one target image, where the concealing of the hash number provides security in an authentication of the at least one target image. The method further includes generating an encrypted identification token, where the encrypted identification token includes the hash number. The method further includes associating the encrypted identification token with the user, and storing the encrypted identification token in a database for authentication of at least one target image and the user.
Bibliography:Application Number: US202318233281