×

User-selectable signatures

DC
  • US 8,429,415 B1
  • Filed: 04/13/2010
  • Issued: 04/23/2013
  • Est. Priority Date: 04/26/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A computing device which provides secured access, the computing device comprising:

  • a program memory;

    a data storage memory;

    first and second input devices both of which are part of the computing device and are selectable by a user via the computing device to allow the user to generate a reference signature that can be compared to a future submitted signature for authentication purposes to allow it to be determined whether access to the computing device should be granted based on the user selection, wherein at least one of the first and second user selectable input devices is of a type of input device other than a keyboard;

    a processor operatively interfaced with the program memory, the data storage memory, and the first and second user selectable input devices;

    a first set of instructions stored in the program memory that, when executed by the processor, allow a user to select at least one signal type, among at least two different user selectable signal types, to be received and stored in the memory, the at least two different signal types being associated with the first or second user selectable input devices;

    a second set of instructions stored in the memory that are adapted to be executed after the first set of instructions has been executed, the second set of instructions, when executed by the processor, causing(a) input data of at least one signal type from the user selected one of the first and second input devices to be generated and then recorded in the data storage memory,(b) a reference signature to be created which comprises in part at least a portion of the input data recorded in the data storage memory, and(c) the reference signature to be stored in the data storage memory; and

    a third set of instructions stored in the program memory that are adapted to be executed after both the first and second sets of instructions have been executed, the third set of instructions, when executed by the processor, retrieving the reference signature from the data storage memory and comparing it to a subsequent signature submission signal to allow a determination to be made as to whether or not access to the computing device should be granted.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×