Abstract: The purpose of this invention is to develop a Visual Cue based Authentication using SecForge to reduce the risk of spoofing the authentication process. Users can be authenticated to various computer devices using a procedure that recognizes and confirms an authenticated human. A user model can be created and saved in the cloud, synchronized across devices. When a user accesses a device, image data is taken, which can be used in facial recognition and human verification processes.SecForge is designed for a diverse user base, from beginners to experts works on a modular architecture with modules that offers specific functionalities like port scanning,directory enumeration, hash cracking,payload generation, and post exploitation tasks.These modules are interlinked through core engine Layer.A versatile effective, and modular command line toolkit created for vulnerability assessment and penetration Testing tasks by providing an adaptable, scalable, and user focused solution targeting at improving digital security architecture it aims to address significant issues in traditional framework.
Description:Field of Invention
The aim of this invention is related to the Information Security domain. Its addresses user authentication system using visual cue based authentication mechanism. For granting access images, patterns or visual stimuli is used by a legitimate user for granting access. It uses cognitive psychology principles similar to human memory recall and pattern recognitionit enhances the security and usability in digital authentication process. It can be adoptable to different domains like cyber security, online services, banking services, mobile applications and other digital platforms for enhanced user authentication.
Objectives of this Invention
The goal of this invention is to develop advanced, user-friendly, and comprehensive framework for managing and securing authentication credentials across digital platforms. This invention addresses the inherent limitations of conventional password systems such as weak password selection, memorability issues, and vulnerability to cyberattacks by providing a unified end-to-end solution for password generation, verification, storage, and replacement. The framework utilizes image-based password creation as a core feature, leveraging principles from cognitive psychologyspecifically, the pictorial superiority effectto enhance memorability and reduce reliance on alphanumeric strings. Users select images or patterns from customizable grid interfaces, which serve as secure authentication tokens resistant to brute force attacks, phishing, and keylogging.
Background of the Invention
The Traditional authentication systems rely heavily on alphanumeric passwords or PINs to verify user identity. However, these methods suffer from significant drawbacks that compromise security and user experience Memory Limitations Users often struggle to remember complex password combinations, leading them to select weak, easily guessable passwords. Many users reuse the same password across different services, increasing vulnerability to credentialstuffing attacks. Conventional password systems are prone to various security threats including Phishing: Users are deceived into revealing credentials, Keylogging (Yang et al. [2024]) Malicious software records keystrokes. Shoulder Surfing Passwords (Abdelrahman et al. [2022]) are observed and stolen physically. Brute Force Attempts Automated systems try all possible password combinations until access is gained to combat these challenges, image-based authentication( X Wang et al. [2024]) has emerged as a promising and user-friendly alternative. This innovative approach draws upon the Pictorial Superiority Effect in cognitive psychology, which suggests that humans are significantly better at recalling and recognizing images than text. By replacing or enhancing traditional password inputs with visual elements, image-based systems offer Enhanced Memorability Users can intuitively recognize images, reducing password fatigue, Improved Security Visual passwords are harder to guess or replicate through conventional attack methods. Resistance to Common Threats Since images cannot be easily captured through keyloggers or shoulder surfing, the method inherently resists such breaches.
This approach offer interactive media on a user connected computer device. There could be multiple images in the interactive media. Multiple photos could be displayed. On the computer platform’s graphical display. When the user chooses a series of images from the many images on the computer graphical display, the approach may also involve getting input data from the device. Methods and systems for user authentication are the method may also comprise receiving input data from the computing device when the user selects a sequence of images from the plurality of images on the graphical display of the computing device. The selected sequence of images may correspond to a sequence of grammatical words(US9202105B1). The method may further comprise analyzing the input data by comparing the sequence of grammatical words to a passcode, and authenticating the user when the sequence of grammatical words is equal to the passcode (US10848482B1)
Summary of the Invention
The present invention strengthen data protection and uphold confidentiality, the invention incorporates robust encryption techniques during storage and transmission of credentials. All authentication data is encrypted using industry-standard algorithms, with support for periodic re-encryption to protect against emerging threats. Authentication processes are further fortified by multi-factor verification mechanisms, which can include combinations ofImage-based selections,Time-sensitive one-time codes (OTPs), Device authentication or biometric inputs (such as fingerprint or facial recognition), Challenge-response mechanisms for high-risk operations. Each login or authentication attempt is recorded through a detailed access logging system, providing timestamped logs, device fingerprints, geographic metadata, and action-specific details. This facilitates security audits, intrusion detection, and compliance reporting.
The invention enables end-to-end password replacement, meaning that legacy password systems can be phased out entirely in favor of image- or pattern-based credentials, enhancing security across organizational boundaries. System administrators or end users can perform credential resets, access revocations, and module replacements through an integrated interface. A standout feature of the framework is its high degree of configurability, allowing administrators to tailor security policies based on risk thresholds or user profiles. These configuration options may includeGrid Size Adjustment Modifying the dimensions of the image grid (e.g., 3×3, 5×5, etc.) to influence selection entropy.This approach reduce the likelihood that someone else may spoof the authentication process, a user can be authenticated to any of a variety of computer devices using an authentication procedure that recognizes the user and confirm that an actual human being is attempting to be authenticated.It is possible to create and save user model in the cloud, which allows the model to be synchronized across several devices. When a user accesses one of these devices, image data may be taken. This data can then be used in a facial recognition process to identify the user and in human verification process to confirm that the facial data matches that of a real user
Detailed Description of the Invention
The primary objective of the invention relates to the creation and deployment of a flexible, efficient, and modular commandline toolkit named SecForge, designed explicitly for Vulnerability Assessment and Penetration Testing (VAPT) activities conducted on Linux-based platforms. It seeks to overcome critical challenges observed in conventional VAPT frameworks by offering a customizable, scalable, and user-centric solution aimed at enhancing digital security infrastructure.In existing cybersecurity environments, most VAPT tools are inherently monolithic, restricting users to predefined functionalities and rigid workflows. Additionally, beginners often encounter a steep learning curve, with limited educational support and minimal scope for customization or extension. The current landscape is further constrained by resource-heavy graphical interfaces, fragmented integration mechanisms, and incompatibility with minimal computing environments.
The invention addresses these deficiencies through a modular command-line-based framework that promotes adaptability, operational efficiency, and educational accessibility. SecForge is developed to cater to a wide spectrum of users, from novice learners seeking guided entry into cybersecurity practices to expert practitioners engaged in high-level ethical hacking, penetration testing, and system auditing.SecForge operates under a modular architecture comprising discrete, independently functional modules, which users may install, remove, or update based on project requirements. Each module provides a specific set of functionalitiesfor example, port scanning, directory enumeration, hash cracking, payload generation, post-exploitation tasks, and more. These components are interlinked through a central orchestration layer that coordinates execution, input/output parsing, and reporting. Interoperability: The toolkit supports the inclusion of third-party binaries and scripting utilities via a standardized registration and invocation process. This ensures that users can integrate their preferred tools and scripts without dependency conflicts.
Resource Efficiency Due to its CLI-based design, SecForge minimizes hardware requirements and can be deployed on embedded systems, cloud-hosted containers, and remote terminal environments. Educational Accessibility The invention includes a contextual help engine embedded within each module, offering usage instructions, common flags, examples, and threat simulation templates. This dramatically lowers the barrier for users new to cybersecurity testing.SecForge introduces a set of advanced usability mechanisms that streamline VAPT workflows in Profile-based Execution Users can create configuration profiles for repeated test scenarios, eliminating redundancy and enabling quick deployment in scheduled or automated testing environments. Integrated Reporting Engine SecForge collects test data and generates standardized vulnerability reports in machine-readable formats (e.g., JSON, XML) and human-readable summaries. This supports seamless integration with larger security management platforms and compliance documentation. Audit Logging & Safe Mode The invention includes built-in logging and audit features that track executed commands, timestamps, and results. A “safe mode” prevents potentially destructive actions from being executed without explicit user confirmation, thereby enhancing ethical usage and reducing operational risk.
The invention is positioned to serve a broad range of practical applications across various sectorsEducation & TrainingAs a lightweight, accessible framework, SecForge can be adopted by universities, training institutes, and cybersecurity workshops to teach penetration testing, ethical hacking, and digital forensics. Corporate Security Audits Enterprises and startups can integrate SecForge into their DevSecOps pipelines to proactively identify vulnerabilities in production systems, thereby reducing risk exposure and improving compliance. Governmental and Defense Use The toolkit’s customizable nature allows it to be adapted for mission-specific testing environments, especially in sectors dealing with sensitive data and infrastructure. Open-Source Development The invention supports community-driven module development, encouraging collaborative enhancements and democratizing access to cutting-edge cybersecurity methodologies.InventiveStep & Technological AdvancementThe inventive step lies in the fusion of modularity, accessibility, and extensibility into a singular, streamlined toolkit which resolves the major limitations of existing systems. Unlike prevailing tools which trade simplicity for capability or vice versa, SecForge offers both by enabling users to tailor their security environment while maintaining a consistent interface and usage philosophy. The invention transforms VAPT operations from rigid, specialist-only workflows into inclusive, transparent, and collaborative exercises, thereby advancing the state of cybersecurity tooling in India and globally.
User Interface Layer (CLI) In order to gather important data, like IP address, subdomain, DNS records, and open ports, this critical stage uses a variety of sophisticated tools. It combines active reconnaissance techniques, which interact directly with target system to obtain information, and passive reconnaissance techniques, which collect data without warning the target. this two-pronged strategy guarantees a thorough comprehension of the target digital footprint, Core Engine Layer Module for vulnerability assessment and scanning in this stage, comprehensive active scans are carried out using well known tools like Nmap, Nikto, and OpenVAS the module uses a variety of misconfiguration and known common Vulnerability Exposures (CVES) to find system vulnerabilities. It built a through map of possible entry points that adversaries could use and examines system response to find security vulnerabilities, Tool Modules Layer Module for Exploiting after vulnerability are found, this module adopts a proactive stance by simulating actual attack situations using potent tools like Metasploit’s, searchsploit, and SQLmap. It offers information about the possible impact, thoroughly examines the exploitability of the vulnerabilies found, and takes use of potential avenues for malevolent actors to exploit, Report Generation and Logging Layer Module for reporting the last stage involves compiling all of the test results into through report that are readable by humans. This module meticulously gathers comprehensive information, including the type of vulnerability found, their possible effects and the remedial recommendations that are prioritized. These reports are an essential resource for stakeholders, giving them the knowledge they need to successfully improve their security posture
As shown in figure 1. User Interface Layer (CLI)This layer includes a command line interface that was primarily creates in bash using Linux based SecForge’s tool and is intended to give users a simple and effective navigation experience. It uses a range of techniques, such as interactive prompts that walk users through challenging tasks and lower the learning curve, command flags for defining alternatives, and extensive help menus to help users grasp various functionalities. Core Engine LayerAs the backbone of the design, the core engine coordinates the use of several tools, runs automated processes, and gathers data for analysis, this layer uses rust for performance critical modules, which guarantee high execution and resource management efficiency, and python for its scripting logic, which allows for flexible and quick feature development.
2. Tool Modules LayerThis layer facilitates a wide range of functionalities necessary for security assessment, including the following, by serving as a complete reposition for both third party and custom-built tool Linux based SecForge’s . Network scanning is the process of finding open ports and active devices on a network by using programs like Nmap. Vulnerability Assessment
Figure 1 Report Generation and Logging LayerThis layer is essential for converting tool execution raw output into comprehensive easily navigable reports in a variety of formats such as HTML, PDF, and Markdown. to meet a range of reporting requirements. Further, it keeps through logs that serve as an audit trail for testing procedures, improving accountability and enabling repeat testing for trend analysis and dependability confirmation.
Brief description of Drawing
Figure 1, Data flow diagram
The provided diagram represents the workflow of the Visual cue base authentication system,showcasing the key components and their interactions. , Claims:The scope of the invention is defined by the following claims:
1. A system/method to the recommend the fashion based on the previous data, said system/method comprising the steps of:
a) The system starts up, and the training the data from the previous data(1). The data is feed to User Interface Layer (CLI) In order to gather important data, like IP address, subdomain, DNS records, and open ports, this critical stage uses a variety of sophisticated tools.
b) The Reconnaissance techniques, which interact directly with target system to obtain information, and passive reconnaissance techniques, which collect data without warning the target. this two-pronged strategy guarantees a thorough comprehension of the target digital footprint.
c) The Core Engine Layer Module for vulnerability assessment and scanning in this stage, comprehensive active scans are carried out using well known tools like Nmap, Nikto, and OpenVAS the module uses a variety of misconfiguration and known common Vulnerability Exposures (CVES) to find system vulnerabilities. It built a through map of possible entry points that adversaries could use and examines system response to find security vulnerabilities.
d) The SecForge Linux tool operates on a modular architecture with modules that offers specific functionalities like port scanning ,directory enumeration, hash cracking ,payload generation and post exploitation tasks.
2. As mentioned in claim 1, the Tool Modules Layer Module for Exploiting after vulnerability are found, this module adopts a proactive stance by simulating actual attack situations using potent tools like Metasploit’s, searchsploit, and SQLmap. It offers information about the possible impact, thoroughly examines the exploitability of the vulnerabilities found, and takes use of potential avenues for malevolent actors to exploit.
3. According to claim 1, the Report Generation and Logging Layer Module for reporting the last stage involves compiling all of the test results into through report that are readable by humans. This module meticulously gathers comprehensive information, including the type of vulnerability found, their possible effects and the remedial recommendations that are prioritized. These reports are an essential resource for stakeholders, giving them the knowledge they need to successfully improve their security posture
| # | Name | Date |
|---|---|---|
| 1 | 202541076242-REQUEST FOR EARLY PUBLICATION(FORM-9) [11-08-2025(online)].pdf | 2025-08-11 |
| 2 | 202541076242-FORM-9 [11-08-2025(online)].pdf | 2025-08-11 |
| 3 | 202541076242-FORM FOR STARTUP [11-08-2025(online)].pdf | 2025-08-11 |
| 4 | 202541076242-FORM FOR SMALL ENTITY(FORM-28) [11-08-2025(online)].pdf | 2025-08-11 |
| 5 | 202541076242-FORM 1 [11-08-2025(online)].pdf | 2025-08-11 |
| 6 | 202541076242-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-08-2025(online)].pdf | 2025-08-11 |
| 7 | 202541076242-EVIDENCE FOR REGISTRATION UNDER SSI [11-08-2025(online)].pdf | 2025-08-11 |
| 8 | 202541076242-DRAWINGS [11-08-2025(online)].pdf | 2025-08-11 |
| 9 | 202541076242-COMPLETE SPECIFICATION [11-08-2025(online)].pdf | 2025-08-11 |