Abstract: Embodiments of the present disclosure disclose a method for authenticating access. The method comprises receiving a touch input from a user, where the touch input comprises selection of one or more nodes of a plurality of nodes displayed on a user interface of the system and sequence of selection of the one or more nodes. Then, method comprises determining an intensity of touch pressure on each of the selected one or more nodes. Next, the received touch input with a predefined touch input and the intensity of the touch pressure on each of the selected one or more nodes with corresponding predefined intensities of touch pressure is compared. Then, the method authenticates access to the system based on the comparison of the touch input and the comparison of the intensity of the touch pressure. FIGURE 5
CLIAMS:We claim:
1. A method for authenticating access to a system, the method comprising:
receiving, by the system, a touch input from a user comprising selection of one or more nodes of a plurality of nodes displayed on a user interface of the system and sequence of selection of the one or more nodes;
determining, by the system, an intensity of touch pressure on each of the selected one or more nodes;
comparing, by the system, the received touch input with a predefined touch input and the intensity of the touch pressure on each of the selected one or more nodes with corresponding predefined intensities of touch pressure; and
authenticating, by the system, access to the electronic device based on the comparison of the touch input and the comparison of the intensity of the touch pressure.
2. The method as claimed in claim 1 further comprising generating by the system, a visual feedback on the user interface of the system to indicate the intensity of touch pressure.
3. The method as claimed in claim 2, wherein the visual feedback comprises generating concentric circles for the selected one or more nodes respectively on the user interface to indicate the intensity of touch pressure.
4. The method as claimed in claim 1 further comprising providing access to the system upon determining:
matching of the received touch input with the predefined touch input; and
matching of the intensity of the touch pressure on each of the selected one or more nodes with the corresponding predefined intensities of touch pressure.
5. The method as claimed in claim 1, wherein the predefined touch input is defined by the user, said predefined touch input comprises one or more nodes of a plurality of nodes and a predefined sequence of selection of the one or more nodes.
6. The method as claimed in claim 1, wherein the selection of the one or more nodes is performed by at least one of swipe, slide, poke, tap, press, and gestures on the one or more nodes.
7. The method as claimed in claim 1 further comprising providing by the system, an alert when the intensity of touch pressure received from the user is equal to a maximum predefined intensity of touch pressure of the predefined intensities of touch pressure.
8. A system for authenticating access comprising:
a processor;
a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, cause the processor to:
receive a touch input from a user comprising selection of one or more nodes of a plurality of nodes displayed on a user interface of the system and sequence of selection of the one or more nodes;
determine an intensity of touch pressure on each of the selected one or more nodes;
compare the received touch input with a predefined touch input and the intensity of the touch pressure on each of the selected one or more nodes with corresponding predefined intensities of touch pressure; and
authenticate access to the system based on the comparison of the touch input and the comparison of the intensity of the touch pressure.
9. The system as claimed in claim 8, wherein the processor is further configured to generate a visual feedback on the user interface of the system to indicate the intensity of touch pressure.
10. The system as claimed in claim 9, wherein the visual feedback comprises generating concentric circles for the selected one or more nodes respectively on the user interface to indicate the intensity of touch pressure.
11. The system as claimed in claim 8, wherein the processor is configured to provide access to the system upon determining:
the received touch input to be matching with the predefined touch input; and
the intensity of the touch pressure on each of the selected one or more nodes to be matching with the corresponding predefined intensities of touch pressure.
12. The system as claimed in claim 11, wherein the predefined touch input is defined by the user, said predefined touch input comprises one or more nodes of a plurality of nodes and a predefined sequence of selection of the one or more nodes.
13. The system as claimed in claim 8, wherein the selection of the one or more nodes is performed by at least one of swipe, slide, poke, tap, press, and gestures on the one or more nodes.
14. The system as claimed in claim 8, wherein the processor is further configured to provide an alert when the intensity of touch pressure received from the user is equal to a maximum predefined intensity of touch pressure of the predefined intensities of touch pressure.
15. A non-transitory computer readable medium including instructions stored thereon that when processed by a processor cause a system to perform acts of:
receiving a touch input from a user comprising selection of one or more nodes of a plurality of nodes displayed on a user interface of the system and sequence of selection of the one or more nodes;
determining an intensity of touch pressure on each of the selected one or more nodes;
comparing the received touch input with a predefined touch input and the intensity of the touch pressure on each of the selected one or more nodes with corresponding predefined intensities of touch pressure; and
authenticating access to the system based on the comparison of the touch input and the comparison of the intensity of the touch pressure.
Dated this 5th day of February, 2014
SHWETHA A CHIMALGI
OF K & S PARTNERS
AGENT FOR THE APPLICANT
,TagSPECI:TECHNICAL FIELD
The present subject matter is related, in general to authentication of a user and more particularly, but not exclusively to a method and system for authenticating an access.
| # | Name | Date |
|---|---|---|
| 1 | 572-CHE-2015 FORM-9 05-02-2015.pdf | 2015-02-05 |
| 1 | 572-CHE-2015-FER.pdf | 2019-10-18 |
| 2 | 572-CHE-2015 CORRESPONDENCE OTHERS 16-06-2015.pdf | 2015-06-16 |
| 2 | 572-CHE-2015 FORM-18 05-02-2015.pdf | 2015-02-05 |
| 3 | abstract 572-CHE-2015.jpg | 2015-02-11 |
| 3 | 572-CHE-2015 FORM-1 16-06-2015.pdf | 2015-06-16 |
| 4 | 572-CHE-2015 POWER OF ATTORNEY 16-06-2015.pdf | 2015-06-16 |
| 4 | 572CHE2015_CertifiedCopyRequest.pdf ONLINE | 2015-02-12 |
| 5 | 572CHE2015_CertifiedCopyRequest.pdf | 2015-03-13 |
| 5 | 572-CHE-2015-Request For Certified Copy-Online(12-02-2015).pdf | 2015-02-12 |
| 6 | IP29617-spec.pdf | 2015-03-12 |
| 6 | FORM 3-IP29617.pdf | 2015-03-12 |
| 7 | IP29617-fig.pdf | 2015-03-12 |
| 7 | FORM 5-IP29617.pdf | 2015-03-12 |
| 8 | IP29617-fig.pdf | 2015-03-12 |
| 8 | FORM 5-IP29617.pdf | 2015-03-12 |
| 9 | IP29617-spec.pdf | 2015-03-12 |
| 9 | FORM 3-IP29617.pdf | 2015-03-12 |
| 10 | 572-CHE-2015-Request For Certified Copy-Online(12-02-2015).pdf | 2015-02-12 |
| 10 | 572CHE2015_CertifiedCopyRequest.pdf | 2015-03-13 |
| 11 | 572-CHE-2015 POWER OF ATTORNEY 16-06-2015.pdf | 2015-06-16 |
| 11 | 572CHE2015_CertifiedCopyRequest.pdf ONLINE | 2015-02-12 |
| 12 | abstract 572-CHE-2015.jpg | 2015-02-11 |
| 12 | 572-CHE-2015 FORM-1 16-06-2015.pdf | 2015-06-16 |
| 13 | 572-CHE-2015 CORRESPONDENCE OTHERS 16-06-2015.pdf | 2015-06-16 |
| 13 | 572-CHE-2015 FORM-18 05-02-2015.pdf | 2015-02-05 |
| 14 | 572-CHE-2015-FER.pdf | 2019-10-18 |
| 14 | 572-CHE-2015 FORM-9 05-02-2015.pdf | 2015-02-05 |
| 1 | search_strategy_572_CHE_2015_20-09-2019.pdf |