Abstract: Embodiments of the present disclosure disclose a method and a system for authenticating access to a computing device. The method comprises providing a user interface on a display of the computing device. The user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells. The method further comprises receiving a pattern from the user, wherein the pattern comprises of a plurality of colored grid cells and order of coloring of the plurality of colored grid cells. The method further comprises comparing the pattern received from the user with a predefined pattern. The method further comprises providing access to the computing device based on the comparison. FIGURE 4
CLIAMS:We claim:
1. A method for authenticating access to a computing device, comprising:
providing, by a processor of the computing device, a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving, by the processor, a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing, by the processor, the pattern received from the user with a predefined pattern; and
authenticating, by the processor, access to the computing device based on the comparison.
2. The method as claimed in claim 1 further comprising providing access to the computing device upon determining the pattern received from the user to be matching with the predefined pattern.
3. The method as claimed in claim 1, wherein the predefined pattern is defined by a user of the computing device, said predefined pattern comprises a plurality of predefined colored grid cells and a predefined order of coloring of the plurality of predefined colored grid cells.
4. The method as claimed in claim 1, wherein comparing the pattern received from the user with the predefined pattern comprises:
comparing the plurality of colored grid cells with the plurality of predefined colored grid cells; and
comparing order of coloring of the plurality of grid cells with predefined order of coloring of the plurality of predefined colored grid cells.
5. The method as claimed in claim 1 further comprising:
incrementing a counter each time upon determining the pattern received from the user to be different from the predefined pattern; and
resetting the incremented counter upon determining the pattern received from the user to be matching with the predefined pattern.
6. The method as claimed in claim 5 further comprising restricting access to the computing device upon determining value of the counter to be exceeding a predefined counter value.
7. The method as claimed in claim 1, further comprising hiding display of a colored grid cell of the plurality of colored grid cells subsequently upon receiving selection of the colored grid cell from the user.
8. A computing device for providing authenticated access comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, causes the processor to:
providing a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing the pattern received from the user with a predefined pattern; and
authenticating access to the computing device based on the comparison.
9. The computing device as claimed in claim 8, wherein the access to the computing device is provided upon determining the pattern received from the user to be matching with the predefined pattern.
10. The computing device as claimed in claim 8, wherein the predefined pattern is defined by a user of the computing device, said predefined pattern comprises a plurality of predefined colored grid cells and a predefined order of coloring of the plurality of predefined colored grid cells.
11. The computing device as claimed in claim 8, wherein comparing the pattern received from the user with the predefined pattern comprises:
comparing the plurality of colored grid cells with the plurality of predefined colored grid cells; and
comparing order of coloring of the plurality of grid cells with predefined order of coloring of the plurality of predefined colored grid cells.
12. The computing device as claimed in claim 8, wherein the processor is further configured to:
increment a counter each time upon determining the pattern received from the user to be different from the predefined pattern; and
reset the incremented counter upon determining the pattern received from the user to be matching with the predefined pattern.
13. The computing device as claimed in claim 12, wherein the processor is further configured to restrict access to the computing device upon determining value of the counter to be exceeding the predefined counter value.
14. The computing device as claimed in claim 8, wherein the processor is further configured to hide display of a colored grid cell of the plurality of colored grid cells subsequently upon receiving selection of the colored grid cell from the user.
15. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform operations comprising:
providing a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing the pattern received from the user with a predefined pattern; and
authenticating access to the computing device based on the comparison.
Dated this 25th day of November, 2014
R RAMYA RAO
OF K & S PARTNERS
AGENT FOR THE APPLICANT
,TagSPECI:TECHNICAL FIELD
The present subject matter is related, in general to authentication techniques and more particularly, but not exclusively to a method and a system for authenticating access to a computing device.
| # | Name | Date |
|---|---|---|
| 1 | 5908-CHE-2014 FORM-9 25-11-2014.pdf | 2014-11-25 |
| 2 | 5908-CHE-2014 FORM-18 25-11-2014.pdf | 2014-11-25 |
| 3 | IP28855-spec.pdf | 2014-11-28 |
| 4 | IP28855-fig.pdf | 2014-11-28 |
| 5 | FORM 5-IP28855.pdf | 2014-11-28 |
| 6 | FORM 3-IP28855.pdf | 2014-11-28 |
| 7 | 5908-CHE-2014-Request For Certified Copy-Online(28-11-2014).pdf | 2014-11-28 |
| 8 | 5908CHE2014_CertifiedCopyRequest.pdf | 2014-12-02 |
| 9 | abstract 5908-CHE-2014.jpg | 2014-12-09 |
| 10 | 5908-CHE-2014 POWER OF ATTORNEY 16-12-2014.pdf | 2014-12-16 |
| 11 | 5908-CHE-2014 FORM-1 16-12-2014.pdf | 2014-12-16 |
| 12 | 5908-CHE-2014 CORRESPONDENCE OTHERS 16-12-2014.pdf | 2014-12-16 |
| 13 | 5908-CHE-2014-FER.pdf | 2019-08-01 |
| 14 | 5908-CHE-2014-AbandonedLetter.pdf | 2020-02-04 |
| 1 | search_strategy_5908_31-07-2019.pdf |