Sign In to Follow Application
View All Documents & Correspondence

Method And System For Authenticating Access To A Computing Device

Abstract: Embodiments of the present disclosure disclose a method and a system for authenticating access to a computing device. The method comprises providing a user interface on a display of the computing device. The user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells. The method further comprises receiving a pattern from the user, wherein the pattern comprises of a plurality of colored grid cells and order of coloring of the plurality of colored grid cells. The method further comprises comparing the pattern received from the user with a predefined pattern. The method further comprises providing access to the computing device based on the comparison. FIGURE 4

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
25 November 2014
Publication Number
51/2014
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipo@knspartners.com
Parent Application

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. NARASIMHA RAO VENKATA DONGALA
Adarshanagar, 2nd Line, Guntur, Andhra Pradesh, India

Specification

CLIAMS:We claim:

1. A method for authenticating access to a computing device, comprising:
providing, by a processor of the computing device, a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving, by the processor, a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing, by the processor, the pattern received from the user with a predefined pattern; and
authenticating, by the processor, access to the computing device based on the comparison.
2. The method as claimed in claim 1 further comprising providing access to the computing device upon determining the pattern received from the user to be matching with the predefined pattern.
3. The method as claimed in claim 1, wherein the predefined pattern is defined by a user of the computing device, said predefined pattern comprises a plurality of predefined colored grid cells and a predefined order of coloring of the plurality of predefined colored grid cells.
4. The method as claimed in claim 1, wherein comparing the pattern received from the user with the predefined pattern comprises:
comparing the plurality of colored grid cells with the plurality of predefined colored grid cells; and
comparing order of coloring of the plurality of grid cells with predefined order of coloring of the plurality of predefined colored grid cells.
5. The method as claimed in claim 1 further comprising:
incrementing a counter each time upon determining the pattern received from the user to be different from the predefined pattern; and
resetting the incremented counter upon determining the pattern received from the user to be matching with the predefined pattern.
6. The method as claimed in claim 5 further comprising restricting access to the computing device upon determining value of the counter to be exceeding a predefined counter value.
7. The method as claimed in claim 1, further comprising hiding display of a colored grid cell of the plurality of colored grid cells subsequently upon receiving selection of the colored grid cell from the user.
8. A computing device for providing authenticated access comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, causes the processor to:
providing a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing the pattern received from the user with a predefined pattern; and
authenticating access to the computing device based on the comparison.
9. The computing device as claimed in claim 8, wherein the access to the computing device is provided upon determining the pattern received from the user to be matching with the predefined pattern.
10. The computing device as claimed in claim 8, wherein the predefined pattern is defined by a user of the computing device, said predefined pattern comprises a plurality of predefined colored grid cells and a predefined order of coloring of the plurality of predefined colored grid cells.
11. The computing device as claimed in claim 8, wherein comparing the pattern received from the user with the predefined pattern comprises:
comparing the plurality of colored grid cells with the plurality of predefined colored grid cells; and
comparing order of coloring of the plurality of grid cells with predefined order of coloring of the plurality of predefined colored grid cells.
12. The computing device as claimed in claim 8, wherein the processor is further configured to:
increment a counter each time upon determining the pattern received from the user to be different from the predefined pattern; and
reset the incremented counter upon determining the pattern received from the user to be matching with the predefined pattern.
13. The computing device as claimed in claim 12, wherein the processor is further configured to restrict access to the computing device upon determining value of the counter to be exceeding the predefined counter value.

14. The computing device as claimed in claim 8, wherein the processor is further configured to hide display of a colored grid cell of the plurality of colored grid cells subsequently upon receiving selection of the colored grid cell from the user.
15. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform operations comprising:
providing a user interface on a display of the computing device, wherein the user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells;
receiving a pattern from the user, wherein the pattern comprises a plurality of colored grid cells and order of coloring of the plurality of colored grid cells;
comparing the pattern received from the user with a predefined pattern; and
authenticating access to the computing device based on the comparison.

Dated this 25th day of November, 2014

R RAMYA RAO
OF K & S PARTNERS
AGENT FOR THE APPLICANT
,TagSPECI:TECHNICAL FIELD

The present subject matter is related, in general to authentication techniques and more particularly, but not exclusively to a method and a system for authenticating access to a computing device.

Documents

Application Documents

# Name Date
1 5908-CHE-2014 FORM-9 25-11-2014.pdf 2014-11-25
2 5908-CHE-2014 FORM-18 25-11-2014.pdf 2014-11-25
3 IP28855-spec.pdf 2014-11-28
4 IP28855-fig.pdf 2014-11-28
5 FORM 5-IP28855.pdf 2014-11-28
6 FORM 3-IP28855.pdf 2014-11-28
7 5908-CHE-2014-Request For Certified Copy-Online(28-11-2014).pdf 2014-11-28
8 5908CHE2014_CertifiedCopyRequest.pdf 2014-12-02
9 abstract 5908-CHE-2014.jpg 2014-12-09
10 5908-CHE-2014 POWER OF ATTORNEY 16-12-2014.pdf 2014-12-16
11 5908-CHE-2014 FORM-1 16-12-2014.pdf 2014-12-16
12 5908-CHE-2014 CORRESPONDENCE OTHERS 16-12-2014.pdf 2014-12-16
13 5908-CHE-2014-FER.pdf 2019-08-01
14 5908-CHE-2014-AbandonedLetter.pdf 2020-02-04

Search Strategy

1 search_strategy_5908_31-07-2019.pdf