Sign In to Follow Application
View All Documents & Correspondence

Method And System For Presenting Dynamic Lock Screens

Abstract: METHOD AND SYSTEM FOR PRESENTING DYNAMIC LOCK-SCREENS ABSTRACT A method and system for authenticating a user in an electronic device includes receiving an input from the user indicating the authentication window to be displayed on a lock-screen. Further, the method includes providing an option to modify the authentication window with random dummy objects on the lock-screen. The method includes displaying a dynamically generated authentication window. Furthermore, the method includes authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 February 2014
Publication Number
34/2015
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
mail@lexorbis.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-12-27
Renewal Date

Applicants

Samsung India Electronics Private Limited
A-25, Ground Floor, Front Tower, Mohan Co-operative Industrial Estate, New Delhi-110044

Inventors

1. Sandeep Gupta
Samsung R&D Institute India – Delhi, 2-A, Sector-126, Noida - 201303, U.P
2. Gaurav Kakkar
Samsung R&D Institute India – Delhi, 2-A, Sector-126, Noida - 201303, U.P

Specification

CLIAMS:I/We claim:

1. A method of authenticating a user in an electronic device, the method comprising:
receiving an input from the user indicating an authentication window to be displayed on a lock-screen;
providing an option to modify the authentication window with random dummy objects on the lock-screen;
displaying a dynamically generated authentication window; and
authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

2. The method as claimed in claim 1, wherein providing the option to modify the authentication window with random dummy objects on the lock-screen comprises at least one of:
providing an option to select type of dummy objects;
providing an option to set number of dummy objects; and
applying a default configuration, wherein the default configuration comprises a predetermined type of dummy objects and a predetermined number of dummy objects.

3. The method as claimed in claim 2, wherein the dummy objects are inserted dynamically to increase complexity of the lock-screen.

4. The method as claimed in claim 1, wherein authenticating the user comprises:
generating a reference code in response to a user defined sequence of objects selected from the dynamically generated authentication window;
comparing the reference code with a token associated with the corresponding authentication window; and
authenticating the user if the reference code matches the token.

5. The method as claimed in claim 1 and further comprising:
transferring a configuration file to one or more electronic devices, wherein the configuration file comprises configuration information pertaining to authentication windows.

6. A method of authenticating a user in an electronic device, the method comprising:
configuring one or more authentication windows, wherein an authentication window is associated with at least one token;
receiving an input from the user indicating the authentication window to be displayed on a lock-screen;
providing an option to modify the authentication window with random dummy objects on the lock-screen;
displaying a dynamically generated authentication window; and
authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

7. The method as claimed in claim 6, wherein configuring the authentication window comprises:
creating a layout of objects, wherein each object is linked to a unique ID;
selecting a plurality of objects from the layout of objects in a user defined sequence;
generating a token wherein the token represents the plurality of objects selected in the user defined sequence; and
storing the token as password of the authentication window.

8. The method as claimed in claim 7, wherein the plurality of objects in the layout of objects comprises at least one of:
objects stored in an electronic device;
objects received by the electronic device from a website, wherein the website is at least one of a social networking website, a search engine website, and an image hosting website; and
objects generated from data items stored in the electronic device, wherein the data items are at least one of text, images, computer generated three dimensional models, and videos.

9. The method as claimed in claim 7, wherein creating the layout of objects comprises:
selecting a plurality of objects from a class of objects;
associating attributes to the selected objects; and
arranging the objects in the layout, wherein the objects are arranged in at least one of a circular arrangement, a rectangular arrangement, a two dimensional arrangement and a three dimensional arrangement.

10. The method as claimed in claim 6, wherein providing an option to modify the authentication window with random dummy objects on the lock-screen comprises at least one of:
providing an option to select type of dummy objects;
providing an option to set number of dummy objects; and
applying a default configuration, wherein the default configuration comprises a predetermined type of dummy objects and a predetermined number of dummy objects.

11. The method as claimed in claim 10, wherein the dummy objects are inserted dynamically to increase complexity of the lock-screen.

12. The method as claimed in claim 6, wherein authenticating the user comprises:
generating a reference code in response to a user defined sequence of objects selected from the dynamically generated authentication window;
comparing the reference code with a token of the corresponding authentication window; and
authenticating the user if the reference code matches the token.

13. The method as claimed in claim 6 and further comprising:
transferring a configuration file to one or more electronic devices, wherein the configuration file comprises configuration information pertaining to authentication windows.

14. A method of unlocking an electronic device, the method comprising:
presenting user selectable options to a user on a lock-screen, wherein each option represents an authentication window;
receiving a first input from the user indicating an authentication window;
receiving a second input from the user for modifying the authentication window, wherein the second input enables insertion of dummy objects;
presenting a dynamically generated authentication window on the lock-screen;
receiving a third input from the user on the dynamically generated authentication window, wherein the third input is a password to unlock the lock-screen; and
unlocking the electronic device if the third input is valid.

15. The method as claimed in claim 14, wherein inputs from the user are at least one of haptic inputs, voice commands, key-press, and eye gaze.

16. The method as claimed in claim 14, wherein receiving the third input from the user comprises providing hints for the password.

17. A method of unlocking an electronic device, the method comprising:
providing an option to create an authentication window in real-time;
creating a real-time authentication window, wherein the real-time
authentication window comprises layout of objects;
comparing the real-time authentication window with one or more
authentication windows stored in the electronic device;
providing an input in the real-time authentication window;
comparing the input with a password associated with an authentication
window stored in the electronic device; and
unlocking the electronic device if the input matches the password.

18. The method as claimed in claim 17, wherein comparing the real-time authentication window comprises
comparing one or more essential elements of the real-time authentication window with one or more essential elements of the authentication windows stored in the electronic device, wherein the essential elements are defined as attributes representing the layout of objects.

19. The method as claimed in claim 18, wherein the attributes comprises but are not limited to shape of the layout of objects, number of objects in the layout of objects, and a common theme of the layout of objects.

20. The method as claimed in claim 17, wherein creating the real-time authentication window comprises:
selecting objects stored in the electronic device;
selecting objects from a website, wherein the website is at least one of a
social networking website, a search engine website, and an image hosting website; and
selecting objects generated from data items stored in the electronic device,
wherein the data items are at least one of text, images, computer generated three dimensional models and videos.

21. A system for authenticating a user in an electronic device, the system comprising:
a configuration module to configure one or more authentication windows, wherein an authentication window is associated with at least one token;
a user interface to receive an input from the user indicating the authentication window to be displayed on a lock-screen;
a display module to display a dynamically generated authentication window; and
an authentication module to authenticate the user by validating authentication password entered by the user in the dynamically generated authentication window.

22. The system as claimed in claim 21 and further comprising:
a storage module, wherein the storage module comprises:
an object storage module to store plurality of objects;
an authentication window storage module to store a plurality of authentication windows;
a unique id storage module to store plurality of unique id;
a token storage module to store plurality of tokens; and
a configuration file storage module to store configuration file pertaining to authentication windows.

23. The system as claimed in claim 21 and further comprising:
a processor, the processor comprising:
a listener and control module to
detect user inputs,
provide basic shapes, objects, and count,
update a lock-screen when the user provides preferences, and
communicate updates to configuration module and authentication module.

Dated this 13th day of Feb 2014

(Binu Radhakrishnan)
Agent for the Applicants
Reg No IN/PA – 931
,TagSPECI: FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
As amended by the Patents (Amendment) Act, 2005
&
The Patents Rules, 2003
As amended by the Patents (Amendment) Rules, 2006
COMPLETE SPECIFICATION
(See section 10 and rule 13)

TITLE OF THE INVENTION : Method And System For Presenting Dynamic Lock-Screens

APPLICANT : Samsung India Electronics Private Limited, A-25,Ground Floor, Front Tower, Mohan Co-operative Industrial Estate, New Delhi-110044.

INVENTORS:
Sandeep Gupta, an Indian national, having address Samsung R&D Institute India – Delhi, 2-A, Sector-126, Noida - 201303, U.P.
Gaurav Kakkar, an Indian national, having address Samsung R&D Institute India – Delhi, 2-A, Sector-126, Noida - 201303, U.P.

PREAMBLE TO THE DESCRIPTION
The following specification particularly describes the nature of this invention and the manner in which it is to be performed.

METHOD AND SYSTEM FOR PRESENTING DYNAMIC LOCK-SCREENS

FIELD OF THE INVENTION

[1] The present invention relates to the field of security while using electronic devices and more specifically to the field of user authentication while accessing electronic devices.

BACKGROUND

[2] Present day electronic devices, for example, smart phones, personal computers, tablet computers, smart television, and smart music systems have secure access feature in-built in them. Some examples of secure access feature include screen locks, PIN codes, and passwords. However, these secure access features are often inadequate leading to a breach in security and privacy of a user of the electronic devices.

[3] In one existing prior art, a screen lock receives a command from a user to unlock an electronic device. Further, the screen lock receives a pattern from the user. Examples of the pattern include shapes, drawings, and gestures. The user inputs the pattern via an input module in the electronic device. Examples of the input module include but are not limited to touchscreens and keypads. The screen lock compares the pattern with a pre-configured pattern stored in the electronic device. If the pattern matches with the pre-configured pattern, the screen lock unlocks the electronic device. However, the screen lock provides limited protection from unauthorized access. The screen lock proves to be ineffective in the case when an unauthorized user in the vicinity of the electronic device sees the pattern while the user inputs the pattern. Often, the unauthorized user can input the pattern and access the electronic device.

[4] In another existing prior art, a screen lock displays a plurality of images to a user. The plurality of images are arranged randomly. Further, the screen lock permits the user to rearrange the plurality of images into a first arrangement. Then the first arrangement of the plurality of images is compared with a second arrangement previously stored in the electronic device. If the first arrangement matches with the second arrangement, the electronic device is unlocked. However, the screen lock provides limited protection from unauthorized access. The screen lock proves to be ineffective in the case when an unauthorized user in the vicinity of the electronic device watches the user rearranging the plurality of images into the first arrangement. If the unauthorized user has seen the first arrangement of the plurality of images, the unauthorized user may rearrange the plurality of the images into the first arrangement to access the electronic device.

[5] In yet another existing prior art, a screen lock displays a plurality of images to a user. Further, the screen lock permits the user to select a first image from the plurality of images via an input module of an electronic device. The screen lock compares the first image with a second image stored in the electronic device. If the first image matches with the second image, the screen lock unlocks the electronic device. However, the screen lock provides limited protection from unauthorized access. The screen lock proves to be ineffective in the case when an unauthorized user in the vicinity of the electronic device watches the user selecting the first image. If the unauthorized user has watched the user selecting the first image, the unauthorized user is capable of selecting the first image and accessing the electronic device.

[6] It is often desired to have screen locks with changing patterns in presence of a person other than the user of the electronic device.

[7] In light of the foregoing discussion, there is a need for a user configurable screen lock with a dynamically generated authentication window to prevent unauthorized users from accessing the electronic device.

SUMMARY

[8] The above mentioned needs are met by employing a lock-screen with a dynamically generated authentication window. Initially, a plurality of authentication windows associated with at least one token are configured in an electronic device. The lock-screen enables the user to select an authentication window from the plurality of authentication windows to unlock the electronic device. Moreover, the lock-screen permits the user to modify the authentication window before the authentication window is displayed, thereby dynamically generating the authentication window.

[9] An example of a method of authenticating a user in an electronic device includes receiving an input from the user indicating the authentication window to be displayed on a lock-screen. The method includes providing an option to modify the authentication window with random dummy objects on the lock-screen. The method includes displaying a dynamically generated authentication window. Furthermore, the method includes authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

[10] An example of a method of authenticating a user in an electronic device includes configuring one or more authentication windows. Each authentication window is associated with at least one token. Further, the method includes receiving an input from the user indicating the authentication window to be displayed on a lock-screen. Moreover, the method includes providing an option to modify the authentication window with random dummy objects on the lock-screen. The method includes displaying a dynamically generated authentication window. Further, the method includes authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

[11] An example of a method of unlocking an electronic device includes presenting user selectable options to a user on a lock-screen. Each option represents an authentication window. The method includes receiving a first input from the user indicating an authentication window. Further, the method includes receiving a second input from the user for modifying the authentication window. The second input enables insertion of dummy objects. Further, the method includes presenting a dynamically generated authentication window on the lock-screen. Moreover, the method includes receiving a third input from the user on the dynamically generated authentication window. The third input is a password to unlock the lock-screen. The method includes unlocking the electronic device if the third input is valid.

[12] Another example of a method of unlocking an electronic device includes providing an option to create an authentication window in real-time. The method includes creating a real-time authentication window, wherein the real-time authentication window comprises layout of objects. The method includes comparing the real-time authentication window with one or more authentication windows stored in the electronic device. Further, the method includes providing an input in the real-time authentication window. The method includes comparing the input with a password associated with an authentication window stored in the electronic device. The method includes unlocking the electronic device if the input matches the password.

[13] An example of a system for authenticating a user in an electronic device includes a configuration module to configure a plurality of authentication windows. Each authentication window is associated with at least one token. The system includes a user interface to receive an input from the user indicating the authentication window to be displayed on a lock-screen. The system includes a display module to display a dynamically generated authentication window. Further, the system includes an authentication module to authenticate the user by validating authentication password entered by the user in the dynamically generated authentication window.

[14] The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.

BRIEF DESCRIPTION OF THE FIGURES

[15] In the accompanying figures, similar reference numerals may refer to identical or functionally similar elements. These reference numerals are used in the detailed description to illustrate various embodiments and to explain various aspects and advantages of the present disclosure.

[16] FIG. 1 is a block diagram of a system for authenticating a user in an electronic device, in accordance with one embodiment of the present invention;

[17] FIG. 2 is a flowchart illustrating steps to configure authentication windows, in accordance with one embodiment of the present invention;

[18] FIG. 3 is a flowchart illustrating steps to unlock a lock-screen, in accordance with one embodiment of the present invention;

[19] FIG. 4 is a flowchart illustrating steps to generate a self-creation authentication window, in accordance with one embodiment of the present invention;

[20] FIG. 5 is a flowchart illustrating a method of authenticating a user, in accordance with one embodiment of the present invention;

[21] FIG. 6 is a flowchart illustrating a method of authenticating a user, in accordance with another embodiment of the present invention;

[22] FIG. 7a is an exemplary illustration of a step in configuration of an authentication window, in accordance with one embodiment of the present invention;

[23] FIG. 7b is another exemplary illustration of a step in configuration of authentication window, in accordance with one embodiment of the present invention;

[24] FIG. 7c is an exemplary illustration of a step of selecting an authentication window to unlock a lock-screen, in accordance with one embodiment of the present invention;

[25] FIG. 7d is another exemplary illustration of a step of selecting an authentication window to unlock a lock-screen, in accordance with another embodiment of the present invention;

[26] FIG. 7e is an exemplary illustration of a step of unlocking a lock-screen, in accordance with one embodiment of the present invention; and

[27] FIG. 7f is another exemplary illustration of a step of unlocking a lock-screen, in accordance with one embodiment of the present invention.

DETAILED DESCRIPTION

[28] Embodiments of the present disclosure described herein provide a lock-screen with dynamically generated authentication windows for an electronic device. The present invention enables a user to configure one or more authentication windows. Further, the present invention permits the user to select an authentication window among the plurality of authentication windows to unlock the lock-screen. In addition, the present invention enables the user to modify the authentication window with random dummy objects before entering a password to unlock the lock-screen. Moreover, the present invention permits the user to generate a self-creation authentication window to unlock the lock-screen. The self-creation authentication is also referred to as real-time authentication window.

[29] FIG. 1 is a block diagram of a system for authenticating a user in an electronic device, in accordance with one embodiment of the present invention. Examples of the electronic device include but are not limited to smart phones, smart televisions, personal computers, tablet computers and smart music systems. The system 100 includes a configuration module 105, an input module 110, a display module 115, an authentication module 125, a storage module 130 and a processor 135.

[30] The system 100 permits the user to configure a plurality of authentication windows. Each authentication window is associated with at least one token and at least one user defined password. Tokens are generated from user defined passwords. The user defined passwords are generated by connecting a first set of objects in the authentication window. Objects are stored in the electronic device in an object storage module 150. Further, the user can download objects from a website. Examples of websites include, but is not limited to a social networking website, an image hosting website and a search engine website. In addition, the user is enabled to use data items stored in the electronic device as objects. Examples of data items in the electronic device include, but is not limited to text, images, videos, computer generated three dimensional models and sounds stored in database of the electronic device.

[31] Each object in the first set of objects are associated with a unique ID based on an attribute of the object. Examples of attributes includes but is not limited to shape, colour, association with sports and association with celebrities. Examples of data related to attributes include but is not limited to “red”, “square”, “Tom”, and “Harry”. Each of the objects are assigned multiple attributes by the user. For example, a red circle is associated with the attributes “red colour” and “circular shape”. It is noted that an attribute is shared by multiple objects. For example, a red circle, image of a red car, and a red triangle share the attribute “red colour”. The user is enabled to edit each of the objects by adding and removing the attributes from the objects. Moreover, the attributes describe the objects. The objects with similar content share common attributes. For example, an image of a dog, a word “dog” and an image of a puppy share the common attribute “dog”. A first object can be represented by a second object if the first object and the second object share common attributes. For example, an image of a red flag can be represented by an image of a red gown. The image of the red flag and the image of the red gown share an attribute “red”. In another example, an image of a cat is represented by a word “cat”. The image of the cat and the word “cat” share an attribute “cat”.

[32] The system 100 permits the user to configure a plurality of authentication windows. The configuration module 105 enables the user to configure one or more authentication windows. Each of the authentication windows is associated with at least one token. Configuration of the authentication windows includes generating tokens for each authentication window. The plurality of authentication windows is stored in an authentication window storage module 165 in the storage module 130.

[33] To configure an authentication window, the configuration module 105 provides the user with a set of options representing a plurality of classes of objects via the display module 115. Examples of classes of objects include but are not limited to cricket, movies, and flowers. Examples of the display module 115 include but are not limited to liquid crystal display screens, light emitting diode display, cathode ray tube displays and plasma displays. The configuration module 105 enables the user to select the class of objects via the input module 110. The input module 110 is also referred to as user interface. Examples of the input module 110 includes but is not limited to touchscreen, microphone, keypad, and camera. The user selects the class of objects by providing inputs via the input module 110. Examples of methods to provide input in the input module 110 include providing haptic input to a touchscreen, providing voice commands to a microphone, inputting data in a keypad and changing eye gaze in front of a camera.

[34] The configuration module 105 creates a layout of objects for the authentication window. The layout of objects contains a plurality of objects belonging to the class of objects selected by the user. In one embodiment of the present invention, the class of objects and the plurality of objects are stored in the object storage module 150 present within the storage module 130. In one embodiment of the present invention, the layout of objects includes the plurality of objects arranged in a grid. The configuration module 105 displays the created layout of objects to the user via the display module 115. Objects in the layout are arranged in at least one of a rectangular arrangement, a circular arrangement, a three dimensional arrangement, and a two dimensional arrangement. The shape of layout include at least one of a rectangular shape, a circular shape and a quadrilateral shape.

[35] In one embodiment of the present invention, the user is enabled to create the objects in the layout of objects rather than using the objects already stored in the electronic device. As a result, the configuration module 105 provides full user intervention in configuring the authentication window. Objects in the layout created by the user includes objects received in the electronic device from a website. Examples of the website include but is not limited to a social networking website, a search engine website, and an image hosting website. In another embodiment of the present invention, the layout includes objects generated from data items stored in the electronic device. Examples of data items in the electronic device include, but are not limited to text, images, videos, computer generated three dimensional models and sounds.

[36] Further, the user configures the user defined password for the authentication window. The user is enabled to select a second set of objects from the layout of objects in a user defined sequence. The user selects the second set of objects via the input module 110.

[37] Data regarding selection of the second set of objects in a user defined sequence are transferred by the input module 110 to the processor 135. The processor 135 includes a listener and controller module 160. The listener and controller module 160 captures data regarding selection of the second set of objects in the user defined sequence and converts the data into event data. The event data includes actions of the user in the input module 110. Examples of the actions of the user in the input module 110 includes but is not limited to single touch, multi touch, swipe, and scroll. The listener and controller module 160 identifies the unique ID of the second set of objects selected from the event data. The unique IDs of objects are stored in the unique ID storage module 145. The unique ID identified is transferred to the configuration module 105.

[38] The configuration module 105 includes a token module 155. The token module 155 generates a token from unique IDs associated with the second set of objects. The token represents the plurality of objects selected in the user defined sequence. The generated token is transferred to the storage module 130. The generated token is stored in a token storage module 120. In one embodiment of the present invention, each authentication window is configured with multiple tokens. Multiple tokens are configured by providing a plurality of user defined passwords. The token storage module 120 stores a plurality of tokens associated with the authentication windows.

[39] Further, the processor 135 generates a configuration file containing configuration information of the authentication window. The configuration information includes objects selected, the event data, and the token. Further, the configuration file includes information regarding essential elements associated with the authentication window. The essential elements are defined as attributes representing the layout created to configure the authentication window. Examples of the essential elements include, but are not limited to shape of the layout, the number of objects in the layout, arrangement of objects in the layout and a common theme of objects in the layout. The common theme is an attribute shared commonly by the objects in the layout. Consider an example wherein an authentication window has a “rectangular” shape with “cricket” as a theme and “bat” and “ball” as objects. It is to be noted that, the shape “rectangular”, the theme “cricket” and the objects “bat” and “ball” are the essential elements.

[40] The configuration file can be transferred into the storage module 130. The storage module 130 includes a configuration file storage module 140. The configuration file is stored in the configuration file storage module 140. The configuration file is transferred from a first electronic device to a second electronic device to implement the authentication window in the second electronic device.

[41] Further, the system 100 authenticates the user with a lock-screen on accessing the electronic device. When the user tries to access the electronic device, the processor 135 displays a plurality of user selectable options to the user via the display module 115. The plurality of user selectable options include a first set of user selectable options representing the plurality of authentication windows and an option for self-creating authentication windows. It is to be noted that the self-creating authentication window is also referred to as real-time authentication window. The plurality of authentication windows is stored in the authentication window storage module 165. The user is enabled to select a user selectable option via the input module 110. The user selects the user selectable option by entering a first input via the input module 110.

[42] In one embodiment of the present invention, the user selects the user selectable option from the first set of user selectable options to select an authentication window.

[43] In another embodiment of the present invention, the authentication window is selected by the electronic device based on profile of the electronic device. Examples of profile include but are not limited to “General”, “Silent”, “Meeting” and “Outdoors”. For example a first authentication window is selected by the electronic device if the profile of the electronic device is “General” and a second authentication window is selected by the electronic device if the profile of the electronic device is “Silent”.

[44] The system 100 provides the user options to modify the selected authentication window. The user can modify the authentication window by inserting dummy objects thereby generating a dynamically generated authentication window. The dummy objects include objects downloaded by the user into the object storage module 150. In addition, the dummy objects include objects generated from data items stored in the electronic device. Examples of data items in the electronic device include, but are not limited to text, images, videos, computer generated three dimensional models and sounds stored in the electronic device. The system 100 permits the user to enter a second input to set number and type of dummy objects to be inserted in the authentication window. In one embodiment of the present invention, the user enters the second input to set number and type of dummy objects to be inserted in the authentication window. In another embodiment of the present invention, the user enters the second input to select dummy objects. In yet another embodiment of the present invention, the second input is assigned by the system 100 by default. It is to be noted that the dummy objects do not form part of the user defined password. However, dummy objects are inserted in the authentication window to confuse unauthorized users in the vicinity of the electronic device. Inserting dummy objects increases the complexity of the dynamically generated authentication window.

[45] The processor 135 generates the dynamically generated authentication window based on the first input and the second input. Tokens and user-defined passwords associated with the authentication window is associated with the dynamically generated authentication window. Further, the dynamically generated authentication window consists of a plurality of objects arranged randomly. The plurality of objects includes the second set of objects and a plurality of dummy objects. It is noted that an object in the second set of objects can be represented by a different object in the dynamically generated authentication window. A first object in the second set of objects is represented by a second object if the first object and the second object share common attributes. In an exemplary illustration of the present invention, an image of a red flag in the second set of objects is represented by an image of a red gown in the dynamically generated authentication window. The image of the red flag and the image of the red gown share an attribute “red”. In another exemplary illustration of the present invention, an image of a dog in the second set of objects is represented by a word “Dog” in the dynamically generated authentication window. The image of the dog and the word “Dog” share an attribute “dog”. As a result, complexity of the dynamically generated authentication window is increased.

[46] In one embodiment of the present invention, the dynamically generated authentication window displays hints for the user defined password associated with the authentication window. In another embodiment of the present invention, objects in the dynamically generated authentication window interact with the user to provide hints for the user defined password associated with the authentication window. Hints assist the user in recollecting the user defined password associated with the authentication window. Examples of hints include but are not limited to textual data, images, patterns, sounds, videos, and interactive computer simulations. In one embodiment of the present invention, hints include words describing objects that make up the password. In another embodiment, hints include images sharing common attributes with the objects that make up the password. In yet another embodiment, hints include verbal instructions to assist the user to recollect the user defined password associated with the authentication window.

[47] Next, the processor 135 enables display of the dynamically generated authentication window on a lock-screen. The user can access the electronic device by providing a third input on the dynamically generated authentication window. The third input is hereinafter referred to as authentication password. The user provides the third input by selecting a third set of objects among the plurality of objects in a user defined sequence. The user selects the third set of objects via the input module 110. Data regarding selection of the third set of objects and the user defined sequence are transferred by the input module 110 to the processor 135. Any change or update in the authentication window is communicated to other modules by the listener and controller module 160. The listener and controller module 160 captures data regarding selection of the third set of objects and the user defined sequence and converts the data into event data. The listener and controller module 160 generates a reference code from the event data. The event data includes actions of the user in the input module 110. Examples of the actions of the user in the input module 110 includes but is not limited to single touch, multi touch, swipe, scroll and key-press. The listener and controller module 160 detect user input and provide basic shapes, objects, and count. In addition, the listener and controller module 160 updates the authentication window when user provides inputs regarding user preferences.

[48] Another objective of the listener and controller module 160 is to transfer the reference code to the authentication module 125. The authentication module 125 authenticates the user by comparing the reference code with a token of the authentication window. If the reference code matches the token, then the authentication password is valid. If the authentication password is valid, the lock-screen is unlocked. If the authentication password is invalid, access is denied to the user.

[49] In one embodiment of the present invention, while unlocking, the user can select an option to generate a self-creation authentication window. With self-creation feature, the system 100 enables the user to configure a self-creation authentication window. The self-creation authentication window is also referred to as real-time authentication window since the authentication window is created in real-time. To generate the self-creation authentication window, the system 100 enables the user to create a layout of objects first. The objects can be selected from pre-existing objects that are stored in the electronic device, or from a website, or from data items stored in the electronic device. The website can be a social networking website, a search engine website, or an image hosting website. Examples of data items in the electronic device include, but are not limited to text, images, videos, computer generated three dimensional models and sounds.

[50] Upon creation of the self-creation authentication window, a step of comparison is performed by the system 100. The self-creation authentication window is compared with an existing authentication window stored in the authentication window storage module 165. The comparison of the authentication windows can be based on any one of the attributes or essential elements like shape, arrangement, or theme of the objects. The comparison of the authentication windows can also be performed based on layout of objects.

[51] Further, if there is a match between the authentication windows, then the user enters a password. Then the passwords of the authentication windows are compared. If there is a match between the passwords of the authentication windows, then the electronic device is unlocked.

[52] In one embodiment, the step of comparison of the authentication windows as well as the step of comparison of the passwords of the authentication windows is performed in parallel and the result of the comparison is displayed to the user. The user is allowed to take a corrective step in case any one of the comparisons do not give a desired match.

[53] FIG. 2 is a flowchart illustrating steps of configuration of a plurality of authentication windows, in accordance with one embodiment of the present invention. The flowchart begins at step 205.

[54] At step 210, a configuration module in the present invention enables display of a plurality of classes of objects. The configuration module enables the user to select a class of objects from the plurality of classes of objects. Examples of classes of objects include but are not limited to cricket, movies, and flowers.

[55] At step 215, the user selects a class of objects for configuring the authentication window.

[56] At step 220, the configuration module creates a layout of objects by selecting a plurality of objects belonging to the class selected by the user. Further, the configuration module displays the created layout of objects to the user. In the layout of objects the plurality of objects can be arranged in a specific order. Examples of the arrangement include but is not limited to a circular arrangement, a rectangular arrangement, a two dimensional arrangement and a three dimensional arrangement.

[57] In one embodiment of the present invention, the user is enabled to create objects in the layout of objects. As a result, the configuration module provides full user intervention in configuring the authentication window. The objects in the layout created by the user includes objects received in the electronic device from a website. Examples of the website include but is not limited to a social networking website, a search engine website, and an image hosting website. In another embodiment of the present invention, the objects created by the user includes objects generated from data items stored in the electronic device. Examples of data items in the electronic device include, but are not limited to text, images, videos, computer generated three dimensional models and sounds.

[58] At step 225, the user selects the first set of objects in a user defined sequence via an input module. Data regarding selection of the first set of objects and the user defined sequence are transferred by the input module to a processor. The processor includes a listener and controller module. A listener of the listener and controller module captures data regarding selection of the first set of objects and the user defined sequence and converts the data into event data. The event data includes actions of the user in the input module. Examples of the actions of the user in the input module include but are not limited to single touch, multi touch, swipe, and scroll. A controller of the listener and controller module identifies the unique ID of the objects from the event data. The unique IDs of the objects are transferred to the configuration module.

[59] At step 230, a token module in the configuration module generates a token from unique IDs associated with the first set of objects. The token represents the plurality of objects selected in the user defined sequence. It is noted that order of occurrence of steps 210, 215, 220, 225, and 230 is not restricted to the order described in the present disclosure. For example, step 220 can be performed before step 210.

[60] At step 235, the generated token is stored in a token storage module. The token storage module is in the storage module of the electronic device.

[61] At step 240, the configuration module provides the user with an option for creating another authentication window. If the user wants to configure another authentication window, step 210 is performed. If the user decides to stop configuring authentication windows, step 245 is performed.

[62] The flowchart ends at step 245.

[63] FIG. 3 is a flowchart illustrating steps to unlock a lock-screen, in accordance with one embodiment of the present invention. The flowchart begins at step 305.

[64] At step 310, a processor displays a plurality of user selectable options via a display module. The plurality of user selectable options include a first set of user selectable options representing a plurality of authentication windows and an option self-creation feature. The user is enabled to select a user selectable option via an input module.

[65] At step 315, the user selects the user selectable option by inputting a first input to the input module.

[66] At step 320, the processor checks if the user has opted self-creation by selecting the option for self-creation feature. If the user selects the option for the self-creation feature, step 325 is performed. If the user selects the user selectable option from the first set of user selectable options, step 345 is performed. The user selects the first set of user selectable options to select an authentication window from the plurality of authentication windows.

[67] At step 325, with self-creation feature, the processor enables the user to generate a self-creation authentication window. To generate the self-creation authentication window, the processor enables the user to create a layout of objects. The user creates the layout by at least one of selecting the objects already stored in the electronic device, selecting objects received in the electronic device from a website and selecting objects generated from data items stored in the electronic device. The processor generates the self-creation authentication window by arranging the plurality of selected objects. Further, the processor compares the self-creation authentication window with one or more authentication windows stored in an authentication window storage module of the electronic device. The processor compares essential elements of the self-creation authentication window with essential elements of the authentication windows stored in the electronic device. If the self-authentication window matches with at least one of authentication windows stored in the electronic device, step 330 is performed. If the self-creation authentication window fails to match with at least one authentication window stored in the electronic device, access is denied to the user.

[68] At step 330, the processor presents the self-creation authentication window on the lock-screen.

[69] At step 335, the user enters an authentication password in the self-creation authentication window. The processor receives the authentication password.

[70] At step 340, the electronic device is unlocked if the authentication password is valid. An authentication module authenticates the user by comparing the reference code with tokens associated with each authentication window. If the reference code matches a token associated with one of the authentication windows, then the authentication password is valid. If the authentication password is valid, the lock-screen is unlocked. If the authentication password is invalid, access is denied to the user.

[71] At step 345, the processor provides options to modify the authentication window if the user selects the first set of user selectable options at step 320. The user modifies the authentication window by inserting dummy objects. In one embodiment of the present invention, the user can set number and type of dummy objects to be inserted in the authentication window. In another embodiment of the present invention, the user is enabled to select dummy objects. In yet another embodiment of the present invention, the authentication window is modified by applying a default configuration, wherein the default configuration comprises a predetermined type of dummy objects and a predetermined number of dummy objects. The dummy objects are inserted in the authentication window to confuse unauthorized users in the vicinity of the electronic device. The user can select the number and type of the dummy objects by entering a second input to the input module. The processor generates a dynamically generated authentication window based on the first input and the second input. The system performs step 350 after step 345.

[72] At step 350, the processor presents the dynamically generated authentication window on the lock-screen.

[73] At step 355, the user enters an authentication password in the dynamically generated authentication window. The processor receives the authentication password.

[74] At step 360, the electronic device is unlocked if the authentication password is valid. The processor generates a reference code from the authentication password. Further, the processor accesses a token associated with the dynamically generated authentication window. The token is accessed from a token storage module. The processor compares the reference code with the token. If the reference code matches with the token, the authentication password is valid. If the authentication password is valid, the user is authenticated and the electronic device is unlocked. If the authentication password is invalid, access is denied to the user.

[75] The flowchart ends at step 365.

[76] FIG. 4 is a flowchart illustrating steps to generate a self-creation authentication window, in accordance with one embodiment of the present invention. The flowchart begins at step 405.

[77] At step 410, a system receives a first input from a user. The user selects complexity of the self-creation authentication window by providing the first input. In one embodiment of the present invention, the complexity of the self-creation authentication window signifies number of objects in the self-creation authentication window. Hence, the first input is the number of objects in the self-creation authentication window. In another embodiment of the present invention, the complexity of the self-creation authentication window indicates type of objects in the self-creation authentication window. Hence, the first input decides the type of the objects in the self-creation authentication window.

[78] At step 415, the user selects a plurality of objects to configure the self-creation authentication window. In one embodiment of the present invention, the user is enabled to select the objects already stored in the electronic device. In another embodiment, the user is enabled to select the objects from a website. Examples of the website include but is not limited to a social networking website, a search engine website, and an image hosting website. In another embodiment of the present invention, the user is enabled to select objects generated from data items stored in the electronic device. Examples of data items in the electronic device include, but are not limited to text, images, videos, computer generated three dimensional models and sounds.

[79] At step 420, the user creates a layout of objects with the plurality of objects selected to configure the self-creation authentication window.

[80] At step 425, the system generates the self-creation authentication window by arranging the plurality of objects. It is noted that order of occurrence of steps 410, 415, and 420 is not restricted to the order described in the present disclosure. For example, step 420 can be performed before step 410.

[81] The flowchart ends at step 430.

[82] FIG. 5 is a flowchart illustrating a method of authenticating a user, in accordance with one embodiment of the present invention. The flowchart starts at step 505.

[83] At step 510, a lock-screen receives an input from the user. A plurality of user selectable options are presented to the user on the lock screen. The plurality of user selectable options represents a plurality of authentication windows. The user is enabled to select an authentication window via a user interface. The user selects an authentication window by entering the input. The input received from the user indicates the authentication window to be displayed on the lock-screen.

[84] At step 515, the lock-screen provides the user with an option to modify the authentication window with random dummy objects. The user can set number and type of dummy objects to be inserted in the authentication window. In one embodiment of the present invention, the user can set number and type of dummy objects to be inserted in the authentication window. In another embodiment of the present invention, the user is enabled to select dummy objects. In yet another embodiment of the present invention, a pre-set type and pre-set number of dummy objects is assigned by default. The dummy objects are inserted in the authentication window to confuse unauthorized users in the vicinity of the electronic device.

[85] At step 520, the lock-screen displays a dynamically generated authentication window. The dynamically generated authentication window is the modified authentication window. The user enters an authentication password in the dynamically generated authentication window.

[86] At step 525, the lock-screen authenticates the user by validating authentication password entered by the user. The lock-screen generates a reference code from the authentication password. The reference code is compared with a token associated with the authentication window to check the validity. If the reference code matches with the token, the authentication password is valid. If the authentication password is valid the user is authenticated.

[87] The flowchart ends at step 530.

[88] FIG. 6 is a flowchart illustrating a method of authenticating a user, in accordance with another embodiment of the present invention. The flowchart starts at step 605.

[89] At step 610, a configuration module enables the user to configure one or more authentication windows.

[90] Steps 615, 620, 625, and 630 are the steps involved in authenticating the user and thereby unlocking a lock-screen.

[91] At step 615, a lock-screen receives an input from the user. A plurality of user selectable options are presented to the user on the lock screen. The plurality of user selectable options represents a plurality of authentication windows. The user is enabled to select an authentication window via a user interface. The user selects an authentication window by entering the input. The input received from the user indicates the authentication window to be displayed on the lock-screen.

[92] At step 620, the lock-screen provides the user with an option to modify the authentication window with random dummy objects. In one embodiment of the present invention, the user can set number and type of dummy objects to be inserted in the authentication window. In another embodiment of the present invention, the user is enabled to select dummy objects. In yet another embodiment of the present invention, a pre-set type and a pre-set number of dummy objects is assigned by default. The dummy objects are inserted in the authentication window to confuse unauthorized users in the vicinity of the electronic device.

[93] At step 625, the lock-screen displays a dynamically generated authentication window. The dynamically generated authentication window is the modified authentication window. The user enters an authentication password in the dynamically generated authentication window.

[94] At step 630, the lock-screen authenticates the user by validating authentication password entered by the user. The lock-screen generates a reference code from the authentication password. The reference code is compared with a token associated with the authentication window to check the validity. If the reference code matches with the token, the authentication password is valid. If the authentication password is valid the user is authenticated.

[95] The flowchart ends at step 635.

[96] FIG. 7a is an exemplary illustration of a step in configuration of a first authentication window, in accordance with one embodiment of the present invention. FIG. 7a includes a plurality of objects 705a, 710a, 715a, 720a, 725a, and 730a. The plurality of objects 705a, 710a, 715a, 720a, 725a, and 730a are shapes with pattern filling. The different pattern filling associated with each of the objects is referred to as attribute of the objects. A user is enabled to configure a password by selecting a set of objects from the layout of objects in a user defined sequence. The password generated is based on the attribute associated with each of the objects in the set of objects selected.

[97] In one embodiment of the present invention, the user configures the password by connecting a square 715a, a triangle 725a, a first star 730a and a second star 720a. The square 715a has horizontal stripes filling. The triangle 725a has dotted filling. The first star 730a has check-patterned filling. The second star 720a has a black filling. An ellipse 705a and a ten point star 710a remain unused by the user. The dynamically generated authentication window generated from the authentication window in FIG. 7a is illustrated in FIG. 7e.

[98] FIG. 7b is an exemplary illustration of a step in configuration of a second authentication window, in accordance with one embodiment of the present invention. FIG. 7b includes a plurality of objects 705b, 710b, 715b, 720b, 725b, and 730b. The plurality of objects 705b, 710b, 715b, 720b, 725b, and 730b are images of articles of daily use. A user is enabled to configure a password by selecting a set of objects from the layout of objects in a user defined sequence.

[99] In one embodiment of the present invention, the user configures the password by connecting a ball 705b, a cap 720b, and a book 725b. A flower 710b, a cup 715b, and an apple 730b remain unused by the user. The dynamically generated authentication window generated from the authentication window in FIG. 7b is illustrated in FIG. 7f.

[100] FIG. 7c is an exemplary illustration of a step of selecting an authentication window to unlock a lock-screen, in accordance with one embodiment of the present invention. FIG. 7c includes a first icon 705c, a second icon 710c and a third icon 715c. The first icon 705c represents a first authentication window configured in FIG. 7a. The second icon 710c represents a second authentication window configured in FIG. 7b. The third icon 715c represents an option to generate a self-creation authentication window. The self-creation authentication window is also referred to as a real-time authentication window.

[101] FIG. 7d is another exemplary illustration of a step of selecting an authentication window to unlock a lock-screen, in accordance with one embodiment of the present invention. FIG. 7d includes a plurality of icons 705d, 710d, and 715d. A user is enabled to select an icon from the plurality of icons 705d, 710d, and 715d. A first icon 705d represents an easy authentication window. The easy authentication window provides ease of access to an electronic device. Number of dummy objects in the easy authentication window is very low. Moreover, the easy authentication window enables the user to unlock the lock-screen with a simple password. The easy authentication window provides limited protection from unauthorized access. The user can select the easy authentication window to unlock the lock-screen during absence of unauthorized users in vicinity of the electronic device. A second icon 710d represents a medium authentication window. Number of dummy objects in the easy authentication window is moderate. A third icon 715d represents a hard authentication window. It is noted that number of dummy objects in the hard authentication window is high. The hard authentication window enables the user to unlock the electronic device with a complex password. The user selects the hard authentication window to unlock the lock-screen during presence of a plurality of unauthorized users in vicinity of the electronic device.

[102] FIG. 7e is an exemplary illustration of a step of unlocking a lock-screen, in accordance with one embodiment of the present invention. FIG. 7e includes a plurality of objects 705e, 710e, 715e, 720e, 725e, and 730e in a dynamically generated authentication window. The dynamically generated authentication window is generated from a first authentication window configured in FIG. 7a. However, the objects in the FIG. 7a are non-existent in FIG. 7e. Objects in FIG. 7a are replaced with objects which share attributes with the objects in FIG. 7a. For example, the square 715a with horizontal stripes filling in FIG. 7a is replaced with a heart 720e with horizontal stripes filling. The triangle 725a with dotted filling in FIG. 7a is replaced with a pentagon 705e with dotted filling. The first star 730a with check-patterned filling in FIG. 7a is replaced by a semicircle 715e with check-patterned filling. The second star 720a with black filling in FIG. 7a is replaced with a square 730e with black filling. As a result, a valid authentication password is obtained by connecting the heart 720e, the pentagon 705e, the semicircle 715e and the square 730e. An arrow mark 710e and a seven point star 725e are dummy objects in the dynamically generated authentication window. The user is authenticated on entering the valid authentication password.

[103] FIG. 7f is another exemplary illustration of a step in unlocking a lock-screen, in accordance with one embodiment of the present invention. FIG. 7f includes a plurality of objects 705f, 710f, 715f, 720f, 725f, and 730f in a dynamically generated authentication window. The dynamically generated authentication window is generated from a second authentication window configured in FIG. 7b. However, the objects in the FIG. 7b are inexistent in FIG. 7f. Objects in FIG. 7b are replaced with objects which share attributes with the objects in FIG. 7b. For example, the image of a ball 705b in FIG. 7b is replaced with a first icon 720f with a word “BALL” written. The image of a cap 720b in FIG. 7b is replaced with a second icon 715f with a word “CAP” written. The image of a book 725b in FIG. 7b is replaced with a third icon 710f with a word “BOOK” written. As a result, the valid authentication password is obtained by connecting the first icon 720f, the second icon 715f, and the third icon 710f. Icons 705f, 730f, and 725f are dummy objects in the dynamically generated authentication window.

[104] Advantageously, the embodiments specified in the present disclosure implements lock-screen with dynamically generated authentication windows. The present invention permits a user to configure a plurality of authentication windows. In addition, the present invention permits a user to select an authentication window from a plurality of authentication windows. The present invention prevents unauthorized users from accessing the electronic device. The present invention protects privacy of an authorized user by increasing the complexity of the lock-screen.

[105] In the preceding specification, the present disclosure and its advantages have been described with reference to specific embodiments. However, it will be apparent to a person of ordinary skill in the art that various modifications and changes can be made, without departing from the scope of the present disclosure, as set forth in the claims below.

[106] Accordingly, the specification and figures are to be regarded as illustrative examples of the present disclosure, rather than in restrictive sense. All such possible modifications are intended to be included within the scope of present disclosure.

I/We claim:

1. A method of authenticating a user in an electronic device, the method comprising:
receiving an input from the user indicating an authentication window to be displayed on a lock-screen;
providing an option to modify the authentication window with random dummy objects on the lock-screen;
displaying a dynamically generated authentication window; and
authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

2. The method as claimed in claim 1, wherein providing the option to modify the authentication window with random dummy objects on the lock-screen comprises at least one of:
providing an option to select type of dummy objects;
providing an option to set number of dummy objects; and
applying a default configuration, wherein the default configuration comprises a predetermined type of dummy objects and a predetermined number of dummy objects.

3. The method as claimed in claim 2, wherein the dummy objects are inserted dynamically to increase complexity of the lock-screen.

4. The method as claimed in claim 1, wherein authenticating the user comprises:
generating a reference code in response to a user defined sequence of objects selected from the dynamically generated authentication window;
comparing the reference code with a token associated with the corresponding authentication window; and
authenticating the user if the reference code matches the token.

5. The method as claimed in claim 1 and further comprising:
transferring a configuration file to one or more electronic devices, wherein the configuration file comprises configuration information pertaining to authentication windows.

6. A method of authenticating a user in an electronic device, the method comprising:
configuring one or more authentication windows, wherein an authentication window is associated with at least one token;
receiving an input from the user indicating the authentication window to be displayed on a lock-screen;
providing an option to modify the authentication window with random dummy objects on the lock-screen;
displaying a dynamically generated authentication window; and
authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

7. The method as claimed in claim 6, wherein configuring the authentication window comprises:
creating a layout of objects, wherein each object is linked to a unique ID;
selecting a plurality of objects from the layout of objects in a user defined sequence;
generating a token wherein the token represents the plurality of objects selected in the user defined sequence; and
storing the token as password of the authentication window.

8. The method as claimed in claim 7, wherein the plurality of objects in the layout of objects comprises at least one of:
objects stored in an electronic device;
objects received by the electronic device from a website, wherein the website is at least one of a social networking website, a search engine website, and an image hosting website; and
objects generated from data items stored in the electronic device, wherein the data items are at least one of text, images, computer generated three dimensional models, and videos.

9. The method as claimed in claim 7, wherein creating the layout of objects comprises:
selecting a plurality of objects from a class of objects;
associating attributes to the selected objects; and
arranging the objects in the layout, wherein the objects are arranged in at least one of a circular arrangement, a rectangular arrangement, a two dimensional arrangement and a three dimensional arrangement.

10. The method as claimed in claim 6, wherein providing an option to modify the authentication window with random dummy objects on the lock-screen comprises at least one of:
providing an option to select type of dummy objects;
providing an option to set number of dummy objects; and
applying a default configuration, wherein the default configuration comprises a predetermined type of dummy objects and a predetermined number of dummy objects.

11. The method as claimed in claim 10, wherein the dummy objects are inserted dynamically to increase complexity of the lock-screen.

12. The method as claimed in claim 6, wherein authenticating the user comprises:
generating a reference code in response to a user defined sequence of objects selected from the dynamically generated authentication window;
comparing the reference code with a token of the corresponding authentication window; and
authenticating the user if the reference code matches the token.

13. The method as claimed in claim 6 and further comprising:
transferring a configuration file to one or more electronic devices, wherein the configuration file comprises configuration information pertaining to authentication windows.

14. A method of unlocking an electronic device, the method comprising:
presenting user selectable options to a user on a lock-screen, wherein each option represents an authentication window;
receiving a first input from the user indicating an authentication window;
receiving a second input from the user for modifying the authentication window, wherein the second input enables insertion of dummy objects;
presenting a dynamically generated authentication window on the lock-screen;
receiving a third input from the user on the dynamically generated authentication window, wherein the third input is a password to unlock the lock-screen; and
unlocking the electronic device if the third input is valid.

15. The method as claimed in claim 14, wherein inputs from the user are at least one of haptic inputs, voice commands, key-press, and eye gaze.

16. The method as claimed in claim 14, wherein receiving the third input from the user comprises providing hints for the password.

17. A method of unlocking an electronic device, the method comprising:
providing an option to create an authentication window in real-time;
creating a real-time authentication window, wherein the real-time
authentication window comprises layout of objects;
comparing the real-time authentication window with one or more
authentication windows stored in the electronic device;
providing an input in the real-time authentication window;
comparing the input with a password associated with an authentication
window stored in the electronic device; and
unlocking the electronic device if the input matches the password.

18. The method as claimed in claim 17, wherein comparing the real-time authentication window comprises
comparing one or more essential elements of the real-time authentication window with one or more essential elements of the authentication windows stored in the electronic device, wherein the essential elements are defined as attributes representing the layout of objects.

19. The method as claimed in claim 18, wherein the attributes comprises but are not limited to shape of the layout of objects, number of objects in the layout of objects, and a common theme of the layout of objects.

20. The method as claimed in claim 17, wherein creating the real-time authentication window comprises:
selecting objects stored in the electronic device;
selecting objects from a website, wherein the website is at least one of a
social networking website, a search engine website, and an image hosting website; and
selecting objects generated from data items stored in the electronic device,
wherein the data items are at least one of text, images, computer generated three dimensional models and videos.

21. A system for authenticating a user in an electronic device, the system comprising:
a configuration module to configure one or more authentication windows, wherein an authentication window is associated with at least one token;
a user interface to receive an input from the user indicating the authentication window to be displayed on a lock-screen;
a display module to display a dynamically generated authentication window; and
an authentication module to authenticate the user by validating authentication password entered by the user in the dynamically generated authentication window.

22. The system as claimed in claim 21 and further comprising:
a storage module, wherein the storage module comprises:
an object storage module to store plurality of objects;
an authentication window storage module to store a plurality of authentication windows;
a unique id storage module to store plurality of unique id;
a token storage module to store plurality of tokens; and
a configuration file storage module to store configuration file pertaining to authentication windows.

23. The system as claimed in claim 21 and further comprising:
a processor, the processor comprising:
a listener and control module to
detect user inputs,
provide basic shapes, objects, and count,
update a lock-screen when the user provides preferences, and
communicate updates to configuration module and authentication module.

Dated this 13th day of Feb 2014

(Binu Radhakrishnan)
Agent for the Applicants
Reg No IN/PA – 931

METHOD AND SYSTEM FOR PRESENTING DYNAMIC LOCK-SCREENS

ABSTRACT

A method and system for authenticating a user in an electronic device includes receiving an input from the user indicating the authentication window to be displayed on a lock-screen. Further, the method includes providing an option to modify the authentication window with random dummy objects on the lock-screen. The method includes displaying a dynamically generated authentication window. Furthermore, the method includes authenticating the user by validating authentication password entered by the user in the dynamically generated authentication window.

Documents

Application Documents

# Name Date
1 SignedDoc.pdf 2014-02-21
2 SIEL_P074_Drawings_Final.pdf 2014-02-21
3 SIEL_P074_Draft_Final.pdf 2014-02-21
4 SIEL_P074 - FORM 5.pdf 2014-02-21
5 SIEL_P074 - FORM 3.pdf 2014-02-21
6 Form_26_IP_Astra_SIEL.pdf 2014-02-21
7 689-CHE-2014 POWER OF ATTORNEY 11-04-2014.pdf 2014-04-11
8 689-CHE-2014 FORM-1 11-04-2014.pdf 2014-04-11
9 689-CHE-2014 CORRESPONDENCE OTHERS 11-04-2014.pdf 2014-04-11
10 Covering Letter 689CHE2014.pdf 2014-11-25
11 689-CHE-2014-Request For Certified Copy-Online(25-11-2014).pdf 2014-11-25
12 Form 3 [05-07-2016(online)].pdf 2016-07-05
13 Form 3 [12-01-2017(online)].pdf 2017-01-12
14 Form 26(Online)[21-07-2017].pdf 2017-07-21
15 Form 1_Amended by Form 13 _21-07-2017.pdf 2017-07-21
16 Form 13_Change in address for service _21-07-2017.pdf 2017-07-21
17 689-CHE-2014-Changing Name-Nationality-Address For Service [21-07-2017(online)].pdf 2017-07-21
18 689-CHE-2014-RELEVANT DOCUMENTS [05-03-2018(online)].pdf 2018-03-05
19 689-CHE-2014-Changing Name-Nationality-Address For Service [05-03-2018(online)].pdf 2018-03-05
20 689-CHE-2014-FORM 3 [24-12-2018(online)].pdf 2018-12-24
21 689-CHE-2014-FORM 3 [27-09-2019(online)].pdf 2019-09-27
22 689-CHE-2014-PETITION UNDER RULE 137 [17-12-2019(online)].pdf 2019-12-17
23 689-CHE-2014-PETITION UNDER RULE 137 [17-12-2019(online)]-1.pdf 2019-12-17
24 689-CHE-2014-OTHERS [17-12-2019(online)].pdf 2019-12-17
25 689-CHE-2014-Information under section 8(2) (MANDATORY) [17-12-2019(online)].pdf 2019-12-17
26 689-CHE-2014-FORM 3 [17-12-2019(online)].pdf 2019-12-17
27 689-CHE-2014-FER_SER_REPLY [17-12-2019(online)].pdf 2019-12-17
28 689-CHE-2014-DRAWING [17-12-2019(online)].pdf 2019-12-17
29 689-CHE-2014-COMPLETE SPECIFICATION [17-12-2019(online)].pdf 2019-12-17
30 689-CHE-2014-CLAIMS [17-12-2019(online)].pdf 2019-12-17
31 689-CHE-2014-ABSTRACT [17-12-2019(online)].pdf 2019-12-17
32 Correspondence by Agent_Power of Attorney_20-12-2019.pdf 2019-12-20
33 689-CHE-2014-RELEVANT DOCUMENTS [04-03-2020(online)].pdf 2020-03-04
34 689-CHE-2014-FORM 13 [04-03-2020(online)].pdf 2020-03-04
35 689-CHE-2014-AMENDED DOCUMENTS [04-03-2020(online)].pdf 2020-03-04
36 689-CHE-2014-FORM 3 [02-07-2021(online)].pdf 2021-07-02
37 689-CHE-2014-FORM 3 [24-09-2021(online)].pdf 2021-09-24
38 689-CHE-2014-FER.pdf 2021-10-17
39 689-CHE-2014-FORM 3 [18-12-2021(online)].pdf 2021-12-18
40 689-CHE-2014-US(14)-HearingNotice-(HearingDate-23-08-2023).pdf 2023-08-07
41 689-CHE-2014-FORM-26 [21-08-2023(online)].pdf 2023-08-21
42 689-CHE-2014-Correspondence to notify the Controller [21-08-2023(online)].pdf 2023-08-21
43 689-CHE-2014-Written submissions and relevant documents [01-09-2023(online)].pdf 2023-09-01
44 689-CHE-2014-PatentCertificate27-12-2023.pdf 2023-12-27
45 689-CHE-2014-IntimationOfGrant27-12-2023.pdf 2023-12-27

Search Strategy

1 searchstrat_20-06-2019.pdf

ERegister / Renewals

3rd: 26 Feb 2024

From 14/02/2016 - To 14/02/2017

4th: 26 Feb 2024

From 14/02/2017 - To 14/02/2018

5th: 26 Feb 2024

From 14/02/2018 - To 14/02/2019

6th: 26 Feb 2024

From 14/02/2019 - To 14/02/2020

7th: 26 Feb 2024

From 14/02/2020 - To 14/02/2021

8th: 26 Feb 2024

From 14/02/2021 - To 14/02/2022

9th: 26 Feb 2024

From 14/02/2022 - To 14/02/2023

10th: 26 Feb 2024

From 14/02/2023 - To 14/02/2024

11th: 26 Feb 2024

From 14/02/2024 - To 14/02/2025

12th: 28 Jan 2025

From 14/02/2025 - To 14/02/2026