Sign In to Follow Application
View All Documents & Correspondence

Method And System For User Authentication

Abstract: The embodiments herein provide a system and method for unlocking a screen of an electronic device. The method includes generating a random number in response to receiving an event in the electronic device. The random number is generated between in a range predefined by a user of the electronic device. Further, the method includes dynamically rendering plurality of items in a shape representing the random number on the screen. Further, the method includes receiving at least one interaction event performed on at least one item rendered in the shape to unlock the screen of the electronic device. Furthermore, the method includes computing an interaction pattern performed on at least one item based on at least one interaction event. Further, the method includes determining a match between the interaction pattern and a preconfigured interaction pattern, and unlocking the screen of the electronic device in response to determining match. FIG. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 May 2014
Publication Number
46/2015
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
patent@ipmetrix.com
Parent Application

Applicants

Samsung India Electronics Pvt Ltd
Logix Cyber Park Tower C 8th to 10th floor, Tower D, Ground to 10th floor, Plot No.C - 28-29, Sector -62, Noida-201301 (U.P), India,

Inventors

1. Shubham Joshi
H.No 4, GC Marg, Talli bamori, Adarsh Nagar,Mukhani, Haldwani, Uttarakhand
2. Brij Mohan Purohit
B1-Block, Saraswati Vihar, Ajab Pur, Khurd, Dehradun,Uttarakhand
3. Saurabh Mishra
Kamal Nagar Colony, Mirjanhat, Bhagalpur, Bihar

Specification

FIELD OF INVENTION
[001] The embodiments herein generally relate to user authentication, and more particularly to a system and method for unlocking a screen of an electronic device based on an intuitive pattern.
BACKGROUND
[002] Generally, almost all electronic devices (for example, smart 5 phones) are equipped with screen touch sensors which allow user to interact directly by touching the electronic device. Many applications have been designed/modified to take advantage of these touch screen as input devices. One such area includes security in which lock-screens prevent access to the electronic devices. 10
[003] Conventional methods and systems include for example, but not limited to, pin code, password-string, pattern, face recognition, voice recognition, swipe to unlock, signature-based, and the like. The pin code and password-based lock mechanism provides a medium level of security and takes input by allowing the user to touch the numbers displayed on the 15 screen or by drawing a pattern on the screen, which may be vulnerable to shoulder surfing. Swipe to unlock may not provide any security to the electronic device and can be easily accessed by any unauthorized users.
[004] Though the existing systems and methods are effective to a degree in providing protection to electronic devices but, have tradeoffs in 20 terms of ease of usage, drawing unique patterns on screen, security level, vulnerability, remembering password strings or patterns, shoulder surfing, user requirement, and the like.
OBJECT OF INVENTION
[005] The principal object of the embodiments herein is to provide a 25 method and system for authenticating a user based on the intuitive interaction patterns performed on icons of a home screen of an electronic device.
3/43
[006] Another object of the embodiments herein is to provide a mechanism for unlocking a screen of an electronic device using intuitive interaction patterns.
[007] Another object of the embodiments herein to provide a mechanism for automatically arranging a plurality of item of home screen 5 of the electronic device in a shape of an automatically generated random number that can be intuitive to the user for performing interaction patterns to unlock the electronic device.
[008] Another object of the embodiments herein is to provide a mechanism to thwart shoulder surfing without explicitly entering password. 10
SUMMARY
[009] Accordingly the embodiments herein provide a method for authenticating a user. The method includes generating a random number in response to receiving an event in the electronic device. The random number is generated in between a range predefined by a user of the electronic 15 device. Further, the method includes dynamically rendering plurality of items in a shape representing the random number on the screen. Further, the method includes receiving at least one interaction event performed on at least one item rendered in the shape. Furthermore, the method includes computing an interaction pattern performed on at least one item based on at 20 least one interaction event. Further, the method includes determining a match between the interaction pattern and a preconfigured interaction pattern to authenticate the user.
[0010] Accordingly the embodiments herein provide a method for authenticating a user using a server. The method includes dynamically 25 rendering a plurality of items in a shape representing a random number on a screen of an electronic device, wherein the random number is generated in response to receiving an event in the server. Further, the method includes sending a one-time password (OTP) comprising a preconfigured interaction
4/43
pattern to the electronic device, wherein the OTP is generated by the server to authenticate the user. Furthermore, the method includes receiving at least one interaction event performed on at least one item rendered in the shape on the electronic device, wherein the interactions are performed by the user in accordance to the preconfigured interaction pattern. Furthermore, the 5 method includes computing an interaction pattern performed by the user on at least one item based on at least one interaction event. Furthermore, the method includes determining a match between the computed interaction pattern and the preconfigured interaction pattern to authenticate the user.
[0011] Accordingly the embodiments herein provide an electronic 10 device for authenticating a user. The electronic device includes a random number generator module configured to generate a random number in response to receiving an event in the electronic device. The random number is generated in between a range predefined by a user of the electronic device. Further, the electronic device includes a rendering module 15 configured to dynamically render a plurality of items in the shape representing the random number on the screen. Further, the electronic device includes a controller module configured to receive at least one interaction event performed on at least one the item arranged in the shape to unlock the screen of the electronic device. Further, the controller is 20 configured to compute an interaction pattern performed on at least one the item based on at least one interaction event. Further, the controller is configured to determine a match between the interaction pattern and a preconfigured interaction pattern to authenticate the user.
[0012] Accordingly the embodiments herein provide a server for 25 authenticating a user. The server includes a random number generator configured to generate a random number in response to receiving an event. Further, the server includes a rendering module configured to dynamically render a plurality of items in the shape representing the random number on
5/43
the screen. Furthermore, the server includes an interaction pattern configuration module configured to send a one-time password (OTP) to the electronic device, wherein the OTP includes a preconfigured interaction pattern to authenticate the user. Furthermore, the server includes a controller module configured to receive at least one interaction event 5 performed on at least one item rendered in the shape, wherein at least one interaction is performed by the user in accordance to the preconfigured interaction pattern. Furthermore, the controller module is configured to compute an interaction pattern performed by the user on at least one item based on at least one interaction event. Furthermore, the controller module 10 is configured to determine a match between the computed interaction pattern and the preconfigured interaction pattern to authenticate the user.
[0013] Accordingly the invention provides a computer program product for authenticating a user. The computer program product includes a computer executable program code recorded on a computer readable non-15 transitory storage medium. The computer executable program code when executed causes the product to generate a random number in response to receiving an event in the electronic device, wherein the random number is generated between ranges predefined by a user of the electronic device. Further, the computer executable program code executed causes the 20 product to dynamically render plurality of items in a shape representing the random number on the screen. Furthermore, the computer executable program code executed causes the product to receive at least one interaction event performed on at least one item rendered in the shape. Furthermore, the computer executable program code executed causes the product to 25 compute an interaction pattern performed on at least one item based on at least one interaction event. Furthermore, the computer executable program code executed causes the product to determine a match between the
6/43
interaction pattern and a preconfigured interaction pattern to authenticate the user.
[0014] Accordingly the invention provides a computer program product for authenticating a user. The computer program product includes a computer executable program code recorded on a computer readable non-5 transitory storage medium. The computer executable program code when executed causes the product to dynamically render a plurality of items in a shape representing a random number on a screen of an electronic device, wherein the random number is generated in response to receiving an event in a server. Further, the computer executable program code executed causes 10 the product to send a one-time password (OTP) containing a preconfigured interaction pattern to the electronic device, wherein the OTP is generated by the server to authenticate the user. Furthermore, the computer executable program code executed causes the product to receive at least one interaction event performed on at least one item rendered in the shape on 15 the electronic device, wherein the interactions are performed by the user in accordance to the received preconfigured interaction pattern. Furthermore, the computer executable program code executed causes the product to compute an interaction pattern performed by the user on at least one item based on at least one interaction event and determine a match between the 20 computed interaction pattern and the preconfigured interaction pattern to authenticate the user.
[0015] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be 25 understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing
7/43
from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF FIGURES
[0016] This invention is illustrated in the accompanying drawings, throughout which like reference letters indicate corresponding parts in the various figures. The embodiments herein will be better understood from the 5 following description with reference to the drawings, in which:
[0017] FIG. 1 is a high level view of a system for authenticating a user, according to embodiments disclosed herein;
[0018] FIG. 2 is a block diagram showing different modules of an electronic device and a server for authenticating a user, according to 10 embodiments disclosed herein;
[0019] FIGS. 3A-3D shows example illustrations of different options to pre-configure an interaction pattern to authenticate the user, according to embodiments disclosed herein;
[0020] FIG. 4 is a flowchart illustrating a method for authenticating 15 a user of an electronic device, according to embodiments disclosed herein;
[0021] FIG. 5 is a flowchart illustrating a method for authenticating a user using a server, according to embodiments disclosed herein;
[0022] FIG. 6 illustrates example operations performed by different modules to authenticate the user , where a random number 3 is generated, 20 according to embodiments disclosed herein;
[0023] FIG. 7 illustrates example operations performed by different modules to authenticate the user, where a random number 4 is generated, according to embodiments disclosed herein;
[0024] FIGS. 8A and 8B shows example illustrations of the screen, 25 where a random number 3 is generated to authenticate the user, according to embodiments disclosed herein;
8/43
[0025] FIGS.9A and 9B shows example illustrations of the screen, where a random number 4 is generated and a descending order is used to authenticate the user of the electronic device, according to embodiments disclosed herein;
[0026] FIGS. 10A and 10B shows another example illustrations of 5 the screen, where a random number 4 is generated and a ascending order is used to authenticate the user of the electronic device, according to embodiments disclosed herein; and
[0027] FIG. 11 depicts a computing environment implementing the system and the method of authenticating the user, in accordance to 10 embodiments disclosed herein.
9/43
DETAILED DESCRIPTION OF INVENTION
[0028] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-5 known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. Also, the various embodiments described herein are not necessarily mutually exclusive, as some embodiments can be combined with one or more other embodiments to form new embodiments. The term “or” as used herein, refers to a non-10 exclusive or, unless otherwise indicated. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein can be practiced and to further enable those skilled in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein. 15
[0029] The embodiments herein achieve a system and method for authenticating a user. The method includes generating a random number in response to receiving an event in the electronic device, wherein the random number is generated in between a range predefined by a user of the electronic device. Further, the method includes dynamically rendering 20 plurality of items in a shape representing the random number on the screen. Further, the method includes receiving at least one interaction event performed on at least one item rendered in the shape to unlock the screen of the electronic device. Furthermore, the method includes computing an interaction pattern performed on at least one item based on at least one 25 interaction event. Further, the method includes determining a match between the interaction pattern and a preconfigured interaction pattern, and authenticating the user of the electronic device in response to determining match.
10/43
[0030] In another embodiment, a method for authenticating a user using a server is described. The method includes dynamically rendering a plurality of items in a shape representing a random number on a screen of an electronic device, wherein the random number is generated in response to receiving an event in the server. Further, the method includes sending a 5 one-time password (OTP) comprising a preconfigured interaction pattern to the electronic device, wherein the OTP is generated by the server to authenticate the user. Furthermore, the method includes receiving at least one interaction event performed on at least one item rendered in the shape on the electronic device, wherein the interactions are performed by the user 10 in accordance to the preconfigured interaction pattern. Furthermore, the method includes computing an interaction pattern performed by the user on at least one item based on at least one interaction event. Furthermore, the method includes determining a match between the computed interaction pattern and the preconfigured interaction pattern to authenticate the user. 15
[0031] The methods and systems disclosed herein is simple, dynamic, and robust for authenticating a user based on intuitive interaction patterns. Typically, a Smartphone has multiple icons on a home screen. These icons can be presented on the unlock screen as well, and a need for an unlock screen may be avoided. Unlike conventional systems, the items 20 are automatically arranged in a shape of the generated random number that can be intuitive to the user for performing interaction patterns to unlock the electronic device. For example, a dynamically generated integer can be displayed by re-arrangement of the icons on the home screen of the locked electronic device. The random number is used to re-arrange the home 25 screen icons to form the shape of the random integer. The entire process of authentication is intuitive, as the interaction pattern of items can be configured by the user and is related to the random number shape presented on the device screen. Further, it may be difficult for a shadow surfer to
11/43
determine the interaction pattern used by the user as the random number and corresponding shape keeps changing for each authentication instance. Unlike conventional system, the electronic device can be unlocked using the home screen of the electronic device thereby eliminating a need of an additional lock screen to be displayed to unlock the electronic device. 5
[0032] Advantageously, the system and method provides a new method to authentication of user using the rotation of icons in accordance with a dynamic logic. Further, the intuitive dynamically generated random number (displayed as re-arranged icons on the home screen to resemble the shape of the integer) ensures that an authorized user can self authenticate 10 easily using the rotation of icons according to pre-stored logic (increasing/decreasing no. of rotations of the icons). However, an unauthorized user may not be aware of the exact logic used by the authorized user to enter the password in the form of rotating icons. Furthermore, as the interaction pattern can be configured by the user and 15 can be related to the shape of the generated random number, the user may easily remember the configuration of the interaction pattern and perform necessary interactions to form the configured interaction pattern Furthermore, the configured interaction pattern can be send to the user as a one-time-password to the user, such as to authenticate the user and perform 20 one or more transactions. Unlike conventional systems, the proposed system and method can be used to perform the online transactions based on the intuitive interaction patterns. Furthermore, the proposed system and method can be implemented using existing and electronic devices and may not require extensive setup and instrumentation. 25
[0033] Referring now to the drawings, and more particularly to FIGS. 1 through 11, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments.
12/43
[0034] Throughout the description the term “item(s)” may refer to a set of objects, icons, and the like presented on a screen of an electronic device. Example of items can include, but are not limited to, application icons displayed on a home screen of the electronic device, objects or icons from a webpage displayed on the electronic device, images from gallery 5 items displayed on the electronic device, names of people from a phone contact list displayed on the electronic device, and the like.
[0035] FIG. 1 is a high level view of a system 100 for authenticating a user, according to embodiments disclosed herein. In an embodiment, the system 100 includes an electronic device 102 and a server 10 104 communicating among each other over a communication network 106.
[0036] The electronic device 102 described herein can be such as for example, but not limited, a cell phone, a personal digital assistant, a mobile personal computer, a laptop, a tablet, a phablet, a desktop computer, a communicator, or equivalent thereof. 15
[0037] The server 104 described herein can be for example, but not limited to, a payment gateway (PG) server, a financial server, a seller terminal, a desktop or wireless computer, or equivalent thereof.
[0038] The communication network 106 described herein can include a combination of various types of networks such as, for example, 20 but not limited to Personal Area Networks (PANs), Local Area Networks (LANs), Wide Area Networks (WANs), Global System for Mobile Communication (GSM), Internet, value-added networks, interactive television networks, wireless communications networks, two-way cable networks, satellite networks, interactive kiosk networks, cellular networks, 25 Personal Mobile Gateways (PMGs) or any other suitable communications networks that can provide a means of communication between the electronic device 102 and the server 104.
13/43
[0039] In an embodiment, the electronic device 102 can be configured to authenticate the user, such as to provide access to the electronic device 102. Typically, the electronic device 102 such as smartphone has multiple icons on a home screen. These icons can be presented on the unlock screen as well, and a need for an unlock screen 5 may be avoided. Unlike conventional systems, the items are automatically arranged in a shape of the generated random number that can be intuitive to the user for performing interaction patterns to authenticate the user. Further, various operations to authenticate a user of an electronic device, such as to provide unlock and provide access to the user to the electronic 10 device is described in conjunction with the FIGS. 2 through 10.
[0040] In another embodiment, a system and method for authenticating a user using the server 104 is described. Typically, an electronic payment service is an essential feature in the electronic commerce market, and electronic payment is generally made through 15 several types of services including credit card payment, mobile phone payment, phone billing, transfer account, and so on. Some companies provide all of these payment services, called integrated electronic payment services. However, most payment gateway companies use different types of authentication or authorization techniques to authenticate or authorize the 20 user.
[0041] When the user (i.e., customer) attempts to make a purchase or perform a transaction, the electronic device 102 may send a request for payment or perform any transaction to the server 104. Upon receiving the request, the server 104 can be configured to generate a random number and 25 dynamically render a plurality of items arranged in a shape of the dynamically generated number. The server 104 can be configured to generate and send a one-time password (OTP) including the preconfigured interaction pattern to the electronic device 102. The preconfigured
14/43
interaction pattern described herein can include a pattern of one or more interactions to be performed on one or more items, a type of interaction to be performed on the items, and a number of times the interactions to be performed on the items. The user can view the one-time password (OTP) including the preconfigured interaction pattern and understand the 5 interactions to be performed on the items to authenticate themselves. Unlike conventional systems and methods, the proposed system and method provides a new method to authentication of user using the rotation of icons in accordance with a dynamic logic specified in the OTP. Further, the intuitive dynamically generated random number (displayed as re-10 arranged icons on the home screen to resemble the shape of the integer) ensures that an authorized user can self authenticate easily using the rotation of icons according to the OTP. However, an unauthorized user may not be aware of the exact logic used by the authorized user to enter the password in the form of rotating icons. 15
[0042] The FIG. 1 shows a limited overview of the system but, it is to be understood that another embodiment is not limited thereto. The system 100 is only one example of a suitable environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. The system 100 should not be interpreted as having any 20 dependency or requirement relating to any one or combination of components shown in the illustrative system 100 for authenticating the user. Further, the system can include different modules communicating among each other along with other hardware or software components. For example, the component can be, but not limited to, a process running in the 25 electronic device, an executable process, a thread of execution, a program, or a computer. By way of illustration, both an application running on an electronic device and the electronic device can be the component.
15/43
[0043] FIG. 2 is a block diagram showing different modules 200 of an electronic device 102 and the server 104, according to embodiments disclosed herein. In an embodiment, the electronic device 102 and server 104 can be configured to include a random number generator 202, a rendering module 204, an interaction recognition module 206, an 5 interaction pattern configuration module 208, a controller module 210, a communication module 212, and a storage module 214.
[0044] The random number generation module 202 can be configured to generate a random number from a range predefined by a user of the electronic device 102. The random number can typically be an 10 integer in a user defined range. In an embodiment, the random number can be generated in between the predefined range defined by the user using a random function conventionally available in programming interfaces. For example, if the range defined by the user is range (2, 5) then the generated random number can be 2, 3, 4, or 5. 15
[0045] The rendering module 204 can be configured to render, arrange, and reposition the items present on the screen of the electronic device 102. On receiving an internal or external event to unlock the electronic device, the rendering module 204 can be configured to position the items on the screen in a shape of the random number generated by the 20 random number generator 202. The internal or external event described herein can be an interaction event or an instruction received to access the electronic device 102. Unlike conventional systems, the items are automatically arranged in a shape of the generated random number that can be intuitive to the user for performing interaction patterns to unlock the 25 electronic device. For example, a dynamically generated integer can be displayed by re-arrangement of the icons on the home screen of the locked electronic device. The random number is used to re-arrange the home screen icons to form the shape of the random integer.
16/43
[0046] The interaction recognition module 206 can be configured to recognize the interaction events performed by the user on the displayed items arranges in the shape representing the generated random number. For example, when the user changes an orientation of an item, the interaction recognition module 206 recognizes the interaction event performed and 5 records it to compute an interaction pattern of the user.
[0047] The interaction pattern configuration module 208 allows the user to configure an interaction pattern to be performed by the authorized user to unlock the electronic device 102. Further, the pre-configured interaction pattern can be used to indicate the conventional password used 10 to unlock the electronic device 102. The preconfigured interaction pattern described herein can include a pattern of one or more interaction events to be performed on one or more items, a type of interaction event to be performed on the items, and a number of times the interaction events to be performed on the items. Further, more details related to the configuration of 15 the interaction pattern are described in conjunction with the FIG. 3
[0048] The controller module 210 can be configured to compute interaction pattern performed by the user on the one or more items arranged in the shape representing the random number. Further, for unlocking the electronic device 102, the user needs to perform one or more interaction 20 events in the order presented in the preconfigured interaction pattern to unlock the electronic device 102. Examples of user interaction events to match the pre-configured interaction pattern can include, but are not limited to, changing orientation of the items, rotation of an item in clockwise direction, rotation of an item in counterclockwise direction, rotation of item 25 for a pre-defined number of items and so on. The interaction events performed by the user can be recorded, and combined, to compute an interaction pattern. Further, the controller module 210 can be configured to determine if the interaction pattern computed based on the interaction
17/43
events performed by the user is same as the pre-configured interaction pattern stored in the storage module 110. The computed interaction pattern can be matched against the pre-configured interaction password in the storage module 110. Unlike conventional unlocking mechanisms, where a pre-defined screen is presented to the user, the present method and system 5 presents a different screen in each instance for unlocking the electronic device 102. The entire process of unlocking is intuitive, as the interaction pattern of items can be configured by the user and is related to the random number shape presented on the device screen.
[0049] The communication module 212 can be configured to allow 10 the communication between the electronic device 102 and the server 104. The communication module 212 can be configured to include various interfaces to allow the communication between various components throughout the system 100. Further, the detailed operations performed by various modules and methods described herein are described in detail in 15 conjunction with the FIGS. 3 through 9.
[0050] FIGS. 3A-3D shows example illustrations of different options to pre-configure an interaction pattern to authenticate a user, according to embodiments disclosed herein. In an embodiment, the FIG. 3A illustrates an example of a user interface to define a range by the user. The 20 interaction pattern configuration module 208 can be configured to allow a user to define the range of numbers using a suitable means as shown at 302a. An example user-defined range (1, 5) is shown at 302b. The range described herein includes an upper limit and a lower limit of numbers in which the random number can be generated at the time of unlocking the 25 electronic device. For example, for a range (1, 5), the random number generator 202 can randomly generate a number as 1, 2, 3, 4, or 5. Although the FIG. 3A shows a limited view of numbers as 1 to 5 to define the range
18/43
but, it is to be understood that the range can be defined between any numeric ranges.
[0051] The FIG.3B illustrates an example illustration of other options used to pre-configure an interaction pattern to unlock the electronic device 102. In an embodiment, the preconfigured interaction pattern can 5 include a pattern of one or more interaction events to be performed on one or more items, a type of interaction event to be performed on the items, and a number of times the interaction events to be performed on the items. After configuring the range, the interaction pattern configuration module 208 can be configured to allow the user to configure the type and order of 10 interaction event to be performed on the items to unlock the electronic device 102. The FIG. 3B shows an example list 304 of different interaction events from which the user can configure the interaction pattern. For example, the user can configure the interaction pattern to be performed to unlock the electronic device 102 as rotate an item clockwise followed by 15 counterclockwise, or first and last anticlockwise, or first and last clockwise, or the like.
[0052] The FIG. 3C shows an example user interface allowing a user to configure the order of interaction events to be performed for unlocking the screen of the electronic device 102. For example, the number 20 of time the interaction events to be performed in order can be selected as ascending or descending. For example, in case of an ascending rotation pattern, the items presented on the screen of the electronic device 102 needs to be rotated in an ascending order pursuant to the configuration pattern to unlock the electronic device 102. For instance, for randomly generated 25 number 3, a first item can be rotated once, the second item can be rotated twice and the third item rotated thrice to unlock the electronic device 102.
[0053] The FIG. 3D illustrates an example of a user interface allowing a user to configure a customized orientation pattern to unlock the
19/43
electronic device 102. The orientation settings 308 can be customized and defined to form the interaction pattern. Once defined, the users need to perform interaction events related to the orientation of items. The FIG. 3D shows four different orientations. The user can add more orientation to create a more complicated interaction pattern. The customized orientation 5 settings 308 provide the user with the option to create complex interaction patterns for enhanced security. In an embodiment, for the sake of convenience of the user, there may not be any association between the interaction events performed by the user and the generated random number. For example, the user may perform the interaction events on the items 10 based on the customized settings and irrespective of the random number being generated.
[0054] FIG. 4 is a flowchart illustrating a method 400 for authenticating a user of the electronic device 102, according to embodiments disclosed herein. The various steps of the method 400 are 15 summarized into individual blocks where some of the steps can be performed by various modules of the electronic device 102, the user of the electronic device 102, and the like. The method 400 and other description described herein provide a basis for a control program, which can be implemented using a microcontroller, microprocessor, or an equivalent 20 thereof.
[0055] In an embodiment, at step 402, the method 400 includes generating a random number in response to receiving an event in an electronic device 102. When the user needs to use the electronic device 102, which is locked, the user may press a home button or performs a swipe 25 or tap event on the screen to access the electronic device 102. When an event occurs, the method 400 allows the random number generator 202 generate a random number in the range predefined by the user of the electronic device 102.
20/43
[0056] At step 404, the method 400 includes dynamically rendering the plurality of items in a shape representing the random number on the screen of the electronic device 102. Based on the randomly generated number, the items on the screen can be positioned to form the shape of the randomly generated number. Typically, a smartphone has multiple icons on 5 a home screen. Unlike conventional systems, these icons can be presented on the unlock screen as well, and a need for an unlock screen may be avoided. For example, when the user wants to unlock the phone and the random number generated is 3 then all the icons are assembled together on the screen in way representing the shape of the random number 3 on the 10 screen of the electronic device 102. The method 400 allows the rendering module 204 to rearrange the position coordinates of the icons available on the screen to form the shape of the random number, such as arranging the icons to form the number 3 visually.
[0057] At step 406, the method 400 includes receiving an 15 interaction event performed on the items rendered in the shape of the randomly generated number to unlock the screen of the electronic device 102. The method 400 allows the interaction recognition modules 206 to receive and identify the one or more interaction events performed on the items. The user visualizes the shape of the integer and understands that 20 he/she has to select that many icons as unlock sequence. For example, if the rendered items represent a shape of a random number 3 then the user visualizes the shape to identify the integer 3 and performs the interaction event on the items pursuant to the preconfigured interaction pattern to unlock the electronic device 102. 25
[0058] At step 408, the method 400 includes computing an interaction pattern performed on the items based on the interaction events. All the interaction events performed by the user can be identified by the interaction recognition module 206 and communicated to the controller
21/43
module 210 to compute the interaction pattern performed by the user. The method 400 allows the controller module 210 to compute the interaction pattern by identifying and counting each interaction event performed on each item displayed on the screen. The controller module 210 can be configured to combine all the interaction events performed by the user to 5 compute the interaction pattern.
[0059] At step 410, the method 400 includes determining whether there is a match between the computed interaction pattern and the preconfigured interaction pattern. The method 400 allows the controller module 210 to match the computed interaction pattern against the pre-10 configured interaction pattern, such as to authenticate the user. In an embodiment, a case table in the interaction pattern configuration module 208 can store the valid item rotation pattern based on the setting defined by the user. Consider an example, if the user setting is stored as “Alternate clockwise”, “counterclockwise”, and “decreasing/descending count” and in 15 case the generated random number is 3 then a valid list of patterns in the case table can be:
Entry
Orientation
Descending Count
1
Clockwise
3
2
Counterclockwise
2
3
Clockwise
1
[0060] The method 400 allows the controller module 210 to determine whether the computed interaction pattern is in pursuant to the list 20 of pattern stored in the case table representing the preconfigured interaction pattern configured by the authorized user to unlock the electronic device 102.
22/43
[0061] At step 412, the method 400 includes determining whether the user is authenticated to access the electronic device 102. At step 414, the method 400 includes allowing access to the electronic device 102 in response to determining that the user is authenticated. In an embodiment, the method 400 includes unlocking the screen of the electronic device 102 5 in response to finding the match between the computed interaction pattern and the preconfigured interaction pattern. The method 400 allows the rendering module 106 to render the unlocked home screen on the electronic device in response to determining the match. As opposed to the locked home screen, the user may now interact and launch the application icons 10 from the unlocked home screen.
[0062] At step 416, the method 400 includes determining whether the user has a threshold for maximum number of retries has reached in response to determining that the user is not authenticated. Further, the method 400 includes repeating the steps 406 to 416 in response to 15 determining a mismatch between the computed interaction pattern and the preconfigured interaction pattern. Furthermore, at step 418, the method 400 including displaying alternate unlocking method to unlock the electronic device 102 in response to determining that the user has reached the threshold for maximum number of retries. 20
[0063] Unlike conventional methods, the entire method 400 of authenticating the electronic device 102 is intuitive, as the interaction pattern of items can be configured by the user and is related to the random number shape presented on the electronic device screen. The electronic device 102 can be unlocked using the home screen of the electronic device 25 102 thereby eliminating a need of an additional lock screen to be displayed to unlock the electronic device. Advantageously, the system and method provides a new method to unlock a mobile phone using the rotation of icons in accordance with a dynamic logic.
23/43
[0064] The various actions, acts, blocks, steps, and the like in method 400 may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some actions, acts, blocks, steps, and the like may be omitted, added, modified, skipped, and the like without departing from the scope of the invention. 5
[0065] FIG. 5 is a flowchart illustrating a method 500 for authenticating a user using the server 104, according to embodiments disclosed herein. The various steps of the method 500 are summarized into individual blocks where some of the steps can be performed by various modules of the electronic device 102, the server 104, the user of the 10 electronic device 102, and the like. The method 500 and other description described herein provide a basis for a control program, which can be implemented using a microcontroller, microprocessor, or an equivalent thereof.
[0066] In an embodiment, at step 502, the method 500 includes 15 generating a random number in response to receiving an event in the server 102. When the user attempts to make a purchase or perform a transaction, the electronic device 102 may send a request for payment or perform any transaction to the server 104. Upon receiving the request, the method 500 allows the server 104 to generate the random number. 20
[0067] At step 504, the method 500 includes dynamically rendering a plurality of items in a shape representing the random number on the screen of the electronic device 102. Based on the randomly generated number, the method 500 allows the rendering module 204 to position the items on the screen to form the shape of the randomly generated number. 25 The method 500 allows the rendering module 204 to rearrange the position coordinates of the icons available on the screen to form the shape of the random number, such as arranging the icons to form the shape visually.
24/43
[0068] At step 506, the method 500 includes sending a one-time-password (OTP) including a preconfigured interaction pattern to the electronic device 102. The preconfigured interaction pattern described herein can include a pattern of one or more interactions to be performed on one or more items, a type of interaction to be performed on the items, a 5 number of times the interactions to be performed on the items, or a combination thereof. The method 500 allows the server 104 to generate and send the preconfigured interaction pattern to authenticate the user of the electronic device 102.
[0069] At step 508, the method 500 includes receiving an 10 interaction event performed on the items rendered in the shape of the randomly generated number to unlock the screen of the electronic device 102. The user performs the various interaction events on the items in accordance to the preconfigured interaction pattern. The method 500 allows the interaction recognition modules 206 to receive and identify the one or 15 more interaction events performed on the items. The user visualizes the shape of the integer and understands that he/she has to select that many icons as unlock sequence. For example, if the rendered items represent a shape of a random number 3 then the user visualizes the shape to identify the integer 3 and performs the interaction event on the items pursuant to the 20 preconfigured interaction pattern to unlock the electronic device 102.
[0070] At step 510, the method 500 includes computing an interaction pattern performed on the items based on the interaction events. All the interaction events performed by the user can be identified by the interaction recognition module 206 and communicated to the controller 25 module 210 to compute the interaction pattern performed by the user. The method 500 allows the controller module 210 to compute the interaction pattern by identifying and counting each interaction event performed on each item displayed on the screen. The controller module 210 can be
25/43
configured to combine all the interaction events performed by the user to compute the interaction pattern.
[0071] At step 512, the method 500 includes determining whether there is a match between the computed interaction pattern and the preconfigured interaction pattern. The method 500 allows the controller 5 module 210 to match the computed interaction pattern against the pre-configured interaction pattern, such as to authenticate the user. In an embodiment, a case table in the interaction pattern configuration module 208 can store the valid item rotation pattern based on the setting defined by the user. Consider an example, if the user setting is stored as “Alternate 10 clockwise”, “counterclockwise”, and “increasing count” and in case the generated random number is 3 then a valid list of interaction patterns in the case table can be:
Entry
Orientation
increasing Count
1
Clockwise
1
2
Counterclockwise
2
3
Clockwise
3
[0072] The method 500 allows the controller module 210 to 15 determine whether the computed interaction pattern is in pursuant to the list of pattern stored in the case table representing the preconfigured interaction pattern configured by the authorized user to unlock the electronic device 102.
[0073] At step 514, the method 500 includes determining whether 20 the user is authenticated. At step 516, the method 500 includes allowing access to at least one action such as to access the transaction or payment in response to determining that the user is authenticated. At step 518, the method 500 includes determining whether the user has a threshold for
26/43
maximum number of retries has reached in response to determining that the user is not authenticated. Further, the method 500 includes repeating the steps 506 to 518 in response to determining a mismatch between the computed interaction pattern and the preconfigured interaction pattern. Furthermore, at step 520, the method 500 including displaying alternate 5 authentication and verification method in response to determining that the user has reached the threshold for maximum number of retries.
[0074] Unlike conventional methods, the entire method 500 of authenticating the electronic device 102 is intuitive, as the interaction pattern of items can be configured by the server 102 and is related to the 10 random number shape presented on the electronic device screen. Advantageously, the system and method provides a new method to authenticate the user using the rotation of icons in accordance with a dynamic logic. The various actions, acts, blocks, steps, and the like in method 500 may be performed in the order presented, in a different order or 15 simultaneously. Further, in some embodiments, some actions, acts, blocks, steps, and the like may be omitted, added, modified, skipped, and the like without departing from the scope of the invention.
[0075] FIG. 6 illustrate example operations performed by different modules to authenticate the user of the electronic device 102, where a 20 random number 3 is generated, according to embodiments disclosed herein. In an embodiment, on receiving an event in the electronic device 102, the rendering module 204 can be configured to render (602) the screen showing press to unlock. In an example, in response to receiving a response from the user, the random number generator 202 can be configured to generate (606) 25 a random number 3. As shown in the FIG. 6, the rendering module 204 can be configured to rearrange (606) the icons present on the home screen to form the shape of number 3. In case, if there are too few icons on the home
27/43
screen then the icons may be repeatedly used to form the shape of the integer.
[0076] The user visualizes the shape of the integer and understands that he/she has to select that many icons as unlock sequence. The user can then perform interaction events on the icons displayed in the shape of 5 number 3. For example, if the rendered items represent the shape of a random number 3 then the user visualizes the shape to identify the integer 3 and performs the interaction event on the items pursuant to the preconfigured interaction pattern to unlock the electronic device 102. The interaction recognition module 202 can be configured to identify (608) the 10 interaction event performed by the user on the icons displayed in the shape of number 3. The controller module 210 can be configured to compute an interaction pattern by combining all the user interaction events to form an interaction pattern. Further, the controller module 210 can be configured to determine (610) whether there is a match between the computed interaction 15 pattern and the pre-configured interaction pattern. In response to determining the match between the computed interaction pattern and the pre-configured interaction pattern, the screen of the electronic device 102 is unlocked (612). The controller module 210 can instruct the rendering module to render (616) the home screen of the electronic device 102 and 20 allow access to the user.
[0077] FIG. 7 illustrates example operations performed by different modules to authenticate the user of the electronic device, where a random number 4 is generated, according to embodiments disclosed herein. In an embodiment, on receiving an event in the electronic device, the rendering 25 module 204 can be configured to render (702) the screen showing press to unlock. In an example, in response to receiving a response from the user, the random number generator 202 can be configured to generate (704) a random number 4. As shown in the FIG. 4, the rendering module 204 can
28/43
be configured to rearrange (706) the icons present on the home screen to form the shape of number 4.
[0078] The user visualizes the shape of the integer and understands that he/she has to select that many icons as unlock sequence. The user can then perform interaction events on the icons displayed in the shape of 5 number 4. For example, if the rendered items represent a shape of the random number 4 then the user visualizes the shape to identify the integer 4 and performs the interaction event on the items pursuant to the preconfigured interaction pattern to unlock the electronic device 102. The interaction recognition module can be configured to identify (708) the 10 interaction events performed by the user on the icons displayed in the shape of number 4. The controller module 210 can be configured to compute an interaction pattern by combining all the user interaction events to form an interaction pattern. Further, the controller module 210 can be configured to determine (710) whether there is a match between the computed interaction 15 pattern and the pre-configured interaction pattern. In response to determining the match between the computed interaction pattern and the pre-configured interaction pattern, the screen of the electronic device 102 is unlocked (712). The controller module 210 can instruct the rendering module to render (714) the home screen of the electronic device 102 and 20 allow access to the user.
[0079] FIGS. 8A and 8B shows example illustrations of the screen, where a random number 3 is generated to authenticate the user of the electronic device, according to embodiments disclosed herein. On receiving a request for unlocking the electronic device 102, the random number 25 generator 202 can be configured to generate a random number selected from the range defined by the user. In this example, let’s consider:
Range  1 to 5
Dynamically generated Random Integer  3
29/43
Icons re-arranged to form the shape of the integer 3
Preconfigured interaction pattern 
Rotate first icon clockwise 1 time
Rotate second icon anticlockwise 2 times
Rotate third icon clockwise 3 times 5
[0080] As shown is the FIG. 8A, the rendering module 204 configured to dynamically arrange the icons present on the home screen in a shape representing the random number 3. The user visualizes the shape of the integer and understands that he/she has to select that many icons as unlock sequence. The FIG.8B shows the interaction events performed by 10 the user on the icons for unlocking the electronic device 102.The list of interaction events performed by the user for unlocking the device includes :
i. The user rotates the first icon 802 in clockwise direction 1 time,
ii. The user rotating a second icon 804 in anticlockwise 15 direction 2 times, and
iii. The user rotating a third icon 806 in clockwise direction 3 times.
[0081] It is to be understood that the user can perform the interaction event such as gesture on any of the icons rendered in the shape 20 of number 3, instead of 802, 804, and 806. Further, the controller module 210 can compute the interaction pattern based on the interaction events performed by the user on the displayed items. Further, the computed interaction pattern can be compared against the preconfigured interaction pattern to authenticate the user, such as to determine whether the user is 25 authorized to access the electronic device 102. In response to a successful authentication of the user, the electronic device 102 can be unlocked.
[0082] Further in some embodiments, against each icon (802, 804, and 806), the count of rotation can be displayed for ease of user. The user
30/43
can enable/disable the display of rotation count using the setting options provided by the interaction configuration module 208 depending on complexity level.
[0083] Although the example shows number 3 and the corresponding interaction events, it must be understood that the any type of 5 interaction pattern can be used for other random numbers. For example, when a random number 4 is generated, the list of interaction events performed by the user for unlocking the device includes :
iv. The user rotating a first icon in clockwise direction 1 time,
v. The user rotating a second icon in anticlockwise direction 2 10 times,
vi. The user rotating a third icon in clockwise direction 3 times, and
vii. The user rotating a fourth icon in anticlockwise direction 4 times. 15
[0084] FIGS. 9A and 9B shows example illustrations of the screen, where a random number 4 is generated and a descending order is used to unlock the screen of the electronic device, according to embodiments disclosed herein. On receiving a request for unlocking the electronic device 102, the random number generator 202 can be configured to generate a 20 random number selected from the range defined by the user. In this example, let’s consider:
Range  1 to 5
Dynamically generated Random Integer  4
Icons re-arranged to form the shape of the integer 4 25
Preconfigured interaction pattern 
Rotate first icon 1 clockwise 1 time
Rotate second icon anticlockwise 2 times
Rotate third icon clockwise 3 times
31/43
Rotate second icon anticlockwise 4 times
[0085] As shown in the FIG. 9A, the rendering module 204 configured to dynamically arrange the icons present on the home screen in a shape representing the random number 4. The user visualizes the shape of the integer and understands that he/she has to select that many icons as 5 unlock sequence. The FIG. 9B shows the interaction events performed by the user on the icons for unlocking the electronic device 102.The list of interaction events performed by the user for unlocking the device includes :
viii. The user rotates the first icon 902 in clockwise direction 1 time, 10
ix. The user rotates the second icon 904 in anticlockwise direction 2 time,
x. The user rotates the third icon 906 in clockwise direction 3 times, and
xi. The user rotates the fourth icon 908 in anticlockwise 15 direction four times.
[0086] It is to be understood that the user can perform the interaction event on any icon any of the icons rendered in the shape of number 4, instead of 902, 904, 906, and 908. Further, the controller module 210 can compute the interaction pattern based on the interaction events 20 performed by the user on the displayed items. Further, the computed interaction pattern can be compared against the preconfigured interaction pattern to authenticate the user, such as to determine whether the user is authorized to access the electronic device 102. In response to a successful authentication of the user, the electronic device 102 can be unlocked. 25
[0087] FIGS. 10A and 10B shows another example illustration of the screen, where a random number 4 is generated and an ascending order is used to authenticate the user of the electronic device, according to embodiments disclosed herein. In this example, let’s consider:
32/43
Range  1 to 5
Dynamically generated Random Integer  4
Icons re-arranged to form the shape of the integer 4
Preconfigured interaction pattern 
Rotate first icon clockwise 4 times 5
Rotate second icon anticlockwise 3 times
Rotate third icon clockwise 2 times
Rotate second icon anticlockwise 1 time
[0088] The FIG.10B shows the interaction events performed by the user on the icons for unlocking the electronic device 102. The list of 10 interaction events performed by the user for unlocking the device includes :
xii. The user rotates the first icon 1002 in clockwise direction 4 times,
xiii. The user rotates the second icon 1004 in anticlockwise direction 3 times, 15
xiv. The user rotates the third icon 1006 in clockwise wise two time, and
xv. The user rotating a fourth icon 1008 in anticlockwise direction once.
[0089] When the user performs the above sequence of interaction 20 events, the electronic device 102 can be unlocked. In the example, shown in the FIG. 10B, the rotation direction and rotation count of the interaction events performed can be used to compute the interaction pattern. Further, the computed interaction pattern can be compared against the preconfigured interaction pattern to authenticate the user, such as to determine whether 25 the user is authorized to access the electronic device 102. In response to a successful authentication of the user, the electronic device 102 can be unlocked.
33/43
[0090] The system and method described is not restricted to the numeric ranges 1-5. Any range of integers can be chosen by the user. Generally, if the range selected by the user is more, then the complexity of the user may get increases. Further, the system and method is also not necessarily bound by all the steps of the method. I.e., the increasing or 5 decreasing count option, or the clockwise or anticlockwise restrictions may be selectively disabled, so that the user may only choose that many icons as shown by the integer, and interact with them in any manner.
[0091] Furthermore, it may be appreciated by a person having ordinary skills in the art that the controller module 210 can be configured to 10 execute arithmetic and logical operation to allow the user to easily unlock the electronic device 102. For example, if the range selected by a user is range (1, 10) and the random number generated is 9 then the user needs to rotate an icon 9 times and interact with 9 different icons to the unlocking process, which in itself is complex, time consuming and error prone task. 15 To reduce the complexity, time consumed and chances of error, the user can perform some arithmetic and logical operations before interacting with the icons. If the shape indicates the number 9, the use identifies the integer 9 and performs a subtraction operation like (10-9=1), which indicates the user has to perform the interaction event on the items only 1 time. Similarly 20 for random number 7, the user needs to interact with 3 icons (10-7=3). Such mathematical or logical operation may be predefined in the storage unit of the electronic device 102 or the server 104.
[0092] Though the above description is described with respect to the electronic device like Smart phone but, it is to be understood that the 25 proposed system and method for authenticating the user and unlocking an electronic device can be used in security system such as a payment processing system, Internet banking systems, a door locking and unlocking
34/43
system, a safe locking and unlocking system, a car locking and unlocking system, and the like.
[0093] FIG. 11 depicts a computing environment implementing the method of unlocking the electronic device 102, in accordance with various embodiments of the present invention. As depicted, the computing 5 environment 1102 comprises at least one processing unit 1104 that is equipped with a control unit 1106 and an Arithmetic Logic Unit (ALU) 1108, a memory 1110 a storage unit 1112, a clock chip 1114, plurality of networking devices 1116, and a plurality Input output (I/O) devices 1118. The processing unit 1104 is responsible for processing the instructions of 10 the algorithm. The processing unit 1104 receives commands from the control unit 1106 in order to perform its processing. Further, any logical and arithmetic operations involved in the execution of the instructions are computed with the help of the ALU 1108.
[0094] The overall computing environment 1102 can be composed 15 of multiple homogeneous or heterogeneous cores, multiple CPUs of different kinds, special media and other accelerators. The processing unit 1104 is responsible for processing the instructions of the algorithm. The processing unit 1104 receives commands from the control unit 1106 in order to perform its processing. Further, any logical and arithmetic 20 operations involved in the execution of the instructions are computed with the help of the ALU 1108. Further, the plurality of process units may be located on a single chip or over multiple chips.
[0095] The algorithm comprising of instructions and codes required for the implementation are stored in either the memory unit 1110 or the 25 storage 1112 or both. At the time of execution, the instructions may be fetched from the corresponding memory 1110 or storage 1112, and executed by the processing unit 1104. The processing unit 1104 synchronizes the operations and executes the instructions based on the
35/43
timing signals generated by the clock chip 1114. The embodiments disclosed herein can be implemented through at least one software program running on at least one hardware device and performing network management functions to control the elements. The elements shown in the FIGS. 1-11 include various units, blocks, modules, or steps described in 5 relation with methods, processes, algorithms, or systems of the present invention, which can be implemented using any general purpose processor and any combination of programming language, application, and embedded processor.
[0096] The foregoing description of the specific embodiments will 10 so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents 15 of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit 20 and scope of the embodiments as described herein.
36/43
STATEMENT OF CLAIMS
We claim:
1. A method for authenticating a user, the method comprising:
generating a random number in response to receiving an event in an electronic device, wherein said random number is generated in between a range predefined by a user of said electronic device;
dynamically rendering a plurality of items in a shape representing said random number on a screen of said electronic device;
receiving at least one interaction event performed on at least one said item rendered in said shape;
computing an interaction pattern performed on at least one said item based on said at least one interaction event; and
determining a match between said interaction pattern and a preconfigured interaction pattern to authenticate said user.
2. The method of claim 1, wherein computing said interaction pattern performed on at least one said item based on said at least one interaction event comprising:
identifying at least one said type of interaction event performed on at least one said item based on said at least one interaction event; and
counting a number of times said at least one identified interaction event performed on at least one said item.
3. The method of claim 1, wherein said method further comprises displaying a number of times said at least one interaction event performed on said at least one item representing said shape on said electronic device.
37/43
4. The method of claim 1, wherein said interaction event results in a change in orientation of at least one said item in one of clockwise and counterclockwise direction.
5. The method of claim 1, wherein said preconfigured interaction pattern comprises a pattern of at least one interaction event to be performed on said at least one item, a type of interaction event to be performed on said at least one item, and a number of times at least one said interaction event to be performed on at least one said item.
6. The electronic device of claim 1, wherein said preconfigured interaction pattern is preconfigured by said user and stored in said electronic device.
7. A method for authenticating a user using a server, the method comprising:
dynamically rendering a plurality of items in a shape representing a random number on a screen of an electronic device, wherein said random number is generated in response to receiving an event in said server;
sending a one-time password (OTP) comprises a preconfigured interaction pattern to said electronic device, wherein said OTP is generated by said server to authenticate said user;
receiving at least one interaction event performed on at least one said item rendered in said shape on said electronic device, wherein said at least one interaction event is performed by said user in accordance to said received preconfigured interaction pattern;
computing an interaction pattern performed by said user on at least one said item based on said at least one interaction event; and
38/43
determining a match between said computed interaction pattern and said preconfigured interaction pattern to authenticate said user.
8. The method of claim 7, computing said interaction pattern performed by said user on at least one said item based on said at least one interaction event:
identifying at least one said type of interaction performed on at least one said item based on said at least one interaction event; and
counting a number of times said at least one identified interaction event performed on at least one said item.
9. The method of claim 7, wherein said method further comprises displaying a number of times said at least one interaction event performed on said at least one item representing said shape on said electronic device.
10. The method of claim 7, wherein said interaction event results in a change in orientation of at least one said item in one of clockwise and counterclockwise direction.
11. The method of claim 7, wherein said preconfigured interaction pattern comprises a pattern of at least one interaction event to be performed on said at least one item, a type of interaction event to be performed on said at least one item, and a number of times at least one said interaction event to be performed on at least one said item.
12. An electronic device for authenticating a user, the electronic device comprising:
a random number generator module configured to generate a random number in response to receiving an event in said electronic
39/43
device, wherein said random number is generated in between a range predefined by said user;
a rendering module configured to dynamically render a plurality of items in a shape representing said random number on a screen of said electronic device; and
a controller module configured to:
receive at least one interaction event performed on at least one said item arranged in said shape;
compute an interaction pattern performed on at least one said item based on said at least one interaction event; and
determine match between said interaction pattern and a preconfigured interaction pattern to authenticate said user.
13. The electronic device of claim 12, wherein compute said interaction pattern performed on at least one said item based on said at least one interaction event comprising:
identify at least one said type of interaction event performed on at least one said item based on said at least one interaction event; and
count a number of times said at least one identified interaction event performed on at least one said item.
14. The electronic device of claim 12, wherein said rendering module is further configured to display a number of times said at least one interaction event performed on said at least one item representing said shape of said electronic device.
15. The electronic device of claim 21, wherein said interaction event results in a change in orientation of at least one said item in one of clockwise and counterclockwise direction.
40/43
16. The electronic device of claim 12, wherein said preconfigured interaction pattern comprises a pattern of at least one interaction event to be performed on said at least one item, a type of interaction event to be performed on said at least one item, and a number of times at least one said interaction event to be performed on at least one said item.
17. The electronic device of claim 12, wherein said preconfigured interaction pattern is preconfigured by said user and stored in said electronic device.
18. A server for authenticating a user, the server comprising:
a random number generator configured to generate a random number in response to receiving an event in said server;
a rendering module configured to dynamically render a plurality of items in a shape representing a random number on a screen of an electronic device;
an interaction pattern configuration module configured to send a one-time password (OTP) comprises a preconfigured interaction pattern to said electronic device, wherein said OTP is generated by said server to authenticate said user; and
a controller module configured to:
receive at least one interaction event performed on at least one said item rendered in said shape, wherein said at least one interaction is performed by said user in accordance to said received preconfigured interaction pattern;
compute an interaction pattern performed by said user on at least one said item based on said at least one interaction event; and
41/43
determine a match between said computed interaction pattern and said preconfigured interaction pattern to authenticate said user.
19. The server of claim 18, wherein compute said interaction pattern performed on at least one said item based on said at least one interaction event comprising:
identify at least one said type of interaction event performed on at least one said item based on said at least one interaction event; and
count a number of times said at least one identified interaction event performed on at least one said item.
20. The server of claim 18, wherein said rendering module is further configured to display a number of times said at least one interaction event performed on said at least one item representing said shape of said electronic device.
21. The server of claim 18, wherein said interaction event results in a change in orientation of at least one said item in one of clockwise and counterclockwise direction.
22. The server of claim 18, wherein said preconfigured interaction pattern comprises a pattern of at least one interaction event to be performed on said at least one item, a type of interaction event to be performed on said at least one item, and a number of times at least one said interaction event to be performed on at least one said item.
23. A computer program product comprising a computer executable program code recorded on a computer readable non-transitory storage medium, wherein said computer executable program code
42/43
when executed causing the actions as claimed in at least one of claim 1, claim 2, claim 3, claim 4, claim 5, and claim 6.
24. A computer program product comprising a computer executable program code recorded on a computer readable non-transitory storage medium, wherein said computer executable program code when executed causing the actions as claimed in at least one of claim 7, claim 8, claim 9, claim 10, and claim 11.

Documents

Application Documents

# Name Date
1 Form 5.pdf 2014-05-06
2 Form 3.pdf 2014-05-06
3 FORM 2.pdf 2014-05-06
4 Drawings.pdf 2014-05-06
5 1215-del-2014-GPA-(15-05-2014).pdf 2014-05-15
6 1215-del-2014-Correspondence-Others-(15-05-2014).pdf 2014-05-15
7 SEL_New POA_ipmetrix.pdf 2015-04-16
8 FORM 13-change of POA - Attroney.pdf 2015-04-16
9 1215-DEL-2014-FER.pdf 2018-07-13
10 1215-DEL-2014-PETITION UNDER RULE 137 [31-12-2018(online)].pdf 2018-12-31
11 1215-DEL-2014-FORM 13 [31-12-2018(online)].pdf 2018-12-31
12 1215-DEL-2014-FER_SER_REPLY [31-12-2018(online)].pdf 2018-12-31
13 1215-DEL-2014-ASSIGNMENT DOCUMENTS [10-10-2019(online)].pdf 2019-10-10
14 1215-DEL-2014-8(i)-Substitution-Change Of Applicant - Form 6 [10-10-2019(online)].pdf 2019-10-10
15 1215-DEL-2014-FORM-26 [11-10-2019(online)].pdf 2019-10-11
16 1215-DEL-2014-Proof of Right (MANDATORY) [25-11-2019(online)].pdf 2019-11-25
17 1215-DEL-2014-FORM-26 [10-05-2021(online)].pdf 2021-05-10
18 1215-DEL-2014-Correspondence to notify the Controller [10-05-2021(online)].pdf 2021-05-10
19 1215-DEL-2014-Written submissions and relevant documents [25-05-2021(online)].pdf 2021-05-25
20 1215-DEL-2014-FORM-26 [25-05-2021(online)].pdf 2021-05-25
21 1215-DEL-2014-CORRECTED PAGES [25-05-2021(online)].pdf 2021-05-25
22 1215-DEL-2014-Annexure [25-05-2021(online)].pdf 2021-05-25
23 1215-DEL-2014-Annexure [25-05-2021(online)]-1.pdf 2021-05-25
24 1215-DEL-2014-US(14)-HearingNotice-(HearingDate-13-05-2021).pdf 2021-10-17

Search Strategy

1 1215_DEL_2014-GoogleDocs_11-07-2018.pdf