Abstract: A method of verifying the identity of a user comprising: initiating (50) a sign-in request from a first computing device to an authentication server; receiving (58) an instruction from the authentication server to provide signature data from a second computing device; entering (64) signature data at the second computing device and sending the signature data to the authentication server; verifying (65) the signature data at the authentication server; notifying (66) the user that their identity has been verified on the basis of the data received from the second computing device.
Abstract: The present invention discloses a method of verifying the authenticity of a provided signature, comprising the steps of: receiving a set of sampled data points, each sampled data point being associated with a different position along the signature; identifying a set of characterizing nodes within the set of sampled data points using a set of predetermined characterizing nodes comprised in a pre-stored user profile; determining if each identified characterizing node lies within a predetermined threshold range of a corresponding predetermined characterizing node; and generating a positive verification when the characterizing nodes lie within the predetermined threshold range. A system arranged to carry out the method is also disclosed.
Abstract: A data leak protection method for managing user interaction with a computing device, the computing device comprising a kernel mode of operation and a user mode of operation, the method comprising: monitoring the kernel mode of the computing device in order to detect user-initiated events; determining whether a given user-initiated event has a forbidden status or an allowed status; performing an action in dependence on the status of the given user-initiated event.
Abstract: The present invention includes a system and a method of validating an identity of a user using a pointing device by comparing a sampled mouse signature with an authenticated mouse signature. The method includes presenting a virtual pad including a background graphic image, a plurality of objects positioned on the background graphic image to a user. The user moves the pointing device to manipulate a cursor on the background graphic image. The method includes a step of sampling a plurality of events corresponding to positions of the cursor to provide a sampled mouse signature including a set of position vectors. The present invention includes comparing the sampled mouse signature to a stored mouse signature representing the identity of a user, and validating the identity of a user in response to the comparing step.
Abstract: A method of comparing an input pattern with a memory pattern includes the steps of loading a representation of said input pattern into cells in an input layer; loading a representation of said memory pattern into cells in a memory layer; loading an initial value into cells in an intermediate layers between said input layer and said memory layer; comparing values of cells in said intermediate layers with values stored in cells of adjacent layers; updating values stored in cells in said intermediate layers based on said step of comparing; and mapping cells in said memory layer to cells in said input layer.
Type:
Grant
Filed:
March 29, 2004
Date of Patent:
September 9, 2008
Assignee:
Applied Neural Technologies Limited of Woodbourne Hall