Altpass LLC v. Apple Inc

Filing 1

COMPLAINT ( Filing fee $ 402 receipt number 0542-15080913), filed by Altpass LLC. (Attachments: #1 Exhibit Exhibit A, #2 Exhibit Exhibit A-1, #3 Exhibit Exhibit B, #4 Exhibit Exhibit B-1, #5 Exhibit Exhibit C, #6 Exhibit Exhibit C-1, #7 Civil Cover Sheet Civil Cover Sheet)(Massand, Neal)

Download PDF
EXHIBIT B US007725725B1 O (12) United States Patent (10) Patent N0.2 Odom (54) US 7,725,725 B1 (45) Date of Patent: 10/2002 Bromba et a1. ............ .. 455/411 11/2002 Sharma et a1. ............ .. 704/270 ( N ) _ Gary Odom, 123 NW- 121114919, #1545, _ 6,618,806 B1 * POIT1and,OR(U$)97209 * Inventorr 6,466,781 B1* 6,480,825 B1* (76) USER-SELECTABLE SIGNATURES *May 25, 2010 6,636,975 B1 * 10/2003 Khidekel et a1. ............ .. 726/10 6,647,400 B1 * 11/2003 Moran ...................... .. 707/205 S b_ Once" d_ 1 _ h f hi u JeCUO any 15° almerat etermo t 5 9/2003 Brown et a1. .............. .. 713/186 6,647,498 B1* 11/2003 C110 .......................... .. 726/17 Patent 15 extended or adlusted under 35 6,651,168 B1 * USC‘ 1546’) by 733 days‘ 6,657,614 B1 * 12/2003 110 etal. ................... .. 345/168 patent is Subject to a tenninal dis_ 11/2003 K30 et a1. ................. .. 713/185 6,671,813 132* 12/2003 Clainmr~ ....................... .. 726/3 6,732,278 B2* 6,751,734 B1* (21) (22) Filed: 6/2004 6,766,456 B1 * APPL NO; 11515966 5/2004 Balrd et a1. .................. .. 726/7 7/2004 McKeeth ..................... .. 726/2 Uchida ..................... .. 713/186 6,895,514 B1* 5/2005 6,948,154 B1 * Dec. 23, 2006 9/2005 Rothermel et a1. ........ .. 717/128 6,957,337 B1* Related U-s-Applicatioll Data . . Chainer et a1. ............ .. 713/186 7,065,786 B2* 7,200,804 B1* * On . (60) 52031350111211apphcanonNO'60/286’457’?1edmApr' (51) Int-ClH04L 9/32 (52) 4/2007 Khavari et a1. ............. .. 715/230 Martinez et ......... 6/2008 Sanaiet a1. B2* Field of Classi?cation Search ............... .. 713/176, ’ 7,409,705 B2* ............... .. 713/183 U.S.Cl. ..................................... .. 713/176; 713/183 (58) 6/2006 Taguchi ..................... .. 726/18 7,386,731 Man 4’ 2002, of application7,350,078 Continuation HOW PaLNQ NO_ . 10/2005 Kermani .................... .. 726/19 ' 7,444,517 B2* 7,506,174 B2* 2001/0047488 A1* (200601) 713/183 See app11cat1on ?le for complete search h1story. (56) 8/2008 Ueda et a1. ................... .. 726/5 10/2008 Dayan et a1. .............. .. 713/184 3/2009 Davis et a1. ............... .. 713/186 11/2001 Verplaetse et a1. ........ .. 713/202 (Continued) Primary ExamineriDaVid Garcia Cervetti References Cited (57) ABSTRACT U.S. PATENT DOCUMENTS 5,226,172 A 7/1993 5,229,764 A 5,442,342 A 5,491,752 A 7/ 1993 Matchett 8/1995 Kung 2/1996 Kaufman et a1, Computer 1og1n may compnse any user-determmed submls sion. A user may select among different devices for input, selectthe signal content, andas Well selectthetypes of signals 5,638,513 A * 6/1997 Ananda ....................... .. 726/5 used for a login signature. Account identi?cation may be 5,664,099 A * 9/ 1997 Ozzie et a1. A 5,896,497 A $1 Seymour et a1. * et a1. . . . . inferred by signature rather than explicitly stated. A plurality . . . . . . . . . . . .. of discontiguous data blocks in a 4/1999 Hfllstead 51318;? 6,205,204 B1 3/2001 Jalili 6,442,692 B1 ?ilgllfti?lzlgigill‘llOus, regardless of the prospects for success 3/2001 Morganstein et a1. 6,209,104 B1 of ?les may be employed for Validation. The paths to data used in Validation ' 8/2002 Zilberman 20 Claims, 10 Drawing Sheets 801 KEY FILE 62 KEY INDEX 61 KEY INDEX (611 INITIAL Kev INDEX) -- 210KEYCODE 211 KeYsTRoKe TIMING Z12 Mouse CLICKS 213 MOUSE VECTOR Z14 Mouse LOCATION 215 Mouse SHAPE 216 Mouse Sveen 217 KEY KL MOUSE CLICK §J ENTRY US 7,725,725 B1 Page 2 US. PATENT DOCUMENTS 2002/0002678 2002/0002685 2002/0083339 2002/0087894 A1* A1* A1* A1* 1/2002 Chowetal. ............... .. 713/169 1/2002 Shim ........................ .. 713/200 6/2002 Blumenau et a1. . 7/2002 713/201 Foley et a1. ............... .. 713/202 2002/0091937 2002/0141586 2003/0056120 2004/0128508 2006/0036547 A1* 7/2002 A1* 10/2002 A1* 3/2003 A1* 7/2004 A1* 2/2006 * cited by examiner Wheeler et a1. Yasuhara ........... .. 713/170 ................... . . 70 5/44 US. Patent May 25, 2010 100 COMPUTER 101 DISPLAY DEVICE Sheet 1 0f 10 US 7,725,725 B1 9 SUBMISSION 3 IDENTlb‘lCATlON 1I TRANSMISSION(S) 102 CPU 21 SIGNAL(S) 103 STORAGE 104 MEMORY 4A SIGNATURE 105 RETENTION 1A TRANSMISSION(S) DEVICES(S) 2A SIGNAL(S) 106 INPUT DEVICE(S) 107 POINTING DEVICE (E.G. MOUSE) FIGURE 3 108 KEYBOARD 9 SUBMISSION 109 BIOMETRIC DEVICE 4s SIGNATURE 1S TRANSMISSION(S) FIGURE 1 2S SIGNALS FIGURE 4 97 ACCESS AUTHENTICATION 9 SUBMISSION 11 TRANSMISSION TYPE 2 SIGNAL 21 SIGNAL TYPE 18 VALIDATION 22 SIGNAL DATA 27 AUTHORIZATION FIGURE 2 FIGURE 5 US. Patent May 25, 2010 US 7,725,725 B1 Sheet 2 0f 10 108 KEYBOARD 2 SIGNAL DCICIDCICIDCICIC] DUDE] DUUCICICIUUUC] UCICIU CICICICICICICICICIC] :10 CJCICIU DC] :1 DC] 1 TRANSMISSION DUUCICICIUUC] DOC] —> 2S SIMPLE SIGNAL 107MOUSE OR 1 TRANSMISSION —> 2S SIMPLE SIGNAL IOSKEYEOARI) DDUUUDDDUC] DUDE) CICICIUCICICIDUC] UCIOU lMTRANSMISSION UUUUUUUDC] DUE] OOOOOOODOC] C10 j CJCJCJU DC] :1 DC] —> 20 COMPOSITE SIGNAL [[1 AND FIGURE 6 107 MOUSE US. Patent May 25, 2010 US 7,725,725 B1 Sheet 3 0f 10 7 8 ACTIVE TERMINATION 77 PASSIVE TERMINATION 9 SUBMISSION 9 SUBMISSION 2 INPUT 2 INPUT SIGNALS SIGNALS 1 TRANSMISSION 1 TRANSMISSION 25 OVERT TERMINATION 26 TERMINATION () CONDITION ‘? 23 SUBMISSION TERMINATION 23 SUBMISSION TERMINATION FIGURE 7 61NO FIGURE 8 63 NO US. Patent May 25, 2010 Sheet 4 0f 10 US 7,725,725 B1 ( 41 TEXT INPUT DIALOG ( 40 SCREEN \ \ 42 TEXT INPUT CONTROL TEXT INPUT \\/ 43 ACKNOWLEDGE BUTTON OK \/ I TRANSMISSION <25 TERMINATE FIGURE 9 _ 2 SIGNAL |Z| LOCATION \ 21 SIGNAL TYPE III SPEED |X| VECTOR _|:| SHAPE TEXT INPUT OK FIGURE 10 US. Patent May 25, 2010 Sheet 5 0f 10 US 7,725,725 B1 99 ACCOUNT INPUT 2 INPUT SIGNALS 10 ACCOUNT CREATION 13 PACKAGING 14 ENCRYPTION 15 SEQUENCING - 16 KEY CREATION / EMPLOYMENT FIGURE 11 6KEY 7 NEXT KEY TRAJECTORY PACKAGING FIGURE 12 16 KEY UNIT 6 KEY 8 KEY FILE 109 ACCOUNT FIGURE 13 US. Patent May 25, 2010 Sheet 6 0f 10 US 7,725,725 B1 801 KEY FILE 62 KEY 61 KEY INDEX / INDEX (61 1 INITIAL KEY INDEX) ENTRY r----- 210 KEY CODE 21 1 KEYSTROKE TIMING - _ _ ____ _. _ __, 212 MOUSE CLICKS 213 MOUSE VECTOR 214 MOUSE LOCATION i 215 MOUSE SHAPE 217 KEY & SPEED 216 MOUSE MOUSE CLICK6215 6210 FIGURE 14 5 US. Patent May 25, 2010 Sheet 7 0f 10 US 7,725,725 B1 180 POST-SUBMISSION VALIDATION 9 SUBMISSION 2 INPUT L SIGNALS V 47 ACCUMULATB SIGNAL DATA i 45 NO 44 SUBMISSION COMPLETED 18 VALIDATION i 27 AUTHORIZATION 181 INCREMBNTAL VALIDATION FIGURE 15 9 SUBMISSION 2 INPUT L SIGNALS V 18 VALIDATION CONTINUING INPUT l 27 AUTHORIZATION FIGURE 16 US. Patent May 25, 2010 18 VALIDATION Sheet 8 0f 10 US 7,725,725 B1 @ 808 i l 818 (9 50 ACCUMULATE INITIAL SIGNAL KEYS 51 DISCARD UNMATCHED KEYS 52 FOR EACH POSSIBLE INITIAL SIGNAL KEY 56 FOR EACH SIGNAL FOR EACH REMAINING KEY ¢ 61 ¢ 6 SIGNAL MATCH? 55 ACCUMULATE POSSIBLE KEYS 59 DISCARD KEY 70 808 73 NO KEY REMAINING K) 33 MATCH RESULTS 71 NEXT KEY TO: 27 AUTHORIZATION v 75 NO FIGURE 17 TRAJEETORY 74 YES US. Patent May 25, 2010 Sheet 9 0f 10 US 7,725,725 B1 _ I. m l I I I > UUB M m V S DA U w I l l l 9N 00 A I I I I R Y I l l l I I I I Wm w n 00 S l l l /_ T ST I I I I l l l l mm mF 73 T2 I I I I mm IC 2 J YY % m H NYT 7 m MY s l Um YM Tm TAR Yw m1 1 l l l I I I l Uw vY @O mm 7 "MTNJ MEIS a n l l l I I A Q M w, w Um EAm WPW LM M E I I I L l m Y T HE M T l l l WE 0a w _I I I I l l l l I I I I l l l l I I I I l l l I I I 38 RETRY A AUTHORIZATION F B U RE 1 8 72 YEs — AUTHORIZATION 37 ACCESS DENIED SUCCESS US. Patent May 25, 2010 Sheet 10 0f 10 9 —’ SUBMISSION US 7,725,725 B1 2INPUT L 18 VALIDATION SIGNALS 71 FIRST KEY TRAJECTORY 81 INITIAL KEY FILE 7W WRONG KEY TRAJECTORY 8W WRONG KEY FILE 72 SECOND KEY TRAJECTORY TERMINAL KEY FILE 7N LAST KEY TRAJECTORY @ 33 MATCH RESULTS 63 YES FIGURE 19 38 RETRY ? : 65 NO 37 ACCESS DENIED 86 NO < AUTHORIZATION FAILURE US 7,725 ,725 B1 1 2 USER-SELECTABLE SIGNATURES These aspects are independent: one does not rely upon the other. Any one or all may be employed to enhance computer login security. CROSS-REFERENCE TO RELATED APPLICATIONS Access privileges for accounts are not germane. Determin ing or setting account access privileges are separate opera tions that occur after submission validation and authorization. This application is a continuation of US. patent applica tion Ser. No. 10/090,520 ?led Mar. 4, 2002 now US. Pat. No. BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS 7,350,078, Which is a non-provisional ?ling of provisional application 60/286,457, ?led on Apr. 26, 200l.As such, this application claims priority to Apr. 26, 2001. FIG. 1 is a block diagram of a computer suitable for prac ticing the invention. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT FIG. 2 depicts the access authentication process. FIG. 3 depicts an embodiment of identi?cation and signa ture comprising submission. FIG. 4 depicts an embodiment of signature solely compris Not Applicable ing submission. FIG. 5 depicts classifying signals by their transmission and THE NAMES OF THE PARTIES TO A JOINT RESEARCH AGREEMENT Not Applicable signal types. 20 FIG. 7 depicts active submission termination. FIG. 8 depicts passive submission termination. INCORPORATION-BY-REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC Not Applicable 25 FIGS. 9 & 10 depict example submission screens. FIG. 11 depicts account creation. FIG. 12 depicts a key. FIG. 13 depicts a key unit. FIG. 14 depicts an example of key indexing. BACKGROUND OF THE INVENTION 1. Field of the Invention FIG. 6 depicts simple and composite signals. 30 FIG. 15 depicts validation after submission termination. FIG. 16 depicts incremental validation. FIG. 17 depicts the validation process. The relevant technical ?eld is computer login security. 2. Description of the Related Art resulting in access. Including Information Disclosed Under 37 CFR 1.97 and FIG. 19 depicts an example of validation key trajectory resulting in authorization failure. FIG. 18 depicts an example of validation key trajectory 1.98 Computer login traditionally consists of a user typing in an 35 DETAILED DESCRIPTION OF THE INVENTION account name and a passWord. Historically, access validation (authenticating a passWord one an account name is known) FIG. 1 is a block diagram of a desktop computer 100 Which has been through reading data from a single passWord ?le comprising account name and encrypted passWord. Once a single account and a typed passWord is known, system secu rity can be compromised. Once encryption for a single pass Word is broken, all other passWords are potentially com prised, as all passWords and account names are conveniently located in the single passWord ?le and use the same encryp tion. comprises a CPU 102; storage 103, Which comprises memory 40 104 and optionally one or more devices With retention medi um(s) 105 such as hard disks, diskettes, compact disks, or tape; an optional display device 101; and one or more input devices 106, examples of Which include but are not exclusive to: a keyboard 108; one or more pointing devices 107, such as 45 a mouse; or a biometric device 109, such as a ?ngerprint reader. The mouse is the most popular pointing device 107 for desktop computers 100. In the description beloW, mention of BRIEF SUMMARY OF THE INVENTION a mouse is meant to include pointing devices 107 of any type, including, for example, a pen or stylus used in computing Computer login may comprise any user-determined sub mission, including a plurality of transmissions for Which 50 devices Where a user may “Write” upon a screen. The submission may be passively terminated. Preferably a user determines the input devices and signal types as Well as the content of signals. This makes submission theft more dif?cult 100. As Well, the softWare described may ?nd application in other computer-like devices requiring secured access, includ and less likely. Account identi?cation may be inferred by signature rather than explicitly stated. Overt account identi?cation provides described softWare may be employed on such a computer ing hand-held or embedded devices. 55 an entry point for hacking; With inferred account identi?ca for example, fuzzy logic or neural netWork pattern matching; tion, this entry point is eliminated. A plurality of discontiguous data blocks (keys) in a one or more ?les may be employed for validation. This ameliorates or, random or pseudo-random determinations. A random or 60 pseudo-random technique that results in seemingly arbitrary selection, the equivalent of softWare rolling dice, is referred to having a single authentication key that, once accessed, may as non-deterministic. be deciphered and security compromised. Multiple trajectories to keys, hence multiple paths to authorization as Well as ersatz trajectories and paths When submission Will not garner authorized access, obfuscate vali dation protocol to spy softWare and devices. In the folloWing description, softWare-determined protocol includes exemplary methods or techniques such as algo rithms; or non-algorithmic methods or techniques, including, In the folloWing description, protocols, algorithm types, 65 data types, and types of data, such as transmission 11, signal 21, packaging 13, sequencing 15, or encryption 14 types or protocols, are identi?able using binary identi?cation codes (type identi?ers), by data length, or other data signature, such US 7,725 ,725 B1 3 4 as a uniquely identi?able bit pattern, or by convention, such as known location (offset) Within a data structure. FIG. 2 depicts the access authentication process 97, com may be employed if identi?cation 3 or signature 4s does not represent the actual account identi?er 109. prising submission 9, validation 18, and authoriZation 27. security precaution to preclude unauthorized access 39. His torically, a single signal 2 of a single transmission 1 has typically been used for a signature 4, namely a passWord, Which is a signature 4 of a single Word of text. A pass-phrase A signature 4 is at least one transmission 1 intended as a Naturally, an account 109 must be created 10 before any access authentication process 97 may occur. Submission 9 comprises one or more transmissions 1 intended for authenticating access to a computer 100 or net is a signature 4 of a plurality of Words of text. A plurality of transmissions 1 or signals 2 may be used for Work of computers 100. As depicted in FIG. 3, in one embodi ment, a submission 9 comprises identi?cation 3 and signature identi?cation 3 or signature 4. In some embodiments, a user 4. Historically, an account name Would be an identi?cation 3, may determine the transmission(s) 1, signal(s) 2, transmis and a passWord a signature 4. If surety of uniqueness may be sion type(s) 11, or signal type(s) 21 that comprise a submis sion 9. Altemately, transmission 1 or signal 2 determination assured, in an alternate embodiment, a submission 9 com prises a single signature 4s, as depicted in FIG. 4, supplanting separate identi?cation 3 & signature 411 While providing for accords With a software-determined protocol. the dual components of identi?cation 3 and signature 4. With submission 9 solely comprising signature 4s, an account 109 may be identi?ed by the signature 4s data itself, or by having match 5 to input 22: for example, no deviance from a char Historically, validation 18 has required an absolute signal acter-based passWord has been permitted. With mouse 107 movements, or other dif?cult-to-exactly-replicate signals 2, hoWever, some tolerance may be permitted. Signal 22 toler an account identi?er 109 embedded Within a key 6 that has been accessed during validation 18 of the signature 4s. A transmission 1 is user input into the computer 100 via one or more input devices 106, Whereupon termination of transmission 1 is recognizable, and resulting in at least one signal 2. There may be different types 11 of transmissions 1, examples of Which include mouse 107 movements or clicks, keyboard 108 entry, or combinations thereof. Other types 11 of transmissions 1 are possible With different input devices 106, such as, for example, voice transmission 1 if the com puter 100 is equipped With a microphone and speakers. Multiple-device 106 transmission 1m is conceivable. An 20 ance should be alloWed When appropriate, and may be set by softWare-determined protocol or user selection. For example, deviance up to 10% from recorded signal match 5 for key stroke timing 211 may be acceptable. Similarly, as another 25 pixels and still be tolerated. As multiple signals 2 may com prise a submission 9, the need for exactness for any single signal 2 to properly authenticate access 97 is lessened. example, mouse click location may vary Within a radius of 10 Termination of submission 9 may be active or passive. FIGS. 7 & 8 illustrate. Inputting a passWord or pass-phrase, 30 example of a multiple-device 106 transmission 1 is a combi the mouse 107. As another example, inputting mouse 107 movement may be actively terminated by a mouse 107 click. nation of mouse 107 movement While one or more keys 108 are pressed, as depicted in FIG. 6. A signal 2 is a set of related softWare-recogniZable data from a single transmission 1. A plurality of signals 2 of With active termination 78, a user terminates submission 9 35 different types 21 may emanate from a single transmission 1. example: mouse 107 movement of the cursor may yield sig 107 movement or sound for a limited time, or until a certain 40 previous transmission 1 termination. For example, changing 45 from cursor/mouse movement to mouse button clicking may 50 be considered a change in signal type 21, and hence a possible basis for passive termination. Biometric transmission 1 is typically passively terminated 77: softWare terminates sub mission 9 When su?icient biometric signals 2 have been recorded. types 21 from a single-device transmission 1. Signal data 22 may be categoriZed by its transmission type 11 and/or signal type 21, as depicted in FIG. 5. For easy identi?cation, each possible transmission type 11 or signal type 21 may be assigned a unique ordinal. Hypothetically, if elapsed time absent further input; until su?icient signal 2 has been input to alloW a signal match 5; or until a succeeding transmission 1 of another transmission type 11 or signal type 21 commences, the change of type 11 itself indicative of 215. A transmission 1 of composite signals 2C comprising a plurality of simple signals 2S is conceivable. For example, a multiple-device 106 transmission 1m produces a composite signal 2C if matching to signals 2 of both devices 106 is required, as does requiring signal match 5 of multiple signal through a prescribed indication 25. With passive termination 77, softWare terminates submission 9 Without overt user action, but instead When a predetermined condition is met 26. Examples of pas sive termination 77 include: recording mouse For example, typing a Word may yield the signals 2 of entered keys 210 and the timing betWeen keystrokes 211. Another nals 2 of locations 214, velocities, duration, and shape pattern (s) (such as script signatures, draWn characters, and so on) for example, is typically terminated by pressing the ‘Enter’ key or clicking an equivalent acknoWledge button 43 using Termination 23 of identi?cation 3 or signature 4 may occur using any number of protocols: passively 77 by a predeter a multiple-device 106 transmission 1 is identi?ed as a unique mined or user-selected number of transmissions 1; ?nal trans transmission type 11, the range of transmission types 11 may extend to the factorial of all possible input devices 106, depending upon the embodiment employed. To avoid unnec essary complication, consider signal type 21 as potentially mission 1 by a particular type of action; active termination 78 by a ?nal gesture, such a key or button press; passive termi 55 nation 77 by time out of a predetermined duration or su?i ciency of data collection. Another example: incremental vali dation 181 permits passive termination 77 via absence of next additive (rather than combinatorial): for example, a key mouse transmission 1 could be considered as comprising key 108 plus mouse 107 signals 2, rather than some uniquely key trajectory 7, or, alternately, completed signal matching 5 60 identi?able key-mouse signal type 21. account 109 creation submission 9 screen 40, employed to input at least a signature 4. (In one embodiment, account identi?ers 3 may be assigned.) Text transmission(s) 1 can be Identi?cation 3 is at least one transmission 1 of an account identi?er 109. Historically, identi?cation 3 has been a keyed in account name 109. Employing the invention, identi?cation 3 comprises at least one signal 2 from at least one transmis sion 1. A translation table, algorithmic method, or other soft Ware-determined protocol, With or Without encryption 14, of all relevant keys 6. FIGS. 9 & 10 depict an example account input 99 or post 65 input in the text input dialog 41 comprising a text input control 42 and acknoWledge button 43. Signature 4 transmis sion(s) 1 can be input, and input signals 2 recorded. FIG. 9 US 7,725 ,725 B1 5 6 depicts dragging the text input dialog 41 doWn the screen 40 2 basis. If a plurality of protocols are used for encryption 14, the protocol 14 employed must be identi?able. as a transmission 1 (by pressing the proper mouse 107 button When the cursor is over an appropriate section of dialog 41, As a suggestion for encryption 14, initial input signals 2 in thus selecting the dialog 41, then moving the mouse 107 While keeping the button pressed). The dragging action in this example is terminated by a mouse-up (releasing the mouse the ?rst transmission 1 may comprise a parametric seed for encrypting one or more keys 6. Caution is advised if non exact signal matching 5 is tolerated, as close may not good be enough for decryption using such a seed technique, but it is possible to incorporate tolerance into an encryption 14 algo 107 button). In one embodiment, a user may determine as part of rithm, so that an acceptable margin of error for signal match ing 5 may also suf?ce for decryption as Well. Mathematical account creation 99 Which signal types 21 are to be consid ered for validation 18 of subsequent submissions 9. This is an editing process that may be construed as part of account input rounding is a suggested technique alloWing such tolerance; as 99. For example, after submission termination 23, having recorded signals 2 for account input 99, as depicted in the Well employing a subset of possible signals 2, such as a high example of FIG. 10, the user may select, via checkbox con trols as shoWn, Which signal types 21 of the transmission 1 depicted in FIG. 9 are to be considered for the transmission 1 such as median or mean. being recorded. The checkboxes are speci?c to types of sig nals 21 appropriate to the type of transmission 11 employed. In the described example, the checkboxes (for signal type 21 selection) appear only for account input 99, not When a user is and loW, or using one or more algorithmically-derived values, Signal sequencing 15 is codi?cation of the order of signals 2. Signal sequencing 15 may be predetermined (softWare determined), such as, for example, input order, or, alternately, a predetermined prioritization. In alternative embodiments, signal sequencing 15 may vary by software-determined pro 20 tocol or by user selection. If a plurality of protocols are used making an submission 9 after an account 109 has been cre for signal sequencing 15, the protocol employed must be ated, as the prerequisite signals 2 for signature 4 or identi? cation 3 have already been stored. identi?able. FIG. 9 depicts a button 25 for submission termination 78.A termination button 25 or its equivalent is necessary only With active termination 78. Initial input for account creation 10 may use active termination 78 Which is later edited out during a subsequent signal 2 and transmission 1 selection process, ing further opportunity for obscuring decipherment of pack aging 13 protocols. Sequencing 15 and encryption 14 may be combined, offer 25 During account creation 10, each selected signal 2 is optionally encrypted 14, encoded for subsequent signal matching 5, and stored in keys 6, Which are stored in key ?les resulting in passive termination 77. There is an embodiment Whereby a user may determine some or all of the transmissions 1 or transmission types 11 30 comprising account input 99. There is an embodiment Whereby a user may determine Which signal types 21 of select transmissions 1 comprise account input 99. Otherwise, soft Ware-determined protocol may determine all or some trans missions 1 or signals 2 comprising account input 99. In one embodiment, account input 99 captures all trans mission 1 signals 2 until actively terminated 78. In an alter nate embodiment, account input 99 may be passively termi nated 77. In one embodiment, transmissions 1 and signals 2 from account input 99 may be edited, the user selecting sig 35 40 function as a plurality of keys 5 in alternate embodiments, a key 6 may comprise a key unit 16. A key ?le 8 as an actual or 45 50 13, and key 6 creation or employment 16. Packaging 13 tells hoW to interpret keys 6, including stored potential collection of keys 6 a key unit 8. An established account 109 may be considered a virtual aggregation of the keys 6 used to validate 18 submission 9 for that account 109, hence also represents a key unit 16. A key ?le 8 comprises at least one key 6. A key ?le 8 may Which account input 99 provides one or more signals 2 from one or more transmissions 1 for packaging into one or more As depicted in FIG. 11, a key unit 16 is a virtual or actual collection of signal matches 5. As in one embodiment a single key 6 may have a plurality of signal matches 5, and thereby type user-determined. FIG. 11 depicts account creation 10, in the beginning of keys 6. Each user account 109 has at least one key 6 for access authentication 97. There are tWo aspects to account creation 10: packaging 10, this can be veri?ed by attempting to validate 18 the appro prior to establishing the account 10. A key 6 may contain account 109 identi?cation 3. and termination types are employed as account submission 9. signals 2 may not be edited or user-selected, or termination 23 accounts Where submission 9 comprises signature 4s, the signature 4s itself must be unique. During account creation priate component of a submission 9 for a neW account 109 nals 2 and termination, such that only select, edited signals 2 In alternate embodiments, as aspects of account input 99, 8, for subsequent access authentications 97. As in the prior art, each account 109 must be unique. For accounts 109 Where submission 9 comprises identi?cation 3 and signature 4A, identi?cation 3 must be unique. For 55 comprise a plurality of keys 6, or What deceptively may be keys 6: a key ?le 8 may have pseudo-keys as key ?le 8 ?ller. In one embodiment, key ?les 8 may be a uniform number of bytes, regardless of the number of keys 6 stored in a key ?le 8. Keys 6 may be in ?les 8 not exclusively comprising keys 6 (or pseudo-keys); in other Words, a key ?le 8 may as Well be match signals 5. Overt packaging 13 is optional, and may vary employed for other purposes, including ?les 8 comprising by embodiment. Packaging 13 may be implicit by softWare determined protocol, obviating the need for overt, data-based unrelated data or even executable code. packaging 13. There may be tWo optional aspects to packag 13, at least one signal match 5 facility, and at least one next ing 13: encryption 14 and signal sequencing 15. As depicted in FIG. 12, a key 6 may comprise packaging 60 of key 6 data. Encryption 14 is optional, but recommended. Encryption 14 employment may vary by embodiment. In one embodiment, the same encryption 14 protocol or algorithm is used throughout (thus, predetermined). In alternative embodiments, encryption 14 may vary by softWare-deter mined protocol or by user selection on a per-user or per- signal key trajectory 7. In alternate embodiments, key 6 composition varies; the minimum requirement is that a key 6 comprises at least one signal match 5. Packaging 13 and next key trajectory 7 inherency may vary. A signal match 5 is a signal 2 stored in a key 6 during Encryption 14 refers to encrypting or decrypting all or part 65 account creation 10, used for validation 18 of a subsequent submission 9 signal 2. A key 6 may comprise a plurality of signal matches 5. US 7,725 ,725 B1 7 8 A next key traj ectory 7 vectors validation 18 to the next key 6, or, if the terminal key 62, results in forwarding match results 33 for authorization 27, by absence of next key trajectory 7 in one embodiment. Next key trajectories 7 are a sequential be sorted. For example, keys 6 for initial signals 21' may be arranged in binary sorted order by signal type 21 and signal 2. Key ?les 8 may be organized by account 109, or by trans mission type 11. Key ?les 8 may be organized by signal type 21, With keys 6 Within ?les 8 organized by input ordinal. Alternately, an initial key ?le 8i may comprise all possible initial keys 61' (of ?rst signal matches 5), possibly organized or organizational facility for keys 6. Next key trajectories 7 may be obviated by having a single key 6 With suf?cient contiguous signal matches 5 for valida tion 18, Whereupon the signal matches 5 Within the key 6 are sequenced, organized, indexed, or otherWise knoWable by softWare-determined protocol in relation to packaging 13. As the correspondence of signal match 5 to key 6 varies by indexed by signal type 21. One or more key ?les 8 may contain one or more indexes 61 to keys 6 Within their respec tive ?les 8. A key ?le 8 may include an index, or key ?les 8 themselves embodiment, so too Where a next key trajectory 7 leads. Depending upon restrictions that may be imposed in an embodiment, a next key trajectory 7 may lead to a key 6 in the same key ?le 8 as the last key 6, a key 6 in another key ?le 8, or the same key 6 if the key 6 holds a plurality of signal matches 5. Next key trajectory 7 provides all or part of a reference to the next key 6 used in validation 18, if there is a next key 6. A next key trajectory 7 may be encrypted 14. A next key trajectory 7 may be combined With other data be indexed. The next key trajectory 7 may provide next key 6 lookup via an index 61. A key ?le 8 may include an index 611' to initial signal keys 6i. The index 61 may comprise key trajectories 7, including key trajectories 7 to possible ?rst keys 61', Which may be organized by transmission type 11 and/or signal type 21. FIG. 14 depicts an example of key 6 indexing. Key 6 20 that may have been or need to be mathematically transposed to determine the next key 6. For example, all or a portion of an account 109 identi?er 3, part of a signal match 5, or some portion of packaging 13 may be combined With the next key trajectory 7 as a next key 6 identi?er. Next key trajectory 7 25 this example, checking possible initial keys 6i constitutes may comprise or reference an offset in a key ?le 8. A next key initial key trajectory 71. One or more next key trajectories 7 in an initial key 61' may indicate keys 8 for succeeding signal matching 5, like links in a chain, so only an index of initial trajectory 7 may reference a key index entry 62. A key 6 may include a plurality ofnext key trajectories 7, in Which case a different next key trajectory 7 may be selected based upon signal match 5 resultsione or more next key trajectories 7 for a correct signal match 5, likeWise for an keys 61' is required. Alternately, a single key 6 may contain all necessary signal matches 5 for validation 18. Wrong signal match 5. With a plurality of next key trajectories 7, a next key trajectory 7 may be selected based upon signal match 5 results, or by software-determined protocol, or a combination thereof. Packaging 15 may be encoded as part of the next key trajectory 7. For example, a next key trajectory 7 may include the signal sequencing 15 that identi?es next signal match 5 type 21. In this instance, if the next input signal 2 cannot be of 35 40 security. Signature 4 has played gate-keeper to unauthorized 45 50 6 comprising multiple signal matches 5, one for each simple signal 2 (key code 210 and mouse click 212), or, alternately, Without key ?le 8 organization or key indexing 61, more keys 6 may need to be considered than just those keys 61' for initial signal matches 5. With next key trajectories 7 referring to subsequent keys 6, optimally, only potential initial keys 61' need be searched to commence validation 18. An initial key 61' that may ultimately lead to authorized 27 FIG. 15 depicts post-submission validation 180: input sig access 39 must associate to an account 109, either directly or 55 cannot succeed 86 that may not associate to an account 109 for Which access 39 may be obtained. A key unit 16 for Which authorized 27 access 39 is unobtainable is referred to as a fake key 6w. Organize key units 16 as an optimization. Various conven zation. reference multiple keys 6, each With simple signal matches 5 that altogether comprise the composite signal 2. access 39, not account identi?cation 3. by reference. There may be keys 6 for Which authorization 27 A key index 61 may reference keys 6 in different ?les 8. As depicted in the FIG. 14 example, initial key index 611 entries 62 reference keys 6 of the same input signal type 21. Initial key code keys 210, for example, reference keys 6210 in the same ?le 801 as the index 611, While keystroke timing keys 6211 referenced by the keystroke timing index entry 211 reside in another key ?le 802. Key indexing 61 is an optimi A key code & mouse click key index entry 217 is depicted in FIG. 14 as an example of a composite signal 2. The key code & mouse click key index entry 217 may reference keys the same type 21 as the next signal match 5, authorization 27 may fail 86. Knowing that at that point, a Wrong trajectory protocol 7w may be invoked to avoid identifying a proper key unit 16. A submission 9 comprising identi?cation 3 folloWed by signature 4a is easier to validate 18 than a submission 9 solely comprising signature 4s: knoWing an account identi?er 3 provides the means to knoW What the signature 411 should be. Historically, identi?cation 3 has not been relied upon for indexing 61 or organization is recommended When submis sion solely comprises signature 4s Where a user may input signals 2 in any user-determined manner. Depicted in FIG. 14 is a key ?le 801 With a key index 61, speci?cally an initial key index 611. The depicted initial key index 611 contains refer ences to keys 61' that contain at least initial signals 2. In the FIG. 14 example, only initial keys 61' are indexed. In 60 tions of organizing or indexing accounts 109, keys 6, and key nals 2 are accumulated 47 and submission 9 completed 46 before validation 18 commences. FIG. 16 depicts incremental validation 181: validation 18 is concurrent With submission 9 transmission 1. In other Words, With incremental validation 181, validation 18 may progress With each signal 2 or trans mission 1. ?les 8 may be employed. In alternate embodiments, the same Submission termination 23 must be knoWn using post submission validation 180. This is a potential draWback: organizing principles may be applied at the level of key 6, key unless softWare-determined protocol determines submission ?le 8, or account 109. Optimally, keys 6 are organized to facilitate rapid search for signal matches 5, particularly for ?nding initial signals 2i When submission 9 solely comprises signature 4s. Keys 6 may termination 23, passive termination 77 cannot be accom 65 plished using post-submission validation 180; active termi nation 78 must be used. For full user-determined submission 9, employ incremental validation 181, Which has the con US 7,725 ,725 B1 10 comitant advantage of immediate knowledge of authorization results 33 for authorization 27. In the depicted example, input signals 2 are validated 18 in input order interactively 88 With input 2. In other Words, validation 18 is incrementally con failure 86, allowing Wrong key trajectory 7w protocol inter posing. FIG. 17 depicts the validation 18 process, Which is similar regardless Whether post-submission validation 180 or incre mental validation 181 is employed. temporaneous 88 With submission 9. In an alternate embodi ment With alternate sequencing 15, input signal 2 validation 18 may not commence until submission 9 is completed 46. The described example facilitates rapid authorization 27 by Incremental validation 181 may commence once the ?rst transmission 1 completes, or, in a more sophisticated embodi incremental validation 18. Actually, While access 39 may ment, ongoing 88 With signal input 2. In a concurrent valida tion 181 embodiment, initial signal keys may be accumulated 50 and subsequent unmatched keys discarded 51 concurrent marginally be accelerated by incremental validation 18, only lack is authorization 86 is notably rapidly facilitated, as con tinued input 2 of a submission 9 that cannot possibly be With transmission 1, on a signal-by-signal 2 basis. validated 18 may be interrupted so that a user may retry 63. Validation 18 commences by accumulating possible keys FIG. 19 depicts an example of an embodiment employing 55 based upon signal match 54 betWeen signals 2 of the ?rst transmission 1 and possible initial signal keys 52. For subse quent transmissions 1, accumulated keys are discarded 59 by failure to match signals 57. Match results 33 are passed to a Wrong trajectory protocol 7w. Wrong trajectory protocol 7w is employed as a means of obfuscation targeted at computer monitoring devices. In the depicted example, keys 6 are con structed With multiple key trajectories 7, With at least one trajectory to a succeeding key 6 Whereupon authorization 27 may succeed 72, and at least one trajectory 7w Whereupon authorization 27 When there are no keys remaining 73 or no next key trajectories 7 for remaining keys 75. As long as there are remaining keys 34 With next key trajectories 74, the pro 20 that cannot result in successful authorization 86: Whatever one-to-one correspondence betWeen signal match 5 and key 6. Through access to one or more keys 6 Which may reside in 25 one or more key ?les 8, validation 18 produces signal match results 33, upon Which authorization 27 permits access 29, alloWs retry 28 of submission 9, or denies access 27. Full submission 9 comprises a set of signals 2 upon Which access 39 may be granted 72. Incomplete submission 9 com prises a set of signals 2 to Which additional user input is either for authorization success 72 or failure 86. 30 upon signal match 5 results, one of the three right or Wrong 35 acter) codes 210, and timing of key strokes (rhythm) 211. As 40 signals 2. It may be, for example, that user-selected signal 45 this example, though With incremental signal matching 5, this 50 recording user input signals by type from at least one user-selected device among a plurality of selectable user input devices connected to a single computer, Wherein a signal comprises a set of related softWare-rec ognizable data of the same type received from at least 55 sion 1 to tWo possible accounts meriting validation 18 consideration. In this example, subsequent input signals 2 narroW validation 18 to a single account 109 by a sequential process of elimination. So, With incremental validation 181 there may need to be a different key ?les 8 may be employed to have various paths to authorization 27. As another suggestion, different signal sequencing 15 may be employed to differ trajectories 7. The folloWing is claimed: 1. A computer-implemented process comprising: receiving user indication of signature input recording; code (as rhythm is the timing betWeen successive keystrokes), example, the key 6 With rhythm 211 signal match 5 may have sequence packaging 15 indicating that key code 210 is ignored for this transmission 1. So, in this example of incre mental validation 181, initial signal input 2 has multiple sig nal matches 5, narroWing possibilities in the initial transmis As described, validation protocols 18 may vary, and differ ent protocols may be combined. Multiple non-deterministic trajectory 7 paths, including Wrong trajectory 7w, is one example. In some embodiments, validation protocol 18 authorizing 27 access 39 may use different trajectories 7. Duplicate signal matches 5 in different keys 6 in the same or Would not be knoWn at ?rst. A key unit 8 of key rhythm 211 signal types 21 Would also ?nd a match 5 after the second key this time (in this example) for the correct user. In this trajectories 7 that play out to authorization 27. It is possible for different next key trajectories 7 to diverge to different (possibly duplicate) keys 6 that later converge back to the same key 6. input 2, With tWo possible corresponding signals 2: key (char selection Was employed, With initial key code 210 signals 2 for the ?rst input to be ignored, and key rhythm 211 used. A key code 210 match 5 may be found, but it Would be Wrong in For example, a key 6 may contain six next key trajectories 7, three of Which are Wrong key trajectories 7w. Depending trajectories 7 are non-deterministically chosen. This example presupposes sequences of keys 6 strung together by next key Would not succeed 86. an example, a key unit 16 of key code signal type 21 might be accessed to search keys 6 for signal matches 5 of key code 210 key 6 or key ?le 8 pinball is used, authorization fails 86. Trajectories 7 may be selected non-deterministically. This suggestion is most effective When there are multiple possible trajectories 7, including Wrong key trajectories 7w, that augur ongoing 88, and for Which by themselves 2 authorization 27 In an example depicted by FIG. 18, the ?rst trajectory 71 is to a key 61' in a key ?le 8i determined by signal type 21. Keep in mind that this process may be repeated for all possible initial keys 61'. For example, consider key 108 transmission 1 access 39 is hopeless (fake keys 6w). In the example, signal match 77 in the initial key 77 in the initial key ?le 8i mis matches. In this case, key trajectory 7w leads to a fake key 6w cess of discarding keys that don’t match 51 continues 818. FIGS. 18 & 19 depict examples of the access authentica tion 97 process. FIGS. 18 & 19 illustrate an example of one input device, Wherein a signal type comprises a category of measurable variable input associated With at least one user-select able input device, and Wherein at least one user-selectable input device affords 60 recording a plurality of signal types; plurality of input signals 2 before signal match 5 may effec tively commence. In the example above, Where key rhythm terminating said recording; 211 is the ?rst signal 2 to be matched 5, tWo key code 210 signals 2 must be input before key rhythm 211 may even be considered. In the example of FIG. 18, validation 18 accesses three key creating a signature based at least in part upon at least a ?les 8 through successive key trajectories 7, bundling match storing at least a portion of said recording; portion of said stored recording; and 65 storing said signature. 2. The process according to claim 1, Wherein said recording comprises signals from a plurality of user-selected devices. US 7,725 ,725 B1 11 12 creating a signature using said stored recorded user input signals from a plurality of categories of measurable vari able input; and 3. The process according to claim 1, further comprising: receiving user indication to edit said signature; receiving user selection of at least one signal type from a plurality of signal types associated With at least one user input device of said recording; storing said signature. 5 editing said stored signature to exclude recorded data of at least one signal type. 4. The process according to claim 1, further comprising: comparing a subsequent signature submission to at least a said recording. 12. The process according to claim 10, Wherein passively terminating said recording. portion of said recording, and accepting said comparison Within a predetermined 13. The process according to claim 10, further comprising: dividing a stored signature into distinct data portions; recording and storing a second series of user input signals degree of inexactness, thereby authenticating said subsequent signature. after storing said signature, 5. The process according to claim 4, Wherein said prede termined degree comprises a user-designated tolerance. 6. The process according to claim 1, further comprising Wherein said second series of user input signals are received in incremental portions; presenting at least a portion of said recording to said user for comparing at least one said distinct data portion to at least one said incremental portion; editing, Wherein said presented recording portion does not com prise teXt-character codes. storing said comparison; and 20 7. The process according to claim 1, Wherein at least a portion of said recording comprises at least one signal type comprising signal input from a plurality of devices. 8. The process according to claim 1, further comprising: dividing a stored signature into distinguishable data por parison. comparing a subsequent signature submission to at least a 25 degree of inexactness, key; thereby authenticating said subsequent signature. linking keys of a signature, 30 user-selected device among a plurality of selectable user input devices connected to a single computer, 35 input data; user input data and performing a corresponding authen able input associated With at least one user-selectable input device, and 40 ?rst portion, discarding from further processing previ user-selected device; storing at least a portion of said recording; creating a signature based at least in part upon at least a 45 16. The method according to claim 15, Wherein said sig nature comprises signals from at least one signal type deter mined by received input after said storing at least a portion of 50 said recording. 55 17. The method according to claim 15, Wherein creating said signature using recorded signals from a plurality of sig nal types. 18. The method according to claim 15, further comprising: dividing a stored signature into distinct data portions; and recording. 10. A computer-implemented process comprising: commencing signature input recording; recording user input signals by type from at least one input devices connected to a single computer, incrementally authenticating a second series of user input signals to said signature by comparing said second series Wherein a signal comprises a set of related softWare-rec ogniZable data of the same type received from at least one input device, Wherein a signal type comprises a category of measurable variable input associated With at least one user-select of user input signals to their respective distinct data portions of said stored signature. 60 able input device, and Wherein at least one user-selectable input device affords recording a plurality of signal types; terminating said recording; storing at least a portion of said recording; portion of said stored recording; and storing said signature. nation determining authentication impossible. user-selected device among a plurality of selectable user Wherein recording a plurality of signal types for at least one terminating said recording; ing said user input data portion, or by process of elimi 9. The process according to claim 1, Wherein said signature comprises signals from at least one category determined by received input after said storing at least a portion of said Wherein a signal comprises a set of related softWare-rec ogniZable data of the same type received from at least one input device, Wherein a signal type comprises distinct measurable vari subsequently, iteratively receiving a plurality of portions of ously accumulated keys based upon failure in matching respective key data to said user input data portion; and Whereby continuing said iterative process until completing authentication by matching said last key to correspond 15. A computer-implemented method for recording input and creating a signature comprising: recording user input signals by type from at least one dividing a plurality of stored signatures into keys; tication step for each portion, Wherein, upon receiving each subsequent portion after said portion of said recording, and accepting said comparison Within a predetermined Wherein each said distinguishable data portion comprises a receiving a ?rst portion of user input data; accumulating keys of a plurality of signatures based upon matching stored key data to said ?rst portion of user determining Whether to continue receiving and storing a succeeding incremental portion based upon said com 14. The process according to claim 10, further comprising: tions, said links determined at least in part by sequential order of user input corresponding to recorded signals; 11. The process according to claim 10, Wherein said sig nature comprises signals from at least one signal type deter mined by received input after said storing at least a portion of 19. The method according to claim 15, Wherein creating said signature from input signals from a plurality of user selected input devices. 20. The method according to claim 15, Wherein said sig nature comprises in part signals from a pointing device. 65 * * * * *

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?