International Business Machines Corporation
Obfuscating mobile device passwords through pattern generation

Last updated:

Abstract:

A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.

Status:
Grant
Type:

Utility

Filling date:

7 Nov 2019

Issue date:

14 Sep 2021