SECURITY ACCESS IN A COMPUTER-BASED FLOW OF TASKS
Implementing security access includes creating a coordinate system that includes a first axis and a second axis. Points on the first axis and the second axis specify corresponding coordinates. The security access also includes randomly selecting values from a database and populating the coordinate s...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Implementing security access includes creating a coordinate system that includes a first axis and a second axis. Points on the first axis and the second axis specify corresponding coordinates. The security access also includes randomly selecting values from a database and populating the coordinate system with the values and selecting a set of the coordinates from the coordinate system. The set of coordinates is indicative of an instruction. The security access further includes generating an image from the coordinate system and the values, the image including labels for the coordinates along respective first axis and second axis, and identifying values corresponding to the set of coordinates. The values correspond to the set of coordinates indicative of an answer to the instruction. The security access also includes transmitting the image and the instruction to a user device, and using the image, the instruction, and the answer as a security access mechanism. |
---|