Secure Login for Web Sites


We have constructed a system that uses a graphical password deployed from, a Trojan and virus resistant, embedded device. Using user-supplied image, a novel, image hash will provide an input into a cryptosystem on the embedded device that subsequently returns an encryption key or text password. The graphical password will require the user to select points on the image. From these points, the embedded device will stretch the graphical password input to a 32-length, random, unique alphanumeric password or a 256-bit AES key. Each embedded device is unique to a specific graphical password. With one (memorized) graphical password, the user can generate as many 32-length, unique, alphanumeric passwords, as required, from their embedded device.