摘要 |
Techniques for authenticating a user of a computing device (e.g., handheld, desktop, laptop) are provided. In order to grant access to any of the services provided by the computing device, the computing device displays, to the user, one or more images that are stored on the computing device. The user is required to accurately identify one or more objects depicted in the one or more images in order to gain access to the computing device. The computing device is not required to be connected to any network at the time of authentication. Authentication data that is associated with object(s) in each displayed image may have been established previously by another computing device and then provided to the computing device.
|