System and method for authenticating an end user

ABSTRACT

A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.

BACKGROUND OF THE INVENTION

The present invention relates to authenticating an end user; morespecifically, authenticating an end user by means of dynamic informationto prevent fraud.

Conventional authentication methods utilize static information tovalidate an end user. Since static information by its very nature rarelychanges, individuals can easily capture an end user's authenticationinformation for fraudulent use in the future.

Furthermore, conventional authentication methods traditionally employonly 1-way authentication. The term 1-way authentication hereinaftermeans identifying only a single party to a multiple party transaction.Conventional authentication methods usually call for an end user toauthenticate to an entity (e.g. bank, credit card company, governmentagency, etc.) without the entity authenticating to the end user. The useof 1-way authentication methods exposes an end user to phishing attacks.The term phishing hereinafter means an attempt to criminally and/orfraudulently acquire sensitive information by masquerading as atrustworthy entity in an electronic medium.

SUMMARY OF THE INVENTION

The present invention provides a method for authenticating an end user,said method comprising:

generating a login field in response to receiving an authenticationrequest from said end user, said login field comprising a plurality ofcolored nodes, said plurality of colored nodes containing a first subsetof nodes matching both color and location to a second subset of nodesresiding in a transparent credit card being controlled by said end user;

determining an authenticity status of said end user by comparing a thirdsubset of nodes received from said end user with said first subset ofnodes, said third subset of nodes being received in response to sendingsaid login field to said end user, said end user having generated saidthird subset of nodes by overlaying said transparent credit card on topof said login field and selecting at least one node which displays acolor not being black, each node of said at least one node beingselected according to a function utilizing both static and dynamicvariables; and

sending said determined authenticity status to said end user via anoutput device.

BRIEF DESCRIPTION OF THE DRAWINGS

The patent application file contains at least one drawing executed incolor. The Office upon request and payment of the necessary fee willprovide copies of this patent application publication with colordrawing(s).

FIG. 1 illustrates a graphical representation of the combination oftransparent credit card and login field, in accordance with embodimentsof the present invention.

FIG. 2 illustrates a graphical representation of an alternativecombination of transparent credit card and login field, in accordancewith embodiments of the present invention.

FIG. 3 illustrates a method for authenticating an end user, inaccordance with embodiments of the present invention.

FIG. 4 illustrates a computer system which may facilitate a method forauthenticating and end user, in accordance with embodiments of thepresent invention.

DETAILED DESCRIPTION OF THE DRAWINGS Definitions

The term ‘credit card’ as used herein refers to any automated tellermachine (ATM) card, credit card, charge card, debit card, gift card,etc. issued by an entity which allows an end user the ability topurchase goods and/or services therewith.

The term ‘node’ as used herein refers to a single point residing withineither a login field and/or a transparent credit card.

Specification

Although certain embodiments of the present invention are describedherein, it is understood that modifications may be made to the presentinvention without departing from its course and scope. Scope of thepresent invention is not limited to the number of constitutingcomponents, the materials thereof, the shapes thereof, the relativearrangement thereof, etc. Furthermore, while the accompanying drawingsillustrate certain embodiments of the present invention, such drawingsare not necessarily depicted to scale.

FIG. 1 illustrates a graphical representation 100 of the combination 106of transparent credit card 102 and login field 104, in accordance withembodiments of the present invention.

A transparent credit card 102 is assigned to an end user prior to anauthentication attempt. The transparent credit card 102 comprises aplurality of nodes, each displaying a seemingly random color. Only theprovider of said transparent credit card 102 knows the pattern of colorscontained in the transparent credit card 102.

The login field 104 also comprises a plurality of nodes, each displayinga seemingly random color. The color pattern of nodes contained withinthe login field 104 is dynamically created each time the end user wishesto authenticate, therefore each authentication attempt will produce adifferent color pattern of nodes in the login field 104.

Contained within each pattern produced in the login field 104 is a firstsubset of nodes. Each node in the first subset of nodes matches both thecolor and location of a unique node residing in the transparent creditcard 102. The nodes residing in the transparent credit card matching thecolor and location as the first subset of nodes are called the secondsubset of nodes.

Overlaying the transparent credit card 102 on top of the login field 104results in the combination 106. The combination 106 displays the nodesin both the transparent credit card 102 and the login field 104 havingthe same color and having the same location (i.e. the first and secondsubset of nodes).

In one embodiment of the present invention, the login field 104 willdisplay colors such that when the transparent credit card 102 isoverlaid, if the overlaid nodes do not match in color they will thereinproduce a dark, i.e. black, color. The blackening of non-color matchingnodes will help identify for the end user which nodes are to be selectedfrom to effectuate the authentication attempt.

In another embodiment of the present invention, the transparent creditcard 102 when overlaid on top of the login field 104 merely turnsnon-color matching nodes a neutral color so as to highlight the matchingcolored nodes more easily (see 202 in FIG. 2, infra).

The combination 106 comprises at least three different groups ofdifferently colored nodes. At this point the end user would select thegroup of colored nodes which match the result of a function. Thefunction comprises both static and dynamic information gathered by theend user and thus prevents unauthorized individuals the ability todecipher the login scheme.

If the end user properly selects the appropriately colored nodesdisplayed in the combination 106, then the end user would properlyauthenticate and gain access to secure information. However, if the enduser selects the wrong color nodes, the end user is denied access to thesecure information.

FIG. 2 illustrates a graphical representation 200 of an alternativecombination 206 of transparent credit card 202 and login field 204, inaccordance with embodiments of the present invention.

Overlaying the transparent credit card 202 on top of the login field 204results in the alternative combination 206. The combination 206 displaysthe nodes in both the transparent credit card 202 and the login field204 having the same color and having the same location (i.e. the firstand second subset of nodes).

Specifically, the transparent credit card 202 when overlaid on top ofthe login field 204 turns non-color matching nodes a neutral and/orlightened color so as to highlight the matching colored nodes moreeasily.

The alternative combination 206 comprises at least three differentgroups of differently colored nodes. At this point the end user wouldselect the group of colored nodes which match the result of a function.The function comprises both static and dynamic information gathered bythe end user and thus prevents unauthorized individuals the ability todecipher the login scheme.

If the end user properly selects the appropriately colored nodesdisplayed in the combination 206, then the end user would properlyauthenticate and gain access to secure information. However, if the enduser selects the wrong color nodes, the end user is denied access to thesecure information.

FIG. 3 illustrates a method 300 for authenticating an end user, inaccordance with embodiments of the present invention.

The method 300 begins with step 302 which comprises sending a loginfield to the end user. The login field is sent to the end user inresponse to the end user requesting access to the secure information.Contained within the login field is a first subset of nodes which matchboth the color and location of a second subset of nodes, the secondsubset of nodes residing in the end user's transparent credit card. Thefirst subset of nodes is dynamically selected each time the end userwishes to authenticate thus no two instances of the first subset are thesame.

In one embodiment of the present invention, the end user requests theauthentication attempt by submitting a unique userID. The userID istherein used to identify the color pattern residing in the transparentcredit card assigned to the end user. The pattern residing in thetransparent credit card is used to select the nodes which comprise thefirst subset of nodes located in the login field.

After completion of step 302, the method 300 continues with step 304which comprises receiving authentication data from the end user. Step304 receives data comprising the locations for a set of nodes which theend user selected after overlaying their transparent credit card on topof the login field and completing a function.

In one embodiment of the present invention, the function comprises bothdynamic and static variables, the static variable known only to the enduser and the provider of the transparent credit card. Along with thedynamic and static variables, the provider of the transparent creditcard must assign numeric values to each color present in both thetransparent credit card and login field.

For example, the transparent credit card provider assigns the followingcolors numeric values: red=0; green=1; blue=2; yellow=3, white=4, etc.The end user must be aware of each color's numeric value beforeattempting to authenticate. Additionally, the static variable Srepresents month in which the end user was born. The dynamic variable Drepresents the day which the end user attempts to authenticate. Finally,a second dynamic variable C represents the number of colors present whenthe end user overlays the transparent credit card on top of the loginfield.

When the end user overlays their transparent credit card on top of thelogin field, the combination produces three color combination: red,green, and blue (see 206 in FIG. 2, supra). If the end user was born onSep. 1, 1948, and attempts to authenticate on March 3^(rd), the functionappears as follows:

Color Value=(S+D)modulo C=(3+9)modulo 3=0

Use of the modulo operation ensures that the color value calculated byuse of the function matches one of the assigned color values present inthe combination. Since the numeric value of zero (0) was assigned to thecolor red, the end user would select all the red nodes which appear inresponse to overlaying the transparent credit card on top of the loginfield.

After completion of step 304, the method 300 continues with step 306which comprises determining whether the end user's authenticationattempt is valid or invalid. Step 306 compares the nodes selected in theauthentication data received pursuant to step 304 with the first subsetof nodes residing in the login field.

If the authentication data received from the end user contains each andevery node which both: 1) correspond to a node from the first subset ofnodes residing the login field; and 2) correspond to the color valuedetermined by use of the function identified supra, then step 306returns a response ‘yes’ and the method 300 continues with step 308which comprises granting the end user access to the secure information.

In one embodiment of the present invention, step 306 returns a response‘no’ and the method 300 denies the end user access 310 if theauthentication data received pursuant to step 304 contains at least onenode having a color which does not correspond to the color valuedetermined by use of the function identified supra. For example, if theauthentication data contains three red node locations and one green nodelocation where the color value calculated pursuant to the functioncorresponds to red, the end user's authentication attempt fails.

In an alternative embodiment of the present invention, step 306 returnsa response ‘no’ and the method 300 denies the end user access 310 if theauthentication data received pursuant to step 304 contains at least onenode not corresponding to any node in the first subset of nodes residingin the login field.

In another alternative embodiment of the present invention, step 306returns a response ‘no’ and the method 300 denies the end user access310 if the authentication data received pursuant to step 304 does notcontain all nodes which: 1) correspond to nodes in the first subset ofnodes residing in the login field; and 2) correspond to the color valuedetermined by use of the function identified supra. For example, if theauthentication data contains only two red node locations where the firstsubset of nodes in the login field comprises three red nodes and thecolor value determined by use of the function corresponds to red, theend user's authentication attempt fails.

Step 308 comprises granting the end user access to secure information.After completion of step 308, the method 300 ends.

Step 310 comprises denying the end user who attempted to authenticateaccess to the secure information. In one embodiment of the presentinvention, after completion of step 310, the method 300 ends. In analternative embodiment of the present invention, after completion ofstep 310, the method 300 returns to step 302 and sends a new login fieldto the end user to attempt an authentication again. The new login fieldwould comprise a new and dynamically created first subset of nodesmatching a new second subset of nodes residing in the end user'stransparent credit card.

FIG. 4 illustrates a computer system 900 which may facilitate a methodfor authenticating and end user, in accordance with embodiments of thepresent invention.

The computer system 900 comprises a processor 908, an input device 906coupled to the processor 908, an output device 910 coupled to theprocessor 908, and memory devices 902 and 912 each coupled to theprocessor 908.

The input device 906 may be, inter alia, a keyboard, a mouse, a keypad,a touchscreen, a voice recognition device, a sensor, a network interfacecard (NIC), a Voice/video over Internet Protocol (VOIP) adapter, awireless adapter, a telephone adapter, a dedicated circuit adapter, etc.

The output device 910 may be, inter alia, a printer, a plotter, acomputer screen, a magnetic tape, a removable hard disk, a floppy disk,a NIC, a VOIP adapter, a wireless adapter, a telephone adapter, adedicated circuit adapter, an audio and/or visual signal generator, alight emitting diode (LED), etc.

The memory devices 902 and 912 may be, inter alia, a cache, a dynamicrandom access memory (DRAM), a read-only memory (ROM), a hard disk, afloppy disk, a magnetic tape, an optical storage such as a compact disc(CD) or a digital video disc (DVD), etc. The memory device 912 includesa computer code 914 which is a computer program that comprisescomputer-executable instructions.

The computer code 914 includes, inter alia, an algorithm used forauthenticating and end user according to the present invention. Theprocessor 908 executes the computer code 914. The memory device 902includes input data 904. The input data 904 includes input required bythe computer code 914. The output device 910 displays output from thecomputer code 914. Either or both memory devices 902 and 912 (or one ormore additional memory devices not shown in FIG. 4) may be used as acomputer usable medium (or a computer readable medium or a programstorage device) having a computer readable program embodied thereinand/or having other data stored therein, wherein the computer readableprogram comprises the computer code 914. Generally, a computer programproduct (or, alternatively, an article of manufacture) of the computersystem 900 may comprise said computer usable medium (or said programstorage device).

Any of the components of the present invention can be deployed, managed,serviced, etc. by a service provider that offers to deploy or integratecomputing infrastructure with respect to a process for authenticatingand end user. Thus, the present invention discloses a process forsupporting computer infrastructure, comprising integrating, hosting,maintaining and deploying computer-readable code into a computing system(e.g., computing system 900), wherein the code in combination with thecomputing system is capable of performing a method for authenticatingand end user.

In another embodiment, the invention provides a business method thatperforms the process steps of the invention on a subscription,advertising and/or fee basis. That is, a service provider, such as aSolution Integrator, can offer to create, maintain, support, etc. aprocess for authenticating an end user. In this case, the serviceprovider can create, maintain, support, etc. a computer infrastructurethat performs the process steps of the invention for one or morecustomers. In return, the service provider can receive payment from thecustomer(s) under a subscription and/or fee agreement, and/or theservice provider can receive payment from the sale of advertisingcontent to one or more third parties.

While FIG. 4 shows the computer system 900 as a particular configurationof hardware and software, any configuration of hardware and software, aswould be known to a person of ordinary skill in the art, may be utilizedfor the purposes stated supra in conjunction with the particularcomputer system 900 of FIG. 4. For example, the memory devices 902 and912 may be portions of a single memory device rather than separatememory devices.

While particular embodiments of the present invention have beendescribed herein for purposes of illustration, many modifications andchanges will become apparent to those skilled in the art. Accordingly,the appended claims are intended to encompass all such modifications andchanges as fall within the true spirit and scope of this invention.

1. A method for authenticating an end user, said method comprising:generating a login field in response to receiving an authenticationrequest from said end user, said login field comprising a plurality ofcolored nodes, said plurality of colored nodes containing a first subsetof nodes matching both color and location to a second subset of nodesresiding in a transparent credit card being controlled by said end user;determining an authenticity status of said end user by comparing a thirdsubset of nodes received from said end user with said first subset ofnodes, said third subset of nodes being received in response to sendingsaid login field to said end user, said end user having generated saidthird subset of nodes by overlaying said transparent credit card on topof said login field and selecting at least one node which displays acolor not being black, each node of said at least one node beingselected according to a function utilizing both static and dynamicvariables; and sending said determined authenticity status to said enduser via an output device.
 2. The method of claim 1, said resultcomprising: determining that said end user is authentic by determiningthat each node in said third subset of nodes both corresponds to aunique node in said first subset of nodes and matches a color havingbeen determined according to said function Color Value=(S+D)modulo C,where each color not being black and displayed as a result of overlayingsaid transparent credit card on top of said login field corresponds to aunique integer known only to both said end user and a provider of saidtransparent credit card, where said variable S is a static integergreater than −1 and known only to both said end user and a provider ofsaid transparent credit card, where said variable C is a dynamic integerrepresenting the total number of colors displayed not being blackdisplayed as a result of overlaying said transparent credit card on topof said login field, where said variable D is a dynamic integer knownonly to both said end user and a provider of said transparent creditcard and being selected from the group comprising day of the week, monthof the year, hour of the day, and age of said end user; and approvingsaid authentication request from said end user in response to havingdetermined that said end user is authentic.
 3. The method of claim 1,said result comprising: determining that said end user is not authenticby determining that each node in said third subset of nodes does notcorrespond to a unique node in said first subset of nodes residing insaid login field; and denying said authentication request from said enduser in response to having determined that said end user is notauthentic.
 4. The method of claim 1, said result comprising: determiningthat said end user is not authentic by determining that each node insaid third subset of nodes does not match a color having been determinedaccording to said function Color Value=(S+D)modulo C, where each colornot being black and displayed as a result of overlaying said transparentcredit card on top of said login field corresponds to a unique integerknown only to both said end user and a provider of said transparentcredit card, where said variable S is a static integer greater than −1and known only to both said end user and a provider of said transparentcredit card, where said variable C is a dynamic integer representing thetotal number of colors displayed not being black displayed as a resultof overlaying said transparent credit card on top of said login field,where said variable D is a dynamic integer known only to both said enduser and a provider of said transparent credit card and being selectedfrom the group comprising day of the week, month of the year, hour ofthe day, and age of said end user; and denying said authenticationrequest from said end user in response to having determined that saidend user is not authentic.
 5. The method of claim 1, wherein said firstsubset of nodes and said second subset of nodes contain no less thannine nodes and said nine nodes collectively displaying no less thanthree different colors.
 6. The method of claim 1, in which pursuant tosaid overlaying said transparent credit card on top of said secondpattern, where a node residing in said second pattern does not match acolor of a node being overlaid by said transparent credit card then aresulting color is produced, said resulting color being black.
 7. Acomputer program product, comprising a computer-usable storage mediumhaving a computer-readable program code stored therein, saidcomputer-readable program code containing instructions that whenexecuted by a processor of a computer system implement a method forauthenticating an end user, said method comprising: generating a loginfield in response to receiving an authentication request from said enduser, said login field comprising a plurality of colored nodes, saidplurality of colored nodes containing a first subset of nodes matchingboth color and location to a second subset of nodes residing in atransparent credit card being controlled by said end user; determiningan authenticity status of said end user by comparing a third subset ofnodes received from said end user with said first subset of nodes, saidthird subset of nodes being received in response to sending said loginfield to said end user, said end user having generated said third subsetof nodes by overlaying said transparent credit card on top of said loginfield and selecting at least one node which displays a color not beingblack, each node of said at least one node being selected according to afunction utilizing both static and dynamic variables; and sending saiddetermined authenticity status to said end user via an output device. 8.The computer program product of claim 7, said result comprising:determining that said end user is authentic by determining that eachnode in said third subset of nodes both corresponds to a unique node insaid first subset of nodes and matches a color having been determinedaccording to said function Color Value=(S+D)modulo C, where each colornot being black and displayed as a result of overlaying said transparentcredit card on top of said login field corresponds to a unique integerknown only to both said end user and a provider of said transparentcredit card, where said variable S is a static integer greater than −1and known only to both said end user and a provider of said transparentcredit card, where said variable C is a dynamic integer representing thetotal number of colors displayed not being black displayed as a resultof overlaying said transparent credit card on top of said login field,where said variable D is a dynamic integer known only to both said enduser and a provider of said transparent credit card and being selectedfrom the group comprising day of the week, month of the year, hour ofthe day, and age of said end user; and approving said authenticationrequest from said end user in response to having determined that saidend user is authentic.
 9. The computer program product of claim 7, saidresult comprising: determining that said end user is not authentic bydetermining that each node in said third subset of nodes does notcorrespond to a unique node in said first subset of nodes residing insaid login field; and denying said authentication request from said enduser in response to having determined that said end user is notauthentic.
 10. The computer program product of claim 7, said resultcomprising: determining that said end user is not authentic bydetermining that each node in said third subset of nodes does not matcha color having been determined according to said function ColorValue=(S+D)modulo C, where each color not being black and displayed as aresult of overlaying said transparent credit card on top of said loginfield corresponds to a unique integer known only to both said end userand a provider of said transparent credit card, where said variable S isa static integer greater than −1 and known only to both said end userand a provider of said transparent credit card, where said variable C isa dynamic integer representing the total number of colors displayed notbeing black displayed as a result of overlaying said transparent creditcard on top of said login field, where said variable D is a dynamicinteger known only to both said end user and a provider of saidtransparent credit card and being selected from the group comprising dayof the week, month of the year, hour of the day, and age of said enduser; and denying said authentication request from said end user inresponse to having determined that said end user is not authentic. 11.The computer program product of claim 7, wherein said first subset ofnodes and said second subset of nodes contain no less than nine nodesand said nine nodes collectively displaying no less than three differentcolors.
 12. The computer program product of claim 7, in which pursuantto said overlaying said transparent credit card on top of said secondpattern, where a node residing in said second pattern does not match acolor of a node being overlaid by said transparent credit card then aresulting color is produced, said resulting color being black.
 13. Acomputing system comprising a processor coupled to a computer-readablememory unit, said memory unit comprising a software application, saidsoftware application comprising instruction that when executed by saidprocessor, implement a method for authenticating an end user, saidmethod comprising: generating a login field in response to receiving anauthentication request from said end user, said login field comprising aplurality of colored nodes, said plurality of colored nodes containing afirst subset of nodes matching both color and location to a secondsubset of nodes residing in a transparent credit card being controlledby said end user; determining an authenticity status of said end user bycomparing a third subset of nodes received from said end user with saidfirst subset of nodes, said third subset of nodes being received inresponse to sending said login field to said end user, said end userhaving generated said third subset of nodes by overlaying saidtransparent credit card on top of said login field and selecting atleast one node which displays a color not being black, each node of saidat least one node being selected according to a function utilizing bothstatic and dynamic variables; and sending said determined authenticitystatus to said end user via an output device.
 14. The computing systemof claim 13, said result comprising: determining that said end user isauthentic by determining that each node in said third subset of nodesboth corresponds to a unique node in said first subset of nodes andmatches a color having been determined according to said function ColorValue=(S+D)modulo C, where each color not being black and displayed as aresult of overlaying said transparent credit card on top of said loginfield corresponds to a unique integer known only to both said end userand a provider of said transparent credit card, where said variable S isa static integer greater than −1 and known only to both said end userand a provider of said transparent credit card, where said variable C isa dynamic integer representing the total number of colors displayed notbeing black displayed as a result of overlaying said transparent creditcard on top of said login field, where said variable D is a dynamicinteger known only to both said end user and a provider of saidtransparent credit card and being selected from the group comprising dayof the week, month of the year, hour of the day, and age of said enduser; and approving said authentication request from said end user inresponse to having determined that said end user is authentic.
 15. Thecomputing system of claim 13, said result comprising: determining thatsaid end user is not authentic by determining that each node in saidthird subset of nodes does not correspond to a unique node in said firstsubset of nodes residing in said login field; and denying saidauthentication request from said end user in response to havingdetermined that said end user is not authentic.
 16. The computing systemof claim 13, said result comprising: determining that said end user isnot authentic by determining that each node in said third subset ofnodes does not match a color having been determined according to saidfunction Color Value=(S+D)modulo C, where each color not being black anddisplayed as a result of overlaying said transparent credit card on topof said login field corresponds to a unique integer known only to bothsaid end user and a provider of said transparent credit card, where saidvariable S is a static integer greater than −1 and known only to bothsaid end user and a provider of said transparent credit card, where saidvariable C is a dynamic integer representing the total number of colorsdisplayed not being black displayed as a result of overlaying saidtransparent credit card on top of said login field, where said variableD is a dynamic integer known only to both said end user and a providerof said transparent credit card and being selected from the groupcomprising day of the week, month of the year, hour of the day, and ageof said end user; and denying said authentication request from said enduser in response to having determined that said end user is notauthentic.
 17. The computing system of claim 13, wherein said firstsubset of nodes and said second subset of nodes contain no less thannine nodes and said nine nodes collectively displaying no less thanthree different colors.
 18. The computing system of claim 13, in whichpursuant to said overlaying said transparent credit card on top of saidsecond pattern, where a node residing in said second pattern does notmatch a color of a node being overlaid by said transparent credit cardthen a resulting color is produced, said resulting color being black.19. A process for supporting computer infrastructure, said processcomprising providing at least one support service for at least one ofcreating, integrating, hosting, maintaining, and deployingcomputer-readable code in a computing system, wherein said code incombination with the computing system is capable of implementing amethod for authenticating an end user, said method comprising:generating a login field in response to receiving an authenticationrequest from said end user, said login field comprising a plurality ofcolored nodes, said plurality of colored nodes containing a first subsetof nodes matching both color and location to a second subset of nodesresiding in a transparent credit card being controlled by said end user;determining an authenticity status of said end user by comparing a thirdsubset of nodes received from said end user with said first subset ofnodes, said third subset of nodes being received in response to sendingsaid login field to said end user, said end user having generated saidthird subset of nodes by overlaying said transparent credit card on topof said login field and selecting at least one node which displays acolor not being black, each node of said at least one node beingselected according to a function utilizing both static and dynamicvariables; and sending said determined authenticity status to said enduser via an output device.
 20. The process for supporting computerinfrastructure of claim 19, said result comprising: determining thatsaid end user is authentic by determining that each node in said thirdsubset of nodes both corresponds to a unique node in said first subsetof nodes and matches a color having been determined according to saidfunction Color Value=(S+D)modulo C, where each color not being black anddisplayed as a result of overlaying said transparent credit card on topof said login field corresponds to a unique integer known only to bothsaid end user and a provider of said transparent credit card, where saidvariable S is a static integer greater than −1 and known only to bothsaid end user and a provider of said transparent credit card, where saidvariable C is a dynamic integer representing the total number of colorsdisplayed not being black displayed as a result of overlaying saidtransparent credit card on top of said login field, where said variableD is a dynamic integer known only to both said end user and a providerof said transparent credit card and being selected from the groupcomprising day of the week, month of the year, hour of the day, and ageof said end user; and approving said authentication request from saidend user in response to having determined that said end user isauthentic.
 21. The process for supporting computer infrastructure ofclaim 19, said result comprising: determining that said end user is notauthentic by determining that each node in said third subset of nodesdoes not correspond to a unique node in said first subset of nodesresiding in said login field; and denying said authentication requestfrom said end user in response to having determined that said end useris not authentic.
 22. The process for supporting computer infrastructureof claim 19, said result comprising: determining that said end user isnot authentic by determining that each node in said third subset ofnodes does not match a color having been determined according to saidfunction Color Value=(S+D)modulo C, where each color not being black anddisplayed as a result of overlaying said transparent credit card on topof said login field corresponds to a unique integer known only to bothsaid end user and a provider of said transparent credit card, where saidvariable S is a static integer greater than −1 and known only to bothsaid end user and a provider of said transparent credit card, where saidvariable C is a dynamic integer representing the total number of colorsdisplayed not being black displayed as a result of overlaying saidtransparent credit card on top of said login field, where said variableD is a dynamic integer known only to both said end user and a providerof said transparent credit card and being selected from the groupcomprising day of the week, month of the year, hour of the day, and ageof said end user; and denying said authentication request from said enduser in response to having determined that said end user is notauthentic.
 23. The process for supporting computer infrastructure ofclaim 19, wherein said first subset of nodes and said second subset ofnodes contain no less than nine nodes and said nine nodes collectivelydisplaying no less than three different colors.
 24. The process forsupporting computer infrastructure of claim 19, in which pursuant tosaid overlaying said transparent credit card on top of said secondpattern, where a node residing in said second pattern does not match acolor of a node being overlaid by said transparent credit card then aresulting color is produced, said resulting color being black.