Password check by decomposing password
First Claim
Patent Images
1. A system comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving a proposed password from a user;
accessing a previous password of the user;
decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively;
determining that the proposed password is formed by the first plurality of components using a first set of formation rules;
determining that the previous password is formed by the second plurality of components using a second set of formation rules; and
determining to accept the proposed password based on a comparison between the first formation rules and the second formation rules.
2 Assignments
0 Petitions
Accused Products
Abstract
A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that measures the strength of the proposed password based on rules, such as concatenation, insertion, and replacement. The proposed password is scored against all known words, such as when a user is first asked to create a password for an account or access. The proposed password can also be scored against one or more previous passwords for the user, such as when the user is asked to change the user'"'"'s previous password, to determine similarity between the two passwords.
-
Citations
20 Claims
-
1. A system comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving a proposed password from a user; accessing a previous password of the user; decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; determining that the proposed password is formed by the first plurality of components using a first set of formation rules; determining that the previous password is formed by the second plurality of components using a second set of formation rules; and determining to accept the proposed password based on a comparison between the first formation rules and the second formation rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17, 18)
-
-
11. A method, comprising:
-
receiving, by one or more hardware processors, a proposed password from a user; accessing, by the one or more hardware processors, a previous password of the user; decomposing, by the one or more hardware processors, the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; determining, by the one or more hardware processors, that the proposed password is formed by the first plurality of components using a first set of formation rules; determining, by the one or more hardware processors, that the previous password is formed by the second plurality of components using a second set of formation rules; and determining, by the one or more hardware processors, to accept the proposed password based on a comparison between the first formation rules and the second formation rules. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
19. A non-transitory machine readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving a proposed password from a user; accessing a previous password of the user; decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; determining that the proposed password is formed by the first plurality of components using a first set of formation rules; determining that the previous password is formed by the second plurality of components using a second set of formation rules; and determining to accept the proposed password based on a comparison between the first formation rules and the second formation rules. - View Dependent Claims (20)
-
Specification