Assisted password generation
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a request for a new password, the new password associated with a user account, the request including text designated as a seed value;
submitting the seed value to one or more services other than an authentication service, the one or more services generating a set of words associated with the seed value;
receiving the set of words from the one or more services;
generating the plurality of passwords based at least in part on the set of words such that the plurality of passwords satisfy at least one entropy requirement;
transmitting the plurality of passwords to a user device associated with the user account;
receiving, from the user device, an indication of a selected password from the plurality of passwords;
setting the selected password as indicated by the user device as the new password associated with the user account;
detecting submission, in connection with the user account, of a password;
as a result of determining that the submission does not include the new password, determining whether the submission includes at least one password of the plurality of passwords that is different from the selected password; and
as a result of determining that the submission includes the at least one password of the plurality of passwords that is different from the new password, performing one or more actions to protect the user account.
1 Assignment
0 Petitions
Accused Products
Abstract
Entities of an organization may have difficulties generating and remembering strong passwords. A password management service may generate passwords with high entropy and aid entities in remembering generated passwords. The password management service may generate a list of passwords based on a seed value provided by the entities. The entities may then select a password from the list of passwords to be used at the entities'"'"' password. Furthermore, the entities may be allowed to save the list of passwords to aid the entities in remembering their selected password from the list of passwords.
13 Citations
23 Claims
-
1. A computer-implemented method comprising:
-
receiving a request for a new password, the new password associated with a user account, the request including text designated as a seed value; submitting the seed value to one or more services other than an authentication service, the one or more services generating a set of words associated with the seed value; receiving the set of words from the one or more services; generating the plurality of passwords based at least in part on the set of words such that the plurality of passwords satisfy at least one entropy requirement; transmitting the plurality of passwords to a user device associated with the user account; receiving, from the user device, an indication of a selected password from the plurality of passwords; setting the selected password as indicated by the user device as the new password associated with the user account; detecting submission, in connection with the user account, of a password; as a result of determining that the submission does not include the new password, determining whether the submission includes at least one password of the plurality of passwords that is different from the selected password; and as a result of determining that the submission includes the at least one password of the plurality of passwords that is different from the new password, performing one or more actions to protect the user account. - View Dependent Claims (2, 3, 4, 21, 23)
-
-
5. A system, comprising at least one computing device configured to implement one or more services, wherein the one or more services are configured to:
-
receive a request for a new password, the new password associated with a user account, the request including text designated as a seed value; submit the seed value to one or more services other than an authentication service, the one or more services generating one or more password components associated with the seed value; receive the one or more password components from the one or more services; generate the plurality of passwords based at least in part on the one or more password components such that the plurality of passwords satisfy at least one entropy requirement; transmit the plurality of passwords to a user computing device associated with the user account; receive, from the user computing device, authentication information comprising an indication of a selected password from the plurality of passwords; set the selected password as indicated by the user device as the new password associated with the user account; detect submission, in connection with the user account, of a password; as a result of determining that the submission does not include the new password, determine whether the submission includes at least one password of the plurality of passwords that is different from the selected password; and as a result of determining that the submission includes at least one password of the plurality of passwords that is different from the selected password, perform one or more actions in response to receiving the authentication information. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 22)
-
-
13. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to at least:
-
receive a request for a new passphrase, the new passphrase associated with a user account, the request including text designated as a seed value; submit the seed value to another computer system, the other computer system retrieving one or more words associated with the seed value; receive the one or more words from the other computer system; generate the plurality of passphrases based at least in part on the one or more words such that the plurality of passphrases satisfy at least one entropy requirement; transmit the plurality of passphrases to a user device associated with the user account; receive, from the user device, an indication of a selected passphrase from the plurality of passphrases; set the selected passphrase as indicated by the user device as the new passphrase associated with the user account; detect submission, in connection with the user account, of a passphrase; and as a result of determining that the submission includes the new passphrase, allow access to one or more resources of an organization. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification