Method for producing a data structure for use in password identification
First Claim
1. Method for producing a data structure for use in password identification from a first set of first symbols (1) used for the formation of passwords, characterized by the following steps:
- preparation of a second set of at least two second symbols (3) that are identical to or different from the symbols of the first set;
creation of a first number of first lists (7-10) of the first symbols, the first number being at least equal to two and at the most equal to the number of second symbols (3);
creation of a second list (12) of the second symbols (3), the number of elements in this list being equal to the first number, and each symbol (3) appearing only once in this list;
creation of a third number of third lists of third symbols, the third number being at least equal to the first number, the set of first symbols being a subset of the set of third symbols, and each one of the first lists being comprised in a third list;
association of a first list with each symbol of the second list;
association of a second symbol with each symbol of the first lists; and
storage of the data structure composed of at least all of these lists and of the associations on a medium in the form of digital data and/or of a readable representation;
in order to enable the creation of a password on the basis of a code consisting of;
a second symbol contained in the second list for defining the first list associated with that second symbol as a starting list, a subcode comprising at least one first symbol for selecting that symbol from the starting list and, if the subcode comprises at least two first symbols, for iteratively selecting one after another of the other first symbols in that one of the first lists which is associated with the second symbol associated with the previously selected first symbol, the last first symbol found in this manner constituting the starting symbol, and a manner of reading a sequence of third characters starting with the starting symbol by travelling through the third lists and the symbols in the third lists.
1 Assignment
0 Petitions
Accused Products
Abstract
Passwords consisting of symbols selected from a third set of third symbols, of which a first set constitutes a subset of the first symbols, can be created from a data structure. The method for obtaining this structure comprises the following steps: preparation of a second set of at least two second symbols; creation of a first number of first lists of the first symbols, each list being contained in a third list constituted of the third symbols; creation of a second list of the second symbols, each symbol appearing in that list only once; association of a first list with each symbol of the second list; association of a second symbol to each symbol of the first lists. With this structure (27), a multitude of pseudo-aleatory passwords can be created by means of a code comprising a second symbol, a subcode of at least one first symbol, and a reading path (51) of the symbols in the third lists of the structure, starting from a first symbol found by using the second symbol and the subcode.
24 Citations
10 Claims
-
1. Method for producing a data structure for use in password identification from a first set of first symbols (1) used for the formation of passwords, characterized by the following steps:
-
preparation of a second set of at least two second symbols (3) that are identical to or different from the symbols of the first set;
creation of a first number of first lists (7-10) of the first symbols, the first number being at least equal to two and at the most equal to the number of second symbols (3);
creation of a second list (12) of the second symbols (3), the number of elements in this list being equal to the first number, and each symbol (3) appearing only once in this list;
creation of a third number of third lists of third symbols, the third number being at least equal to the first number, the set of first symbols being a subset of the set of third symbols, and each one of the first lists being comprised in a third list;
association of a first list with each symbol of the second list;
association of a second symbol with each symbol of the first lists; and
storage of the data structure composed of at least all of these lists and of the associations on a medium in the form of digital data and/or of a readable representation;
in order to enable the creation of a password on the basis of a code consisting of;
a second symbol contained in the second list for defining the first list associated with that second symbol as a starting list, a subcode comprising at least one first symbol for selecting that symbol from the starting list and, if the subcode comprises at least two first symbols, for iteratively selecting one after another of the other first symbols in that one of the first lists which is associated with the second symbol associated with the previously selected first symbol, the last first symbol found in this manner constituting the starting symbol, and a manner of reading a sequence of third characters starting with the starting symbol by travelling through the third lists and the symbols in the third lists. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification