Method for supporting dynamic password
First Claim
1. A method of password verification comprising the steps of:
- providing a process for transforming at least a variable parameter into an ordered string of characters, wherein the process sometimes results in different ordered strings of characters for a same variable parameter;
providing at least a variable parameter as a known password;
determining from data available to an individual and from the known password a static string;
providing the determined static string as a password for verification; and
, verifying the static string to determine that it is an accurate transformation of the at least a variable parameter according to the provided process and when the determination is that the transformation is accurate, providing an indication that the password is verified.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of generating dynamic password is disclosed. A method of generating a dynamic password comprising the steps of providing a plurality of variable parameters, each parameter from the plurality of variable parameters being variable upon predetermined criteria; providing a plurality of predetermined static parameters; and processing at least some of the plurality of variable parameters and of the predetermined static parameters according to a dynamic password generating equation manipulating at least some of the plurality of variable parameters and of the predetermined static parameters resulting in an ordered sequence of dynamic and static parameters.
56 Citations
19 Claims
-
1. A method of password verification comprising the steps of:
-
providing a process for transforming at least a variable parameter into an ordered string of characters, wherein the process sometimes results in different ordered strings of characters for a same variable parameter;
providing at least a variable parameter as a known password;
determining from data available to an individual and from the known password a static string;
providing the determined static string as a password for verification; and
, verifying the static string to determine that it is an accurate transformation of the at least a variable parameter according to the provided process and when the determination is that the transformation is accurate, providing an indication that the password is verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of changing dynamic passwords comprising the steps of:
-
providing a string of characters, the string including indications of at least a parameter from a plurality of parameters, the at least a parameter being a variable parameter variable upon predetermined criteria;
receiving the provided string of characters; and
, storing data based on the known password, the data sufficient for verifying provided passwords to determine their accuracy. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method of verifying a dynamic password comprising the steps of:
-
receiving a password comprising a string of characters wherein the characters are sequenced according to a predetermined sequence of variable parameters and static parameters;
identifying static parameters within the string of characters;
determining dynamic parameter values related to the dynamic parameters in accordance with the predetermined sequence;
comparing static parameters received within the string of characters with previously stored static parameters and the received dynamic parameter within the determined dynamic parameters to determine a first comparison result;
wherein upon both the first comparison result being indicative of a match, the dynamic password is validated.
-
-
17. A method of generating a dynamic password comprising the steps of:
providing a process for transforming at least a variable parameter into an ordered string of characters, wherein the process sometimes results in different ordered strings of characters for a same variable parameter; and
, providing at least a variable parameter as a password, the provided variable parameter provided by an individual via a data entry device.- View Dependent Claims (18, 19)
Specification