Temporary password login
First Claim
Patent Images
1. A method for providing access to a computational component, comprising:
- (a) authenticating a user using a first password;
(b) after the user is successfully authenticated using the first password, receiving a request from the user for a second password to be authorized for at least one of the user and a login associated with the user;
(c) providing the user with the second password; and
(d) initiating a timer to determine when an assigned life for the second password has expired.
6 Assignments
0 Petitions
Accused Products
Abstract
A telecommunications component, such as a switch or server, is provided that includes a timer 120 and an access agent 116 operable to (a) authenticate a user using a first (typically dynamic) password; (b) after the user is successfully authenticated using the first password, receive a request from the user for a second (temporary, typically non-dynamic) password to be authorized for at least one of the user and a login associated with the user; (c) provide the user with the second password; and {d} initiate the timer to determine when an assigned life for the second password has expired.
-
Citations
24 Claims
-
1. A method for providing access to a computational component, comprising:
-
(a) authenticating a user using a first password;
(b) after the user is successfully authenticated using the first password, receiving a request from the user for a second password to be authorized for at least one of the user and a login associated with the user;
(c) providing the user with the second password; and
(d) initiating a timer to determine when an assigned life for the second password has expired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19, 20)
-
-
11. A telecommunications component, comprising:
-
a timer; and
an access agent operable to (a) authenticate a user using a first password;
(b) after the user is successfully authenticated using the first password, receive a request from the user for a second password to be authorized for at least one of the user and a login associated with the user;
(c) provide the user with the second password; and
(d) initiate the timer to determine when an assigned life for the second password has expired. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
21. A method for authenticating a user, comprising:
-
(a) receiving a sequence of characters from a user;
(b) comparing the sequence of characters with a first password, the first password being a dynamic password; and
(c) when the sequence of characters is different from the first password, comparing the sequence of characters with a second password, the second password being a nondynamic password and having a predetermined life. - View Dependent Claims (22, 24)
-
-
23. A method for authenticating a user, comprising:
-
(a) receiving a sequence of characters from a user;
(b) comparing the sequence of characters with a first password, the first password being a dynamic password; and
(c) comparing the sequence of characters with a second password, the second password being a static password and having a predetermined life, wherein step (b) is performed when the sequence of characters is different from the second password.
-
Specification