PASSWORD BASED ACCESS INCLUDING ERROR ALLOWANCE
First Claim
1. A method of managing user access via a client device, the method comprising:
- assigning a password to the user;
prompting the user to input the password via an input device of the client device;
receiving an input from the user via the input device responsive to said prompting;
granting access to the user when the received input is the same as the password;
granting access to the user when the received input is not the same as the password and includes a first incorrect character; and
denying access to the user when the received input is not the same as the password and includes at least a second incorrect character different from the first incorrect character.
0 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for enabling a client user to access secure information or services via a security code including a password and/or username even when the security code provided by the client user includes one or more errors. As one example, a level of error allowance may be selected by a system administrator based on a prescribed minimum level of security and the security code selected by the client user. The application of error allowance can reduce the number of times a client user is denied access to requested information or services due to incorrect or mistyped security code input while also ensuring the prescribed minimum level of security is retained.
-
Citations
20 Claims
-
1. A method of managing user access via a client device, the method comprising:
-
assigning a password to the user; prompting the user to input the password via an input device of the client device; receiving an input from the user via the input device responsive to said prompting; granting access to the user when the received input is the same as the password; granting access to the user when the received input is not the same as the password and includes a first incorrect character; and denying access to the user when the received input is not the same as the password and includes at least a second incorrect character different from the first incorrect character. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network system, comprising:
-
a network server; a client device communicating with the network server via a network; a password selection tool configured to enable the user to select a password that includes at least a minimum number of characters; and a password validation engine configured to prompt the user for the password responsive to a request by the user for information stored at the server, wherein the password validation engine is configured to receive a user response to said prompt via the client device; wherein the password validation engine is further configured to compare the password selected by the user with the user response to identify correct password characters contained in the user response, and responsive to said comparison; grant the user access to the information stored on the server when the user response includes less than all of the correct password characters and at least a first number of correct password characters; and deny the user access to the information stored on the server when the user response includes less than all of the correct password characters and a second number of correct password characters less than the first number of correct characters. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of managing access of a user of a network client, the method comprising:
-
assigning a security code to the user; receiving an access request from the user via an input device of the network client, wherein the access request is received at a server communicating with the network client via a network; requesting a security code from the user via a graphical user interface of the network client in response to the received access request; receiving a response from the user via the input device of the network client responsive to the security code request, wherein the response is received at the server; generating a plurality of security code variations at the server based on the security code assigned to the user; granting the requested access to the user when the response received at the server includes the security code or one of the generated security code variations; and denying the requested access to the user when the response received at the server does not include the security code or one of the security code variations. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification