ENTERPRISE PASSWORD RESET
First Claim
1. A method for authenticating a user, the method comprising:
- receiving the user'"'"'s request for authentication;
extracting information associated with the user from user-specific information stored in an enterprise computer, wherein the extracted user information does not explicitly relate to a password;
generating one or more challenges based on the extracted user information;
receiving the user'"'"'s response to the challenges;
comparing the user'"'"'s response to the extracted user information; and
authenticating the user.
6 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system for automatically authenticating a user. During operation, the system receives a user'"'"'s request for authentication. The system then extracts information associated with the user from user-specific information stored in an enterprise computer. The extracted user information does not explicitly relate to a password. The system further generates one or more challenges based on the extracted user information, and receives the user'"'"'s response to the challenges. Subsequently, the system compares the user'"'"'s response to the extracted user information, and authenticates the user.
116 Citations
24 Claims
-
1. A method for authenticating a user, the method comprising:
-
receiving the user'"'"'s request for authentication; extracting information associated with the user from user-specific information stored in an enterprise computer, wherein the extracted user information does not explicitly relate to a password; generating one or more challenges based on the extracted user information; receiving the user'"'"'s response to the challenges; comparing the user'"'"'s response to the extracted user information; and authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage medium storing instructions which when executed by a computer cause the computer to perform a method for authenticating a user, the method comprising:
-
receiving the user'"'"'s request for authentication; extracting information from the user based on user-specific information stored in an enterprise computer, wherein the extracted user information does not explicitly relate to a password; generating one or more challenges based on the extracted user information; receiving the user'"'"'s response to the challenges; comparing the user'"'"'s response to the extracted user information; and authenticating the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer system for authenticating a user, comprising:
-
a processor; a memory; a receiving mechanism configured to receive the user'"'"'s request for authentication; an extracting mechanism configured to extract information associated with the user based on user-specific information stored in an enterprise computer, wherein the extracted user information does not explicitly relate to a password; a generating mechanism configured to generate one or more challenges based on the identified user information; a receiving mechanism configured to receive the user'"'"'s response to the challenges; a comparing mechanism configured to compare the user'"'"'s response to the extracted user information; and an authenticating mechanism configured to authenticate the user. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification