AUTOMATIC PIN CREATION USING PASSWORD
First Claim
1. A method, comprising:
- receiving, by a processor of a content provider, a first access credential;
applying, by the processor, a rule to the first access credential; and
generating, by the processor, a second access credential based on a result of the rule applied to the first access credential, wherein the second access credential is not longer than the first access credential.
2 Assignments
0 Petitions
Accused Products
Abstract
A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a processor of a content provider, a first access credential; applying, by the processor, a rule to the first access credential; and generating, by the processor, a second access credential based on a result of the rule applied to the first access credential, wherein the second access credential is not longer than the first access credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, by a processor of a content provider, identification information of a user through a user device; receiving, by the processor, an entered credential from the user; comparing, by the processor, the entered credential with a stored credential, wherein the stored credential was generated automatically by the processor from a first credential of the user based on a rule; and granting access to the user if the entered credential matches the stored credential. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
a computer storage storing account information for a plurality of users having an account with a content provider, wherein the account information comprises a first credential, a second credential automatically generated from the first credential, and a user identifier for a user; and a processor operable to; receive identification information of a user through a user device; receive an entered credential from the user; compare the entered credential with a second credential, wherein the second credential was generated automatically from a first credential of the user based on a rule; and granting access to the user if the entered credential matches the second credential. - View Dependent Claims (18, 19, 20)
-
Specification