METHODS, DEVICES AND COMPUTER PROGRAM SUPPORTS FOR PASSWORD GENERATION AND VERIFICATION
2 Assignments
0 Petitions
Accused Products
Abstract
During log-on of a user to an entity protected by a password, the password is verified by iteratively receiving a password character; and verifying that the received character complies with a predefined property (α) that sets at least one requirement for allowable passwords. If this is not the case, then this can indicate a brute force attack and appropriate action may be taken. The property α may be dependent on the user. Also provided are a corresponding device and a computer program product.
38 Citations
28 Claims
-
1-15. -15. (canceled)
-
16. A method of verification of a password during log-on of a user to an entity protected by a password, the method comprising the steps in a processor of:
-
receiving at least one character of the password; and verifying that the at least one received character compiles with a predefined property that sets at least one requirement for allowable passwords; and upon reception of all the characters of the password and an indication that the password is complete, the subsequent step of verifying that the complete password corresponds to the password that protects the entity. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A device for verifying a password during log-on of a user to an entity protected by a password, the device comprising:
-
an interface for receiving password characters; and a processor configured to; verify that at least one received password character complies with a predefined property that sets at least one requirement for allowable passwords; and upon reception of all the characters of the password and an indication that the password is complete, subsequently verify that the complete password corresponds to the password that protects the entity. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A computer program product having stored thereon instructions of a software program, wherein the instructions, when executed by a processor performs the steps, during log-on of a user to an entity protected by a password, of:
-
receiving at least one character of a password; and verifying that the at least one received character complies with a predefined property that sets at least one requirement for allowable passwords; and upon reception of all the characters of the password and an indication that the password is complete, subsequently verifying that the complete password corresponds to the password that protects the entity.
-
Specification