METHOD AND SYSTEM FOR MANAGING USER LOGIN BEHAVIOR ON AN ELECTRONIC DEVICE FOR ENHANCED SECURITY
First Claim
1. A method for managing user login behavior on an electronic device, the method comprising:
- receiving, by an electronic device, information relating to an entered password having a plurality of second characters of a plurality of characters, wherein the entered password is different from a defined password associated with a user and having a plurality of first characters of the plurality of characters;
identifying, by the electronic device and for at least one second character of the entered password, at least one alternative character of the plurality of characters based on a location of a key corresponding to a second character of the at least one second characters on a keyboard used to enter the entered password, wherein the keyboard includes a plurality of keys corresponding to the plurality of characters;
generating, by the electronic device, a variation of the entered password by replacing the at least one second character with an alternative character of the at least one second character; and
determining, by the electronic device, that the entered password is valid when information relating to the variation of the entered password matches information relating to the defined password.
7 Assignments
0 Petitions
Accused Products
Abstract
Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid.
35 Citations
31 Claims
-
1. A method for managing user login behavior on an electronic device, the method comprising:
-
receiving, by an electronic device, information relating to an entered password having a plurality of second characters of a plurality of characters, wherein the entered password is different from a defined password associated with a user and having a plurality of first characters of the plurality of characters; identifying, by the electronic device and for at least one second character of the entered password, at least one alternative character of the plurality of characters based on a location of a key corresponding to a second character of the at least one second characters on a keyboard used to enter the entered password, wherein the keyboard includes a plurality of keys corresponding to the plurality of characters; generating, by the electronic device, a variation of the entered password by replacing the at least one second character with an alternative character of the at least one second character; and determining, by the electronic device, that the entered password is valid when information relating to the variation of the entered password matches information relating to the defined password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 26, 27, 28)
-
-
23. A method for managing user login behavior on an electronic client device including a keyboard having a plurality of keys corresponding to a plurality of characters, the method comprising:
-
storing, on the electronic client device associated with a user, information relating to a password defined by the user, wherein the defined password includes a plurality of first characters of the plurality of characters; receiving, by the electronic device, an entered password having a plurality of second characters of the plurality of characters, wherein the entered password is different from the defined password; identifying, by the electronic client device and for at least one second character, at least one alternative character of the plurality of characters based on a location of a key corresponding to a second character of the at least one second characters on a keyboard used to enter the entered password; generating, by the electronic client device, a variation of the entered password by replacing the at least one second character with an alternative character of the at least one second character; and determining, by the electronic client device, that the entered password is valid when each of the plurality of first characters either matches a corresponding second character in a corresponding position of the entered password or matches an alternative character of the corresponding second character.
-
-
24. A method for managing user login behavior on an electronic client device including a keyboard having a plurality of keys corresponding to a plurality of characters, the method comprising:
-
receiving, by the electronic client device associated with a user, an entered password having a plurality of second characters of a plurality of characters; generating, by the electronic client device, a first hash value corresponding to the entered password; transmitting, by the electronic client device, the first hash value to a server, wherein the server stores a second hash value corresponding to a password defined by the user, the defined password having a plurality of first characters of the plurality of characters; receiving, by the electronic client device, the second hash value from the server when the first hash value fails to match the second hash value; identifying, by the electronic client device and for at least one second character of the entered password, at least one alternative character of the plurality of characters based on a location of a key corresponding to a second character of the at least one second characters on a keyboard used to enter the entered password; generating, by the electronic client device, a variation of the entered password by replacing the at least one second character with an alternative character of the at least one second character; generating, by the electronic client device, a third hash value corresponding to the variation of the entered password; and determining, by the electronic client device, that the entered password is valid when the third hash value corresponding to the variation of the entered password matches the second hash value.
-
-
25. A method for managing user login behavior at a server, the method comprising:
-
storing, on a server, information relating to a password defined by and associated with a user, wherein the defined password includes a plurality of first characters of a plurality of characters; receiving, by the server, an entered password from an electronic client device, the entered password having a plurality of second characters of the plurality of characters; receiving, by the server from the electronic client device, information identifying at least one keyboard layout corresponding to at least one keyboard provided by the electronic client device and used to generate the entered password; identifying, by the server and for at least one second character, at least one alternative character of the plurality of characters based on the at least one keyboard layout; generating, by the server, a variation of the entered password by replacing at least one second character with an alternative character of the at least one second character; and determining, by the server, that the entered password is valid when information relating to the variation of the entered password matches the information relating to the defined password.
-
-
29. A method comprising:
-
receiving an entered password input through a keyboard, the entered password comprising a plurality of first characters; retrieving a defined password comprising a plurality of second characters, the defined password being different from the entered password because a first character of the entered password does not match a second character in a corresponding position of the defined password; and if a location on the keyboard for the first character of the entered password is adjacent to a location on the keyboard for the second character of the defined password, determining that access should be permitted. - View Dependent Claims (30, 31)
-
Specification