Filtering Passwords Based on a Plurality of Criteria
First Claim
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:
- obtaining, with one or more processors, with a domain controller of a private computer network, a first password, the first password being associated with a first username and serving to afford access to the private computer network;
determining, with one or more processors, with a credential-monitoring application within the private computer network, whether the first password satisfies one or more criteria from among a plurality of criteria, wherein determining whether the first password satisfies a first criterion among the plurality of criteria includes;
comparing, with the credential-monitoring application within the private computer network, the first password to a set of compromised credentials within a database within the private computer network; and
determining whether the first password matches one or more passwords within the database; and
in response to the determination that the first password satisfies the one or more criteria from among the plurality of criteria, causing, with one or more processors, a use of the first password to access the private computer network to be rejected and causing, with one or more processors, a first user associated with the first password to be notified to change the first password.
3 Assignments
0 Petitions
Accused Products
Abstract
Provided is a process, including: obtaining a first password to a private computer network; determining, with a credential-monitoring application within the private computer network, whether the first password satisfies one or more criteria by: comparing the first password to a set of compromised credentials within a database within the private computer network; and determining whether the first password matches one or more passwords within the database; and in response to the determination that the first password satisfies the one or more criteria from among the plurality of criteria, causing a use of the first password to access the private computer network to be rejected and causing a first user associated with the first password to be notified to change the first password.
24 Citations
20 Claims
-
1. A tangible, non-transitory, machine-readable medium storing instructions that when executed by one or more processors effectuate operations comprising:
-
obtaining, with one or more processors, with a domain controller of a private computer network, a first password, the first password being associated with a first username and serving to afford access to the private computer network; determining, with one or more processors, with a credential-monitoring application within the private computer network, whether the first password satisfies one or more criteria from among a plurality of criteria, wherein determining whether the first password satisfies a first criterion among the plurality of criteria includes; comparing, with the credential-monitoring application within the private computer network, the first password to a set of compromised credentials within a database within the private computer network; and determining whether the first password matches one or more passwords within the database; and in response to the determination that the first password satisfies the one or more criteria from among the plurality of criteria, causing, with one or more processors, a use of the first password to access the private computer network to be rejected and causing, with one or more processors, a first user associated with the first password to be notified to change the first password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, comprising:
-
obtaining, with one or more processors, with a domain controller of a private computer network, a first password, the first password being associated with a first username and serving to afford access to the private computer network; determining, with one or more processors, with a credential-monitoring application within the private computer network, whether the first password satisfies one or more criteria from among a plurality of criteria, wherein determining whether the first password satisfies a first criterion among the plurality of criteria includes; comparing, with the credential-monitoring application within the private computer network, the first password to a set of compromised credentials within a database within the private computer network; and determining whether the first password matches one or more passwords within the database; and in response to the determination that the first password satisfies the one or more criteria from among the plurality of criteria, causing, with one or more processors, a use of the first password to access the private computer network to be rejected and causing, with one or more processors, a first user associated with the first password to be notified to change the first password.
-
Specification