Method and apparatus for password protection of a computer
First Claim
1. A method for password-protecting access by a user to a computer, the computer including memory, permitting access when a password has been forgotten or corrupted, the method comprising:
- storing in said memory a valid password, said valid password being non-user-settable and said valid password being based on first information, said first information being information which can be obtained without accessing said first information from said computer;
receiving, in said computer, an attempted password, said attempted password obtained by said user, based solely on said first information and said attempted password being obtainable without using information other than said first information;
retrieving from memory said valid password;
translating said valid password into an acceptable code based on said valid password;
comparing an attempted code, based on said attempted password, to said acceptable code; and
permitting user access when said attempted code matches said acceptable code.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for password protecting a personal, laptop or single user computer. The user'"'"'s password entry is compared to the value of a secondary password retained by the computer as well as the value of the user'"'"'s stored primary password. The user may thus access the computer when his primary password is corrupted or forgotten by obtaining an alternate password from the computer manufacturer which matches the secondary password generated or stored by the computer. The operation of the method and the organization of the apparatus make the secondary and alternate passwords valid for a limited time, thereby preserving the overall integrity of the password protection system. The primary, secondary and alternate passwords may be encrypted for added security.
-
Citations
32 Claims
-
1. A method for password-protecting access by a user to a computer, the computer including memory, permitting access when a password has been forgotten or corrupted, the method comprising:
-
storing in said memory a valid password, said valid password being non-user-settable and said valid password being based on first information, said first information being information which can be obtained without accessing said first information from said computer; receiving, in said computer, an attempted password, said attempted password obtained by said user, based solely on said first information and said attempted password being obtainable without using information other than said first information; retrieving from memory said valid password; translating said valid password into an acceptable code based on said valid password; comparing an attempted code, based on said attempted password, to said acceptable code; and permitting user access when said attempted code matches said acceptable code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for password-protecting user access to a computer, the computer including memory, the method permitting access when a password has been forgotten or corrupted, the method comprising:
-
receiving a user-settable first valid password; storing a first acceptable code based on said received first valid password; storing in said memory a second valid password, said valid password being non-user-settable and said valid password being based on first information, said first information being information which can be obtained without accessing said first information from said computer; receiving, in said computer, an attempted password, said attempted password obtained by said user based solely on said first information, and said attempted password being obtainable without using information other than said first information; comparing a first attempted code, based on said attempted password with said first acceptable code; retrieving from memory said second valid password; translating said second valid password into a second acceptable code based on said second valid password; comparing a second attempted code, based on said attempted password, to said second acceptable code; and permitting user access when said second attempted code matches said second acceptable code. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. Apparatus for password-protecting user access to a computer, the computer including memory, the apparatus permitting access when a password has been forgotten or corrupted, the apparatus comprising:
-
means for storing in said memory a valid password, said valid password being non-user-settable and said valid password being based on first information, said first information being information which can be obtained without accessing said first information from said computer; means, in said computer, for receiving an attempted password, said attempted password obtained by said user based solely on said first information, and said attempted password being obtainable without using information other than said first information; means for retrieving from memory said valid password,; means for translating said valid password into an acceptable code based on said valid password; means for comparing an attempted code, based on said attempted password, to said acceptable code; and means for permitting user access when said attempted code matches said acceptable code. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A method for password-protecting user access to a first computer, using a second computer, to permit access when a first password has been forgotten or corrupted, said first computer including information storage devices, and a clock for determining the current date, the method comprising:
-
storing in said first computer a first password for permitting user-access to said first computer in response to user-input of said first password, at least a portion of said first password being a user-memorized portion; calculating, in said second computer, a second password to be used to attempt access to said first computer, said calculating of said second password conducted using date information, and without inputting said user-memorized portion of said first password; outputting, from said second computer, said second password; inputting, into said first computer, said second password; calculating, in said first computer, a third non-user-settable password, said third password based on a date obtained from said clock; comparing in said first computer, said second and third passwords; and permitting user access to said first computer when said second password matches said third password.
-
-
32. A method for password-protecting user access to a first computer, using a second computer, to permit access when a first password has been forgotten or corrupted, said first computer including information storage devices, the method comprising:
-
storing in said first computer data based on said first password for permitting user-access to said first computer in response to user-input of said first password, at least a portion of said first password being a user-memorized portion; calculating, in said second computer, a second password to be used to attempt access to said first computer, said calculating of said second password conducted using first information which can be obtained without accessing said first information from said first computer, and without inputting said user-memorized portion of said first password; outputting, from said second computer, said second password; inputting, into said first computer, said second password; calculating, in said first computer, a third non-user-settable password, said third password based on said first information; translating, in said first computer, said third password into an acceptable code; translating, in said first computer, said second password into an attempted code; comparing, in said first computer, said attempted code with said acceptable code; and permitting user access to said first computer when said attempted code matches said acceptable code.
-
Specification