Method for securely using a single password for multiple purposes
First Claim
Patent Images
1. A method performed by a machine comprising:
- receiving a user password;
receiving a user identification;
receiving a plurality of names for independent software applications that require a password for a user to use any of the software applications;
generating a unique and specific randomly generated salt value for each independent software application;
computing a software application dependent password for a user for a selected independent software application, wherein the software application dependent password only depends on the user password, the user identification and the specific randomly generated salt value associated with the selected software application; and
returning the software application dependent password for the selected independent software application to the user,wherein a user does not need to one of remember the selected software application dependent password and record the selected software application dependent password as the software application dependent password is one of computed each time a user requests access to the software application and temporarily stored a first time the user requests access to the software application for a predetermined time period.
1 Assignment
0 Petitions
Accused Products
Abstract
A method receives input data and determines if a salt value exists. The method generates a salt value and stores the salt value in a table entry if the salt value does not exist. The method further retrieves the salt value from the table entry if the salt value exists and generates a hash from the salt value and the input data. The method further includes generating a password from the hash and returning the password to an application to gain entry to the application. Also a program storage device readable by a machine includes instructions that cause the machine to perform similarly to the method.
-
Citations
27 Claims
-
1. A method performed by a machine comprising:
-
receiving a user password; receiving a user identification; receiving a plurality of names for independent software applications that require a password for a user to use any of the software applications; generating a unique and specific randomly generated salt value for each independent software application; computing a software application dependent password for a user for a selected independent software application, wherein the software application dependent password only depends on the user password, the user identification and the specific randomly generated salt value associated with the selected software application; and returning the software application dependent password for the selected independent software application to the user, wherein a user does not need to one of remember the selected software application dependent password and record the selected software application dependent password as the software application dependent password is one of computed each time a user requests access to the software application and temporarily stored a first time the user requests access to the software application for a predetermined time period. - View Dependent Claims (2, 3, 4)
-
-
5. A method performed by a machine comprising:
-
receiving a plurality of names for independent software applications that require a password for a user to use any of the software applications; generating a plurality of random salt values for each software application; generating a hash from one random salt value and input data, the one salt value only associated with one specific software application, the input data including a user identification and a strong password; generating a software application dependent password from the hash; and returning the software application dependent password to a user to gain entry to the software application, wherein a user does not need to one of remember the software application dependent password and record the software application dependent password as the software application dependent password is one of computed each time a user requests access to the specific software application and temporarily stored a first time the user requests access to the specific software application for a predetermined time period. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A program storage device readable by a machine comprising instructions that cause the machine to:
-
receive a plurality of names for independent software applications that require a password for a user to use any of the software applications; generate a plurality of random salt values for the software applications; generate a hash for each of the plurality of random salt values and input data, each salt value only associated with one specific software application, the input data including a user identification and a strong password; generate a software application dependent password for one hash for a user selected software application; and return the software application dependent password to a user for the selected software application to gain entry to the selected software application, wherein the user does not need to one of remember the software application dependent password for the selected software application and record the software application dependent password for the selected software application as the software application dependent password is generated each time a user requests access to the selected software application. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification