Method for protecting a user's password
First Claim
1. A method for providing a protectable password comprising:
- a) entering an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the protectable password and an arbitrary number of characters and keystrokes unrelated to the protectable password, entering the protectable password in any position within the string of characters and keystrokes of the apparent password;
b) analyzing the entered apparent password by the computing system to determine a presence or absence of the protectable password; and
c) validating the apparent password if the protectable password is determined to be present in any position in within the string of characters and keystrokes of the apparent password.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method for protecting a password. In a first aspect, the method includes allowing a user to enter an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the password and an arbitrary number of non-password related characters and keystrokes. The method further includes analyzing the string of characters and keystrokes by the computing system to find the password, and validating the apparent password if the password is found in any position in the string of characters and keystrokes. In a second aspect, the method includes creating a random pattern in response to receiving a request from a user to access a protected resource in a computing system, wherein the random pattern is associated with the request, displaying the random pattern associated with the request to the user, and allowing the user to enter an apparent password into the computing system that controls access to the protected resource, wherein the apparent password is a string of characters and keystrokes including the password, the random pattern and an arbitrary number of non-password related characters and keystrokes. The method further includes analyzing the string of characters and keystrokes by the computing system to find the password and the random pattern associated with the request, and validating the apparent password if the password and the random pattern are found in any position in the string of characters and keystrokes.
-
Citations
8 Claims
-
1. A method for providing a protectable password comprising:
- a) entering an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the protectable password and an arbitrary number of characters and keystrokes unrelated to the protectable password, entering the protectable password in any position within the string of characters and keystrokes of the apparent password;
b) analyzing the entered apparent password by the computing system to determine a presence or absence of the protectable password; and
c) validating the apparent password if the protectable password is determined to be present in any position in within the string of characters and keystrokes of the apparent password. - View Dependent Claims (2, 3, 4, 5)
- a) entering an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the protectable password and an arbitrary number of characters and keystrokes unrelated to the protectable password, entering the protectable password in any position within the string of characters and keystrokes of the apparent password;
-
6. A method for providing a protectable password comprising:
- a) creating a random pattern in response to receiving a request from a user to access a protected resource in a computing system, wherein the random pattern is associated with the request;
b) displaying the random pattern associated with the request to the user;
c) allowing the user to enter an apparent password into the computing system that controls access to the protected resource, wherein the apparent password is a string of characters and keystrokes including the password, the random pattern and an arbitrary number of characters and keystrokes unrelated to the protectable password, allowing the user to enter the protectable password and the random pattern in any position within the apparent password;
d) analyzing the string of characters and keystrokes of the apparent password by the computing system to determine a presence or absence of the protectable password and the random pattern associated with the request; and
e) validating the apparent password if the protectable password and the random pattern are determined to be present in any position within the string of characters and keystrokes of the apparent password. - View Dependent Claims (7, 8)
- a) creating a random pattern in response to receiving a request from a user to access a protected resource in a computing system, wherein the random pattern is associated with the request;
Specification