×

User authentication method using password

  • US 7,451,322 B2
  • Filed: 10/01/2002
  • Issued: 11/11/2008
  • Est. Priority Date: 03/05/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A user authentication method using a password, the method comprising the steps of:

  • inputting, by a user, a password including a predetermined number of digits, the inputted password including an actual fixed password and a fake password;

    examining whether an input password includes the actual password regardless of order or repetition thereof by using less digits than the input password and without considering the content of the fake password;

    examining, when the actual password is included in the input password, whether an approved password list has an identical approved password with the input password among at least one of the approved passwords that are registered to the list;

    examining, when the approved password list does not have the identical approved password with the input password, whether the approved password list has a designated number of approved passwords having an actual password at the same position with the actual password;

    approving the input password irrespective of content of the fake password when the approved password list has less than a predetermined number of approved passwords having an actual password at the same position with the actual password that is included in the input password;

    registering the approved input password to the approved password list as a new approved password; and

    refusing the input password when the input password does not include the actual password, or when the approved password list does not have any identical approved password with the input password, or when the approved password list has the predetermined number of the approved passwords having an actual password at the same position with the actual password that is included in the input; and

    wherein the input password comprises the actual password, and fake passwords that are randomly chosen and interspersed by the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×