User authentication method using password
First Claim
1. A user authentication method using a password, the method comprising the steps of:
- inputting, by a user, a password including a predetermined number of digits, the inputted password including an actual fixed password and a fake password;
examining whether an input password includes the actual password regardless of order or repetition thereof by using less digits than the input password and without considering the content of the fake password;
examining, when the actual password is included in the input password, whether an approved password list has an identical approved password with the input password among at least one of the approved passwords that are registered to the list;
examining, when the approved password list does not have the identical approved password with the input password, whether the approved password list has a designated number of approved passwords having an actual password at the same position with the actual password;
approving the input password irrespective of content of the fake password when the approved password list has less than a predetermined number of approved passwords having an actual password at the same position with the actual password that is included in the input password;
registering the approved input password to the approved password list as a new approved password; and
refusing the input password when the input password does not include the actual password, or when the approved password list does not have any identical approved password with the input password, or when the approved password list has the predetermined number of the approved passwords having an actual password at the same position with the actual password that is included in the input; and
wherein the input password comprises the actual password, and fake passwords that are randomly chosen and interspersed by the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A user authentication method includes the steps of: inputting, by a user, a predetermined password having a plurality of digits; examining whether an input password includes an actual password that is predetermined by using less digits than the input password; authenticating the input password if the input password includes the actual password; and refusing to authenticate the input password if the input password does not include the actual password. The user authentication method using the password is very useful for reinforcing the security by applying a simple processing, not necessarily consuming high costs and much time. Further, even when the password may be exposed to others, it is still safe. Also, although a password may be used in many cases in common, the security still can be reinforced by differentiating the input password. Most of all, the user can remember the actual password very easily, and yet get the same effect with changing the password.
40 Citations
11 Claims
-
1. A user authentication method using a password, the method comprising the steps of:
-
inputting, by a user, a password including a predetermined number of digits, the inputted password including an actual fixed password and a fake password; examining whether an input password includes the actual password regardless of order or repetition thereof by using less digits than the input password and without considering the content of the fake password; examining, when the actual password is included in the input password, whether an approved password list has an identical approved password with the input password among at least one of the approved passwords that are registered to the list; examining, when the approved password list does not have the identical approved password with the input password, whether the approved password list has a designated number of approved passwords having an actual password at the same position with the actual password; approving the input password irrespective of content of the fake password when the approved password list has less than a predetermined number of approved passwords having an actual password at the same position with the actual password that is included in the input password; registering the approved input password to the approved password list as a new approved password; and refusing the input password when the input password does not include the actual password, or when the approved password list does not have any identical approved password with the input password, or when the approved password list has the predetermined number of the approved passwords having an actual password at the same position with the actual password that is included in the input; and wherein the input password comprises the actual password, and fake passwords that are randomly chosen and interspersed by the user. - View Dependent Claims (2, 3, 4)
-
-
5. A method, comprising:
-
determining whether an input password includes an actual password regardless of order or repetition thereof, the actual password being used for authentication, the inputted password including an actual fixed password and a fake password; determining whether the input password is included in an approved password list without considering content of the fake password; determining whether the approved password list includes a predetermined number of passwords having the actual password at the same position with the actual password included in the input password; approving the input password for authentication when the approved password list does not include a predetermined number of passwords having the actual password at the same position with the actual password included in the input password irrespective of content of the fake password; and refusing to authenticate the input password when the approved password list does include a predetermined number of passwords having the actual password at the same position with the actual password included in the input password; and approving the input password for authentication when the input password includes the actual password, the approved password list does not have the same password with the input password, and the approved password list does not include a predetermined number of passwords having the actual password at the same position with the actual password included in the input password; wherein the input password comprises the actual password, and fake passwords that are randomly chosen and interspersed by the user. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
Specification