Password-protection module
First Claim
Patent Images
1. A method, performed in a computer processor, of protecting a password being used to establish interaction between a user and an application, comprising:
- detecting, across a user interface, a request for the password from the application by receiving a notification from the user indicating the request;
combining the password with information identifying the application, so as to produce a protected password; and
authenticating to the application using the protected password;
wherein authenticating to the application includes communicating with the application in a challenge-response protocol using a derivative of the protected password;
wherein the method further includes preventing the user from providing the password directly to the application;
wherein the derivative of the protected password includes a key generated from the protected password.
14 Assignments
0 Petitions
Accused Products
Abstract
A method of protecting a password being used to establish interaction between a user and an application includes detecting a request for the password from the application by receiving a notification from the user indicating the request. The method further includes combining the password with information identifying the application, so as to produce a protected password, and authenticating to the application using the protected password. The method may also include a mutual authentication capability between user and the application.
33 Citations
28 Claims
-
1. A method, performed in a computer processor, of protecting a password being used to establish interaction between a user and an application, comprising:
-
detecting, across a user interface, a request for the password from the application by receiving a notification from the user indicating the request; combining the password with information identifying the application, so as to produce a protected password; and authenticating to the application using the protected password; wherein authenticating to the application includes communicating with the application in a challenge-response protocol using a derivative of the protected password; wherein the method further includes preventing the user from providing the password directly to the application; wherein the derivative of the protected password includes a key generated from the protected password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, performed in a computer processor, of protecting a password being used to establish interaction between a user and an application, comprising:
-
detecting, across a user interface, a request for the password from the application; combining the password with information identifying the application, so as to produce a protected password; authenticating to the application using the protected password; and determining, based on the password, whether the application is entitled to interact with the user; wherein determining whether the application is entitled to interact with the user includes the application demonstrating knowledge of the password; wherein the application demonstrating knowledge of the password includes providing a derivative of the password to the user; and wherein the derivative of the password is an alternative combination of the password and the value identifying the application, such that the alternative combination is a different combination from the one that produced the protected password.
-
-
21. A method, performed in a computer processor, of protecting a password being used to establish interaction between a user and an application, comprising:
-
detecting, across a user interface, a request for the password from the application; combining the password with information identifying the application, so as to produce a protected password; authenticating to the application using the protected password; and determining, based on the password, whether the application is entitled to interact with the user; wherein determining whether the application is entitled to interact with the user includes the application demonstrating knowledge of the password; and wherein the demonstration of knowledge of the password includes deriving a key from the password, computing message authentication code with the derived key, and sending the message authentication code to the user. - View Dependent Claims (22, 23, 24)
-
-
25. A non-transitory computer readable storage medium including stored instructions, which, when performed by a computer, are adapted for protecting a password being used to establish interaction between a user and an application, comprising:
-
instructions for detecting a request for the password from the application by receiving a notification from the user across a user interface indicating the request; instructions for combining the password with a value identifying the application, so as to produce a protected password; and instructions for authenticating to the application using the protected password; wherein the instructions for authenticating to the application include instructions for communicating with the application in a challenge-response protocol using a derivative of the protected password; wherein the derivative of the protected password includes a key generated from the protected password. - View Dependent Claims (26, 27, 28)
-
Specification