System and method for password protection
First Claim
1. A computer-implemented method for password protection, the method comprising:
- intercepting a plurality of data entry events generated by a data entry device, wherein the plurality of data entry events comprise a user-entered password;
detecting an anomaly event in the plurality of intercepted data entry events;
comparing the detected anomaly event with one or more preset anomalies;
if the detected anomaly event matches at least one preset anomaly, identifying a replacement character string associated with said at least one preset anomaly, wherein the associated replacement character string is different from the detected anomaly;
replacing the detected anomaly event in the plurality of intercepted data entry events with the replacement character string to generate a converted password; and
sending the converted password instead of the user-entered password to a user authentication device for authentication of the user based at least on the converted password.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclose are system, method and computer program product for protecting passwords from interception. An example method comprise: intercepting a plurality of data entry events generated by a data entry device, wherein the plurality of data entry events comprise a user-entered password; detecting an anomaly event in the plurality of intercepted data entry events; comparing the detected anomaly event with one or more preset anomalies; if the detected anomaly event matches at least one preset anomaly, identifying a replacement character string associated with said at least one preset anomaly; replacing the detected anomaly event in the plurality of intercepted data entry events with the replacement character string to generate a converted password; and sending the converted password instead of the user-entered password to a user authentication device for authentication of the user.
42 Citations
20 Claims
-
1. A computer-implemented method for password protection, the method comprising:
-
intercepting a plurality of data entry events generated by a data entry device, wherein the plurality of data entry events comprise a user-entered password; detecting an anomaly event in the plurality of intercepted data entry events; comparing the detected anomaly event with one or more preset anomalies; if the detected anomaly event matches at least one preset anomaly, identifying a replacement character string associated with said at least one preset anomaly, wherein the associated replacement character string is different from the detected anomaly; replacing the detected anomaly event in the plurality of intercepted data entry events with the replacement character string to generate a converted password; and sending the converted password instead of the user-entered password to a user authentication device for authentication of the user based at least on the converted password. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-based system for password protection, the system comprising a plurality of software modules stored in a memory and executable by a processor, the modules comprising:
-
a password interception module configured to intercept a plurality of data entry events generated by a data entry device, wherein the plurality of data entry events comprise a user-entered password; an anomaly detection module configured to detect an anomaly event in the plurality of intercepted data entry events; a database storing one or more preset anomalies and replacement character strings; a password conversion module configured to; compare the detected anomaly event with the one or more preset anomalies stored in the database; if the detected anomaly event matches at least one preset anomaly, identify a replacement character string associated with said at least one preset anomaly, wherein the associated replacement character string is different from the detected anomaly; replace the detected anomaly event in the plurality of intercepted data entry events with the replacement character string to generate a converted password; and send the converted password instead of the user-entered password to a user authentication device for authentication of the user based at least on the converted password. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embedded in a non-transitory computer-readable storage medium, the computer-readable storage medium comprising computer-executable instructions for password protection, the medium comprising instructions for:
-
intercepting a plurality of data entry events generated by a data entry device, wherein the plurality of data entry events comprise a user-entered password; detecting an anomaly event in the plurality of intercepted data entry events; comparing the detected anomaly event with one or more preset anomalies; if the detected anomaly event matches at least one preset anomaly, identifying a replacement character string associated with said at least one preset anomaly, wherein the associated replacement character string is different from the detected anomaly; replacing the detected anomaly event in the plurality of intercepted data entry events with the replacement character string to generate a converted password; and sending the converted password instead of the user-entered password to a user authentication device for authentication of the user based at least on the converted password. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification