Automatic PIN creation using password
First Claim
1. A method, comprising:
- receiving, by a processor of a content provider, identification information of a user through a user device;
generating, by the processor of the content provider, a stored credential comprising a first numeric PIN by converting a first credential including an alphanumeric password to the stored credential based on a rule comprising mapping individual characters of the first credential to numbers or characters, wherein the stored credential has characters that are unknown to the user when the stored credential is generated and does not contain more characters than the first credential;
notifying, by the processor of the content provider, the user of the rule;
receiving, by the processor of the content provider, an entered credential comprising a second numeric PIN from the user;
comparing, by the processor by the processor of the content provider, the entered credential with the stored credential; and
granting access to the user, wherein in granting the access the entered credential matches the stored credential.
2 Assignments
0 Petitions
Accused Products
Abstract
A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving, by a processor of a content provider, identification information of a user through a user device; generating, by the processor of the content provider, a stored credential comprising a first numeric PIN by converting a first credential including an alphanumeric password to the stored credential based on a rule comprising mapping individual characters of the first credential to numbers or characters, wherein the stored credential has characters that are unknown to the user when the stored credential is generated and does not contain more characters than the first credential; notifying, by the processor of the content provider, the user of the rule; receiving, by the processor of the content provider, an entered credential comprising a second numeric PIN from the user; comparing, by the processor by the processor of the content provider, the entered credential with the stored credential; and granting access to the user, wherein in granting the access the entered credential matches the stored credential. - View Dependent Claims (2, 3, 6, 7, 8, 9, 10, 11)
-
-
4. A system, comprising:
-
a computer storage storing account information for a plurality of users having an account with a content provider, wherein the account information comprises a first credential, a second credential automatically generated from the first credential, and a user identifier for a user; and a processor operable to; receive identification information of a user through a user device; generate the second credential comprising a first numeric PIN by converting the first credential including an alphanumeric password to the second credential based on a rule comprising mapping individual characters of the first credential to numbers or characters, wherein the second credential has characters that are unknown to the user when the second credential is generated and does not contain more characters than the first credential; notify the user of the rule; receive an entered credential comprising a second numeric PIN from the user; compare the entered credential with the second credential; and grant access to the user, wherein in granting the access the entered credential matches the second credential. - View Dependent Claims (5, 12, 13, 14, 15, 16, 17)
-
Specification