Updating stored passwords
First Claim
1. A device comprising:
- a memory to store instructions; and
a processor to execute the instructions to;
determine that a first form of a password received from a client device differs from a value associated with the client device,the value associated with the client device being derived from a second form of the password,establish, based on determining that the first form of the password differs from the value associated with the client device, a secure connection between the device and the client device via a quarantine network,receive, via the secure connection, a plain-text password from the client device,compare a value derived from the plain-text password with the value associated with the client device to determine whether the value derived from the plain-text password matches the value associated with the client device,associate a third form of the password with the client device when the value derived from the plain-text password matches the value associated with the client device,receive, after associating the third form of the password, a subsequent first form of the password from the client device, andauthenticate the client device using the first form of the password and the third form of the password.
10 Assignments
0 Petitions
Accused Products
Abstract
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client in accordance with an authentication protocol, and authenticate the client based on a comparison of the first form to a value derived from a second form of the password stored in a password database. The comparison fails when the first form is not comparable to a value derived from the second form. The server may establish a secure connection to the client, receive a plain-text password from the client over the secure connection, authenticate the client by comparing a value derived from the plain-text password with a value derived from the second form, and update the password database with a third form of the password that permits the authentication server to successfully authenticate the client when the authentication server receives the first form.
-
Citations
20 Claims
-
1. A device comprising:
-
a memory to store instructions; and a processor to execute the instructions to; determine that a first form of a password received from a client device differs from a value associated with the client device, the value associated with the client device being derived from a second form of the password, establish, based on determining that the first form of the password differs from the value associated with the client device, a secure connection between the device and the client device via a quarantine network, receive, via the secure connection, a plain-text password from the client device, compare a value derived from the plain-text password with the value associated with the client device to determine whether the value derived from the plain-text password matches the value associated with the client device, associate a third form of the password with the client device when the value derived from the plain-text password matches the value associated with the client device, receive, after associating the third form of the password, a subsequent first form of the password from the client device, and authenticate the client device using the first form of the password and the third form of the password. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
transmitting, by a device, a first form of a plain-text password to a server to establish a first connection to a network, the first form of the plain-text password being based on a first scheme; establishing, by the device, the first connection to the network based on transmitting the first form of the plain-text password, the first connection being established based on the server authenticating the device based on the first form of the plain-text password; transmitting, by the device, a second form of the plain-text password to the server to establish a second connection to the network, the second form of the plain-text password being based on a second scheme that is different from the first scheme, and the second form of the plain-text password being different from the first form of the plain-text password; determining, by the device, that an authentication associated with establishing the second connection to the network failed, the authentication being based on the second form of the plain-text password; establishing, by the device, a secure connection with the server, via a quarantine network, based on determining that the authentication failed; transmitting, by the device and via the secure connection, the plain-text password based on establishing the secure connection; and establishing, by the device, the second connection to the network based on transmitting the plain-text password, the second connection being established based on the server authenticating the device based on the plain-text password. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing instructions, the instructions comprising:
-
one or more instructions which, when executed by one or more processors, cause the one or more processors to determine not to authenticate a device based on a first form of a password, received from the device, differing from a value associated with a second form of the password; one or more instructions which, when executed by the one or more processors, cause the one or more processors to establish, based on determining not to authenticate the device, a secure connection with the device via a quarantine network; one or more instructions which, when executed by the one or more processors, cause the one or more processors to receive, via the secure connection, a plain-text password from the device; one or more instructions which, when executed by the one or more processors, cause the one or more processors to compare a value derived from the plain-text password with the value associated with the second form of the password to determine whether the value derived from the plain-text password matches the value associated with the second form of the password; one or more instructions which, when executed by the one or more processors, cause the one or more processors to authenticate the device when the value derived from the plain-text password matches the value associated with the second form of the password; one or more instructions which, when executed by the one or more processors, cause the one or more processors to associate a third form of the password with the device when the value derived from the plain-text password matches the value associated with the second form of the password; one or more instructions which, when executed by the one or more processors, cause the one or more processors to receive, after authenticating the device, a subsequent first form of the password from the device; and one or more instructions which, when executed by the one or more processors, cause the one or more processors to authenticate the device using the first form of the password and the third form of the password. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification