Transformation rules for one-time passwords
First Claim
Patent Images
1. A method comprising:
- performing by a processor operations comprising;
receiving from a user, a one-time password transformation rule to be applied by the user to a one-time password that is received, so as to transform the one-time password that is received;
sending a one-time password to the user;
receiving a response to the one-time password from the user; and
selectively authenticating the user based on the response corresponding to the one-time password as transformed by the one-time password transformation rule.
1 Assignment
0 Petitions
Accused Products
Abstract
A one-time password may be used and generated using transformation rules. A one-time password transformation rule is received. The one-time password is sent to a user. A response to the one-time password is received. The user is selectively authenticated based on the response corresponding to the one-time password as transformed by the one-time password transformation rule. The one-time password transformation rule may include one or more operations, such as mathematical operations that may be static operations or dynamic operations that change as a function of time. Related systems, devices, methods and computer program products are described.
7 Citations
19 Claims
-
1. A method comprising:
-
performing by a processor operations comprising; receiving from a user, a one-time password transformation rule to be applied by the user to a one-time password that is received, so as to transform the one-time password that is received; sending a one-time password to the user; receiving a response to the one-time password from the user; and selectively authenticating the user based on the response corresponding to the one-time password as transformed by the one-time password transformation rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer system comprising:
-
a processor; and a memory coupled to the processor and comprising computer readable code that, when executed by the processor, causes the processor to perform operations comprising; receiving from a user, a one-time password transformation rule to be applied by the user to a one-time password that is received, so as to transform the one-time password that is received; sending a one-time password to the user; receiving a response to the one-time password from the user; and selectively authenticating the user based on the response corresponding to the one-time password as transformed by the one-time password transformation rule.
-
-
19. A computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied in the medium that, when executed by a processor of a computer system, causes the computer system to perform operations comprising; receiving from a user, a one-time password transformation rule to be applied by the user to a one-time password that is received, so as to transform the one-time password that is received; sending a one-time password to the user; receiving a response to the one-time password from the user; and selectively authenticating the user based on the response corresponding to the one-time password as transformed by the one-time password transformation rule.
-
Specification