Automatic PIN creation using password
First Claim
1. A service provider system comprising:
- a non-transitory memory storing information about a user account and identification information of a user associated with the user account; and
one or more hardware processors configured to execute instructions to cause the service provider system to perform operations comprising;
automatically generating a first access credential from a second access credential for the user account, wherein the first access credential is generated based on a rule comprising mapping individual characters of the second access credential to numbers or characters, and wherein the first access credential is unknown to the user and the second access credential is known to the user;
providing instructions to a user device of the user, wherein the instructions comprise the rule to convert, by the user on a device, the second access credential to the first access credential;
receiving a user-entered access credential and identification information from the device;
comparing the user-entered access credential with the first access credential associated with the user account, wherein the user-entered access credential is known to the user through the instructions provided to the user for converting the second access credential to the user-entered access credential and wherein the first access credential is different than the second access credential; and
granting access to the user account for the user when the user-entered access credential matches the first access credential.
2 Assignments
0 Petitions
Accused Products
Abstract
A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.
-
Citations
22 Claims
-
1. A service provider system comprising:
-
a non-transitory memory storing information about a user account and identification information of a user associated with the user account; and one or more hardware processors configured to execute instructions to cause the service provider system to perform operations comprising; automatically generating a first access credential from a second access credential for the user account, wherein the first access credential is generated based on a rule comprising mapping individual characters of the second access credential to numbers or characters, and wherein the first access credential is unknown to the user and the second access credential is known to the user; providing instructions to a user device of the user, wherein the instructions comprise the rule to convert, by the user on a device, the second access credential to the first access credential; receiving a user-entered access credential and identification information from the device; comparing the user-entered access credential with the first access credential associated with the user account, wherein the user-entered access credential is known to the user through the instructions provided to the user for converting the second access credential to the user-entered access credential and wherein the first access credential is different than the second access credential; and granting access to the user account for the user when the user-entered access credential matches the first access credential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 22)
-
-
8. A method, comprising:
-
automatically generating, by a service provider, a converted credential from a password for a user account and identification information of a user associated with the user account, wherein the converted credential is generated based on a rule comprising mapping individual characters of the password to numbers or characters, and wherein the converted credential is unknown to the user; providing instructions to a user device of a user, wherein the instructions instruct comprise the rule to convert, by the user on a device, the password to the converted credential; receiving, by the service provider, a user-entered credential and a user identifier from the device; comparing the user-entered credential with the converted credential associated with the user account and automatically generated by the service provider from the password associated with the user account, wherein the user-entered credential is known to the user through instructions provided to the user for converting the password to the user-entered credential and wherein the converted credential is different than the password; and granting access to the user account for the user when the user-entered credential matches the converted credential. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
automatically generating, by a service provider, an access credential from a password for a user account and identification information for a user associated with the user account, wherein the access credential is generated based on a rule comprising mapping individual characters of the password to numbers or characters, and wherein the access credential is unknown to the user; providing instructions to a user device of a user, wherein the instructions comprise the rule to convert, by the user on a device, the password to the access credential; receiving, by the service provider, an access credential and a user identifier from the device; comparing the access credential with a converted credential associated with the user account and automatically generated by the service provider from the password associated with the user account, wherein the access credential is known to the user through the instructions provided to the user for converting the password to the access credential and wherein the converted credential is different than the password; and granting access to the user account for the user when the access credential matches the converted credential. - View Dependent Claims (19, 20, 21)
-
Specification