Obfuscated passwords
First Claim
1. A method for obfuscating an electronic password from visual surveillance each time a user accesses a session, comprising:
- receiving, from the user, a password symbol of the electronic password;
generating, by a computing device in response to receiving the password symbol in a session access attempt, an obfuscated password derived from the electronic password using an obfuscation rule when the password symbol is a first symbol of the electronic password,wherein the obfuscated password comprises symbols of the electronic password and a unique sequence of at least one obfuscating symbol generated from both the obfuscation rule and a randomly selected symbol of the electronic password, wherein the unique sequence of at least one obfuscating symbol is generated for each session access attempt by applying the obfuscation rule to a set of generating symbols;
determining, in response to receiving a password symbol, whether to provide a feedback indicator, the feedback indicator corresponding to an instruction to enter an obfuscating symbol derived from the received password symbol according to both the feedback indicator and the obfuscation rule, wherein providing the feedback indicator includes vibrating an electronic device and the feedback indicator is selected from a group consisting of auditory cues, haptic cues, and visual cues;
providing, in response to determining to provide the feedback indicator, the feedback indicator to the user;
obtaining, from the user in response to providing the feedback indicator, a second password symbol; and
determining whether there are more password symbols to obtain;
repeating the determining, the providing, and the obtaining when there are more password symbols to obtain; and
granting access to the session when there are no more password symbols to obtain and the obfuscated password has been received.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for obfuscating an electronic password can include receiving at least a first symbol of a first password, wherein the first password has a plurality of symbols. Next, a second password (the obfuscated password) can be generated, the second password being derived from the first password using an obfuscation rule, wherein the second password includes the symbols of the first password and at least one obfuscating symbol generated from a first symbol of the first password (generating symbol) and the obfuscation rule. It can then be determined whether to provide a feedback indicator. A feedback indicator can be provided, in response to determining to provide the feedback indicator, wherein the feedback indicator corresponds with an instruction to enter an obfuscating symbol according to the obfuscating rule, the obfuscating symbol being from the second password. Finally, access can be granted to a session in response to receiving the second password.
-
Citations
6 Claims
-
1. A method for obfuscating an electronic password from visual surveillance each time a user accesses a session, comprising:
-
receiving, from the user, a password symbol of the electronic password; generating, by a computing device in response to receiving the password symbol in a session access attempt, an obfuscated password derived from the electronic password using an obfuscation rule when the password symbol is a first symbol of the electronic password, wherein the obfuscated password comprises symbols of the electronic password and a unique sequence of at least one obfuscating symbol generated from both the obfuscation rule and a randomly selected symbol of the electronic password, wherein the unique sequence of at least one obfuscating symbol is generated for each session access attempt by applying the obfuscation rule to a set of generating symbols; determining, in response to receiving a password symbol, whether to provide a feedback indicator, the feedback indicator corresponding to an instruction to enter an obfuscating symbol derived from the received password symbol according to both the feedback indicator and the obfuscation rule, wherein providing the feedback indicator includes vibrating an electronic device and the feedback indicator is selected from a group consisting of auditory cues, haptic cues, and visual cues; providing, in response to determining to provide the feedback indicator, the feedback indicator to the user; obtaining, from the user in response to providing the feedback indicator, a second password symbol; and determining whether there are more password symbols to obtain; repeating the determining, the providing, and the obtaining when there are more password symbols to obtain; and granting access to the session when there are no more password symbols to obtain and the obfuscated password has been received. - View Dependent Claims (2)
-
-
3. A system for obfuscating an electronic password, the system comprising:
-
one or more computing nodes having a memory and a processor; and a computer readable storage medium of the one or more computing nodes having program instructions embodied therewith, the program instructions executable by the processor to cause the system to; receive, from the user, a password symbol of the electronic password; generate, in response to receiving the password symbol in a session access attempt, an obfuscated password derived from the electronic password using an obfuscation rule when the password symbol is a first symbol of the electronic password, wherein the obfuscated password comprises symbols of the electronic password and a unique sequence of at least one obfuscating symbol generated from both the obfuscation rule and a randomly selected symbol of the electronic password, wherein the unique sequence of at least one obfuscating symbol is generated for each session access attempt by applying the obfuscation rule to a set of generating symbols; determine, in response to receiving a first password symbol, whether to provide a feedback indicator, the feedback indicator corresponding to an instruction to enter an obfuscating symbol derived from the received password symbol according to both the feedback indicator and the obfuscation rule, wherein the feedback indicator includes a vibration of an electronic device and the feedback indicator is selected from a group consisting of auditory cues, haptic cues, and visual cues; provide, in response to determining to provide the feedback indicator, the feedback indicator to the user; obtain, from the user in response to providing the feedback indicator, a second password symbol; determine whether there are more password symbols to obtain; repeat the determining, the providing, and the obtaining when there are more password symbols to obtain; and grant access to a session when there are no more password symbols to obtain and the obfuscated password has been received. - View Dependent Claims (4)
-
-
5. A computer program product for obfuscating an electronic password, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a processing circuit to cause the processing circuit to perform a method comprising:
-
receiving, from the user, a password symbol of the electronic password; generating, by a computing device in response to receiving the password symbol in a session access attempt, an obfuscated password derived from the electronic password using an obfuscation rule when the password symbol is a first symbol of the electronic password, wherein the obfuscated password comprises symbols of the electronic password and a unique sequence of at least one obfuscating symbol generated from both the obfuscation rule and a randomly selected symbol of the electronic password, wherein the unique sequence of at least one obfuscating symbol is generated for each session access attempt by applying the obfuscation rule to a set of generating symbols; determining, in response to receiving a password symbol, whether to provide a feedback indicator, the feedback indicator corresponding to an instruction to enter an obfuscating symbol derived from the received password symbol according to both the feedback indicator and the obfuscation rule, wherein providing the feedback indicator includes vibrating an electronic device and the feedback indicator is selected from a group consisting of auditory cues, haptic cues, and visual cues; providing, in response to determining to provide the feedback indicator, the feedback indicator to the user; obtaining, from the user in response to providing the feedback indicator, a second password symbol; determining whether there are more password symbols to obtain; repeating the determining, the providing, and the obtaining when there are more password symbols to obtain; and granting access to the session when there are no more password symbols to obtain and the obfuscated password has been received. - View Dependent Claims (6)
-
Specification