Password management system
First Claim
1. A computer system for authenticating a user, the computer system comprising:
- one or more processors, one or more computer-readable memories, one or more non-transitory computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising;
program instructions to create a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key;
program instructions to update the password inventory without input from a user, wherein updating the password inventory comprises one or more of;
issuing a new password key to each password; and
issuing a new password to each password key;
based on updating the password inventory program instructions to transmit information detailing a portion of the password inventory to a third device, wherein the user has access to the third device, and wherein the third device is a mobile device;
program instructions to receive a first login request from a first device;
program instructions to transmit information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords;
program instructions to receive information detailing a first entered password from the first device; and
program instructions to determine whether the first entered password is identical to the first password from the list of one or more passwords.
2 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of the invention may include a method, computer program product and computer system for password management. The embodiment may include a computing device that creates a password inventory. The password inventory may be a list of one or more passwords, where each of the one or more passwords corresponds to a password key. The embodiment may update the password inventory without input from a user. The embodiment may receive a first login request from a first device. The embodiment may transmit information detailing a first password key to the first device, where the first password key corresponds to a first password from the list of one or more passwords. The embodiment may receive information detailing a first entered password from the first device. The embodiment may determine whether the first entered password is identical to the first password from the list of one or more passwords.
-
Citations
1 Claim
-
1. A computer system for authenticating a user, the computer system comprising:
one or more processors, one or more computer-readable memories, one or more non-transitory computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to create a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key; program instructions to update the password inventory without input from a user, wherein updating the password inventory comprises one or more of; issuing a new password key to each password; and issuing a new password to each password key; based on updating the password inventory program instructions to transmit information detailing a portion of the password inventory to a third device, wherein the user has access to the third device, and wherein the third device is a mobile device; program instructions to receive a first login request from a first device; program instructions to transmit information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords; program instructions to receive information detailing a first entered password from the first device; and program instructions to determine whether the first entered password is identical to the first password from the list of one or more passwords.
Specification