Password check by decomposing password
First Claim
Patent Images
1. A system comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving a proposed password from a user;
accessing a previous password of the user;
decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively;
analyzing the first plurality of components and the second plurality of components in relation to the proposed password and the previous password, respectively, to discern a first set of formation rules used to form the proposed password from the first plurality of components and a second set of formation rules used to form the previous password from the second plurality of components;
determining a similarity between the proposed password and the previous password based on a comparison between the first plurality of components and the second plurality of components and a comparison between the first set of formation rules and the second set of formation rules; and
determining to accept the proposed password based on the similarity.
2 Assignments
0 Petitions
Accused Products
Abstract
A proposed password is decomposed into basic components to determine and score transitions between the basic components and create a password score that measures the strength of the proposed password based on rules, such as concatenation, insertion, and replacement. The proposed password is scored against all known words, such as when a user is first asked to create a password for an account or access. The proposed password can also be scored against one or more previous passwords for the user, such as when the user is asked to change the user'"'"'s previous password, to determine similarity between the two passwords.
63 Citations
20 Claims
-
1. A system comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving a proposed password from a user; accessing a previous password of the user; decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; analyzing the first plurality of components and the second plurality of components in relation to the proposed password and the previous password, respectively, to discern a first set of formation rules used to form the proposed password from the first plurality of components and a second set of formation rules used to form the previous password from the second plurality of components; determining a similarity between the proposed password and the previous password based on a comparison between the first plurality of components and the second plurality of components and a comparison between the first set of formation rules and the second set of formation rules; and determining to accept the proposed password based on the similarity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, by one or more hardware processors, a proposed password from a user; accessing, by one or more hardware processors, a previous password of the user; decomposing, by one or more hardware processors, the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; analyzing, by one or more hardware processors, the first plurality of components and the second plurality of components in relation to the proposed password and the previous password, respectively, to discern a first set of formation rules used to form the proposed password from the first plurality of components and a second set of formation rules used to form the previous password from the second plurality of components; determining, by one or more hardware processors, a similarity between the proposed password and the previous password based on a comparison between the first set of formation rules and the second set of formation rules; and determining, by one or more hardware processors, to accept the proposed password based on the similarity. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving a proposed password from a user; accessing a previous password of the user; decomposing the proposed password and the previous password into a first plurality of components and a second plurality of components, respectively; analyzing the first plurality of components and the second plurality of components in relation to the proposed password and the previous password, respectively, to discern a first set of formation rules used to form the proposed password from the first plurality of components and a second set of formation rules used to form the previous password from the second plurality of components; determining a similarity between the proposed password and the previous password based on a comparison between the first plurality of components and the second plurality of components and a comparison between the first set of formation rules and the second set of formation rules; and determining to accept the proposed password based on the similarity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification