Password management system
First Claim
1. A method authenticating a user, the method comprising:
- creating a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key;
updating the password inventory without input from a user, wherein updating the password inventory comprises one or more of;
sending a new list of password keys, wherein each password key corresponds to each password; and
sending a new list of passwords, wherein each password corresponds to each password key;
receiving a first login request from a first device;
transmitting information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords, and wherein the first password key is selected regardless of the order of the list of one or more passwords;
receiving information detailing a first entered password from the first device; and
determining whether the first entered password is identical to the first password from the list of one or more passwords.
2 Assignments
0 Petitions
Accused Products
Abstract
An embodiment of the invention may include a method, computer program product and computer system for password management. The embodiment may include a computing device that creates a password inventory. The password inventory may be a list of one or more passwords, where each of the one or more passwords corresponds to a password key. The embodiment may update the password inventory without input from a user. The embodiment may receive a first login request from a first device. The embodiment may transmit information detailing a first password key to the first device, where the first password key corresponds to a first password from the list of one or more passwords. The embodiment may receive information detailing a first entered password from the first device. The embodiment may determine whether the first entered password is identical to the first password from the list of one or more passwords.
-
Citations
20 Claims
-
1. A method authenticating a user, the method comprising:
-
creating a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key; updating the password inventory without input from a user, wherein updating the password inventory comprises one or more of; sending a new list of password keys, wherein each password key corresponds to each password; and sending a new list of passwords, wherein each password corresponds to each password key; receiving a first login request from a first device; transmitting information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords, and wherein the first password key is selected regardless of the order of the list of one or more passwords; receiving information detailing a first entered password from the first device; and determining whether the first entered password is identical to the first password from the list of one or more passwords. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for authenticating a user, the computer program product comprising:
one or more computer-readable storage devices and program instructions stored on at least one of the one or more tangible storage devices, the program instructions comprising; program instructions to create a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key; program instructions to update the password inventory without input from a user, wherein updating the password inventory comprises one or more of; sending a new list of password keys, wherein each password key corresponds to each password; and sending a new list of passwords, wherein each password corresponds to each password key; program instructions to receive a first login request from a first device; program instructions to transmit information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords, and wherein the first password key is selected regardless of the order of the list of one or more passwords; program instructions to receive information detailing a first entered password from the first device; and program instructions to determine whether the first entered password is identical to the first password from the list of one or more passwords. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer system for authenticating a user, the computer system comprising:
one or more processors, one or more non-transitory computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to create a password inventory, wherein the password inventory comprises a list of one or more passwords, wherein each of the one or more passwords corresponds to a password key; program instructions to update the password inventory without input from a user, wherein updating the password inventory comprises one or more of; sending a new list of password keys, wherein each password key corresponds to each password; and sending a new list of passwords, wherein each password corresponds to each password key; program instructions to receive a first login request from a first device; program instructions to transmit information detailing a first password key to the first device, wherein the first password key corresponds to a first password from the list of one or more passwords, and wherein the first password key is selected regardless of the order of the list of one or more passwords; program instructions to receive information detailing a first entered password from the first device; and program instructions to determine whether the first entered password is identical to the first password from the list of one or more passwords. - View Dependent Claims (16, 17, 18, 19, 20)
Specification