Dynamically mitigating a noncompliant password
First Claim
Patent Images
1. A method of dynamically mitigating a noncompliant password, the method comprising:
- obtaining a password from a user when the user attempts to access a service;
determining whether the password meets quality criteria;
if the password does not meet the quality criteria, granting to the user a different level of access to the service than if the password meets the quality criteria;
wherein the user is associated with a particular user role, of a plurality of user roles;
wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role, and wherein a different quality criteria is associated with a second user role of the plurality of user roles;
wherein the quality criteria is based, at least in part, on a strength of the password;
wherein the method is performed by one or more computing devices.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for dynamically mitigating a noncompliant password. The techniques include obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; and if the password does not meet the quality criteria, performing one or more responsive actions that relate to accessing the service.
-
Citations
72 Claims
-
1. A method of dynamically mitigating a noncompliant password, the method comprising:
-
obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; if the password does not meet the quality criteria, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the user is associated with a particular user role, of a plurality of user roles; wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role, and wherein a different quality criteria is associated with a second user role of the plurality of user roles; wherein the quality criteria is based, at least in part, on a strength of the password; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of dynamically mitigating a noncompliant password, the method comprising:
-
obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; if the password does not meet the quality criteria, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the user is associated with a particular user role, of a plurality of user roles; wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role and wherein a different quality criteria is associated with a second user role of the plurality of user roles; wherein the quality criteria is based, at least in part, on a strength of the password; wherein determining whether the password meets quality criteria further comprises one or more of the steps of; performing a dictionary look-up based on one or more symbols used in the password; checking a length of the one or more symbols used in the password; checking a number of unique characters of the one or more symbols used in the password; checking a case of the characters in the one or more symbols used in the password; checking a sequencing of characters in the one or more symbols used in the password;
orperforming statistical analysis based on the one or more symbols used in the password; wherein the method is performed by one or more computing devices. - View Dependent Claims (20)
-
-
21. A non-transitory machine-readable medium storing one or more sequences of instructions for dynamically mitigating a noncompliant password, which instructions, when executed by one or more processors, cause the one or more processors to perform:
-
obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; if the password does not meet the quality criteria, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the user is associated with a particular user role, of a plurality of user roles; wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role and wherein a different quality criteria is associated with a second user role in the plurality of user roles; wherein the quality criteria is based, at least in part, on a strength of the password. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. An apparatus for dynamically mitigating a noncompliant password, comprising:
-
one or more processors; means for obtaining a password from a user when the user attempts to access a service; means for determining whether the password meets quality criteria; means for granting a different level of access, if the password does not meet the quality criteria, than if the password meets the quality criteria; wherein the user is associated with a particular user role, of a plurality of user roles; wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role and wherein a different quality criteria is associated with a second user role in the plurality of user roles; wherein the quality criteria is based, at least in part, on the strength of the password. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. An apparatus for dynamically mitigating a noncompliant password, comprising:
-
a network interface that is coupled to the data network for receiving one or more packet flows therefrom; a processor; one or more stored sequences of instructions which, when executed by the processor, cause the processor to perform; obtaining a password from a user when the user attempts to access a service; determining whether the password meets quality criteria; if the password does not meet the quality criteria, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the user is associated with a particular user role, of a plurality of user roles; wherein determining whether the password meets quality criteria comprises determining whether the password meets quality criteria for the particular user role and wherein a different quality criteria is associated with a second user role in the plurality of user roles; wherein the quality criteria is based, at least in part, on a strength of the password. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
Specification