Methods and systems of authenticating a password
First Claim
1. A method of authenticating a password for a user account, the method comprising:
- prompting, by a computing device, a user for one or more first credentials associated with the user account, wherein the user account is associated with a user password for the user account;
receiving, by the computing device from the a client computing device, a first password;
determining whether the first password was provided as part of a malicious activity; and
in response to determining that the first password was provided as part of a malicious activity;
prompting, by the computing device, the user for one or more second credentials associated with the user account that are different than the one or more first credentials,receiving, by the computing device from the client computing device, a second password that is different than the first password,determining, by the computing device, whether the second password satisfies each authentication rule associated with the user password, andin response to determining that the second password satisfies each authentication rule;
determining whether the second password satisfies an action rule associated with the user password, andin response to determining that the second password satisfies the action rule, performing an action associated with the action rule.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of creating a password for a user account may include receiving, by a computing device, one or more authentication rules that each correspond to a password. Each authentication rule may describe a feature a password is to possess. The method may include receiving, by the computing device, a content and a corresponding action rule for the password, where the action rule specifies an action that is be performed if the password includes the received content, associating the authentication rules, the content, and the action rule with one or more credentials of the user for the user account, and storing the password type, the authentication rules, the content, and the action rule in a database.
13 Citations
9 Claims
-
1. A method of authenticating a password for a user account, the method comprising:
-
prompting, by a computing device, a user for one or more first credentials associated with the user account, wherein the user account is associated with a user password for the user account; receiving, by the computing device from the a client computing device, a first password; determining whether the first password was provided as part of a malicious activity; and in response to determining that the first password was provided as part of a malicious activity; prompting, by the computing device, the user for one or more second credentials associated with the user account that are different than the one or more first credentials, receiving, by the computing device from the client computing device, a second password that is different than the first password, determining, by the computing device, whether the second password satisfies each authentication rule associated with the user password, and in response to determining that the second password satisfies each authentication rule; determining whether the second password satisfies an action rule associated with the user password, and in response to determining that the second password satisfies the action rule, performing an action associated with the action rule. - View Dependent Claims (2, 3, 7, 8, 9)
-
-
4. A system of authenticating a password for a user account, the system comprising:
-
a computing device; and a computer-readable storage medium in communication with the computing device, wherein the computer-readable storage medium comprises one or more programming instructions that, when executed, cause the computing device to; prompt a user for one or more first credentials associated with the user account, wherein the user account is associated with a user password for the user account, receive a first password, determine whether the first password was provided as part of a malicious activity, and in response to determining that the first password was provided as part of a malicious activity; prompt the user for one or more second credentials associated with the user account that are different than the one or more first credentials, receive a second password that is different than the first password, determine whether the second password satisfies each authentication rule associated with the user password, and in response to determining that the second password satisfies each authentication rule; determine whether the second password satisfies an action rule associated with the user password, and in response to determining that the second password satisfies the action rule, perform an action associated with the action rule. - View Dependent Claims (5, 6)
-
Specification