Dynamic password generation
First Claim
1. A computer system for providing access to electronic information, the system comprising:
- a computer, a computer-readable storage medium, and program instructions stored on the computer-readable storage medium, which when executed cause the computer to perform a method comprising;
receiving, by a first computer from a second computer over a network, in response to information entered into a user interface on the second computer, a first password string associated with a user and a rule for configuring and generating a second password string from the first password string, wherein the rule specifies a dynamic element to insert at a specified position in the first password string, based on first contextual information associated with the user, and wherein a value of the specified dynamic element is determined based on second contextual information associated with the user;
in response to receiving, by the first computer from the second computer over the network, a third password string associated with the user, via information entered into the user interface on the second computer;
configuring and generating, by the first computer, the second password string from the first password string, based on the received rule, by;
selecting the specified dynamic element based on the first contextual information associated with the user;
inserting the selected dynamic element in the first password string at the specified position; and
determining the value of the selected dynamic element based on the second contextual information associated with the user; and
in response to determining, by the first computer, that the third password string matches the second password string, granting, by the first computer, the second computer access to the electronic information.
1 Assignment
0 Petitions
Accused Products
Abstract
Providing access to electronic information. A first password string and a rule for configuring and generating a second password string from the first password string, are received from a user. The rule specifies a dynamic element to insert at a position in the first password string, based on first contextual information associated with the user. The value of the specified dynamic element is determined based on second contextual information associated with the user. Upon receiving a third password string, the second password string is configured and generated from the first password string, based on the rule, by: selecting the specified dynamic element based on the first contextual information; inserting the selected dynamic element in the first password string; and determining the value of the selected dynamic element based on the second contextual information. If the third password string matches the second password string, access to the electronic information is granted.
39 Citations
16 Claims
-
1. A computer system for providing access to electronic information, the system comprising:
-
a computer, a computer-readable storage medium, and program instructions stored on the computer-readable storage medium, which when executed cause the computer to perform a method comprising; receiving, by a first computer from a second computer over a network, in response to information entered into a user interface on the second computer, a first password string associated with a user and a rule for configuring and generating a second password string from the first password string, wherein the rule specifies a dynamic element to insert at a specified position in the first password string, based on first contextual information associated with the user, and wherein a value of the specified dynamic element is determined based on second contextual information associated with the user; in response to receiving, by the first computer from the second computer over the network, a third password string associated with the user, via information entered into the user interface on the second computer; configuring and generating, by the first computer, the second password string from the first password string, based on the received rule, by; selecting the specified dynamic element based on the first contextual information associated with the user; inserting the selected dynamic element in the first password string at the specified position; and determining the value of the selected dynamic element based on the second contextual information associated with the user; and in response to determining, by the first computer, that the third password string matches the second password string, granting, by the first computer, the second computer access to the electronic information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for providing access to electronic information, the program product comprising:
-
a computer-readable storage medium and program instructions stored on the computer-readable storage medium, the program instructions, when executed by a computer, cause the computer to perform a method comprising; receiving, by a first computer from a second computer over a network, in response to information entered into a user interface on the second computer, a first password string associated with a user and a rule for configuring and generating a second password string from the first password string, wherein the rule specifies a dynamic element to insert at a specified position in the first password string, based on first contextual information associated with the user, and wherein a value of the specified dynamic element is determined based on second contextual information associated with the user; in response to receiving, by the first computer from the second computer over the network, a third password string associated with the user, via information entered into the user interface on the second computer; configuring and generating, by the first computer, the second password string from the first password string, based on the received rule, by; selecting the specified dynamic element based on the first contextual information associated with the user; inserting the selected dynamic element in the first password string at the specified position; and determining the value of the selected dynamic element based on the second contextual information associated with the user; and in response to determining, by the first computer, that the third password string matches the second password string, granting, by the first computer, the second computer access to the electronic information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification