WO2017078682A1 - Modifications de mot de passe - Google Patents

Modifications de mot de passe Download PDF

Info

Publication number
WO2017078682A1
WO2017078682A1 PCT/US2015/058789 US2015058789W WO2017078682A1 WO 2017078682 A1 WO2017078682 A1 WO 2017078682A1 US 2015058789 W US2015058789 W US 2015058789W WO 2017078682 A1 WO2017078682 A1 WO 2017078682A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
incorrect
historical
user authentication
passwords
Prior art date
Application number
PCT/US2015/058789
Other languages
English (en)
Inventor
Eli Mordechai
Karen COHEN
Original Assignee
Hewlett Packard Enterprise Development Lp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development Lp filed Critical Hewlett Packard Enterprise Development Lp
Priority to PCT/US2015/058789 priority Critical patent/WO2017078682A1/fr
Publication of WO2017078682A1 publication Critical patent/WO2017078682A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • Secured systems may implement login procedures that involve authentication. This authentication may take the form of a password which must be properly entered before access to the secure system is granted.
  • FIG. 1 is a block diagram of an example system for password modifications consistent with disclosed implementations
  • FIG. 2 is a block diagram of an example password modification device consistent with disclosed implementations
  • FIG. 3 is a block diagram of an example password modification device consistent with disclosed implementations
  • FIG. 4 is a flow chart of an example process for password modifications consistent with disclosed implementations.
  • FIG. 5 is a flow chart of an example process for password modifications consistent with disclosed implementations.
  • passwords may be used as authentication mechanisms for logging in to secured systems.
  • users may need to remember multiple passwords to access various secured systems.
  • users may have a separate password for work, a separate password for personal email, a separate password for social media, and the like.
  • users may struggle with remembering which password is the correct one for the particular system they are attempting to access, and may enter the incorrect password multiple times over various login sessions.
  • implementations consistent with the disclosure may identify an incorrect password entered during a current user authentication session, determine whether the incorrect password is the same as a number of historical incorrect passwords (where each of the number of historical incorrect passwords occurs during a particular historical user authentication session of a plurality of historical user authentication sessions and is followed by an original correct password entered during the particular historical user authentication session), and modify the incorrect password to a new correct password if the incorrect password is the same as each of the number of historical incorrect passwords.
  • FIG. 1 is a block diagram of an example system 100 for password modification.
  • System 100 may be implemented in a number of different configurations without departing from the scope of the disclosed examples.
  • system 100 may include a password modification device 1 10, a client device 120, a storage device 130, and a network 140 for connecting password modification device 1 10 with client device 120 and/or storage device 130.
  • Password modification device 1 10 may be a computing system that performs various functions consistent with disclosed examples.
  • password modification device 1 10 may be a server, a desktop computer, a laptop computer, and/or any other suitable type of computing device.
  • password modification device 1 10 may process information received from client device 120 and/or storage device 130.
  • password modification device 1 10 may receive an incorrect password entered during a current user authentication session, determine whether the incorrect password is the same as a number of historical incorrect passwords, and modify the original correct password to the incorrect password to generate a new correct password if the incorrect password is the same as each of the number of historical incorrect passwords. Examples of password modification device 1 10 and certain functions that may be performed by device 1 10 are described in greater detail below with respect to, for example, FIGs. 2- 5.
  • Client device 120 may be a computing system operated by a user.
  • client device 120 may be a desktop computer, a laptop computer, a tablet computing device, a mobile phone, and/or any other suitable type of computing device.
  • client device 120 may be a computing device to perform operations consistent with certain disclosed implementations.
  • client device 120 may transmit authentication information, such as login names, passwords, user authentication session identification numbers ("session IDs"), and the other information related to the authentication to password modification device 1 10.
  • Client device 120 may include a processor to execute instructions stored in a machine-readable storage medium.
  • client device 120 may include a processor 122, a machine-readable storage medium 124, a display device 126, and an interface 128.
  • Processor 122 of client device 120 may be at least one processing unit (CPU), microprocessor, and/or another hardware device to execute instructions to perform operations.
  • processor 122 may fetch, decode, and execute instructions stored in machine-readable storage medium 124 (such as password capture instructions 127) to capture passwords during user authentication sessions.
  • Machine-readable storage medium 124 may be any electronic, magnetic, optical, or other non-transitory storage device that stores instructions executed by processor 122.
  • Display 126 may be any type of display device that presents information, such as a user interface to capture passwords and the like, from client device 120.
  • Interface 128 may be any combination of hardware and/or programming that facilitates the exchange of data between the internal components of client device 120 and external components, such as password modification device 1 10.
  • interface 128 may include a network interface device that allows client device 120 to receive and send data to and from various components, such as to and from password modification device 1 10 via network 140.
  • Storage device 130 may be any type of storage system configuration that facilitates the storage of data.
  • storage device 130 may facilitate the locating, accessing, and retrieving of data related to passwords entered during user authentication sessions (e.g., SaaS, SQL, Access, etc. databases).
  • Storage device 130 can be populated by a number of methods.
  • password modification device 1 10 may populate storage device 130 by receiving, generating, and/or otherwise accessing data related to incorrect passwords entered during user authentication sessions (e.g., historical user authentication sessions that occurred prior to a current user authentication session) and storing the data in storage device 130 as a set of historical incorrect passwords 132.
  • This data may include the user, the user's login name, session ID numbers, timestamps, and/or any other suitable information.
  • additional information related to how many times a particular historical incorrect password was entered during different (e.g,. separate) user authentication sessions may be stored with the set of historical incorrect passwords 132, or may be stored separately as counter data 134.
  • storage device 130 is a single component external to components 1 10 and 120, storage device 130 may comprise separate components and/or may be part of devices 1 10, 120, and/or another device.
  • storage device 130 may be managed by components of device 1 10 and/or other devices that are capable of accessing, creating, controlling and/or otherwise managing data remotely through network 140.
  • Network 140 may be any type of network that facilitates communication between remote components, such as password modification device 1 10 and client device 120.
  • network 140 may be a local area network (LAN), a wide area network (WAN), a virtual private network, a dedicated intranet, the Internet, and/or a wireless network.
  • system 100 may be implemented in a number of different configurations.
  • FIG. 1 shows one password modification device 1 10, client device 120, storage device 130, and network 140
  • system 100 may include any number of components 1 10, 120, 130, and 140, as well as other components not depicted in FIG. 1 .
  • system 100 may omit any of components 1 10, 120, 130, and 140, and/or the functionality of at least one of components 1 10, 120, 130, and 140 may be incorporated into another component (e.g., components 1 10, 120, 130, 140, and/or a component not shown in FIG. 1 ).
  • FIG. 2 is a block diagram of an example password modification device 210 consistent with disclosed implementations.
  • password modification device 210 may correspond to password modification device 1 10 of FIG. 1 .
  • Password modification device 210 may be implemented in various ways.
  • device 210 may be a special purpose computer, a server, a mainframe computer, and/or any other suitable type of computing device.
  • password modification device 210 may include a processor 220 and a machine-readable storage medium 230.
  • Processor 220 may be at least one processing unit (CPU), microprocessor, and/or another hardware device to execute instructions to perform operations.
  • processor 220 may fetch, decode, and execute identification instructions 240 (e.g., instructions 242, 244, and/or 246) stored in machine-readable storage medium 230 to perform operations consistent with disclosed examples.
  • Machine-readable storage medium 230 may be any electronic, magnetic, optical, and/or other physical storage device that stores executable instructions.
  • machine-readable storage medium 230 may be, for example, memory, a storage drive, an optical disc, and the like.
  • machine- readable storage medium 230 may be a non-transitory machine-readable storage medium, where the term "non-transitory" does not encompass transitory propagating signals.
  • Machine-readable storage medium 230 may be encoded with instructions that, when executed by processor 230, perform operations consistent with disclosed implementations.
  • machine-readable storage medium 240 may include instructions that perform operations to identify an incorrect password entered during a current user authentication session, determine whether the incorrect password is the same as a number of historical incorrect passwords, and modify the original correct password to the incorrect password to generate a new correct password if the incorrect password is the same as each of the number of historical incorrect passwords.
  • machine-readable storage medium 230 may include password confirmation instructions 242, password comparison instructions 244, and password modification instructions 246.
  • Password confirmation instructions 242 may function to identify an incorrect password entered during a current user authentication session.
  • password confirmation instructions 242 may cause processor 220 and/or another processor to compare a password entered (e.g., by a user) during the current user authentication session to an original correct password. For example, if the password entered during the current user authentication session does not match the original correct password, the password may be identified by password modification device 210 as an incorrect password. If the password does match the original correct password, the password may be identified by password modification device 210 as a correct password.
  • a set of historical incorrect passwords may be automatically cleared to help ensure that patterns related to using the same incorrect passwords repeatedly are maintained. For example, if an initial session password (e.g., the first password entered during a user authentication session (e.g., the current user authentication session)) has been identified as a correct password, password confirmation instructions 242, when executed, may automatically cause the clearing of a set of historical incorrect passwords and/or counter data related to the set of historical incorrect passwords, such as the set of historical incorrect passwords 132 and counter data 134 stored in storage device 130.
  • an initial session password e.g., the first password entered during a user authentication session (e.g., the current user authentication session)
  • password confirmation instructions 242 when executed, may automatically cause the clearing of a set of historical incorrect passwords and/or counter data related to the set of historical incorrect passwords, such as the set of historical incorrect passwords 132 and counter data 134 stored in storage device 130.
  • the set of historical incorrect passwords corresponding to the particular user involved in the user authentication session may be removed from a storage device, such as storage device 130.
  • password confirmation instructions 242 when executed, may automatically cause the clearing of the set of historical incorrect passwords and/or counter data related to the set of historical incorrect passwords. Examples of identifying an incorrect password entered during a current user authentication session are described in further detail below with respect to, for example, FIGs. 3-5.
  • Password comparison instructions 244 may function to determine whether an incorrect password is the same as a number of historical incorrect passwords, where each of the number of historical incorrect passwords may occur during a particular historical user authentication session of a plurality of historical user authentications sessions and/or may be followed by an original correct password during the particular historical user authentication session. For example, in some implementations, when password comparison instructions 244 are executed by processor 220 and/or another processor, password comparison instructions 244 may query a storage device, such as storage device 130, for data related to historical incorrect passwords and may parse the data received in response to the query to identify whether and how many times an entered incorrect password is present in a set of historical incorrect passwords (e.g., set of historical incorrect passwords 132) stored on the storage device.
  • a storage device such as storage device 130
  • password comparison instructions 244 may determine that the incorrect password is the same as a number of historical incorrect passwords.
  • the number of historical incorrect passwords may be a threshold number that identifies a minimum number of historical incorrect passwords, such as a minimum number that may need to be exceeded before password modification device 210 may cause the generation of a request to modify the original incorrect password to the incorrect password.
  • each of the number of historical incorrect passwords may correspond with a different one of the plurality of historical user authentication sessions. For example, each of the historical incorrect passwords may have been entered during different and/or separate user authentication sessions.
  • a storage device e.g., storage device 130
  • there each of the number of historical incorrect passwords may have been entered during a different user authentication session and stored in a storage device (e.g., storage device 130) in a manner that associated it with the particular user authentication session during which it was entered (e.g., by storing it with the session ID).
  • password comparison instructions 244 when password comparison instructions 244 are executed by processor 220, password comparison instructions 244 may cause processor 220 to determine whether a user entered the incorrect password during a last historical user authentication session of a plurality of historical user authentication sessions, where the last historical user authentication session immediately precedes the current user authentication session. For example, password comparison instructions 244, when executed, may determine whether the user tried the same incorrect password in the user's last authentication session prior to the current authentication session. If the incorrect password is not entered during the last historical user authentication session, password comparison instructions 244, when executed, may cause the clearing of the number of historical incorrect passwords.
  • password comparison instructions 244 when executed, may cause the clearing of a set of historical incorrect passwords, where the set includes the number of historical incorrect passwords. For example, an entire set of historical incorrect passwords (e.g., set of historical incorrect passwords 132, and or data related to how many times particular historical incorrect passwords may have been entered (e.g., counter data 134) may be removed from a storage device (e.g., storage device 130).
  • password comparison instructions 244, when executed, may determine whether the incorrect password was tried more than a particular number of times (e.g., 3 times, 5 times, etc.).
  • password comparison instructions 244 when executed, may cause a display of a request to modify the correct password (e.g. an original correct password) to the incorrect password (e.g., generating a new correct password) based on the comparison. Examples of determining whether the incorrect password is the same as a number of historical incorrect passwords are described in further detail below with respect to, for example, FIGs. 3-5.
  • Password modification instructions 246 may function to modify the original correct password to generate a new correct password. For example, when password modification instructions 246 are executed by processor 220, password modification instructions 246 may cause processor 220 to modify the original correct password to the incorrect password to generate a new correct password if the incorrect password is the same as each of the number of historical incorrect passwords. For example, in response to a request to change the original correct password to the new correct password, password modification instructions 246, when executed, may clear the original correct password, store the incorrect password as the new correct password (e.g., stored in a manner that associates it with the particular user), and/or use the new correct password during future user authentication sessions. For example, passwords entered in future user authentication sessions may be compared to the new correct password rather than the original correct password. Examples of modifying the incorrect password to a new correct password are described in further detail below with respect to, for example, FIGs. 3-5.
  • FIG. 3 is a block diagram of an example password modification device 310 consistent with disclosed implementations.
  • password modification device 310 may correspond to password modification device 1 10 of FIG. 1 and/or password modification device 210 of FIG. 2.
  • Device 310 may be implemented in various ways.
  • device 310 may be a special purpose computer, a server, a mainframe computer, and/or any other suitable type of computing system.
  • device 310 may include a password confirmation engine 320, a password comparison engine 330, and a password modification engine 340.
  • Engines 320, 330, and 340 may be electronic circuitry for implementing functionality consistent with disclosed examples.
  • engines 320, 330, and 340 may represent combinations of hardware devices and programming to implement the functionality consistent with disclosed implementations.
  • the functionality of engines 320, 330, and/or 340 may correspond to operations performed by password modification device 210 of FIG. 2, such as operations performed when identification instructions 240 are executed by processor 220 (described above with respect to FIG. 2).
  • password confirmation engine 320 may represent a combination of hardware and programming that performs operations similar to those performed when processor 220 executes password confirmation instructions 242.
  • password comparison engine 330 may represent a combination of hardware and programming that performs operations similar to those performed when processor 220 executes password comparison instructions 244
  • password modification engine 340 may represent a combination of hardware and programming that performs operations similar to those performed when processor 220 executes password modification instructions 246.
  • FIG. 4 is a flow chart of an example process 400 for password modification consistent with disclosed implementations.
  • execution of process 400 is described below with reference to system 100 of FIG. 1 and/or specific components of system 100, other suitable systems for execution of at least one step of process 400 may be used.
  • processes described below as being performed by password modification device 1 10 may be performed by password modification device 210, password modification device 310, and/or any other suitable system.
  • Process 400 may be implemented in the form of executable instructions stored on a machine-readable storage medium and/or in the form of electronic circuitry.
  • Process 400 may start (step S405) after a current user authentication session has been initiated.
  • processor 122 of client device 120 may execute password capture instructions 127 to capture passwords entered during the current user authentication session.
  • Client device 120 may transmit the captured passwords and information relating to the current user authentication session to password modification device 1 10 and/or storage device 130 using, for example, interface 128 and network 140.
  • the transmitted passwords may be stored in a manner that links them with the information related to the current user authentication session (such as user, date, time, session number, and the like).
  • Process 400 may include determining whether an incorrect password entered during a current user authentication session is followed by an original correct password entered during the user authentication session (step S410).
  • password modification device 1 10 may analyze the sequence of passwords entered during the current user authentication session to determine whether an incorrect password was followed by an original correct password. For example, in response to receipt of an entered password, password modification device 1 10 may compare the entered password to a password that is associated with the user account of the secured system the user is attempting to access. If the entered password and user account password match, then password modification device 1 10 may identify the entered password as an original correct password.
  • password modification device 1 10 may identify the entered password as an incorrect password and, in some examples, may monitor any additional passwords entered during the same current user authentication session (e.g. entered immediately after the entry of the incorrect password and/or sometime after the entry of the incorrect password) to determine whether one of the additional passwords is an original correct password. If not, password modification device may determine that an incorrect password was not entered during the current user authentication session and/or that an incorrect password was entered but not followed by an original correct password. In some examples, if the incorrect password is not followed by the original correct password, password modification device 1 10 may cause a display of a notification that the incorrect password is incorrect (e.g., cause a display of text, graphics, and/or any other suitable information) (step S430).
  • a display of a notification that the incorrect password is incorrect e.g., cause a display of text, graphics, and/or any other suitable information
  • password modification device may determine that an incorrect password entered during the current user authentication session was followed by an original correct password entered during the current user authentication session. In some implementations, password modification device 1 10 may automatically cause the clearing of the set of historical incorrect passwords if a user enters the original correct password prior to entering the incorrect password using, for example, the methods described above. In some implementations, password modification device 1 10 may automatically cause the clearing of the set of historical incorrect passwords if the incorrect password is not followed by the original correct password using, for example, the methods described above.
  • Process 400 may also include, if the incorrect password is followed by the original correct password, determining whether the incorrect password was entered a particular number of times in different historical user authentication sessions (step S420).
  • password modification device 1 10 may determine whether the incorrect password was entered a particular number of times by determining a number of matches between the incorrect password and historical incorrect passwords stored in a set of historical incorrect passwords, and/or comparing the number of matches to a threshold number using, for example, the methods described above.
  • a storage device may store a set of historical incorrect passwords (such as set of historical incorrect passwords 132), and password modification device 1 10 may query the storage device to obtain information related to whether and/or how many times that particular user has previously entered the password during a different historical user authentication session (e.g., an authentication session that occurred prior to the current user authentication session).
  • Password modification device 1 10 may parse the data received in response to the query to determine the number of matches, and may determine whether the number of matches is above or below a threshold number (e.g., a predetermined number, such as three).
  • Process 400 may also include, if the incorrect password is followed by the original correct password, causing a display of a request to modify the original correct password to the incorrect password to generate a new correct password if the incorrect password was entered the particular number of times (step S450).
  • password modification device 1 10 may cause a display of a graphical interface on display 126 of client device 120.
  • the graphical interface may include an area where the user can identify whether they would like to modify the original correct password.
  • the graphical interface may include an area for text input, a radio button, a checkbox, or any other suitable means of capturing information related to a request to modify the original correct password.
  • password modification device 1 10 may automatically generate the new correct password based on a response to the request, the response indicating to generate the new correct password based on the incorrect password. For example, if the request includes information (e.g., information captured during a user interaction with the graphical user interface described above) indicating that the user wishes to change the password from the original correct password to the incorrect password, password modification device 1 10 may modify the original correct password to become the incorrect password (e.g., delete the original correct password, overwrite the original correct password, and/or otherwise replace the original correct password with the incorrect password).
  • information e.g., information captured during a user interaction with the graphical user interface described above
  • password modification device 1 10 may modify the original correct password to become the incorrect password (e.g., delete the original correct password, overwrite the original correct password, and/or otherwise replace the original correct password with the incorrect password).
  • password modification device 1 10 may automatically cause the clearing of the set of historical incorrect passwords based on a response to the request, the response indicating not to generate the new correct password based on the incorrect password. For example, if the request includes information (e.g., information captured during a user interaction with the graphical user interface described above) indicating that the user does not wish to change the password from the original correct password to the incorrect password, password modification device 1 10 may maintain the original correct password and may delete the set of historical incorrect passwords using, for example, the methods described above (e.g., deleting the set of historical incorrect passwords from a storage device, such as storage device 130).
  • information e.g., information captured during a user interaction with the graphical user interface described above
  • password modification device 1 10 may maintain the original correct password and may delete the set of historical incorrect passwords using, for example, the methods described above (e.g., deleting the set of historical incorrect passwords from a storage device, such as storage device 130).
  • Process 400 may also include, if the incorrect password is followed by the correct password, causing a storing of the incorrect password as a historical incorrect password in a set of historical incorrect passwords if the incorrect password was not entered the particular number of times (step S460).
  • password modification device 1 10 may cause the storing of the incorrect password in a storage device, such as storage device 130.
  • password modification device 1 10 may store the incorrect password along with information related to the historical user authentication session in a storage device, such as storage device 130.
  • password modification device 1 10 may transmit the incorrect password and/or the information related to the historical user authentication session to storage device 130 via network 140.
  • each historical user authentication session may have a separate user ID that password modification device may use to distinguish between user authentication sessions. Sessions with the same user authentication session ID may be considered to be the same session. Sessions with different user authentication session IDs may be considered to be different user authentication sessions.
  • the separate session identification numbers may be used by password modification device 1 10 to distinguish current user authentication sessions from historical user authentication sessions, to distinguish between each of the historical user authentication sessions, to otherwise ensure that passwords entered during a particular session are linked to that particular session, and the like.
  • FIG. 5 is a flow chart of an example process 500 for password modification consistent with disclosed implementations.
  • execution of process 500 is described below with reference to system 100 of FIG. 1 and/or specific components of system 100, other suitable systems for execution of at least one step of process 500 may be used.
  • processes described below as being performed by password modification device 1 10 may be performed by password modification device 210, password modification device 310, and/or any other suitable system.
  • Process 500 may be implemented in the form of executable instructions stored on a machine-readable storage medium and/or in the form of electronic circuitry.
  • Process 500 may start (step S505) after a current user authentication session has been initiated.
  • process 400 may begin when a user enters a password (either a correct password or an incorrect password) during the current user authentication session.
  • Process 500 may include identifying when a correct password was entered after an incorrect password during a current user authentication session (step S510).
  • password modification device may identify when a correct password was entered after an incorrect password during a current user authentication session by, for example, using the methods described above (e.g., monitoring a sequence of passwords entered during a user authentication session and identifying when the passwords matched or did not match an original correct password).
  • Process 500 may also include in response to the identification, determining a particular number of times where the correct password was entered after the incorrect password during different historical user authentication sessions (e.g., separate historical user authentication sessions having different session IDs) (step S520).
  • password modification device 1 10 may compare the incorrect password to a historical incorrect password of a set of historical incorrect passwords; determine a counter value associated with the historical incorrect password, and assign the counter value as the particular number of times.
  • password modification device may employ a counter to keep track of the number of times the particular password was used in different (e.g., separate and distinct) historical user authentication sessions, and password modification device 1 10 may determine the counter value associated with a historical incorrect password that matches the incorrect password entered during the current user authentication session.
  • the stored set of historical incorrect passwords may be cleared if more than one incorrect password is entered during the current user authentication session.
  • the incorrect password described above may be considered to be a first incorrect password (e.g., the incorrect password is a first incorrect password) and the stored set of historical incorrect passwords may be cleared from a storage device if a second incorrect password is entered during the current user authentication session.
  • Process 500 may also include comparing the particular number of times to a threshold number (step S530) using, for example, the methods described above. Additionally, process 500 may also include causing a display of a request to modify the correct password to the incorrect password based on the comparison (step S540). For example, if the particular number of times exceeds (or in some instances is smaller than) the threshold number, password modification device 1 10 may cause the display of the request.
  • steps 510, 520, 530, and/or 540 are complete, process 500 may end (step S555).
  • the disclosed examples may include systems, devices, machine-readable storage media, and methods for password modifications. For purposes of explanation, certain examples are described with reference to the components illustrated and/or described in FIGS. 1 -5. The functionality of the illustrated components may overlap, however, and may be present in a fewer or greater number of elements and components. Further, all or part of the functionality of illustrated elements may co-exist or be distributed among several geographically dispersed locations. Moreover, the disclosed examples may be implemented in various environments and are not limited to the illustrated examples.
  • sequence of operations described in connection with FIGs. 1 -5 are examples and are not intended to be limiting. Additional or fewer operations or combinations of operations may be used or may vary without departing from the scope of the disclosed examples. Furthermore, implementations consistent with the disclosed examples need not perform the sequence of operations in any particular order, including those described with respect to FIGS. 1 -5. Thus, the present disclosure merely sets forth possible examples of implementations, and many variations and modifications may be made to the described examples. All such modifications and variations are intended to be included within the scope of this disclosure and protected by the following claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

Selon des modes de réalisation illustratifs, l'invention porte sur la détermination de modifications de mot de passe. Des modes de réalisation peuvent inclure un moteur de confirmation de mot de passe pour identifier un mot de passe incorrect entré pendant une session d'authentification de l'utilisateur actuel. De plus, des modes de réalisation peuvent inclure un moteur de comparaison de mots de passe pour déterminer si le mot de passe incorrect est identique à un certain nombre de mots de passe incorrects passés. Par exemple, chaque mot de passe parmi le nombre de mots de passe incorrects passés peut se produire pendant une session passée d'authentification d'utilisateur particulière parmi une pluralité de sessions passées d'authentification d'utilisateur, et peut être suivi par un mot de passe correct original entré pendant la session passée d'authentification d'utilisateur particulière. De plus, des modes de réalisation peuvent inclure un moteur de modification de mot de passe pour modifier le mot de passe correct original en le mot de passe incorrect si les mots de passe incorrects sont identiques à chaque mot de passe du nombre de mots de passe incorrects passés.
PCT/US2015/058789 2015-11-03 2015-11-03 Modifications de mot de passe WO2017078682A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2015/058789 WO2017078682A1 (fr) 2015-11-03 2015-11-03 Modifications de mot de passe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2015/058789 WO2017078682A1 (fr) 2015-11-03 2015-11-03 Modifications de mot de passe

Publications (1)

Publication Number Publication Date
WO2017078682A1 true WO2017078682A1 (fr) 2017-05-11

Family

ID=58662863

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/058789 WO2017078682A1 (fr) 2015-11-03 2015-11-03 Modifications de mot de passe

Country Status (1)

Country Link
WO (1) WO2017078682A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528689A (zh) * 2017-09-18 2017-12-29 上海动联信息技术股份有限公司 一种基于Ukey的密码修改方法
CN110445754A (zh) * 2019-07-02 2019-11-12 平安科技(深圳)有限公司 Windows域账号处理方法、服务器及计算机可读存储介质
US11853411B2 (en) * 2020-04-17 2023-12-26 Paypal, Inc. User specific error detection for accepting authentication credential errors

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003030147A (ja) * 2001-07-18 2003-01-31 Nec Yonezawa Ltd パスワード入力システム、文字列入力システム、パスワード入力方法及びパスワード入力プログラム
JP2006099356A (ja) * 2004-09-29 2006-04-13 Fuji Xerox Co Ltd パスワード管理用コンピュータプログラムならびに情報処理システムおよびそのパスワード管理装置および方法
KR100661099B1 (ko) * 2005-04-06 2006-12-22 K.D.G.Eng 모듈화된 d2 r/s용 소켓의 구조
US8312540B1 (en) * 2008-06-13 2012-11-13 Juniper Networks, Inc. System for slowing password attacks
US20140325591A1 (en) * 2008-10-22 2014-10-30 International Business Machines Corporation Rules driven multiple passwords

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003030147A (ja) * 2001-07-18 2003-01-31 Nec Yonezawa Ltd パスワード入力システム、文字列入力システム、パスワード入力方法及びパスワード入力プログラム
JP2006099356A (ja) * 2004-09-29 2006-04-13 Fuji Xerox Co Ltd パスワード管理用コンピュータプログラムならびに情報処理システムおよびそのパスワード管理装置および方法
KR100661099B1 (ko) * 2005-04-06 2006-12-22 K.D.G.Eng 모듈화된 d2 r/s용 소켓의 구조
US8312540B1 (en) * 2008-06-13 2012-11-13 Juniper Networks, Inc. System for slowing password attacks
US20140325591A1 (en) * 2008-10-22 2014-10-30 International Business Machines Corporation Rules driven multiple passwords

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107528689A (zh) * 2017-09-18 2017-12-29 上海动联信息技术股份有限公司 一种基于Ukey的密码修改方法
CN107528689B (zh) * 2017-09-18 2020-10-02 上海动联信息技术股份有限公司 一种基于Ukey的密码修改方法
CN110445754A (zh) * 2019-07-02 2019-11-12 平安科技(深圳)有限公司 Windows域账号处理方法、服务器及计算机可读存储介质
US11853411B2 (en) * 2020-04-17 2023-12-26 Paypal, Inc. User specific error detection for accepting authentication credential errors

Similar Documents

Publication Publication Date Title
KR101922196B1 (ko) 스크린-분석 기반의 디바이스 보안
US8464350B2 (en) System and method for in-private browsing
EP3211825B1 (fr) Procédé et appareil de vérification de terminal de confiance
US20170099292A1 (en) Systems and Methods for Access Permission Revocation and Reinstatement
CN107872440B (zh) 身份鉴权方法、装置和系统
US20190281049A1 (en) Bio-authentication for Streaming Service Account Management
US11188854B2 (en) Systems and methods for assignment of equipment to an officer
WO2017078682A1 (fr) Modifications de mot de passe
CN105337739B (zh) 安全登录方法、装置、服务器及终端
CN105282482A (zh) 一种会议电视系统及其权限控制方法、装置
US20200293760A1 (en) Multi-modal identity recognition
CN107918564A (zh) 数据传输异常处理方法、装置、电子设备及存储介质
US20210075812A1 (en) A system and a method for sequential anomaly revealing in a computer network
CN109684177A (zh) 信息反馈方法及装置
CN103761473B (zh) 一种移动终端上的应用管理系统和方法
US20190236265A1 (en) Preventing Unauthorized Access to Secure Information Systems Using Dynamic, Multi-Device Authentication
US20160028601A1 (en) Internet connectivity probe
US10439805B1 (en) Platform for automated recording and storage of messaging service conversations
EP3707589B1 (fr) Opérations d'impression restaurées
CN106790000B (zh) 一种安全策略的配置方法及装置
CN112434894A (zh) 一种实时风险控制方法、计算机设备及可读存储介质
CN105809074B (zh) 一种usb数据传输控制方法、装置、控制组件及系统
US11470080B2 (en) Method for performing a biometric function between a client and a server
CN107066852B (zh) 应用的密码生成方法及密码生成装置
JP2018109795A (ja) アクセス管理装置、アクセス管理方法およびコンピュータプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15907929

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15907929

Country of ref document: EP

Kind code of ref document: A1