Specifying a set of forbidden passwords

Electrical computers and digital processing systems: support – System access control based on user identification by... – Solely password entry

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S184000, C713S185000, C713S186000, C726S002000, C726S005000, C726S009000, C726S019000, C726S020000, C709S225000, C709S229000

Reexamination Certificate

active

07904729

ABSTRACT:
Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password.

REFERENCES:
patent: 5394471 (1995-02-01), Ganesan et al.
patent: 7509495 (2009-03-01), Roig
patent: 2004/0073815 (2004-04-01), Sanai et al.
patent: 2005/0235341 (2005-10-01), Stieglitz et al.
patent: 2006/0047704 (2006-03-01), Gopalakrishnan
patent: 0011534 (2000-03-01), None
Carlo Blundo et. al, Hyppocrates: a new proactive password checker, Apr. 2004, Journal of Systems and Software, vol. 71, pp. 163-175.
International Preliminary Report on Patentability from related International Application No. PCT/CA2006/000118, dated Apr. 24, 2008.
Written Opinion for corresponding international application PCT/CA2006/000118, date of mailing Aug. 3, 2006.
European Search Report dated Jan. 21, 2010, European Patent Application No. 06705086.4.
Hietaniemi, “Ipasswd—Proactive Password Security”, Proceedings of the Systems Administration Conference, vol. 6, Jan. 1, 1992, pp. 105-114.
Klein, D. “Foiling the Cracker: A Survey of, and Improvements to, Password Security”; 2ndUSENIX Security Workshop, p. 5-14, 1990.
Morris, R. “Password Security: A Case History”; Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 594-597.
WEBsite: www.openwall.com/passwords/wordlists printedMay 25, 2006.
Curry, David A., Final Report, 1990 “Improving the Security of your Unix System”, ITSTD-721-FR-90-21.
WEBsite: http://security.uchicago.edu/docs/userpassword.shtml; “Methods for Choosing a good, Memorable Password” printed Jun. 5, 2006.
Jeyaraman et al. “Have the cake and eat it too—Infusing usability into text-based authentication systems”; Proceedings of the 21stAnnual Computer Security Applications Conference 2005.
“A Remote User Authentication Scheme Using Strong Graphical Passwords”; Proceedings of the IEEE Conference on Local Computer Networks 30thAnniversary 2005.
International Search Report for PCT/CA2006/000118 dated Aug. 3, 2006.
Yan, Jianxin Jeff, A Note on Proactive Password Checking, Computer Laboratory, University of Cambridge.
http://www.utimaco.us/products/easy/manual/1-134.html “Defining forbidden passwords”.
http://www.utimaco.us/products/easy/manual/1-125.html “SafeGuard Easy's Internal Password Rules”.
http://www.utimaco.us/products/easy/manual/1-135.html “Importing a password list”.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Specifying a set of forbidden passwords does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Specifying a set of forbidden passwords, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Specifying a set of forbidden passwords will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2722256

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.