Electrical computers and digital processing systems: support – System access control based on user identification by... – Solely password entry
Reexamination Certificate
2011-03-08
2011-03-08
Arani, Taghi T (Department: 2438)
Electrical computers and digital processing systems: support
System access control based on user identification by...
Solely password entry
C713S184000, C713S185000, C713S186000, C726S002000, C726S005000, C726S009000, C726S019000, C726S020000, C709S225000, C709S229000
Reexamination Certificate
active
07904729
ABSTRACT:
Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password and then comparing the at least one symbolically equivalent password with at least one specified forbidden password. The user password is disapproved if one of the symbolically equivalent passwords corresponds to the at least one forbidden password.
REFERENCES:
patent: 5394471 (1995-02-01), Ganesan et al.
patent: 7509495 (2009-03-01), Roig
patent: 2004/0073815 (2004-04-01), Sanai et al.
patent: 2005/0235341 (2005-10-01), Stieglitz et al.
patent: 2006/0047704 (2006-03-01), Gopalakrishnan
patent: 0011534 (2000-03-01), None
Carlo Blundo et. al, Hyppocrates: a new proactive password checker, Apr. 2004, Journal of Systems and Software, vol. 71, pp. 163-175.
International Preliminary Report on Patentability from related International Application No. PCT/CA2006/000118, dated Apr. 24, 2008.
Written Opinion for corresponding international application PCT/CA2006/000118, date of mailing Aug. 3, 2006.
European Search Report dated Jan. 21, 2010, European Patent Application No. 06705086.4.
Hietaniemi, “Ipasswd—Proactive Password Security”, Proceedings of the Systems Administration Conference, vol. 6, Jan. 1, 1992, pp. 105-114.
Klein, D. “Foiling the Cracker: A Survey of, and Improvements to, Password Security”; 2ndUSENIX Security Workshop, p. 5-14, 1990.
Morris, R. “Password Security: A Case History”; Communications of the ACM, Nov. 1979, vol. 22, No. 11, pp. 594-597.
WEBsite: www.openwall.com/passwords/wordlists printedMay 25, 2006.
Curry, David A., Final Report, 1990 “Improving the Security of your Unix System”, ITSTD-721-FR-90-21.
WEBsite: http://security.uchicago.edu/docs/userpassword.shtml; “Methods for Choosing a good, Memorable Password” printed Jun. 5, 2006.
Jeyaraman et al. “Have the cake and eat it too—Infusing usability into text-based authentication systems”; Proceedings of the 21stAnnual Computer Security Applications Conference 2005.
“A Remote User Authentication Scheme Using Strong Graphical Passwords”; Proceedings of the IEEE Conference on Local Computer Networks 30thAnniversary 2005.
International Search Report for PCT/CA2006/000118 dated Aug. 3, 2006.
Yan, Jianxin Jeff, A Note on Proactive Password Checking, Computer Laboratory, University of Cambridge.
http://www.utimaco.us/products/easy/manual/1-134.html “Defining forbidden passwords”.
http://www.utimaco.us/products/easy/manual/1-125.html “SafeGuard Easy's Internal Password Rules”.
http://www.utimaco.us/products/easy/manual/1-135.html “Importing a password list”.
Brown Michael S.
Little Herbert
Arani Taghi T
Bereskin & Parr LLP / S.E.N.C.R.L., s.r.l.
Jeudy Josnel
Research In Motion Limited
LandOfFree
Specifying a set of forbidden passwords does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Specifying a set of forbidden passwords, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Specifying a set of forbidden passwords will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2722256