Browse Prior Art Database

Method and System of Implementing a Smart Password

IP.com Disclosure Number: IPCOM000237373D
Publication Date: 2014-Jun-16
Document File: 4 page(s) / 98K

Publishing Venue

The IP.com Prior Art Database

Related People

Allie Watfa: INVENTOR [+4]

Abstract

A method and system for implementing a smart password is disclosed. The method generates passwords based on life events and corresponding time lines which are easier to remember while being secure.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 58% of the total text.

Method and System of Implementing a Smart Password

Abstract

A method and system for implementing a smart password is disclosed.  The method generates passwords based on life events and corresponding time lines which are easier to remember while being secure.

Description

Currently, when a user forgets a primary password of a user account, the user opts for a “forgot password” option for securing an alternative password.  In order to provide the alternative password, a mail client asks the user with questions such as, “what is the name of your favorite book?”, “what is the name of your favorite movie?” and so on.  In most cases, the user might not remember the right answer for the question due to changes in preferences such as, books and movies.  In a scenario, the user misspells the name of the book or the movie thereby aborting the process.  As a last resort, the user calls a customer care center, which may not be of help, as the call centre executive is bound by certain rules.

Disclosed is a method and system for implementing a smart password.  The method generates passwords based on life events and corresponding time lines which are easier to remember while being secure.

The method and system creates visual circles for the user, wherein each circle represents a personal life event.  The life event can be dragged and dropped to form a life event sequence.  In an exemplary scenario, an application such as a mail client provides selected life events and the corresponding time lines as a question that the user has to arrange the life events according to the corresponding time lines in order to receive an alternate password.

Initially, the user creates the life event sequence while creating a mail account.  For example, the user defines one or more life events as shown below:


A- Day I married
B- Day I got my first car
C- Day I moved to urbana illinois
D- Day I got my second job
E- Day I bought 40 inch television. 

Thereafter, the user selects time slots corresponding to the one or more life events, as shown below:


[       1999     ][        2002      ][       2008      ][   2009      ][  2010    ][        2011      ]

Subsequently, the user matches the one or more life events that are defined with the time slots as shown below:

[       1999     ][        2002      ][       2008      ][   2009      ][     2010     ] [    2011      ]
          C                                           D                 A             
          B                                                               E

In an exemplary embodiment, the user chooses life events that only the user knows the corresponding time sequence, but not the general public.  This way, the password is effective and secure.

In some embodiments, one or more parameters such as, time lines and life events of the life event sequence can be varied to create stronger passwords.  For example, the strength of the password can be varied by one or more of, but not limited to, having more...