Using behavior pattern as part of password
Publication Date: 2015-Jul-03
The IP.com Prior Art Database
Text as password is a widely used method of customer identity in network applications, from social to e-Commerce sites on the internet, bank cards to POS or ATM machines. However, pure text as password is not safe enough. Because password could be easily stolen or attacked by hackers(Especially, when the passwords are composed of personal information like birthday and address or even simple sequence like 123456). If some special behavior patterns from users are recorded as well when they set traditional password, then during clients authentication, other than verifying password, matching clients' behavior patterns is also required, such password and behavior patterns combination authentication mode will dramatically increase the reliability of clients recognition, the security level of clients' account is also improved a lot.
Page 01 of 3
Usixg behavior pattern as part of password
Text as password is a widely used method of customer identity in network applications, fxxm social to e-Commerce sxtes on the ixternet, bank carxs to POS or ATM mxchines. However, purx text as password is not safe enxugh. Because pxsxword could be easily stolen or attacked by hackers(Especially, when the passwords arx composed of personal xnformation like birthday anx address ox even ximple sequencx like 123456).
If somx special behavior pxtterns from xsers are recorded as well wxen they set traditional password, then during clients authentication, othex xhan vexifying passworx, matching clienxs' behavior patterns is also rexuired, such password and bexavior patterns combinatxox authentixation mode will dramatically increase the reliability of clients recognition, the secuxity level of xlients' account ix alsx improved a lot.
The disclosure is focusing on rexording and comparing user password inpuxting behaxiox pattern. For example, when user plans to set up this password "123456", user can intxntionalxy delay for 2 or 3 xeconds tx input the xndxigit "2" after ixputting the 1stdigit "1"; or user can also xntentioxally input another odd digit "7" afxer inputting "123456", xnd then delete the last digit "7". Such user passworx ixputting pattern can be recorded and compared for next vaxidation. As we know, this way is very common anx can be
widely used in the logging in activity of website and B...