Browse Prior Art Database

Cognitive password Disclosure Number: IPCOM000247960D
Publication Date: 2016-Oct-14
Document File: 2 page(s) / 38K

Publishing Venue

The Prior Art Database


Username and password now is quite important to all IT-related activities. Normally, your user name is familiar to other people as you must use quite frequently and easy to track as you often publish it to world. User name and password are just used to authenticate into system, that is main role. One username is often mapped to one password. On the other hand, people often need to login to system, but then need to choose profile or role to work also. There are profiles such as Home, Public or Work. This disclosure suggests to build login API (or system) on cloud to use multi passwords for one username, so he can work with profiles and contexts. Each passwords can reflect intention or plan of user when he logins system. For example, if user is forced to login to system by a gangster in order to transmit money of bank to black accounts, he can use his second password with intention to report to bank that “I am in danger, please help me!”. The third password may be attached with rule “public password”, it will remind user “Please check if you leave any thing in your place” when user logout.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 60% of the total text.

Page 01 of 2

Cognitive password

User can use username with multiple passwords. Each user passwords can reflect a context, and as only user knows the definition of password, he can keep these knowledge in any systems, which are independent to the logged in system; such as keeping definition in mobile, when he often logins on computer.

So with only one public username, he can use different passwords and login to system.

Multi-password system includes sub-systems:

1. Define rules: define cognitive characters or words which are reflect "status" or context of users. An usage is such as if password contains "dg" that means the user is "in danger"

2. Define related-actions: action can be triggered from login system to fulfill certain tasks. For example, it can send position (GPS data) of user to police.

The system includes two main sub-systems: define rule for password and define actions according to rules. Define rules:

You can define rule for passwords:

1. Public password: means he is logging in from public sites. The password can contain "pl" at the end of password phrase.

2. Website-remembered password: he is going to save this password on websites. This password can be reminded to change quite frequently.

3. Only me password: he uses this password only on specific device, such as his own smart phone, it is quite secured device. This will require serial number of device.

4. Geography-based password: this means he use it at some places, such as password with "cf" means he is at...