Password Generation System and Its Associated Method of Operation
20170155635 ยท 2017-06-01
Inventors
Cpc classification
H04L2463/061
ELECTRICITY
H04L63/10
ELECTRICITY
H04L63/0861
ELECTRICITY
H04L63/0853
ELECTRICITY
G06F21/46
PHYSICS
International classification
Abstract
A system and method that generates a password and places that password in a password input field of a running computer software application. The password input field is accessed by a computer that has a user interface. In a first embodiment of the invention, an electronic device is connected to the computer. The electronic device can generate a password as a random long string of characters. A communications link is established between the electronic device and the computer. The electronic device causes the user interface of the computer to lock or otherwise become disabled. The electronic device then generates a password. The password is entered into said password input prompt via said communications link while said user interface is disabled. The password is later identified with an identification code so that the same password can be recalled in the future.
Claims
1. A method of generating a password to fill a password input field in a running computer software application that is accessed by a computer having a user interface, said method comprising the steps of: providing an electronic device that can generate a password as a random string of characters; establishing a communications link between said electronic device and said computer; locking said user interface on said computer; generating said password using said electronic device; and entering said password into said password input field via said communications link while said user interface is disabled.
2. The method according to claim 1, wherein said step of establishing a communications link between said electronic device and said computer includes physically linking said electronic device to said computer with a cable.
3. The method according to claim 1, wherein said step of establishing a communications link between said electronic device and said computer includes establishing a wireless link between said electronic device and said computer.
4. The method according to claim 1, wherein said random string of characters generated by said electronic device includes alphanumeric characters in both upper case and lower case.
5. The method according to claim 1, wherein said user interface of said computer is a keyboard, wherein said keyboard is disabled by said electronic device.
6. The method according to claim 1, wherein said user interface of said computer is a touch screen, wherein said touch screen is disabled by said electronic device.
7. The method according to claim 1, further including the step of activating said electronic device prior to said step of establishing a communications link between said electronic device and said computer.
8. The method according to claim 7, wherein said step of activating said electronic device requires biometric information to be entered into said electronic device.
9. The method according to claim 1, further including the step of entering a retrieval code into said electronic device for said password.
10. A method of filling a password input field in a running computer software application that is accessed by a computer having a cursor that is moved by a user interface, said method comprising the steps of: providing an electronic device that can generate a password as a string of said characters; establishing a communications link between said electronic device and computer; using said user interface to position said cursor into said password input field; generating said password using said electronic device; and entering said password into said password input field at said curser, via said communications link.
11. The method according to claim 10, further including the step of locking said user interface on said computer when said electronic device is linked to said computer.
12. The method according to claim 10, wherein said step of establishing a communications link between said electronic device and said computer includes physically linking said electronic device to said computer with a cable.
13. The method according to claim 10, wherein said step of establishing a communications link between said electronic device and said computer includes establishing a wireless link between said electronic device and said computer.
14. The method according to claim 10, wherein said string of characters is a randomly generated string of characters.
15. The method according to claim 10, further including the step of assigning a retrieval code for said password, wherein said retrieval code can be entered into said electronic device to retrieve said password.
16. A method of filling a password input field in on a website accessed by a computer, said method comprising the steps of: providing a computer that can access said website, wherein said computer has a user interface; assessing said website with said computer, wherein said website presents said password input field; running software on said computer that can generate a password, wherein said software locks said user interface and enters said password into said password input field; and assigning a retrieval code to said password so said password can be retrieved in the future upon entry of the retrieval code into said computer.
17. The method according to claim 16, wherein said password is a randomly generated string of characters.
18. The method according to claim 16, further including the step of selecting a character length for said password.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] For a better understanding of the present invention, reference is made to the following description of exemplary embodiments thereof, considered in conjunction with the accompanying drawings, in which:
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
DETAILED DESCRIPTION OF THE DRAWINGS
[0019] Although the present invention password generation system can be embodied in many ways, only two exemplary embodiments have been selected for illustration and discussion. The illustrated embodiments, however, are merely exemplary and should not be considered a limitation when interpreting the scope of the appended claims.
[0020] Referring to
[0021] In
[0022] The password generation system 10 can work in conjunction with and computing device that has Internet access. Traditional workstation computers 28, such as PCs and laptops, and be used. Likewise, the password generation system 10 can also work in conjunction with handheld computers 30, such as smart phones and tablet computers.
[0023] Workstation computers 28 are typically connected to the Internet through a computer network 32. The Internet is also connected to many servers 34 that run specialized application software 36. To interact with application software 36, the user is often required to login using a username and password. The username is often preset by the application software 36 to correspond to the user's email address. The user is typically allowed to select a desired password.
[0024] Handheld computers 30 can also connect to the Internet and can reach the same application software 36. However, handheld computers typically communicate with the Internet using a wireless network 38, such as a WiFi network or a cellular network.
[0025] Referring to
[0026] The password generation system 10 is then activated. See Block 44. The password generation system 10 may require user identification or activation. A user can be identified using a code, or by checking a biometric parameter with either the camera 24 or finger scanner 26. Once the password generation system 10 is activated, a data link is achieved between the password generation system 10 and the user's computer. If the computer being used is a workstation computer 28, then the password generation system 10 can be attached to the workstation computer 28 using a USB cable or similar data communications cable. If a handheld computer 30 is being used, a wireless data connection, such as a Bluetooth connection can be established between the password generation system 10 and the handheld computer 30. Different computers run different operating systems. The password generation system 10 automatically recognizes the operating system of the computer it links with and synchronizes its operations to communicate with the operating system of the linked computer. See Block 46.
[0027] Referring to
[0028] The computer 28, 30 is now capable of receiving input instructions directly from the password generation system 10. The user enters a simple input. See Block 49 in
[0029] As is indicated by Block 53 in
[0030] The password generation system 10 prompts the user to input the simple input identifier for the password. See Block 49. This can be done using any alphanumeric identifier. For example, if a user is entering the password into website Amazon.com, then the user may choose to select the name Amaz to identify the password. Of course, the safer choice would be to select a short name or code that does not identify for what the password is used. The identifier is entered into the user interface 14 of the electronic device 12 embodying the password generation system 10.
[0031] The simple input identifier is hard coded into the password generation system. See Block 51. As is shown by Block 53, the password generation system then sees if the user has entered the requirements for the simple input identifier. The password generation system generates at least three variables for each digit of the simple input identifier. The variables generated must contain at least two capital letters and at least two special characters.
[0032] The generated password is transmitted to the curser queue of the application software 36 being accessed. See Block 56. The running application software 36 then accepts the generated password as if it were entered manually by the user. Preferably, the password only appears as a line of asterisks on screen. Alternatively, the password may appear as a few alphanumeric characters with asterisks. Consequently, if a computer contains a virus that captures keyboard entries or screen shots, the generated password is not compromised. The generated password is preferably never fully typed into the keyboard. Likewise, the generated keyboard never appears on screen. Furthermore, if the computer is being monitored by an external video camera, then the password cannot be read from any video recording.
[0033] In the future, if a user goes to a website or uses another software application that requires a password, then the password generation system 10 is used to reenter the correct password. Referring to
[0034] In the exemplary embodiment described above, the password generation system 10 is embodied as a handheld electronic device 12 that is separate and distinct from the computers 28, 30 with which it communicates with. This need not be the case. The password generation system 10 can be embodied as software that is run by a user's computer. This second embodiment of the present invention is best understood by referring to
[0035] The invention is utilized by running a downloaded software application 70 in the user's computer 72. The software application 70 is designed to run simultaneously with the browser software of the computer 72. When a user comes to a password field 74, the user places the curser of the computer 72 onto the password field 74. The software application 70 then generates a complex password 76. The user is prompted to identify the password 76 using a much smaller name or code. The software application 70 then populates the password field 74 with the generated password 76. The software application 70 then accepts the generated password 76 as if it were entered manually by the user. Preferably, the password 76 only appears as a line of asterisks on screen. Consequently, if the computer 72 contains a virus that captures keyboard entries or screen shots, the generated password is not compromised. Likewise if someone is viewing or recording the screen images, the password is not compromised.
[0036] In the future, if a user goes to a website that requires a password, the user again runs the software application 70 that is the password generation system. The user then enters the proper retrieval code into the computer. The user also places the curser of the computer onto the password prompt of the running website. The password generation system will then repopulate the password field 74 with the same password 76 that was previously generated for that application.
[0037] It will be understood that the embodiments of the present invention that are illustrated and described are merely exemplary and that a person skilled in the art can make many variations to those embodiments. All such embodiments are intended to be included within the scope of the present invention as defined by the claims.