摘要 |
Generating and authenticating a dynamic password. A first password string is received from a user. One or more string generation rules with corresponding reference character positions of the first password string are received. The first password string, the string generation rules, and the corresponding reference character positions of the first password string are associated with login credentials of a user. For authentication, a first password string associated with a user is received. A second password string is generated, based on a partial password string and one or more string generation rules, with corresponding reference character positions of the partial password string, all associated with the user. The first password string is compared with the second password string, and the user is authenticated if the strings match. |
主权项 |
1. A computer-implemented method for providing access to electronic information, the method comprising:
receiving, by a first computer from a second computer over a network, in response to information entered into a user interface on the second computer, a first password string associated with a user and a rule for configuring and generating a second password string from the first password string, wherein the rule specifies a dynamic element to insert at a specified position in the first password string, based on first contextual information associated with the user, and wherein a value of the specified dynamic element is determined based on second contextual information associated with the user; in response to receiving, by the first computer from the second computer over the network, a third password string associated with the user, via information entered into the user interface on the second computer:
configuring and generating, by the first computer, the second password string from the first password string, based on the received rule, by:
selecting the specified dynamic element based on the first contextual information associated with the user;inserting the selected dynamic element in the first password string at the specified position; anddetermining the value of the selected dynamic element based on the second contextual information associated with the user; and in response to determining, by the first computer, that the third password string matches the second password string, granting, by the first computer, the second computer access to the electronic information. |