发明名称 Auxiliary password
摘要 A method to provide trusted parties an auxiliary access password that allows access to password protected data while allowing the owner of the data to keep the data secure until certain events occur. Two or more Key Elements are created that can be concatenated in any order or in a specified order to become a valid alternative to the primary password. The Key Elements are shared with trusted parties or institutions that are trusted by the User. The Key Element instructions for each of the trusted parties include a specific time, event or occurrence, such as the death or incapacitation of the owner of the data, when the trusted parties should give their Key Elements to a designated trusted party who will concatenate the Key Elements to gain access to the password protected data.
申请公布号 US2014230028(A1) 申请公布日期 2014.08.14
申请号 US201414176145 申请日期 2014.02.09
申请人 Petty Stephen Oscar 发明人 Petty Stephen Oscar
分类号 G06F21/46 主分类号 G06F21/46
代理机构 代理人
主权项 1. A method for creating and using an auxiliary access password which can be used as an alternative password or as the primary password in the absence of a primary password to allow access to an account, comprising: (1) Two or more auxiliary access password key elements composed of any number of characters in any language that when concatenated in any order or in any specified order can be used to allow access to an account as a valid alternate to the primary password or as the primary password in the absence of a valid primary password. (2) Any number of key elements can be created and when all of the key elements are concatenated in any order or in any specified order compose a valid alternate to the primary password or as the primary password in the absence of a valid primary password. (3) Any number of key elements can be created and the key elements can be divided into multiple designated subsets where each of the subsets of key elements can be concatenated in any order or in any specified order to compose a valid alternate to the primary password or as the primary password in the absence of a valid primary password. (4) The key elements can be created by an automatic method, a mechanical method, a manual method, input by the user or any combination of methods. (5) The method of the auxiliary access password entry for access to an account may be the same as the entry method of the primary password or by an alternative method. (6) When the account allows, the valid auxiliary access password can be used to bypass any pin or other secondary or alternate access method.
地址 Coronado CA US