Sign In to Follow Application
View All Documents & Correspondence

Dynamic Password Generator Based On Real Time Behavioral And Environmental Factors

Abstract: This invention relates to an advanced and trustworthy approach for dynamic password generation using the real-time behavioral biometrics; especially the keystroke dynamics, by adding environmental data to churn out password that cannot be replicated and are sensitive to context into using dynamic passwords. Very typically, the authentication systems rely directly on static credentialization from a plethora of other cyber threats, such as brute force attacks, phishing, dictionary attacks, keylogging, static passwords, etc. To address such shortcomings, this invention comprises a multifactorial approach that links the uniqueness of human typing patterns with real-time system and environmental data to create stronger and richer authenticated password mechanisms. The core of the present invention revolves around capturing and using the keystroke pattern of the user - which includes time taken between presses of keys, time the keys are held down, general typing rhythms, and others as biometric signatures. All of these behavioral measurements are difficult to imitate or replicate. They are collected through real-time capture while the user is typing through either a pre-defined or randomly selected passphrase. The same time, environmental information, which the system captures while using a username, the operating systems, attributes pinned to devices, time of current system, and now many other randomly generated nonces or seeds. This multi-source data is then combined to generate a composite string, which is later processed through a cryptographic hash function (e.g., SHA- 256 or SHA-3). The result of the hashing process is truncated/formatted to form a secured, one-time dynamic password. Thus, this system declares the password to be temporal: every login session generates an original password, inasmuch as the user inputs the same phrase. The variation in context and typing behavior and environmental parameters will contribute towards the dynamic nature of the password.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
20 April 2025
Publication Number
18/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Amit Sharma
H.No. 10, Lane No. 10, Near Bal Vidhyalaya School, Baran Road,
Vivekananda Global University Jaipur
Vivekananda Global University, Sector 36, NRI Colony Rd, V I T Campus, Jagatpura, Seesyawas, Jaipur, Rajasthan 303012

Inventors

1. Dr. Amit Sharma
Associate Professor, Department of Computer Science and Application, Vivekananda Global University, Jaipur
2. Manish Kumar
UG Research Scholar, Department of Computer Application and Technology, Vivekananda global university Jaipur
3. KARTIKEYA LASHKARI
UG Research Scholar, Department of Computer Application and Technology, Vivekananda global university Jaipur
4. Suhani Shekhawat
UG Research Scholar, Department of Agriculture Science Department, Vivekananda global university Jaipur
5. Hans Raj Meena
Ug Research Scholar, Department of Department of Science, Vivekananda global university Jaipur
6. Riya kumari
UG Research Scholar, Department of Management Department, Vivekananda global university Jaipur

Specification

Description:The present invention relates in general to cybersecurity and user authentication systems, and relates particularly to a method and system for dynamic password generation using real-time behavioral biometrics and environmental factors. The invention thus improves the traditional password- based authentication method through the addition of a user's keystroke dynamics and real-time context for creating non-replicable, session-specific credentials. , Claims:1. Generation of Dynamic Passwords A technique for generating passwords in real-time, using keystroke dynamics along with environmental data Input.
2. Behavioral Keystroke Capture Timing captures speed, rhythm, and pace of typing to create a unique pattern of behavior.
3. Sample Environmental Data For contextual ambient environment add system time, OS info, device ID, and random nonces.
4. Hash-based Password Construction Hashing all these inputs into a one-time password.
5. No Static Storage Never store passwords live generated per session.
6. Session Limited Use Also, upon using them once they expire or within a limited time.

Documents

Application Documents

# Name Date
1 202511037880-REQUEST FOR EARLY PUBLICATION(FORM-9) [20-04-2025(online)].pdf 2025-04-20
2 202511037880-FORM-9 [20-04-2025(online)].pdf 2025-04-20
3 202511037880-FORM 1 [20-04-2025(online)].pdf 2025-04-20
4 202511037880-FIGURE OF ABSTRACT [20-04-2025(online)].pdf 2025-04-20
5 202511037880-DRAWINGS [20-04-2025(online)].pdf 2025-04-20
6 202511037880-COMPLETE SPECIFICATION [20-04-2025(online)].pdf 2025-04-20