Dynamic password generation

ABSTRACT

Systems, methods and apparatus are provided for altering a static password between entry and authentication using a dynamic logic. A client application may receive entry of a user password and record an amount of pressure associated with the entry. The client application may dynamically select a virtual contact surface material and generate audio files corresponding to writing or typing the password characters on the selected surface material with the recorded amount of pressure. The client application may compress the audio files by embedding them within the same digital space according to a time-based logic. The dynamic password files may be routed to a central server. Data packet fragmentation may further improve security during transmission. The central server may reconstruct the password for authentication using the time-based logic.

FIELD OF TECHNOLOGY

Aspects of the disclosure relate to dynamic alteration of a passwordprior to authorization.

BACKGROUND OF THE DISCLOSURE

Conventional passwords are static which leaves them susceptible toattack by a malicious actor. Static passwords may be captured by malwareon a client machine or compromised while in storage on a central server.Frequent password changes provide some measure of protection, but suchchanges are burdensome to a user tasked with memorizing each newpassword.

It would be desirable to provide a client application that converts astatic password into a dynamic password prior to authentication withoutrequiring any additional user input. It would also be desirable toimplement additional dynamic software-based and hardware-based securitymeasures to protect the password during the authentication process.

SUMMARY OF THE DISCLOSURE

Systems, methods, and apparatus for dynamic password generation areprovided.

A client application may record an amount of pressure associated withentry of a user password. The client application may dynamically selecta virtual contact surface. The client application may generate a virtualfriction sound simulating entry of user password characters on theselected contact surface with the recorded amount of pressure. Theclient application may generate separate audio files for each passwordcharacter.

The client application may compress the generated audio files bylayering them within the same digital file space according to atime-based logic. Audio files corresponding to individual passwordcharacters or groups of password characters may be embedded together.The client application may share the time-based logic with a centralserver.

The compressed dynamic password file may be prepared for packetfragmentation. The client application may generate a split byte and usethe split byte to join two data packets. During transmission, a stimulussuch as a signal boost may cause the split byte to split, dynamicallyshifting the composition of the data packets during transmission. Thesplit may be coordinated by a network router.

A central server may receive the compressed dynamic password file andreassemble the data packets. The server may reconstruct the passwordusing the time-based logic and authenticate the password.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and advantages of the disclosure will be apparent uponconsideration of the following detailed description, taken inconjunction with the accompanying drawings, in which like referencecharacters refer to like parts throughout, and in which:

FIG. 1 shows illustrative apparatus in accordance with principles of thedisclosure;

FIG. 2 shows illustrative apparatus in accordance with principles of thedisclosure;

FIG. 3 shows illustrative architecture in accordance with principles ofthe disclosure;

FIG. 4 shows an illustrative process flow in accordance with principlesof the disclosure; and

FIG. 5 shows an illustrative process flow in accordance with principlesof the disclosure.

DETAILED DESCRIPTION

Systems, methods and apparatus for dynamic password generation areprovided. A client application may dynamically alter a static passwordat the time of entry to generate a dynamic password. The clientapplication may implement additional dynamic protections to furtheralter the password structure for transmission to a central server forauthentication. The central server may use time-based logic toreconstruct the original password for authentication.

For the sake of illustration, the invention will be described as beingperformed by a “system.” The system may include one or more features ofthe apparatus and methods that are described herein and/or any othersuitable device or approach.

The system may include client server architecture. The system mayinclude a client machine running a client application. The clientapplication may include a user interface. The user interface may beconfigured to accept entry of a user password.

The password entered by the user may be a static password. The staticpassword may be changed at predetermined intervals. The static passwordmay be changed at random intervals. The static password may be selectedby the user. The static password may be generated by a passwordgenerator and assigned to the user.

The user may enter the static password by drawing on a touch-sensitivescreen. The user may draw with a finger, a stylus or using any suitabletool or method. In some embodiments, the password may be entered using amechanical or virtual keyboard or keypad.

The client application may be in communication with one or morebiometric sensors. A biometric sensor may capture unique biometricmarkers associated with the user prior to or during entry of thepassword. For example, a biometric sensor may measure user pressure on atouch-sensitive screen or a mechanical keyboard during entry of thepassword. Illustrative physical biometric markers include fingerprint,facial recognition, palm print, hand geometry, and iris recognition.Illustrative behavioral biometric markers include typing rhythm, gait,keystroke, signature, and voice. The biometric markers may confirm theidentity of the user entering the password.

The client application may record a biometric marker received from thebiometric sensor. The client application may use the biometric marker toconfirm the identity of the user before, during or after password entry.The client application may further use the biometric marker to generatea dynamic password from the static password.

The client application may use dynamic logic to generate one or moredigital files associated with the dynamic password. The dynamic passwordfiles may store digital audio content.

The client application may select a virtual contact surface to beassociated with the password entry. The client application may capturean entered password and a measure of user pressure associated withpassword entry. By combining aspects of the virtual contact surface withthe amount of pressure during entry, the client application may generatea digital audio file. The digital audio file may correspond to asimulated friction sound of writing or typing the password characters onthe selected surface with the measured amount of pressure. In someembodiments, the client application may generate separate audio filesfor each character of the password. In some embodiments, the clientapplication may generate separate audio files for sets of passwordcharacters. Digital dynamic password files may be stored in any suitableformat.

A new virtual contact or surface may be substituted by the client serverat predetermined intervals. For example, the contact surface may bechanged weekly, daily, or multiple times per day. In some embodiments,the new virtual contact surface may be substituted at randomizedintervals. In some embodiments, the client application may substitute anew contact surface each time the user enters a password.

Selection of a virtual contact surface may be dependent on dynamiclogic. The dynamic logic may be time-based logic. Time-based logic maytie computer processes to particular clock or calendar functions.

The transformation of a static password following entry using dynamiclogic improves security without requiring any changes on the part of theuser. Even if a malicious actor were to gain access to the staticpassword during storage or entry, he would not be able to replicate thedynamic password.

The dynamic password file may be transmitted to a central server forauthentication. The client application may apply additional securitymeasures to protect the dynamic password file during transmission. Theclient application may split the password into sections. Each passwordsection may include a predetermined number of characters. In someembodiments, the sections may include a random number of characters. Thenumber of password sections and the arrangement of characters withineach section may be determined using time-based logic.

The client application may generate separate audio files for eachcharacter of the password. Within each password section, the separateaudio files for each character may be layered on top of each other andembedded within the same storage space. In some embodiments, the audiofiles for the password characters may be layered in an order that isdifferent from the order in which the characters were entered. In someembodiments, the password may not be split into sections and all of thecharacters from the password may be embedded within the same space. Thelayering and embedding may compress the size of the password to a singlebyte or to any suitable size.

The client application may use time-based logic to determine thelayering and embedding of the password characters or password sections.The compressed password cannot easily be reconstructed without this keyto the encryption.

The client application may transmit the compressed password in thecompany of a predetermined number of false or “dummy” passwords. Thedummy passwords may be generated by the client application and mayinclude dynamic transformations of incorrect static passwords. The dummypasswords may be altered using the same dynamic logic as the passwordentered by the user. The inclusion of incorrect passwords may furtherprotect against attack as a malicious actor will not be able to identifythe true password.

Transmission of a dynamic password file may involve transmission ofmultiple data packets containing the password data. Packet splitting maybe used to conceal the password by masking the true number andarrangement of the data packets.

The client application may initially join data packets using splitbytes. The split bytes may be generated by the client application. Thesplit bytes may be junk bytes created using any suitable combination ofbinary digits. The combination may be determined by time-based logic.The combined data packets may mask the true structure of thetransmission.

In some embodiments, the data packets may be joined out of sequence tofurther deter attackers. Each individual data packet in the array mayretain the destination header data.

The system may include one or more routers. The routers may be connectedon a local area network (LAN). Data packets associated with the dynamicpassword file may be split within the LAN before reaching the finalrouter or gateway. Splitting the packets at this stage protects the databefore it reaches a point more vulnerable to attack.

The packets may be split using physical stimuli that weaken the splitbytes. Splitting the packets using a physical stimulus instead ofsoftware instructions also makes the process more difficult for amalicious actor to penetrate.

The packets may be split at split points in the network. Split pointsmay include routers, switches, or other connections in the LAN. Thesplit points may be coordinated by a local router or gateway. The splitpoints may include specialized network hardware. The split points mayinclude attenuators, antennae, signal boosters, light sources or anyother suitable hardware.

In some embodiments, packet splitting may be initiated by a change insignal strength. The strength of the signal may be modified for apredetermined amount of time. For example, a nanosecond longinterruption or adjustment in the signal could trigger the split.

The splitting may be initiated by a signal boost. The signal booster maybe associated with a router on the LAN. The client application may sharethe combination of digits used to generate the split byte with one ormore routers on the network. The signal may break up the split bytejoining the data packets, causing the packets to separate.

In a fiber optic network, packet splitting may be initiated byparticular wavelengths of light. A split point may absorb light at awavelength associated with the split byte, neutralizing the energy ofthe split byte and causing the packets to separate. In some embodiments,a portion of the fiber optic cable may be modified to absorb light at apredetermined wavelength.

Additional packet splitting may occur after the data has reached thegateway and been routed to the central sever over a wide area network(WAN).

The system may include a central server. The server may be incommunication with more than one client machine, each running the clientapplication. The server may communicate with the client applicationregarding the time-based logic used to generate and compress thepassword. The client application and the server may communicate usingany suitable method. The client application and the server maycommunicate on a predetermined schedule.

The server may receive the dynamic password. The server may reorder thedata packets using header information or any other suitable information.The server may apply time-based logic as a key to reconstruct thepassword for authentication. The key may function as a map to identifymemory locations for each layer of password data.

The server may authenticate the reconstructed password. If the passwordis determined to be valid, the system may grant access to the user. Ifthe password is not valid, the system may deny access to the user.Access information may be displayed to the user on the user interface ofa client machine.

One or more non-transitory computer-readable media storingcomputer-executable instructions are provided. When executed by aprocessor on a computer system, the instructions perform a method foraltering a password using dynamic logic between entry andauthentication.

The method may include recording an amount of pressure associated withentry of a user password and biometrically confirming an identity of auser based, at least in part, on the recorded amount of pressure.

The method may include dynamically selecting a virtual contact surface.The method may include generating a first digital file for a firstvirtual friction sound associated with entering a first set of passwordcharacters on the selected contact surface with the recorded amount ofpressure. The media may include generating a second digital file for asecond virtual friction sound associated with entering a second set ofpassword characters on the selected contact surface with the recordedamount of pressure.

The method may include generating a compressed digital file by layeringthe first digital file over the second digital file according to atime-based logic. The method may include layering any suitable number ofdigital files each associated with one or more password characters.

The method may include transmitting the compressed digital file to acentral server for password authentication. The method may includedecompressing the digital files at the central server using thetime-based logic and authenticating the password.

Systems, methods, and apparatus in accordance with this disclosure willnow be described in connection with the figures, which form a parthereof. The figures show illustrative features of apparatus and methodsteps in accordance with the principles of this disclosure. It is to beunderstood that other embodiments may be utilized, and that structural,functional and procedural modifications may be made without departingfrom the scope and spirit of the present disclosure.

The steps of methods may be performed in an order other than the ordershown and/or described herein. Method embodiments may omit steps shownand/or described in connection with illustrative methods. Methodembodiments may include steps that are neither shown nor described inconnection with illustrative methods. Illustrative method steps may becombined. For example, an illustrative method may include steps shown inconnection with any other illustrative method.

Apparatus may omit features shown and/or described in connection withillustrative apparatus. Apparatus embodiments may include features thatare neither shown nor described in connection with illustrativeapparatus. Features of illustrative apparatus may be combined. Forexample, an illustrative apparatus embodiment may include features shownor described in connection with another illustrative apparatus/methodembodiment.

FIG. 1 is a block diagram that illustrates a computing device 101(alternatively referred to herein as a “server or computer”) that may beused in accordance with the principles of the invention. The computerserver 101 may have a processor 103 for controlling overall operation ofthe server and its associated components, including RAM 105, ROM 107,input/output (′I/O″) module 109, and memory 115.

I/O module 109 may include a microphone, keypad, touchscreen and/orstylus through which a user of device 101 may provide input, and mayalso include one or more of a speaker for providing audio output and avideo display device for providing textual, audiovisual and/or graphicaloutput. Software may be stored within memory 115 and/or other storage(not shown) to provide instructions to processor 103 for enabling server101 to perform various functions. For example, memory 115 may storesoftware used by server 101, such as an operating system 117,application programs 119, and an associated database

Alternatively, some or all of computer executable instructions of server101 may be embodied in hardware or firmware (not shown).

Server 101 may operate in a networked environment supporting connectionsto one or more remote computers, such as terminals 141 and 151.Terminals 141 and 151 may be personal computers or servers that includemany or all of the elements described above relative to server 101. Thenetwork connections depicted in FIG. 1 include a local area network(LAN) 125 and a wide area network (WAN) 129, but may also include othernetworks.

When used in a LAN networking environment, computer 101 is connected toLAN 125 through a network interface or adapter 113.

When used in a WAN networking environment, server 101 may include amodem 127 or other means for establishing communications over WAN 129,such as Internet 131.

It will be appreciated that the network connections shown areillustrative and other means of establishing a communications linkbetween the computers may be used. The existence of any of variouswell-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like ispresumed, and the system may be operated in a client-serverconfiguration to permit a user to retrieve web pages from a web-basedserver. Any of various conventional web browsers may be used to displayand manipulate data on web pages.

Additionally, application program 119, which may be used by server 101,may include computer executable instructions for invoking userfunctionality related to communication, such as email, short messageservice (SMS), authentication services and voice input and speechrecognition applications.

Computing device 101 and/or terminals 141 or 151 may also be mobileterminals including various other components, such as a battery,speaker, and antennas (not shown). Terminal 151 and/or terminal 141 maybe portable devices such as a laptop, tablet, smartphone or any othersuitable device for receiving, storing, transmitting and/or displayingrelevant information.

Any information described above in connection with database 111, and anyother suitable information, may be stored in memory 115. One or more ofapplications 119 may include one or more algorithms that encryptinformation, process received executable instructions, interact withenterprise systems, perform power management routines or other suitabletasks. Algorithms may be used to perform the functions of one or more ofthe audio file generation, password compression, password decompression,split byte generation, packet joining and packet fragmentation, and/orperform any other suitable tasks.

The invention may be operational with numerous other general purpose orspecial purpose computing system environments or configurations.Examples of well-known computing systems, environments, and/orconfigurations that may be suitable for use with the invention include,but are not limited to, personal computers, server computers, hand-heldor laptop devices, tablets, mobile phones and/or other personal digitalassistants (“PDAs”), multiprocessor systems, microprocessor-basedsystems, set top boxes, programmable consumer electronics, network PCs,minicomputers, mainframe computers, distributed computing environmentsthat include any of the above systems or devices, and the like.

The invention may be described in the general context ofcomputer-executable instructions, such as program modules, beingexecuted by a computer. Generally, program modules include routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotecomputer storage media including memory storage devices.

FIG. 2 shows an illustrative apparatus 200 that may be configured inaccordance with the principles of the invention.

Apparatus 200 may be a computing machine. Apparatus 200 may include oneor more features of the apparatus that is shown in FIG. 1.

Apparatus 200 may include chip module 202, which may include one or moreintegrated circuits, and which may include logic configured to performany other suitable logical operations.

Apparatus 200 may include one or more of the following components: I/Ocircuitry 204, which may include a transmitter device and a receiverdevice and may interface with fiber optic cable, coaxial cable,telephone lines, wireless devices, PHY layer hardware, a keypad/displaycontrol device or any other suitable encoded media or devices;peripheral devices 206, which may include counter timers, real-timetimers, power-on reset generators or any other suitable peripheraldevices; logical processing device 208, which may compute imminence,permanence, edge weights, mapping, and perform other methods describedherein; and machine-readable memory 210.

Machine-readable memory 210 may be configured to store inmachine-readable data structures: user information, biometricinformation, password information, dynamic password parameters, audiofile information, time-based logic parameters and any other suitableinformation or data structures.

Components 202, 204, 206, 208 and 210 may be coupled together by asystem bus or other interconnections 212 and may be present on one ormore circuit boards such as 220. In some embodiments, the components maybe integrated into a single chip. The chip may be silicon-based.

FIG. 3 shows illustrative architecture 300. Architecture 300 may includeone or more elements shown in FIGS. 1 and 2. Architecture 300 may be aclient server architecture. Client devices 302 may include a laptop,computer terminal, mobile device or any other suitable client device. Auser may enter a password at a client device. A client applicationrunning on the client device may alter the password using dynamic logicto generate a dynamic password.

The dynamic password file may be transmitted to router 304. Router 304may be part of a network of routers in a LAN. In some embodiments,router 304 may generate a modified signal that triggers packetfragmentation by disrupting split bytes joining the packets. Router 304may function as a gateway between the LAN and a WAN.

Router 304 may access internet 306 and route the password to server 308.Server 308 may be a central server. In some embodiments, server 308 maybe cloud-based. Server 308 may be configured to authenticate thepassword. Router 304 may also route time-based logic information fromthe client application to the central server.

FIG. 4 shows illustrative process flow 400 for generating andauthenticating a dynamic password. Steps 402-408 may be associated witha client application. At step 402, the client application receives entryof a user password at a user interface of the client device. At step 404the client application generates a dynamic password from the receiveduser password. At step 406, the client application stores a dynamicallyaltered password as one or more digital audio files.

At step 408 the client application compresses digital audio filesassociated with the dynamic password according to a time-based logic. Atstep 410, the client application shares the time-based logic with aserver. In some embodiments, the client application may push thetime-based logic to the server. In some embodiments, the clientapplication may share the time-based logic in response to a request fromthe server.

Steps 412-414 may be associated with transmission of the dynamicpassword. At step 412, the dynamic password data packets are split bystimulating the split bytes. The packets may split in response to amodified signal from a router. The packets may split in response a lightemission at a predetermined wavelength. At step 414, the data packetsare routed to the server.

Steps 416-422 may be associated with a central server. At step 416, theserver reconstructs the original password using the time-based dynamicpassword logic. At the step 418, the server authenticates the password.At step 420, the server may determine whether the password is valid. Atstep 422, if the password is not valid, user access is denied. At step424, if the password is valid, user access is granted.

FIG. 5 shows process flow 500 for generating a dynamic password. One ormore elements of process flow 500 may overlap with elements of processflow 400, shown in FIG. 4.

At step 502 a client application receives a user password at aninteractive user interface. In some embodiments, the user may write thepassword at on a touch-sensitive screen. At step 504, based on the timeof password entry, the client application identifies time-based logicthat will be applied to generate the dynamic password.

At step 506 the client application selects a writing surface materialaccording to the time-based logic. At step 508 the client applicationgenerates an audio file by simulating the sound of writing the passwordon the selected surface material. At step 510, the client applicationcompresses the audio files by embedding sets of audio files within thesame storage space. The files may be arranged according to thetime-based logic, which maps the locations of the files.

Thus, methods and apparatus for DYNAMIC PASSWORD GENERATION areprovided. Persons skilled in the art will appreciate that the presentinvention can be practiced by other than the described embodiments,which are presented for purposes of illustration rather than oflimitation, and that the present invention is limited only by the claimsthat follow.

What is claimed is:
 1. A system for dynamic alteration of a passwordfollowing input, the system comprising: a first processor configured to:record an amount of pressure applied by user during input of a userpassword; biometrically confirm an identity of a user based, at least inpart, on the recorded amount of pressure; dynamically select a virtualcontact surface material; generate a first dynamic password filecomprising a first simulated friction sound corresponding to input of afirst set of user password characters on the selected contact surfacematerial with the recorded amount of pressure; generate a second dynamicpassword file comprising a second simulated friction sound correspondingto input of a second set of user password characters on the selectedcontact surface material with the recorded amount of pressure; andgenerate a compressed dynamic password file, the compressing comprisinglayering the first dynamic password file over the second dynamicpassword file according to a time-based logic; a router configured toroute the compressed dynamic password file to a second processor; and asecond processor configured to: apply the time-based logic to decompressthe compressed dynamic password file; apply the time-based logic toidentify the user entered password; and authenticate the password. 2.The system of claim 1 wherein input of the user password compriseswriting the password on a touch-sensitive screen.
 3. The system of claim1 wherein: the first processor is further configured to generate apredetermined number of compressed dynamic password files eachassociated with an incorrect password and transmit the predeterminednumber of compressed dynamic password files associated with theincorrect passwords along with a compressed digital file associated witha user-entered password; and the second processor is configured toaccept the predetermined number of incorrect passwords along with acorrect password.
 4. The system of claim 1 wherein: the compresseddynamic password file comprises a plurality of data packets, each datapacket comprising a destination address for the second processor; andthe first processor is configured to generate a split byte and to jointwo data packets using the split byte.
 5. The system of claim 4 wherein:the data packets joined by the split byte are not in sequence; and thesecond processor is configured to re-assemble the data packets joined bythe split byte in a correct sequence.
 6. The system of claim 4 wherein:the router is configured to transmit a signal boost at a predeterminedfrequency; and in response to the signal boost, the split byte isconfigured to disconnect from the data packets, the disconnectingcausing the joined data packets to separate.
 7. The system of claim 4wherein the split byte is configured to disconnect from the data packetsin response to a predetermined frequency of light, the disconnectingcausing the joined data packets to separate.
 8. One or morenon-transitory computer-readable media storing computer-executableinstructions which, when executed by a processor on a computer system,perform a method for altering a password using dynamic logic betweenentry and authentication, the method comprising: recording an amount ofpressure associated with entry of a user password; biometricallyconfirming an identity of a user based, at least in part, on therecorded amount of pressure; dynamically selecting a virtual contactsurface; generating a first digital file comprising a first simulatedfriction sound associated with entering a first set of one or morepassword characters on the selected contact surface with the recordedamount of pressure; generating a second digital file comprising a secondsimulated friction sound associated with entering a second set of one ormore password characters on the selected contact surface with therecorded amount of pressure; generating a compressed digital file, thecompression comprising layering the first digital file over the seconddigital file according to a time-based logic; transmitting thecompressed digital file to a central server for password authentication;decompressing the digital files at the central server using thetime-based logic; and authenticating the password.
 9. The media of claim8 further comprising: generating a predetermined number of compresseddigital files each associated with an incorrect password; andtransmitting the predetermined number of compressed digital filesassociated with the incorrect passwords along with the compresseddigital file for the password entered by the user; whereinauthenticating the password comprises accepting the predetermined numberof incorrect passwords along with the password entered by the user. 10.The media of claim 8 wherein the compressed digital file comprises aplurality of data packets, each data packet comprising the destinationaddress for the central server, the method further comprising generatinga split byte and use the split byte to join two data packets.
 11. Themedia of claim 10 wherein: the data packets joined by the split byte arenot in sequence; and the method further comprises reassembling the datapackets joined by the split byte in the correct sequence prior toauthentication.
 12. The media of claim 10 wherein the split byte isconfigured to disconnect from the data packets in response to a signalboost at a predetermined frequency, the disconnecting causing the joineddata packets to separate.
 13. The media of claim 10 wherein the splitbyte is configured to disconnect from the data packets in response to apredetermined frequency of light, the disconnecting causing the joineddata packets to separate.
 14. A method for dynamic alteration ofpassword characters between entry and authentication, the methodcomprising: at a first processor: recording an amount of pressureassociated with entry of a user password; biometrically confirming anidentity of a user based, at least in part, on the recorded amount ofpressure; dynamically selecting a virtual contact surface; generating afirst digital file comprising a first simulated friction soundassociated with entering a first set of one or more password characterson the selected contact surface with the recorded amount of pressure;generating a second digital file comprising a second simulated frictionsound associated with entering a second set of one or more passwordcharacters on the selected contact surface with the recorded amount ofpressure; generating a compressed digital file, the compressingcomprising layering the first digital file over the second digital fileaccording to a time-based logic; and transmitting the compressed digitalfile to a second processor for password authentication; and at a secondprocessor: receiving the compressed digital file; decompressing thedigital files using the time-based logic; and authenticating thepassword.
 15. The method of claim 14 wherein the first set of passwordcharacters and the second set of password characters were entered by theuser in a first order, the method further comprising layering thedigital file associated with the first set of password characters andthe digital file associated with the second set of password charactersin a second order, the second order being different from the firstorder.
 16. The method of claim 14 further comprising: generating apredetermined number of compressed digital files each associated with anincorrect password; and transmitting the predetermined number ofcompressed digital files for authentication along with a compresseddigital file for the user password; wherein authenticating the passwordcomprises accepting the predetermined number of incorrect passwords inaddition to the correct password.
 17. The method of claim 14 wherein:the digital file comprises a plurality of data packets, each data packetcomprising the destination address; and the first processor isconfigured to generate a split byte and use the split byte to join twodata packets.
 18. The method of claim 17 wherein: the data packetsjoined by the split byte are not in sequence; and the second processoris configured to re-assemble the data packets in the correct sequence.19. The method of claim 17 wherein the split byte is configured todisconnect from the data packets in response to a signal boost at apredetermined frequency, the disconnecting causing the joined datapackets to separate.
 20. The method of claim 17 wherein the split byteis configured to disconnect from the data packets in response to apredetermined frequency of light, the disconnecting causing the joineddata packets to separate.