Skip to main content

Nuke Login™

Nuke Login™ is a software product that would provide secure access to computer accounts without the user needing to worry about passwords or related concerns. Like other password manager products, Nuke Login™ would provide the ability to automatically login to many different accounts, but it wouldn't require a password to login to itself. Instead of replacing many passwords with one, it would replace many passwords with a different process.

Also, Nuke Login™ would not only manage the process of logging in. It would manage the whole login-related processes for the accounts, including registering, logging in, changing the security information, logging out, and closing accounts.

When a user was registering for a new account, if they only needed login credentials to register, Nuke Login would automatically generate those credentials and register them. If other things were needed, Nuke Login™ would take care of the login credentials and mask them in the registration process so the user wouldn't need to worry about them. Nuke Login™ would also generate and send information like password reminder questions and answers.

Once a user was registered for an account, Nuke Login™ would automatically log them into it whenever needed. Also, Nuke Login™ could logout a user from an account on purpose if they wanted, and log them back in later. If a user wanted to close an account, Nuke Login™ could close it and remove it from the system. If a password needed reset for some reason, Nuke Login™ could manage the process of resetting that password.

It wouldn't display passwords to the user or let the user copy them to the clipboard. It also wouldn't let the user set their own passwords. It would always automatically enter secure generated passwords that complied with the policies of each account. When a user wants to add an existing account, it would reset the password to a secure generated password.

The app could support managing logins through many of the web browsers, mobile apps, and desktop apps on a device.

It would not bother itself with other things like "secure notes," credit card information, or auto-filling forms: it would focus on actual passwords.

How it could work:
It could work similarly to other existing password managers. Like an aggregator or screen scraper, it could know where the login-related forms and fields were for a wide up-to-date library of providers.

Login process:
The user would install the mobile app on a trusted mobile device. Then he would install the app on a secondary device. The mobile app would use the device camera to scan a special graphic (like a QR Code) on the secondary device. This would login the user to the secondary device.

Things to think about:
  • How could the user recover lost access to Nuke Login™? There would need to be a recovery solution in case something happened to the trusted device.

Verified Author: Serafino Software™
Maturity Idea 
Type: Software Product
Date Claimed: 17 August 2017


Popular posts from this blog

Shared Project Manifesto Version 2

Contents:IntroductionLaunchTradeRewardDevelopVoteHarvest 1. Introduction IP (Intellectual Property) is a great asset but it is hard to produce well. We hypothesize that a market to facilitate shared projects would make it easy to produce IP better.

The market contains projects. Each project has one admin and a number of traders and developers. One user can have any combination of roles at the same time. For example, a user may be an admin and also a trader, or a trader and also a developer. ProjectsUsersAdmin: Provides ideas in exchange for controlTraders: Provide incentives in exchange for growthDevelopers: Provide IP in exchange for incentives 2. Launch When somebody came up with an idea for an IP product, they could create a project for it on the market. That person would be the admin.
The market would record the time the admin launched the project. That lasting record could provide for the admin to claim credit for the project idea, on a first-come, first-served basis. This recogn…

Contact Codes Lite™

CCL (Contact Codes Lite™) would be a software product to help people exchange many kinds of contact information much more easily. CCL would do this by providing users with relatively simple contact codes. The users could distribute the codes to many people in many ways. Then, a person who received a contact code could use it to retrieve the original person's contact information through CCL.

For example, many people still exchange business cards. Retrieving various information from the cards can be time consuming and error prone, especially when there are many cards. Also, when somebody updates their information, the information from the card is no longer valid.

Other good examples for usage of contact codes include:
On a slide in a presentationIn email signaturesOn name tagsIn applications that provide limited space for profile informationWhenever you want to provide easy access to many different contact options without listing each
The main thing that would make CCL different from…

Fog Machine

Fog Machine™ (named because fog is like a cloud, on the ground) is a software product to provide cloud services to customers without a cloud service provider. The problem with the traditional cloud is that it requires a provider. Fog Machine™ would run cloud "nodes" in idle system resources on ordinary user's devices. This would be a peer to peer system in which each connected device would be a peer.

It would support standard cloud APIs (perhaps Cloud Foundry?) and it would be easy to port cloud apps to it off providers such as Google cloud, Azure, or AWS--or maybe it would be effortless for apps that were already portable through compliance with open standards.

We might use encryption for privacy, redundancy for reliability, and remuneration/incentive for resource consistency. The showstopper (critical assumption) is that the synergy would be sufficient to significantly surpass the overhead, and provide competitive performance for at least some types of cloud applicat…

Please Comment

Have you ever heard of a similar idea? What challenges might an idea run into? How might you like to be involved? Comment to add your voice to each idea.