Hashing method and system
First Claim
1. A method, comprising:
- receiving by a computing system, a user password, said user password for enabling access to a computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within a memory device of said computing system;
generating by said computing system, a second hash (H2) for a system parameter;
storing said second hash (H2) within said memory device;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value; and
storing within said memory device, said third hash (H3).
5 Assignments
0 Petitions
Accused Products
Abstract
A hashing method and system. The method comprises receiving by a computing system, a user password. The computing system generates a first hash for the user password. The computing system generates a second hash for a system parameter and performs an operation relating the first hash to the second hash to generate a first combination value. The computing system generates a third hash for the first combination value. The computing system receives a specific password for requesting access to the computing system. The computing system generates a fourth hash for said specific password and performs an operation relating the fourth hash to the second hash to generate a second combination value. The computing system generates a fifth hash for the second combination value. The third hash is compared to the fifth hash to determine that the third hash matches the fifth hash. Access is enabled to the computing system.
-
Citations
56 Claims
-
1. A method, comprising:
-
receiving by a computing system, a user password, said user password for enabling access to a computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within a memory device of said computing system;
generating by said computing system, a second hash (H2) for a system parameter;
storing said second hash (H2) within said memory device;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value; and
storing within said memory device, said third hash (H3). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computing system comprising a processor and a computer readable memory unit coupled to the processor, said memory unit containing instructions that when executed by the processor implement a hashing method, said method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within said memory unit;
generating by said computing system, a second hash (H2) for a system parameter;
storing said second hash (H2) within said memory unit;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value; and
storing within said memory unit, said third hash (H3). - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement a hashing method within a computing system, said method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within said computer usable medium;
generating by said computing system, a second hash (H2) for a system parameter;
storing said second hash (H2) within said computer usable medium;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value; and
storing within said computer usable medium, said third hash (H3). - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A process for integrating computing infrastructure, comprising integrating computer-readable code into a computing system, wherein the computing system comprises a computer usable medium, and wherein the code in combination with the computing system is capable of performing a hashing method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within said computer usable medium;
generating by said computing system, a second hash (H2) for a system parameter;
storing said second hash (H2) within said computer usable medium;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value; and
storing within said computer usable medium, said third hash (H3). - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
Specification