×

Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system

  • US 5,497,421 A
  • Filed: 09/28/1994
  • Issued: 03/05/1996
  • Est. Priority Date: 04/28/1992
  • Status: Expired due to Term
First Claim
Patent Images

1. In a public key, distributed data processing network system including a plurality of nodes interconnected by a communications medium, an arrangement for authenticating a user to said network using a password and username entered during a login procedure, and comparing the information indicative of the password with information contained in a doubly-encrypted credential which is stored in a network database, said arrangement comprising:

  • A. a user node which receives a password and a usemarne during login and computes first and a second hash totals from the password using a first and a second hash algorithm, respectively, and generates a nonce key, and encrypts said second hash total and said nonce key using a first public key to create an encrypted message;

    B. a login agent node, comprisingB1. means for receiving and decrypting said encrypted message using a first private key to obtain said second hash total and said nonce key;

    B2. means for receiving said d-ably-encrypted credential which contains (i) an encrypted credential formed by encrypting a user private key with a first stored hash total computed from the password, and (ii) a second stored hash total computed from the password, wherein said encrypted credential and said second stored hash total are appended and encrypted by said first public key to form the doubly encrypted credential;

    B3. metres for decrypting said doubly-encrypted credential using said first private key to obtain said encrypted credential and said second stored hash total, for comparing said second stored hash total with said second hash total to determine if said password entered by the user is correct, for encrypting said encrypted credential with said nonce key when said second stored hash total and said second hash total match to create a return message, and for forwarding said return message to said user node; and

    wherein said user node comprises means responsive to said return message, for decrypting said return message using said nonce key to obtain said encrypted credential, and for decrypting said encrypted credential with said first hash total to obtain said private key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×