Method and apparatus for strengthening passwords for protection of computer systems
First Claim
1. A computer implemented method for accessing a resource, comprising the steps of:
- combining a first password with a supplement to generate a full password, wherein the bit length of the supplement is a fixed number of bits and the full password has a larger bit length than the first password;
applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system;
combining a second password with possible supplements to generate trial full passwords, each possible supplement having the fixed number of bits and the trial full passwords each having a larger bit length than the second password;
applying the one-way hash function to the trial full passwords to generate trial access codes; and
allowing access to the resource if one of the trial access codes is identical to the stored access code.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented method provides access to processes and data using strengthened password. During an initialization phase, an access code is stored in a memory of a computer system. The access code is an application of a one-way hash function to a concatenation of a password and a password supplement. The size of the password supplement is a fixed number of bits. During operation of the system, a user enters a password, and the one-way hash function is applied to concatenations of the password and possible values having the size of the password supplement to yield trial access codes. Access is granted when one of the trial access codes is identical to the stored access code.
-
Citations
33 Claims
-
1. A computer implemented method for accessing a resource, comprising the steps of:
-
combining a first password with a supplement to generate a full password, wherein the bit length of the supplement is a fixed number of bits and the full password has a larger bit length than the first password; applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system; combining a second password with possible supplements to generate trial full passwords, each possible supplement having the fixed number of bits and the trial full passwords each having a larger bit length than the second password; applying the one-way hash function to the trial full passwords to generate trial access codes; and allowing access to the resource if one of the trial access codes is identical to the stored access code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method for accessing a resource, comprising the steps of:
-
combining a first password with a supplement to generate a full password, wherein the supplement has a fixed number of bits; applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system; combining a second password with possible supplements to generate trial full passwords, each possible supplement being the fixed number of bits; applying the one-way hash function to the trial full passwords to generate trial access codes; and allowing access to the resource if one of the trial access codes is identical to the stored access code; wherein the first combining step includes concatenating the first password and supplement to generate the full password; and the second combining step includes concatenating the second password and the possible supplements to generate the trial full passwords. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method for accessing a resource, comprising the steps of:
-
combining a first password with a supplement to generate a full password, wherein the bit length of the supplement is a fixed number of bits and the full password has a larger bit length than the first password; encrypting data using the full password; applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system; combining a second password with possible supplements to generate trial full passwords, each possible supplement having the fixed number of bits and the trial full passwords each having a larger bit length than the second password; applying the one-way hash function to the trial full passwords to generate trial access codes; and decrypting the data using a particular trial password, the particular trial password yielding a particular trial access code that is identical to the stored access code.
-
-
18. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising:
-
a first module for establishing a password, including instructions for; combining a first password with a supplement to generate a full password, wherein the bit length of the supplement is a fixed number of bits and the full password has a larger bit length than the first password; and applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system; and a resource access module, including instructions for; combining a second password with possible supplements to generate trial full passwords, each possible supplement having the fixed number of bits and the trial full passwords each having a larder bit length than the second password; applying the one-way hash function to the trial full passwords to generate trial access codes; and allowing access to the resource if one of the trial access codes is identical to the stored access code. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising:
-
a first module for establishing a password, including instructions for; combining a first password with a supplement to generate a full password, wherein the size the supplement is a fixed number of bits; and applying a one-way hash function to the full password to generate an access code stored in a memory of a computer system; and a resource access module, including instructions for; combining a second password with possible supplements to generate trial full passwords, each possible supplement being the fixed number of bits; applying the one-way hash function to the trial full passwords to generate trial access codes; and allowing access to the resource if one of the trial access codes is identical to the stored access code; wherein the first module includes instructions for concatenating the first password and supplement to generate the full password; and the resource access module includes instructions for concatenating the second password and the possible supplements to generate the trial full passwords. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
Specification