Hashing method and system
First Claim
1. A method, comprising:
- receiving by a computing system, a user password, said user password for enabling access to a computing system;
generating by said computing system, a first hash (H1) for said user password;
storing said first hash (H1) within a memory device of said computing system;
generating by said computing system, a second hash (H2) for only a system parameter,wherein said system parameter consists of a parameter for a hardware component of said computing system;
storing said second hash (H2) within said memory device;
generating by said computing system, an additional hash for only an additional system parameter, wherein said additional system parameter consists of a parameter for a software component of said computing system;
performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) and said additional hash to generate a first combination value;
generating by said computing system, a third hash (H3) for said first combination value;
storing within said memory device, said third hash (H3);
receiving by said computing system, a specific password for requesting access to said computing system;
generating by said computing system, a fourth hash (H4) for said specific password;
performing by said computing system, an operation relating said fourth hash (H4) to said second hash (H2) and said additional hash to generate a second combination value;
generating by a computer processor of said computing system, a fifth hash (H5) for said second combination value;
comparing by said computing system, said third hash (H3) to said fifth hash (H5);
Determining as a result of said comparing, that said third hash (H3) matches said fifth hash (H5); and
Enabling access to said computing system.
5 Assignments
0 Petitions
Accused Products
Abstract
A hashing method and system. The method comprises receiving by a computing system, a user password. The computing system generates a first hash for the user password. The computing system generates a second hash for a system parameter and performs an operation relating the first hash to the second hash to generate a first combination value. The computing system generates a third hash for the first combination value. The computing system receives a specific password for requesting access to the computing system. The computing system generates a fourth hash for said specific password and performs an operation relating the fourth hash to the second hash to generate a second combination value. The computing system generates a fifth hash for the second combination value. The third hash is compared to the fifth hash to determine that the third hash matches the fifth hash. Access is enabled to the computing system.
-
Citations
49 Claims
-
1. A method, comprising:
-
receiving by a computing system, a user password, said user password for enabling access to a computing system; generating by said computing system, a first hash (H1) for said user password; storing said first hash (H1) within a memory device of said computing system; generating by said computing system, a second hash (H2) for only a system parameter, wherein said system parameter consists of a parameter for a hardware component of said computing system; storing said second hash (H2) within said memory device; generating by said computing system, an additional hash for only an additional system parameter, wherein said additional system parameter consists of a parameter for a software component of said computing system; performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) and said additional hash to generate a first combination value; generating by said computing system, a third hash (H3) for said first combination value; storing within said memory device, said third hash (H3); receiving by said computing system, a specific password for requesting access to said computing system; generating by said computing system, a fourth hash (H4) for said specific password; performing by said computing system, an operation relating said fourth hash (H4) to said second hash (H2) and said additional hash to generate a second combination value; generating by a computer processor of said computing system, a fifth hash (H5) for said second combination value; comparing by said computing system, said third hash (H3) to said fifth hash (H5); Determining as a result of said comparing, that said third hash (H3) matches said fifth hash (H5); and Enabling access to said computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 41, 42, 43)
-
-
11. A computing system comprising a computer processor and a computer readable memory unit coupled to the computer processor, said memory unit containing instructions that when executed by the computer processor implement a hashing method, said method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system; generating by said computing system, a first hash (H1) for said user password; storing said first hash (H1) within said memory unit; generating by said computing system, a second hash (H2) for a system parameter, wherein said system parameter consists of a parameter for a hardware component of said computing system; storing said second hash (H2) within said memory unit; generating by said computing system, an additional hash for only an additional system parameter, wherein said additional system parameter consists of a parameter for a software component of said computing system; performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) and said additional hash to generate a first combination value; generating by said computing system, a third hash (H3) for said first combination value; storing within said memory unit, said third hash (H3); receiving by said computing system, a specific password for requesting access to said computing system; generating by said computing system, a fourth hash (H4) for said specific password; performing by said computing system, an operation relating said fourth hash (H4) to said second hash (H2) and said additional hash to generate a second combination value; generating by said computer processor, a fifth hash (H5) for said second combination value; comparing by said computing system, said third hash (H3) to said fifth hash (H5); Determining as a result of said comparing, that said third hash (H3) matches said fifth hash (H5); and Enabling access to said computing system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 44, 45)
-
-
21. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code comprising an algorithm adapted to implement a hashing method within a computing system, said method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system; generating by said computing system, a first hash (H1) for said user password; storing said first hash (H1) within said computer usable medium; generating by said computing system, a second hash (H2) for a system parameter, wherein said system parameter consists of a parameter for a hardware component of said computing system; storing said second hash (H2) within said computer usable medium; generating by said computing system, an additional hash for only an additional system parameter, wherein said additional system parameter consists of a parameter for a software component of said computing system; performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) and said additional hash to generate a first combination value; generating by said computing system, a third hash (H3) for said first combination value; storing within said computer usable medium, said third hash (H3); receiving by said computing system, a specific password for requesting access to said computing system; generating by said computing system, a fourth hash (H4) for said specific password; performing by said computing system, an operation relating said fourth hash (H4) to said second hash (H2) and said additional hash to generate a second combination value; generating by a computer processor of said computing system, a fifth hash (H5) for said second combination value; comparing by said computing system, said third hash (H3) to said fifth hash (H5); Determining as a result of said comparing, that said third hash (H3) matches said fifth hash (H5); and Enabling access to said computing system. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 46, 47)
-
-
31. A process for integrating computing infrastructure, comprising integrating computer-readable code into a computing system, wherein the computing system comprises a computer usable medium, and wherein the code in combination with the computing system is capable of performing a hashing method comprising:
-
receiving by said computing system, a user password, said user password for enabling access to said computing system; generating by said computing system, a first hash (H1) for said user password; storing said first hash (H1) within said computer usable medium; generating by said computing system, a second hash (H2) for a system parameter, wherein said system parameter consists of a parameter for a hardware component of said computing system; storing said second hash (H2) within said computer usable medium; generating by said computing system, an additional hash for only an additional system parameter, wherein said additional system parameter consists of a parameter for a software component of said computing system; performing by said computing system, an operation relating said first hash (H1) to said second hash (H2) and said additional hash to generate a first combination value; generating by said computing system, a third hash (H3) for said first combination value; storing within said computer usable medium, said third hash (H3); receiving by said computing system, a specific password for requesting access to said computing system; generating by said computing system, a fourth hash (H4) for said specific password; performing by said computing system, an operation relating said fourth hash (H4) to said second hash (H2) and said additional hash to generate a second combination value; and generating by a computer processor of said computing system, a fifth hash (H5) for said second combination value; comparing by said computing system, said third hash (H3) to said fifth hash (H5); Determining as a result of said comparing, that said third hash (H3) matches said fifth hash (H5); and Enabling access to said computing system. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 48, 49)
-
Specification