×

Protection from data security threats

  • US 9,660,972 B1
  • Filed: 06/25/2012
  • Issued: 05/23/2017
  • Est. Priority Date: 06/25/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for authentication, comprising:

  • under the control of one or more computer systems configured with executable instructions,obtaining an electronic claim of access to a password, the claim comprising;

    a first component comprising first information based at least in part on an electronic signature, the electronic signature based at least in part on a first key and a time-dependent value, the first key derived based at least in part on the password; and

    a second component comprising second information based at least in part on a second key, the second key being at least;

    different from the first key;

    derived based at least in part on a derivation function utilizing the password and a second salt value as inputs, where the second salt value is stored by a computing resource service provider; and

    the second key being unavailable to the one or more computer systems until at least obtaining the electronic claim of access to the password;

    computing, based at least in part on the first key, a first reference component;

    computing, based at least in part on the second key from the electronic claim, a second reference component; and

    enabling access to at least one computing resource as a result of both the first reference component matching the first component and the second component matching the second reference component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×