Password protection method, password verification method and system

A password protection and password verification technology, applied in the field of information security, can solve problems such as brute force cracking and dictionary attacks that cannot be prevented, and achieve the effect of strong security

Active Publication Date: 2019-07-05
北京纬百科技有限公司
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Salted hash technology can perfectly resist table lookup attacks, reverse table lookup attacks, rainbow table attacks, but cannot prevent brute force cracking and dictionary attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protection method, password verification method and system
  • Password protection method, password verification method and system
  • Password protection method, password verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Various embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0022] figure 1 It is an exemplary flowchart of a password protection method according to an embodiment of the present invention. The password protection method in the embodiment of the present invention is applied to the server.

[0023] Such as figure 1 As shown, the password protection method of the embodiment of the present invention includes:

[0024] S11. When receiving the user ID and the user password from the client, perform slow hash calculation based on the user password to obtain the first calculated value;

[0025] In the embodiment of the present invention, when the user needs to submit the user password to the server for verification, for example, the user needs to perform user registration on the application program or application website, or the user needs to set a separate verification for a specific network application servi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a password protection method and system, which are applied to a server, and the method comprises the following steps: carrying out slow Hash calculation basedon a user password to obtain a first calculation value when receiving the user identifier and the user password from a client; using a security chip of the cipher machine to encrypt the first calculation value to generate a second calculation value; and storing the password authentication code at least comprising the second calculation value as corresponding to the user identifier. The embodimentof the invention further discloses a password verification method and system and a cipher machine. Through the scheme provided by the embodiment of the invention, violent cracking of the protected user password can be prevented, and the security of the user password is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a password protection method and system. Background technique [0002] Currently, a common way to store user passwords on the server side is to hash the passwords and store the hash results. However, with the gradual improvement of computing power, computers can now perform millions of hash operations per second. If GPU operations are used, they can even perform hundreds of millions of hash operations per second, and the number of calculations is faster. With FPGAs and dedicated ASICs, simply hashing passwords is no longer safe. Efficient hash calculation capabilities make it possible to perform brute force cracking and dictionary attacks on the hash results of user passwords. [0003] Currently, a common approach to this problem is to salt the password before computing its hash. Salted hash technology can perfectly resist table lookup attacks, reverse table looku...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3226H04L9/3236
Inventor 孙吉平陈文静
Owner 北京纬百科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products