Pre-authentification computer system login method based on high collision probability hash function

A computer system, collision probability technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problem of password verification algorithm consuming system computing resources, and achieve the effect of reducing wrong input

Active Publication Date: 2012-10-24
MAOMING POWER SUPPLY BUREAU GUANGDONG POWER GRID CORP
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For large-scale computer application systems with a large number of users and frequent login events, it is often necessary to perform password verification to deal with wrongly entered passwords or passwords entered by brute force attacks. In order to ensure security in the system, the password verification algorithm often consumes system computing resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pre-authentification computer system login method based on high collision probability hash function
  • Pre-authentification computer system login method based on high collision probability hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Such as figure 1 As shown in the overall flow chart of the present invention, a computer system login method based on high collision probability hash function pre-authentication includes the following steps:

[0055] S1 user login input password X;

[0056] The S2 password obtains a value M1 through the set high collision probability hash function H(X);

[0057] S3 compares M1 with the locally stored pre-checked information M, and if they are the same, send the user name and password to the server for verification;

[0058] S4 If M1 is different from the locally stored pre-verification information M, a dialog box will pop up to remind the user that the password is wrong;

[0059] S5 The user clicks the dialog box option to determine whether to enter the password again or send it directly to the server for verification;

[0060] S6 If the user chooses to input the password again, repeat the steps of S1-S4 above;

[0061] S7 If the user chooses not to enter the passwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pre-authentification computer system login method based on high collision probability hash function. According to the method, password pre-authentification is performed when user login is realized in local by encrypting a user login password by mainly utilizing a one-way hash function and storing the user login password at a client, so that the authentification operation burden caused by responding misinput and brute force attack on a system is lightened; and simultaneously, in order to improve the safety, the collision probability of the one-way hash functions adopted by the client in local is very high, so that the cracked result is unrelated to the password even when the local crack attack occurs. By the method, the system authentification burden is lightened by pre-authentification, and the password cannot be cracked by the password authentification information stored in local, so that the method is practical, safe and reliable.

Description

technical field [0001] The invention relates to a log-in method of a large-scale computer application system, in particular to a computer system log-in method pre-verified based on a high-collision probability hash function. Background technique [0002] For large-scale computer application systems with a large number of users and frequent login events, it is often necessary to perform password verification to deal with passwords entered by users incorrectly or by brute force attacks. In order to ensure security in the system, the password verification algorithm often consumes system computing resources. . Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a login pre-authentication method based on a high collision probability hash function, which can greatly save system computing resources. [0004] To solve the problems of the technologies described above, the technical scheme adopted in the present invention is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李志勇刘延乐荆德国朱广名陈宏辉胡铁斌王传起李吉勇王朋义刘兵邹剑吴锡武李文朝叶云琴吴媚
Owner MAOMING POWER SUPPLY BUREAU GUANGDONG POWER GRID CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products