securely generate and store passwords in computer systems
A computer system, computer technology, applied in the field of cryptographic security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] It is an object of the present invention to provide methods and systems for enhanced protection of cryptographic and other secret symmetric keys, private keys or authentication data. Passwords can be stored in software such as figure 1 shown. In this case, the password may be encrypted as a string stored as part of a file, software application, or other software program. Passwords can also be stored in configuration files, such as figure 2 shown.
[0030] Passwords stored in this manner are vulnerable to serious threats. An attacker can access, copy and analyze software executables or configuration files stored on local media. This can happen due to internal attacks, access to backup copies of software or configuration files stored elsewhere, or gaps in access controls protecting software or configuration files.
[0031] An attacker can access, copy, and analyze software executables or configuration files stored on remote media (for example, in distributed computi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


