Method and apparatus for authenticating a user's security credentials
A safe and user-friendly technology, applied in user identity/authority verification, secure communication devices, digital data authentication, etc., can solve problems such as low password security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Discusses techniques to speed up the user verification process. Users can provide long security credentials (eg, strings, passwords, passphrases) to the web server. The strength of the first 'x' characters in a security credential can be evaluated. For example, the first 6 to 8 characters of the overlong security credential may have enough entropy to serve as an acceptable credential. Since credentials with only 6 to 8 characters are actually strong enough, subsequent characters in very long security credentials can be omitted to improve the user experience (ie, the user will not have to enter extra characters). A system utilizing accelerated credential verification may evaluate the strength of an input credential with the first 'x' characters until a sufficient strength (ie, entropy value) is obtained. The system can store the first hash of the first 'x' characters and the hash of the full overlong security credential, and password verification can be done using only...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


