Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for authenticating a user's security credentials

A safe and user-friendly technology, applied in user identity/authority verification, secure communication devices, digital data authentication, etc., can solve problems such as low password security

Inactive Publication Date: 2020-11-20
QUALCOMM INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there may be other problems with shorter passwords
For example, while strong passwords are hard to remember, simple passwords are less secure
Also, a particular client-side application may have both a PC version and a mobile version that talk to the same server that enforces the passphrase
If passphrases are enforced in the PC version, it is often difficult to relax the requirement to use shorter passphrases in the mobile version

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authenticating a user's security credentials
  • Method and apparatus for authenticating a user's security credentials
  • Method and apparatus for authenticating a user's security credentials

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Discusses techniques to speed up the user verification process. Users can provide long security credentials (eg, strings, passwords, passphrases) to the web server. The strength of the first 'x' characters in a security credential can be evaluated. For example, the first 6 to 8 characters of the overlong security credential may have enough entropy to serve as an acceptable credential. Since credentials with only 6 to 8 characters are actually strong enough, subsequent characters in very long security credentials can be omitted to improve the user experience (ie, the user will not have to enter extra characters). A system utilizing accelerated credential verification may evaluate the strength of an input credential with the first 'x' characters until a sufficient strength (ie, entropy value) is obtained. The system can store the first hash of the first 'x' characters and the hash of the full overlong security credential, and password verification can be done using only...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses systems and methods for providing accelerated passphrase verification. In one embodiment, a method comprises: receiving a full secure string; generating a full secure string hash code; storing the full secure string hash code in memory; or a plurality of leading characters to determine at least one substring; generating at least one substring hash code and at least one corresponding character count value such that the corresponding character count value is equal to the at least one subcharacter the number of characters in the string; and storing the at least one substring hash code and the at least one corresponding character count value in memory.

Description

Background technique [0001] Service providers and consumers desire to distribute digitally encoded high quality content such as data, voice and video to both stationary as well as mobile devices. Access to content is often restricted and users may be required to provide security credentials. Credentials such as passwords, passphrases, pattern verification, gestures, and other user input can be used for security-critical use cases. Credentials may consist of multiple characters such as strings of letters, words, numbers, symbols, gestures, or other user input. In general, credentials with more characters are more secure than shorter passwords. [0002] In an effort to increase security within computer networks, computer operating systems, passphrases of up to 256 characters are supported. However, it is often inconvenient for a user to enter a long passphrase, especially when using a mobile device with a small touch screen. Overly long passphrases can be replaced by separat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/31
CPCG06F21/31H04L9/3226H04L63/083G06F2221/2103G06F2221/2111H04L63/105
Inventor 肖露S·帕特内
Owner QUALCOMM INC