Password protection based on Merkle tree proofs

An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms...

Full description

Saved in:
Bibliographic Details
Main Authors Stolbikova, Veronika, Stolbikov, Igor, Waltermann, Rod D, Pennisi, Joseph M
Format Patent
LanguageEnglish
Published 24.05.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms resulting in a number of hash results. The hash results are combined with the combining of the hash result eventually resulting in a combined hash result. An expected hash result that corresponds to the user identifier is retrieved and compared to the combined hash result. The password is verified based on the results of the comparison.
Bibliography:Application Number: US202016821592