Password protection based on Merkle tree proofs
An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
24.05.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An approach is provided that receives a password that corresponds to a user identifier. A number of hashing algorithms are retrieved with the specific hashing algorithms that are retrieved being based on the received user identifier. The password is hashed using each of retrieved hashing algorithms resulting in a number of hash results. The hash results are combined with the combining of the hash result eventually resulting in a combined hash result. An expected hash result that corresponds to the user identifier is retrieved and compared to the combined hash result. The password is verified based on the results of the comparison. |
---|---|
Bibliography: | Application Number: US202016821592 |