SG11202012931UA - Methods and devices for generating and verifying passwords - Google Patents

Methods and devices for generating and verifying passwords

Info

Publication number
SG11202012931UA
SG11202012931UA SG11202012931UA SG11202012931UA SG11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA
Authority
SG
Singapore
Prior art keywords
generating
methods
devices
verifying passwords
passwords
Prior art date
Application number
SG11202012931UA
Inventor
Hui Xu
Original Assignee
Alipay Hangzhou Inf Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Inf Tech Co Ltd filed Critical Alipay Hangzhou Inf Tech Co Ltd
Publication of SG11202012931UA publication Critical patent/SG11202012931UA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Power Engineering (AREA)
  • Bioethics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
SG11202012931UA 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords SG11202012931UA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/078222 WO2020098842A2 (en) 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords

Publications (1)

Publication Number Publication Date
SG11202012931UA true SG11202012931UA (en) 2021-01-28

Family

ID=70733037

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202012931UA SG11202012931UA (en) 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords

Country Status (5)

Country Link
US (1) US11368309B2 (en)
EP (1) EP3799683B1 (en)
CN (1) CN111480316B (en)
SG (1) SG11202012931UA (en)
WO (1) WO2020098842A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11343102B2 (en) * 2020-03-17 2022-05-24 Lenovo (Singapore) Pte. Ltd. Password protection based on Merkle tree proofs
CN115065553A (en) * 2022-07-27 2022-09-16 远江盛邦(北京)网络安全科技股份有限公司 Single package authentication method and device, electronic equipment and storage medium

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8689003B2 (en) * 2007-06-01 2014-04-01 Adobe Systems Incorporated System and method for secure password-based authentication
US20100253470A1 (en) * 2007-10-22 2010-10-07 Microlatch Pty Ltd Transmitter For Transmitting A Secure Access Signal
US8898749B2 (en) * 2009-04-09 2014-11-25 Intel Corporation Method and system for generating one-time passwords
US9118661B1 (en) * 2012-02-24 2015-08-25 Emc Corporation Methods and apparatus for authenticating a user using multi-server one-time passcode verification
US9235697B2 (en) * 2012-03-05 2016-01-12 Biogy, Inc. One-time passcodes with asymmetric keys
US9258118B1 (en) * 2012-06-25 2016-02-09 Amazon Technologies, Inc. Decentralized verification in a distributed system
US20160379330A1 (en) * 2013-06-21 2016-12-29 Signs & Wonders Unlimited, Llc Method and apparatus for protecting digital photos from alteration
CN105450413B (en) * 2014-08-19 2019-04-19 阿里巴巴集团控股有限公司 A kind of setting method of password, device and system
RU2673842C1 (en) * 2015-03-20 2018-11-30 Ривец Корп. Device safety automatic certification with the use of the blocks chain
US10339523B2 (en) * 2015-07-14 2019-07-02 Fmr Llc Point-to-point transaction guidance apparatuses, methods and systems
US10103878B1 (en) * 2015-09-15 2018-10-16 Amazon Technologies, Inc. Separation of security credential verification
US9565020B1 (en) * 2016-02-02 2017-02-07 International Business Machines Corporation System and method for generating a server-assisted strong password from a weak secret
CN105812366B (en) * 2016-03-14 2019-09-24 携程计算机技术(上海)有限公司 Server, anti-crawler system and anti-crawler verification method
US9985964B2 (en) * 2016-03-28 2018-05-29 Black Gold Coin, Inc. Systems and methods for providing block chain-based multifactor personal identity verification
US10902138B2 (en) * 2016-03-30 2021-01-26 PhazrlO Inc. Distributed cloud storage
US10057065B2 (en) * 2016-04-28 2018-08-21 Arnold G. Reinhold System and method for securely storing and utilizing password validation data
NL2017032B1 (en) * 2016-06-23 2018-01-19 Mindyourpass Holding B V Password generation device and password verification device
GB2557277A (en) * 2016-12-02 2018-06-20 Cavendish Wood Ltd A distributed ledger
US20180218176A1 (en) * 2017-01-30 2018-08-02 SALT Lending Holdings, Inc. System and method of creating an asset based automated secure agreement
US10594487B2 (en) 2017-07-27 2020-03-17 International Business Machines Corporation Password management and verification with a blockchain
US10642967B2 (en) * 2017-11-28 2020-05-05 American Express Travel Related Services Company, Inc. Single sign-on solution using blockchain
WO2019118447A1 (en) * 2017-12-11 2019-06-20 Celo Labs Inc. Decentralized database associating public keys and communications addresses
US10560261B1 (en) * 2018-05-24 2020-02-11 DeepTruth, LLC Systems and techniques for capture of trusted media data
US10938566B2 (en) * 2018-08-08 2021-03-02 Keir Finlow-Bates Blockchain based identity and access management
EP3847569A4 (en) * 2018-09-03 2022-05-11 Munia Limited Management system
US11887112B2 (en) * 2019-01-03 2024-01-30 American Express Travel Related Services Company, Inc Hybrid identity as a service for decentralized browser based wallets
US11251958B2 (en) * 2019-08-12 2022-02-15 Bank Of America Corporation Security system with adaptive authentication based on tokenization chaining
CN110472430B (en) * 2019-08-22 2021-05-14 重庆华医康道科技有限公司 Block chain-based doctor-patient data packaging and sharing method and system
CN110493261B (en) * 2019-09-16 2021-07-27 腾讯科技(深圳)有限公司 Verification code obtaining method based on block chain, client, server and storage medium
US11509469B2 (en) * 2020-02-28 2022-11-22 Reynold Vogel, Inc. Methods and systems for password recovery based on user location

Also Published As

Publication number Publication date
EP3799683A2 (en) 2021-04-07
WO2020098842A2 (en) 2020-05-22
US11368309B2 (en) 2022-06-21
WO2020098842A3 (en) 2021-01-07
EP3799683B1 (en) 2022-10-05
CN111480316A (en) 2020-07-31
US20210281417A1 (en) 2021-09-09
EP3799683A4 (en) 2021-06-09
CN111480316B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
ZA201904157B (en) Certificate verifying method, device, computer device and storage medium
EP3320523A4 (en) Method and device for authentication using dynamic passwords
SG11202010749VA (en) Identity Verification and Login Methods, Apparatuses, and Computer Devices
EP3525892A4 (en) Methods and apparatus for generating energy using fall protection devices
EP3547604A4 (en) Method and apparatus for security question generation and identity verification
GB201621721D0 (en) Methods and apparatus for biometric authentication in an electronic device
EP3984165A4 (en) Electronic device and method for generating attestation certificate based on fused key
PL3554034T3 (en) Method and device for authenticating login
GB201604789D0 (en) Methods for creating and verifying an electronic user identity
GB2573563B (en) Methods and apparatus for authenticating devices
DK3476077T3 (en) Password generation device and password verification device
EP4047495A4 (en) Method for verifying user identity and electronic device
SG11202012931UA (en) Methods and devices for generating and verifying passwords
IL285819A (en) Identity verifying device and methods
EP3871123A4 (en) Method for authenticating user and electronic device thereof
EP3657836A4 (en) Method and device for generating and injecting simlock password
GB2572330B (en) Devices and methods for generating electricity
GB2603060B (en) Unit verification method and device
SG10202102327UA (en) Methods and devices for verifying data integrity
GB2587000B (en) Method of testing and improving security in a password-based authentication system
EP3831100C0 (en) System and method for verifying user connections
EP3667529C0 (en) Method and device for authenticating an fpga configuration
GB2587404B (en) Encryption and verification method
HK1250096A1 (en) Password inputting method and device
HK1244976A1 (en) Password determination and login verification method and device