SG11202012931UA - Methods and devices for generating and verifying passwords - Google Patents

Methods and devices for generating and verifying passwords

Info

Publication number
SG11202012931UA
SG11202012931UA SG11202012931UA SG11202012931UA SG11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA SG 11202012931U A SG11202012931U A SG 11202012931UA
Authority
SG
Singapore
Prior art keywords
generating
methods
devices
verifying passwords
passwords
Prior art date
Application number
SG11202012931UA
Other languages
English (en)
Inventor
Hui Xu
Original Assignee
Alipay Hangzhou Inf Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Inf Tech Co Ltd filed Critical Alipay Hangzhou Inf Tech Co Ltd
Publication of SG11202012931UA publication Critical patent/SG11202012931UA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioethics (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
SG11202012931UA 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords SG11202012931UA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/078222 WO2020098842A2 (en) 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords

Publications (1)

Publication Number Publication Date
SG11202012931UA true SG11202012931UA (en) 2021-01-28

Family

ID=70733037

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202012931UA SG11202012931UA (en) 2020-03-06 2020-03-06 Methods and devices for generating and verifying passwords

Country Status (5)

Country Link
US (1) US11368309B2 (zh)
EP (1) EP3799683B1 (zh)
CN (1) CN111480316B (zh)
SG (1) SG11202012931UA (zh)
WO (1) WO2020098842A2 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11343102B2 (en) * 2020-03-17 2022-05-24 Lenovo (Singapore) Pte. Ltd. Password protection based on Merkle tree proofs
CN115065553A (zh) * 2022-07-27 2022-09-16 远江盛邦(北京)网络安全科技股份有限公司 一种单包认证方法、装置、电子设备及存储介质

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8689003B2 (en) * 2007-06-01 2014-04-01 Adobe Systems Incorporated System and method for secure password-based authentication
EP2206277A4 (en) * 2007-10-22 2013-02-13 Microlatch Pty Ltd TRANSMITTER FOR SENDING A SECURED ACCESS SIGNAL
US8898749B2 (en) * 2009-04-09 2014-11-25 Intel Corporation Method and system for generating one-time passwords
US9118661B1 (en) * 2012-02-24 2015-08-25 Emc Corporation Methods and apparatus for authenticating a user using multi-server one-time passcode verification
WO2013134306A1 (en) * 2012-03-05 2013-09-12 Michael Fiske One-time passcodes with asymmetric keys
US9258118B1 (en) * 2012-06-25 2016-02-09 Amazon Technologies, Inc. Decentralized verification in a distributed system
US20160379330A1 (en) * 2013-06-21 2016-12-29 Signs & Wonders Unlimited, Llc Method and apparatus for protecting digital photos from alteration
CN105450413B (zh) * 2014-08-19 2019-04-19 阿里巴巴集团控股有限公司 一种密码的设置方法、装置和系统
AU2016235539B2 (en) * 2015-03-20 2019-01-24 Rivetz Corp. Automated attestation of device integrity using the block chain
US10339523B2 (en) * 2015-07-14 2019-07-02 Fmr Llc Point-to-point transaction guidance apparatuses, methods and systems
US10103878B1 (en) * 2015-09-15 2018-10-16 Amazon Technologies, Inc. Separation of security credential verification
US9565020B1 (en) * 2016-02-02 2017-02-07 International Business Machines Corporation System and method for generating a server-assisted strong password from a weak secret
CN105812366B (zh) * 2016-03-14 2019-09-24 携程计算机技术(上海)有限公司 服务器、反爬虫系统和反爬虫验证方法
US9985964B2 (en) * 2016-03-28 2018-05-29 Black Gold Coin, Inc. Systems and methods for providing block chain-based multifactor personal identity verification
US10902138B2 (en) * 2016-03-30 2021-01-26 PhazrlO Inc. Distributed cloud storage
US10057065B2 (en) * 2016-04-28 2018-08-21 Arnold G. Reinhold System and method for securely storing and utilizing password validation data
NL2017032B1 (en) * 2016-06-23 2018-01-19 Mindyourpass Holding B V Password generation device and password verification device
GB2557277A (en) * 2016-12-02 2018-06-20 Cavendish Wood Ltd A distributed ledger
WO2018140913A1 (en) * 2017-01-30 2018-08-02 SALT Lending Holdings, Inc. System and method of creating an asset based automated secure agreement
US10594487B2 (en) 2017-07-27 2020-03-17 International Business Machines Corporation Password management and verification with a blockchain
US10642967B2 (en) * 2017-11-28 2020-05-05 American Express Travel Related Services Company, Inc. Single sign-on solution using blockchain
WO2019118447A1 (en) * 2017-12-11 2019-06-20 Celo Labs Inc. Decentralized database associating public keys and communications addresses
US10355865B1 (en) * 2018-05-24 2019-07-16 DeepTruth, LLC Systems and techniques for certification of trusted media data
US10938566B2 (en) * 2018-08-08 2021-03-02 Keir Finlow-Bates Blockchain based identity and access management
AU2019335414A1 (en) * 2018-09-03 2021-03-25 Wolfgang Flatow Management system
US11887112B2 (en) * 2019-01-03 2024-01-30 American Express Travel Related Services Company, Inc Hybrid identity as a service for decentralized browser based wallets
US11251958B2 (en) * 2019-08-12 2022-02-15 Bank Of America Corporation Security system with adaptive authentication based on tokenization chaining
CN110472430B (zh) * 2019-08-22 2021-05-14 重庆华医康道科技有限公司 一种基于区块链的医患数据打包共享方法及系统
CN110493261B (zh) * 2019-09-16 2021-07-27 腾讯科技(深圳)有限公司 基于区块链的验证码获取方法、客户端、服务器及存储介质
US11509469B2 (en) * 2020-02-28 2022-11-22 Reynold Vogel, Inc. Methods and systems for password recovery based on user location

Also Published As

Publication number Publication date
CN111480316B (zh) 2022-08-19
US11368309B2 (en) 2022-06-21
EP3799683B1 (en) 2022-10-05
EP3799683A2 (en) 2021-04-07
CN111480316A (zh) 2020-07-31
WO2020098842A2 (en) 2020-05-22
US20210281417A1 (en) 2021-09-09
WO2020098842A3 (en) 2021-01-07
EP3799683A4 (en) 2021-06-09

Similar Documents

Publication Publication Date Title
ZA201904157B (en) Certificate verifying method, device, computer device and storage medium
EP3320523A4 (en) METHOD AND DEVICE FOR AUTHENTICATION USING DYNAMIC PASSWORDS
SG11202010749VA (en) Identity Verification and Login Methods, Apparatuses, and Computer Devices
EP3525892A4 (en) METHOD AND DEVICE FOR GENERATING ENERGY USING FALL PROTECTION DEVICES
EP3547604A4 (en) SECURITY QUESTION GENERATION AND IDENTITY VERIFICATION METHOD AND APPARATUS
GB201621721D0 (en) Methods and apparatus for biometric authentication in an electronic device
EP3984165A4 (en) ELECTRONIC DEVICE AND METHOD FOR GENERATION OF CERTIFICATES BASED ON A FUSED KEY
PL3554034T3 (pl) Sposób i aparat do autoryzowanego logowania
GB2573563B (en) Methods and apparatus for authenticating devices
GB201604789D0 (en) Methods for creating and verifying an electronic user identity
DK3476077T3 (en) Password generation device and password verification device
EP4047495A4 (en) USER IDENTITY VERIFICATION METHOD AND ELECTRONIC DEVICE
SG11202012931UA (en) Methods and devices for generating and verifying passwords
IL285819A (en) Device and method for identity verification
IL274840B2 (en) Device and application integrity verification
EP3831100C0 (en) SYSTEM AND METHOD FOR VERIFYING USER CONNECTIONS
EP3657836A4 (en) SIMLOCK PASSWORD GENERATION AND INJECTION METHOD AND DEVICE
GB2572330B (en) Devices and methods for generating electricity
GB2603060B (en) Unit verification method and device
SG10202102327UA (en) Methods and devices for verifying data integrity
GB2587000B (en) Method of testing and improving security in a password-based authentication system
EP3667529C0 (de) Verfahren und vorrichtung zum authentisieren einer fpga-konfiguration
HK1246434A1 (zh) 一種認證、用於認證的資訊生成方法及裝置
HK1250096A1 (zh) 一種密碼輸入方法及裝置
GB201913973D0 (en) Encryption and verification method