Improved Password Based Solution For Authentication And Authorization

The basic principle behind the idea is that the end point requesting verification starts with generating a humanly readable challenge, which is presented to the user. The user then forwards this challenge to the password manager running in a secure domain, which combines it with the password from the database, inputs the combined data to a non-reversible function, transforms the result into a humanly readable string, and returns it to the user. The user then returns this string to the verifying end point as the response to the challenge, which compares it to the string that itself has computed following the same procedures. If the two strings match, then this is proof that the user is in possession of the permanent password.

Publication Date
14 May 2014

Tags
security password protected database trusted platform module


Download-publication


Click here to download link on ip.com


Click to share this page via your favorite social network.

LEARN MORE
Learn more about defensive publications with our examples and frequently asked questions

What we are trying to do?

We are attempting to mobilize the creativity and innovative capacities of the Linux and broader open source community to codify the universe of preexisting inventions in defensive publications that upon publication in the IP.COM database will immediately serve as effective prior art that prevents anyone from having a patent issued that claims inventions that have already been document in a defensive publication. In addition to creating a vehicle to utilize this highly effective form of IP rights management for known inventions, it is hoped that the community will use defensive publications as a means of codifying future inventions should the inventors prefer not to make their invention the subject of a patent disclosure and application.

Sponsors: