Search Results - computer software or hardware

1 Results Sort By:
Secure Authentication Method Using Private User Identification Information
Invention SummaryMost computer systems employ a password verification system for access. A user is identified with a user ID and verified with a password. Although this method is very popular, it is vulnerable to the password guessing attack. However, the attacker doesn't need to guess the user ID because the user IDs are usually public, such as names...
Published: 8/21/2018   |   Inventor(s): Ju-Yeon Jo, Yoohwan Kim
Keywords(s): Apps, Computer, Computer Science, Computer Software or Hardware, Software
Category(s): Computer Science & Software
© 2020. All Rights Reserved. Powered by Inteum