Secure Authentication Method Using Private User Identification Information
Invention SummaryMost computer systems employ a password verification system for access. A user is identified with a user ID and verified with a password. Although this method is very popular, it is vulnerable to the password guessing attack. However, the attacker doesn't need to guess the user ID because the user IDs are usually public, such as names...
Published: 1/4/2023
|
Inventor(s): Ju-Yeon Jo, Yoohwan Kim
Keywords(s): Computer Science & Software - Apps, Computer Science & Software - Computer Science, Computer Science & Software - Hardware, Computer Science & Software - Software, Software
Category(s): Technology Classifications > Computer Science & Software
|