摘要 |
Techniques for preventing unauthorized access to a server system using stolen passwords are provided. In one embodiment, the server system can store an ordered set of hash values for a user, where each hash value in the ordered set of hash values is generated by applying a hash function in an ordered set of hash functions to the user's password. The server system can further receive, from a client device, a login request for the user that includes a hashed version of the password, and can select a hash value in the ordered set of hash values using a server-side index that is synchronized with a client-side index on the client device. The server system can then grant the login request if the selected hash value matches the hashed version of the password. |
主权项 |
1. A method for preventing unauthorized access to a server system using stolen passwords, the method comprising:
storing, by the server system, an ordered set of hash values for a user, each hash value in the ordered set of hash values being generated by applying a hash function in an ordered set of hash functions to the user's password; receiving, by the server system, a login request for the user from a client device, the login request including a hashed version of the password; selecting, by the server system, a hash value in the ordered set of hash values using a server-side index that is synchronized with a client-side index on the client device; and granting, by the server system, the login request if the hash value matches the hashed version of the password. |