According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received at logic configured to perform a key derivation operation comprising a pseudorandom function. An encryption key is derived from the input password and the random number according to the key derivation operation. The encryption key and a user identifier are received at logic configured to perform a cipher-based message authentication code (CMAC) function. An encrypted password is generated from the encryption key and the user identifier according to the CMAC function.
- New York NY, US Jammie Pringle - Lisle IL, US Terry W. Chaisson - Lisle IL, US Dean Harrington - Lisle IL, US
International Classification:
G06F 17/30 G06F 17/30
Abstract:
A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
- New York NY, US Jammie Pringle - Lisle IL, US Terry W. Chaisson - Lisle IL, US Dean Harrington - Lisle IL, US
Assignee:
CA, INC. - New York NY
International Classification:
G06F 17/30
Abstract:
A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
Youtube
Celtic Fiddle Loop - Tim Chaisson
Just playing around with my loop pedal to a celtic tune my father wrot...
Duration:
2m 34s
RENO 911! - Terry's Fiancee
Dangle and Wiegel try to bust Terry on a street corner, but then Terry...
Duration:
2m 33s
Tim Chaisson - Sweet Baby James (live & acous...
Acclaimed Canadian singer songwriter Tim Chaisson took some time out o...
Duration:
3m 23s
Heart of Oak Jig - written by Irish Millie an...
This was a tune that I composed with my teacher Tim Chaisson during ou...
Duration:
1m 38s
The Chaisson Trio with Lemmie Chaisson Singin...
June 21, 2011 - Festival of Small Halls at Dundas with Kevin Chaisson ...
Duration:
3m 43s
The OSTraining Podcast with Paul Chason and D...
Well welcome to episode 5 of os talks I'm here with David Terry and Pa...