-
公开(公告)号:US11366892B2
公开(公告)日:2022-06-21
申请号:US16380958
申请日:2019-04-10
Applicant: Shape Security, Inc.
Inventor: Yao Zhao , Jian Jiang , Rundong Liu
Abstract: In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.
-
公开(公告)号:US20200250296A1
公开(公告)日:2020-08-06
申请号:US16380958
申请日:2019-04-10
Applicant: Shape Security, Inc.
Inventor: Yao Zhao , Jian Jiang , Rundong Liu
IPC: G06F21/45 , G06F16/901 , G06F21/56 , G06F21/60 , G06F21/62
Abstract: In an embodiment, a method is configured to detect compromised credentials, comprising: generating a plurality of bloom filters, wherein each bloom filter corresponds to a particular subset of a set of compromised credentials; receiving an index value from a client computing device; in response to receiving the index value, determining a target bloom filter corresponding to the index value, and sending the target bloom filter to the client computing device; receiving a first value from the client computing device; in response to receiving the first value, generating a second value based on the first value, and sending the second value to the client computing device.
-