Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server

A technology of two-dimensional information and encryption method, applied in the field of communication, can solve the problems of vulnerability to attack, low security of information authentication process, low security of information encryption method, etc., to increase difficulty, improve security, and prevent large-scale automatic The effect of information theft

Inactive Publication Date: 2007-11-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to provide a two-dimensional information encryption method to overcome the problems of low security and vulnerability to attacks in the prior art.
[0012] Another object of the present invention is to provide a two-dimensional information authentication method to overcome the problem of lo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server
  • Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server
  • Two-dimensional information encryption method and device, and two-dimensional information authenticating method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention respectively provides a two-dimensional information encryption method, the method randomly sets the length of the two-dimensional information, and / or sets attribute values ​​for the two-dimensional information, and then sets a set of length and / or additional attribute values The two-dimensional information of the two-dimensional information is set into an information unit, and several information units form a two-dimensional information encryption table; and a two-dimensional information authentication method, which stores the two-dimensional information encryption table, and then displays the information of several information units in the two-dimensional information encryption table position, and / or the attribute value corresponding to at least one two-dimensional information in each information unit, obtain the two-dimensional information input by the user, and combine the two-dimensional information with the corresponding position and / or attribut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: setting up length of 2D information (Info) and/or additive attribute value (AAV) of the 2D Info; integrating a set of 2D Info with length and AAV into Info unit; Info units constitute 2D Info encryption table. The invention also discloses 2D Info encryption device, 2D Info authentication method, and 2D Info authentication server. Since each length of 2D Info of Info unit in 2D Info encryption table is not fixed, thus, breaker is unable to determine specific content of each piece of 2D Info in Info unit based on inputted 2D Info so as to increase difficulty for breaking Info, and raise security of Info. Moreover, because AAV can be added to 2D Info, breaker is unable to record and recognize attributes automatically. Thus, the invention prevents action of extensive stealing Info automatically.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a two-dimensional information encryption method and device, a two-dimensional information authentication method and a server. Background technique [0002] In order to solve the identity authentication problem on the Internet, some two-dimensional password cards for identity authentication have appeared. There is a unique secret form printed on this two-dimensional password card, and the content of the form is different for each card. Usually, the form of this two-dimensional password card has M rows and N columns (both M and N are integers), and there are 2 or 3 digits in each cell. When the two-dimensional password card is authenticated, the server requires the user to provide the content values ​​of several cells in the table. If the content of the user’s answer is correct, the server will pass the authentication, indicating that the user is the legal owner of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00H04L29/06H04L12/28
Inventor 魏宪德陈旭东任翔
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products