Encryption and authentication method for communication software
A technology of encryption authentication and communication software, applied in wireless communication, electrical components, transmission systems, etc., can solve problems such as sending messages
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] 1. Both the sender A and the receiver B implement the encryption algorithm F internally. The encryption algorithm F is kept secret from the user. The content of the message sent by sender A to receiver B is: identity password P A + send content T;
[0020] 2. After the receiver B receives the communication message, the receiver B will first query the communication system S to obtain the characteristic V of the sender A , and then the receiver B uses the encryption algorithm F according to the sender's characteristic V A Encrypt and calculate its identity password F(V A ), then receiver B compares F(V A ) and P A , if F(V A ) = P A , then the sender A is a legal user, and the receiver B will receive the message; otherwise, the sender A is an illegal user, and the receiver B discards the message.
[0021] In the communication process, the present invention judges the identity of the sender each time by the receiver, thereby preventing cracked software from using n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 