Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key embedded password

An embedded and key technology, applied in the field of information security, can solve problems such as complex system management, high operating costs, and difficult to eliminate

Inactive Publication Date: 2010-06-23
ZHEJIANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two problems are actually the fundamental reasons for the vulnerability of existing passwords (difficult to eliminate security holes), application limitations (poor use flexibility, complex system management) and high operating costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key embedded password
  • Key embedded password
  • Key embedded password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The realization of the present invention includes two parts of work, that is, the design of the key embedded algorithm module and the construction of the key embedded network security system with the key embedded algorithm module as the basic unit. The following is attached Figures 1 to 4 , to illustrate the implementation method of the present invention.

[0059]1. Design and production of key embedded algorithm module

[0060] Select an appropriate computer language, such as VB, C#, C++, and compile the key embedded algorithm program. You can refer to the basic algorithm flow of the key embedded algorithm module ( figure 1 ), design the parent function module according to the following requirements.

[0061] The generating function module consists of three independent sub-modules: generating function encoder E, generating function decoder D, initialization function 12, such as figure 1 shown. The generating function encoder E includes an encryption transformatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key embedded password which comprises key embedded algorithm modules and a password system formed by the key embedded algorithm modules. The key embedded algorithm modules combine a coding / decoding function and a key generation function into a whole, and keys are configured in the discrete algorithm modules in a dissymmetrical way and a symmetrical way. The key algorithm modules are divided into generating function modules and subfunction modules. The password system comprises a management center and a plurality of user terminals, the management center generates the subfunction modules with mutually different key configuration through the generating function modules and distributes the subfunction modules to the users, and key distribution is automatically completed in the process. The keys are provided with uniformly set key numbers, and can be operated by the users through the key numbers. A secret key communication mechanism is established for the password system through the key embedded algorithm modules and the key configuration thereof. The system has the advantages that the system provides three information safety functions: privacy, identifiability and incontestability, but the keys are not transmitted and directly published among the users.

Description

technical field [0001] The invention relates to key embedded ciphers and belongs to the technical field of information security. Background technique [0002] Cryptography is the core technology to ensure network information security. The ciphers currently used in practice can be divided into two categories according to the different key forms: symmetric cryptography and asymmetric cryptography (public key cryptography). [0003] In a symmetric cryptosystem, the same key is used for encryption and decryption. The security of this type of cipher mainly depends on the secrecy of the key, and the communication parties generally need to transfer the key through a secure channel. The main advantage of symmetric cryptography is that the algorithm is simple and the operation speed is fast, but the disadvantage is that the key management is complicated, which is also the biggest problem of symmetric cryptography in practical applications. [0004] In a public key cryptography syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16H04L9/32H04L9/30
Inventor 鲁阳
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products