Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Text message security technology

A technology of text information and security technology, which is applied in the field of text information security, can solve the problems of encryption, interception and cracking of text information in the entire file, and time-consuming problems

Inactive Publication Date: 2010-09-15
张成
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Electronic encryption is actually a password password. It can only do multiple layers of encryption on the entire file but cannot do countless layers of encryption. Adding countless layers of passwords to the file will bring great inconvenience when opening the file---either the password cannot be fully remembered or time-consuming. If the number of encrypted symbols reaches 10 billion bits, it is not difficult to use the current supercomputer to crack 100 trillion times per second; it only encrypts the entire file and cannot encrypt every text information in the file
In the military, the text information is recorded, stored, and transmitted using the encryption technology of ordinary symbols, special symbols, and combinations of special symbols. This encryption technology is complicated and difficult for ordinary personnel to master. There are more than two people who have access to the same password. It is impossible to encrypt the text information in all military documents, and it may be intercepted and cracked during wireless transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text message security technology
  • Text message security technology
  • Text message security technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0005] This kind of text information security technology requires human translation, and can also be made into translation software for translation on electronic devices. This kind of password uses the initials and vowels in Chinese Pinyin, replaces the initials with 26 simple characters, and replaces the vowels with 34 simple characters, and arranges the substitute symbols in rows and columns corresponding to the initials and vowels. In summary, select the password mode or change the password mode and mark it in the form. The selection of the password mode or the change password mode can also be directly input to the computer or recorded on paper. For English, you can use 26 simple characters to replace the 26 letters of English, and then arrange the table in rows and columns according to the corresponding symbols and English letters. Select the password mode or change the password mode and mark it in the table. Select the password mode or change the password mode can also be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses text message security technology, and belongs to the field of text message security, which is an important complement for well overcoming the defects of the text message security in the mechanic password and electronic encryption technology. In the technology, some simple and general symbols are regularly recombined into new symbols for expressing words and phrases to form a password. In Chinese, a password is set by using substitution symbols of initials, finals and roots of a Chinese character to encrypt each character in a file and the password security is greater than 2,626*3,434 times. In English, a password is set by using substitution symbols of the letters of a word, the password security is greater than 2,626 times and a text message can be provided with numerous layers of passwords by using the password technology. The passwords for each person can be unique, be changed without limitation, serve as shorthand and independent language, be input and output on common computers, manually encrypt text messages, serve as translation software for encrypting the text messages on electronic devices, serve as the future programming language for encrypting each program code, and be largely used for confidential files in politics, military, scientific research institutions and commercial enterprises and for private text messages of ordinary people.

Description

Technical field: [0001] The invention relates to text information security technology, in particular to the text information security technology of state secret documents, military secret documents, enterprise and commercial secret documents. Background technique: [0002] The current text information recording, storage and transmission, such as political, military, technological, commercial and other aspects of text information security generally use visual media-paper and electronic media-magnetic tapes, CDs, computer hard drives, U disks, etc. Media storage. Using paper as a medium to store text information has the worst security. The text information recorded on paper is generally recorded, preserved, and transmitted in local, national, or world-wide text and language symbols, which many people can understand. For such storage security, mechanical methods are generally used --- plus code lock storage. There is no mechanical code lock that cannot be opened. Electronic media ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G09C1/00G06F3/023
Inventor 张成
Owner 张成
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products