Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Equation password encryption method

An encryption method and equation technology, applied in the field of equation encryption, can solve the problems of high cost, hidden dangers, and not yet generalized, etc., and achieve the effect of high leakage prevention and simple docking and upgrading.

Inactive Publication Date: 2010-11-03
李强
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shortcoming of this kind of dynamic password system is that it is necessary to use a password generator with you to generate an encrypted value corresponding to the dynamic password of the server, and the follow-up processing of the password generator accidentally lost is quite troublesome and expensive.
[0005] There is also a biometric identification system used as a method for user identification, which uses unique biological characteristics that cannot be faked by the user, such as fingerprints, palm prints, appearance, voiceprint, retina, DNA, handwriting, etc., as the basis for identification, but It is expensive and not yet universal
[0006] At present, in the electronic combination lock industry, banking system password application, computer file and software encryption, etc., those who use static passwords use fixed passwords as authentication numbers, that is, fingerprints, palmprints, faces, voiceprints, retinas, etc. DNA, handwriting, etc. are used as passwords, and what is obtained is a relatively complex inherent digital information. This encryption method has a common shortcoming, that is, the operation information during the password verification process can be copied. After your inherent password information, you can get the same authentication as the password holder himself. This traditional encryption method has great security risks in information leakage and confidentiality. It is often reported in the news that due to bank account numbers and passwords Cases of being peeped and causing property damage, and in the lock-picking industry, it is claimed that there is no lock that cannot be cracked. Even if the door is locked, there are still cases of theft. Cracking is becoming more and more sophisticated, and traditional encryption methods are becoming less and less safe, and the important security risk lies in information leakage. Is there a more advanced security method that can achieve encryption effects, and can also be used in information leakage? The same encryption is the security and confidentiality function that today's industry is looking forward to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equation password encryption method
  • Equation password encryption method
  • Equation password encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to fully understand the technical content of the present invention, the technical solution of the present invention will be further introduced and illustrated below in conjunction with specific embodiments.

[0035] according to figure 1 Shown:

[0036](1) MCU processor 1, which is a processor that can be programmed and can perform calculations.

[0037] (2) Private password storage area 2, an area for storing static private passwords. When setting a password, it is the same as the traditional way of setting a password. This is a long-term constant password that verifiers need to use all the time! Store this password in private password storage area 2. The digital setting of this static password must match the expression of the equation. For example, if the equation has addition and subtraction operations, it is necessary to use a static password with any combination of numbers from 0-9 totaling 10 numbers; and equations with multiplication and division In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information encryption technologies, in particular to a password encryption method. The method mainly refers to that address codes and numbers are combined and operated to compile an equation used as a password, which replaces the traditional method that fixed numbers, letters or character information are used as a password. A core component of the method comprises a static password, an equation password, a random prompt code, a verification and execution code, a micro-programmed control unit (MCU), input and output equipment, and the like, wherein the static password and the equation password are preset; the MCU randomly presents a prompt code to match with the operations of the static password, the equation password and the random prompt code to obtain a new number password; and a user uses own static password and equation password to match with the random prompt code to calculate out the verification and execution code, which can obtain random passwords being different every time; and a dynamic scrambler is avoided being used, and the difficulty of the equation can be set as required, which can achieve the purpose of high security and secrecy.

Description

technical field [0001] The equation encryption method of the present invention relates to the technical field of information encryption. It mainly uses address codes and digital combination operations to write equations as passwords, and uses the results of operations to verify, thereby realizing encryption for the verification process of passwords. It avoids the disclosure of password information due to the copying of the operation information in the verification process, and at the same time, it will not be troublesome to use like a dynamic password, nor will it have the risk of being lost or stolen like a dynamic password. In addition, this encryption method is simple to use and easy to popularize. It can achieve simple and safe docking upgrades with traditional encryption methods, and the difficulty level of the equation can be set according to user needs, which can be adapted to different groups of people and industries to a greater extent. Background technique [0002]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 李强
Owner 李强
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products