Unlock instant, AI-driven research and patent intelligence for your innovation.

Combination lock internally containing random code

A combination lock and random code technology, applied in the field of combination locks, can solve the problems of hidden dangers of users' funds, unsuitable for ordinary people, easy to be deciphered, etc., and achieve the effect of increasing security and being difficult to guess.

Inactive Publication Date: 2013-10-09
褚万青
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned traditional unlocking password is unchanged within a certain period of time, not a one-time password, and is easy to be guessed and cracked, or when consumers enter the unlocking password in public, it is easy to be accidentally or accidentally by bystanders. Intentionally see; once the mobile phone, USBkey (u-shield is one of them), OTP token (that is, one of the OTP ciphers) and other electronic devices corresponding to the unlock password are lost or stolen, the user privacy or the funds on the account are at risk
[0004] In the traditional cipherbooks in the past, there were words (or letters) paired with Arabic numerals, but the pairing was often fixed and easy to be deciphered; in modern ciphers, the pairing may not be fixed, but it is basically done automatically by machines It is not suitable for ordinary people to participate in, and it is not suitable for ordinary people to use in public places; even if the pairing is not fixed, and not all are automatically completed by the machine, but the pairing is often displayed at one time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combination lock internally containing random code
  • Combination lock internally containing random code
  • Combination lock internally containing random code

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0038] Example 1, about c d (the c d is preset). For example, after an electronic device is turned on, the first preset program displayed on its display screen is, the first preset: the first round (1)______, the second round (2)_____, the third round (3) ____, the fourth round (4)___ the fifth round (5)__, the sixth round (6)_, ... the Nth round. The second preset procedure is that c in each round d The original order of the round is changed to: _th round______, _th round_____, _th round____, _th round___, _th round__; the original order between rounds is changed to: ______ . The preset is a touch screen operation on the display screen.

[0039] For example, a password lock is preset for the text message function of a certain mobile phone (that is, the preset c d ). According to the H mode, perform the first preset procedure, such as the first round (the following 1 represents the first round) 3 , the second round (the following 2 represents the second round) 1 , the...

example 2

[0043] Example 2, the c d In , one or more groups of characters represent spaces; for example, in the middle and / or before and after 315k16, a space is preset (inserted) and becomes 315k16 (the abnormal spacing between 1 and 5 is a group Special symbol, this symbol represents a space), or becomes 31*5k16, this * is a group of symbols, this symbol represents a space, then c1=3, c2=1, c3 is equal to space, c4=5, c5= k, c6=1, c7=6; or become *315k16, or become 315k16*, or *315k16*, or become *31*5k16, or become 31*5k16*, or become *31*5k16 *. The blanks can participate in matching through preset representative characters.

[0044] the c d Among them, one or more groups of characters contain characters representing spaces; for example, c1=3*, c2=1, c3=*j, c4=k, c5=1, c6=6, the c1, The symbols * in the c3 character group represent a space respectively. The blanks can participate in matching through preset representative characters.

example 3

[0045] Example 3, about Ae, B f . For example, the A character has 12 groups of characters, namely 0, 9, 8, 7, 6, 5, 4, 3, 2, 1, #, #, each group of characters contains only one symbol; The order of the 12 groups of characters is from left to right, from small to large, that is, A1=0, A2=9, A3=8, A4=7, A5=6, A6=5, A7=4, A8=3 , A9=2, A10=1, A11=#, A12=#. For example, the B character has 12 groups of characters, i.e. j, f, e, c, g, h, d, i, o, k, &, &, each group of characters contains only one letter or symbol ; The order of the 12 groups of characters is from left to right, from small to large, that is, B1=j, B2=f, B3=e, B4=c, B5=g, B6=h, B7=d, B8 =i, B9=o, B10=k, B11=&, B12=&. For example, in a certain round, c 5 (the c d d=5) is equal to 7, namely c 5 =7=A4, (that is, said Ae is equal to said c d , e=4 in this Ae), then there is a described code B paired with A4 in the B character f ; if c 5 =k=B10 (ie the B f equal to the c d , the B f f=10 in ), then there is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a combination lock internally containing a random code. Through the random pairing and screen display of characters and codes in an unlocking password of the combination lock, a consumer can openly input a random code and secretly input a character in the unlocking password until the lock is unlocked.

Description

technical field [0001] The invention relates to an electronic combination lock, in particular to a combination lock which uses random codes to unlock in public places. Background technique [0002] In public places, consumers need to directly input secret characters (such as unlock passwords) on electronic devices such as mobile phones, tablet computers, and notebook computers. At present, the second-generation u-shield used in the ICBC online banking system has a display screen (used to display transaction information, easy to check, and prevent remote control by hackers) and a confirmation key, which plays a great role in the security of online banking. Further, online banking The USB-Shield password input required for the operation will be improved from online input (easy to be peeped by hackers) to input on the USB-Shield (equivalent to inputting the unlock password of the USB-Shield), and further, the scope of use of the second-generation USB-Shield will be expanded Go...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 褚万青
Owner 褚万青