Dynamic deficiency encryption system
An encryption system and dynamic technology, applied in the direction of user identity/authority verification, etc., can solve the problems that cannot prevent direct cryptanalysis
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0023] Embodiment 1 (high security protection reinforcement system)
[0024] The high-security protection reinforcement system of the present invention is characterized in that the dynamic missing system is used to carry out communication protection through identification authentication, environment locking, dynamic missing, regular activation and random scrambling.
[0025] When the sender sends data, it will automatically attach the parameters and status of the operating environment (CPU-ID, MAC, system time, validity period status).
[0026] After the receiver successfully parses the sender's environmental parameters and operating status, it will use the scrambling calculation involving the environmental parameters when performing secure communication to ensure that only the receiver's system running in the specified environment can analyze it.
[0027] The data sent by the sender adopts scrambling protection of identification, environmental parameters, validity period, sys...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com