Unlock instant, AI-driven research and patent intelligence for your innovation.

Compound time varying password and time varying type data encryption method

A technology of data encryption and encryption method, which is applied in the fields of information technology and electronics, can solve problems such as easy confusion, and achieve the effect of complex calculation results

Inactive Publication Date: 2014-10-29
陈麟华
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] What I want to explain here is that in real life, people have two different understandings of "password", which are easy to confuse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compound time varying password and time varying type data encryption method
  • Compound time varying password and time varying type data encryption method
  • Compound time varying password and time varying type data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] 1. Implementation of "composite time-varying cipher".

[0105] When the cryptographic system is implemented, both the "proving party" (client) and the "verifying party" (manager) who use the password need to master the "original source code" and related algorithms in advance, and then use each time according to the figure 1 The process of calculating the "time-varying code" in real time.

[0106] Such as figure 1 , "Yuan initial code" is divided into two parts: "base code" and "operating code".

[0107] Among them, "operation code" defines "self-calculation method", "selection calculation method" and "operation method" correspondingly. "Self-calculation method" transforms "basic code" into "basic code". "Calculation method" transforms "auxiliary code" into "time-diffuse code". The "computing method" enables the "basic code" and "time code" to be mutually calculated into an "intermediate code".

[0108] The "intermediate code" is further divided into two parts: "bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a compound time varying password and a time varying type data encryption method, relates to an information and electronic technology and mainly provides a compound time varying password and a principle method which is the time varying type data encryption method. The compound time varying password is the upgrading of a time varying password, and various variables such as a time variable, a sequence code and an additional code are blended on the basis of a basic password. Appointed operation is performed between the basic password and the selected variables, and an appointed operational method is defined by encoding, the operation can undergo cycle many times so as to improve decryption difficulty. A system is low in construction cost and higher in safety. The time varying type data encryption method is a method for data encryption and decryption by utilizing a compound time varying password algorithm. The time varying type data encryption method is simple in algorithm and high in safety and can be widely applied to the fields of daily life, economy and military and the like.

Description

technical field [0001] The invention relates to "composite time-varying cipher" and "time-varying data encryption method", which is a principle method of "dynamic cipher" and a principle method of "data file encryption", and belongs to the fields of information technology and electronic technology. Background technique [0002] In the information society, there are a large number of various "proof" and "verification" activities. The "manager" needs to authenticate the "customer", often in the form of verifying the "password". The process generally consists of the customer submitting a "certification" application and submitting a "password"; while the manager performs "verification", the "password" submitted by the customer is compared with the "password" stored in the management side in advance. If they are consistent, then Recognize the authenticity of the customer's identity, and disapprove if it is inconsistent. [0003] At present, "static password" is generally used i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/16H04L9/32
Inventor 陈麟华
Owner 陈麟华