Authenticity detection method based on password hash and biometric identification
A biometric identification and biometric information technology, applied in the field of computer security, can solve the problems that the computer information detection code is easily reversed and cannot identify the user's physical identity, so as to avoid the hidden danger of modification and replacement and protect privacy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] refer to figure 1 , the implementation steps of the present invention are as follows:
[0026] Step 1, obtain the software and hardware information of the computer.
[0027] Call the system function to obtain computer hardware information, such as CPU, hard disk, memory, network card, graphics card, recorded as ID i , i=1,2,3...n, wherein n is the number of hardware to be counted in the computer;
[0028] Call the system function to obtain computer software information, such as operating system, office software, chat tool, denoted as SW j , j=1,2,3...m, where m is the number of software in the computer that needs to be counted.
[0029] Step 2, select the cryptographic hash function, and select the fuzzy safe algorithm.
[0030] 2a) Choose a cryptographic hash function as the encryption function
[0031] Compared with similar encryption methods, the cryptographic hash function has the characteristics of being easy to calculate, difficult to deduce information in re...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com