Coding Convention Controlled Authentication and Coding Convention Controlled Encryption
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of coding conventions and control codes, applied in the fields of information technology and electronics, can solve problems such as non-disclosure, hacking, and backdoors for designers
Active Publication Date: 2019-02-26
陈麟华
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] In order to strengthen the anti-cracking ability of data encryption, many algorithms mostly use complex functions, and the entire design process is often not disclosed, which makes people worry that crackers will use the weak links of functions to break through, or designers have backdoors
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0178] Example 1, if the program is: N(A(B(m)C(D(m))), the left side of the brackets is the control code, and the inside of the brackets is the basic code, (the basic code can be divided into the next layer Control code and basic code) if, N=number of repetitions, A=grouping mode, B=shifting method, C=operation method, D=mapping method, then, as long as the corresponding data is given, the corresponding conversion rule will be formed.
[0179] Like this, give digital 341826763321, just get 3(4(1(826)7(6(3321))) by program, wherein N=repetition times 3, A=grouping mode 4, B=shift method 1, C =operation method 7, D=mapping method 6, then the transformed result is unique.
example 2
[0180] Example 2, "common code"=abcdefg, "female code"=ABCDEFG, "combined code"=ABCDEFGabcdefg.
[0181] The first transformation (the program) is shifting: mutual intersection=AaBbCcDdEeFfGg.
[0182] The second conversion (program) is operation: "basic code" "control code"=(AaBbCc)(DdEeFfGg), artificially agreed coding situation: 1=+1; 2=×2, 3=-3, 4= +4, 5=x5, 6=-6, 7=+7, 8=x8, 9=-9.
[0183] Then, given "maternal code"=ABCDEFG=1234567, "common code"=abcdefg=9876123, the formula can be obtained:
[0185] will have unique results. Given different "female code" and "male code" values, there are different unique values.
[0186] (Or, if "01~09" is agreed to be +1~+9 respectively, "11~19" is agreed to be -1~-9 respectively, "21~29" is agreed to be ×1~×9 respectively, "31~39" "respectively agreed as / 1~ / 9..., the change will be more)
[0187] Such a simple program can provide millions of "mother code...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The present invention relates to an information technology and an electronic technology, and mainly provides a coding convention control transformation type information authentication method, and a coding convention control transformation type information encryption / decryption method. According to the present invention, the coding convention control transformation is a technology core, defines a series of different transformation modes in a coding format and according to the artificial convention, and divides the to-be-transformed data into the control codes and the basic codes. The control codes transform the basic codes according to a coding defined control mode to generate a new data result, so that the information authentication or the information encryption / decryption is carried out according to the coding convention control transformation and the generated result. The coding convention control transformation type information authentication method, and the coding convention control transformation type information encryption / decryption method of the present invention are simple, easy, safe and reliable, are low in cost, are very suitable for the software program processing, and can be widely used in the fields, such as the daily life, the economy, the military, etc.
Description
technical field [0001] The invention relates to an information authentication method and an information encryption and decryption method, which is an information authentication technology and an information encryption technology based on a method of "coding convention control conversion", and belongs to the fields of information technology and electronic technology. Background technique [0002] In the information society, there are a large number of various "proof" and "verification" activities. For example, if the "management party" wants to authenticate the "customer", it is often done in the form of verifying the "password". The process generally consists of the customer submitting a "certification" application and submitting a "password"; while the manager performs "verification", the "password" submitted by the customer is compared with the "password" stored in the management side in advance. If they are consistent, then Recognize the authenticity of the customer's id...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.