Microcomputer bit addition verifying coded lock

A technology for verifying passwords and microcomputers. It is used in instruments, time registers, and individual input/output registers. It can solve problems such as cumbersome operations, short password security, and difficulty in remembering long passwords.

Inactive Publication Date: 2016-11-23
吴成贵
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a contradiction that cannot be unified in the traditional microcomputer password lock, and the user is faced with a dilemma when setting the password: from a security point of view, the longer the password, the higher the security level; but the long password is difficult to remember, cumbersome to operate, and easy to enter mistakes ; From the perspective of user convenience, the shorter the password, the easier it is to remember and the more convenient the operation, but the shorter the password, the worse the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Microcomputer bit addition verifying coded lock
  • Microcomputer bit addition verifying coded lock
  • Microcomputer bit addition verifying coded lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Next, a specific example will be used to describe in detail a kind of microcomputer upgrade verification combination lock of the present invention.

[0049] Step A. Set a password M with a length of 20 characters: 64130965347945694872 , and stored in the RAM user area of ​​the microcontroller, such as image 3 shown.

[0050] Step B: The user needs to segment the password M according to his own needs: set the length of each password to be N 1 =6;N 2 =8;N 3 =10;N 4 =20, password segment M 1 for: 641309 ;Cipher segment M 2 for 64130965 ;Cipher segment M 3 for: 6413096534 ;Cipher segment M 4 for: 64130965347945694872 ,Such as image 3 shown.

[0051] Step C. Press the reset button once, and there will be a "beep" prompt sound, and then press the password setting button, and a continuous input prompt sound of "beep" will be issued, and then enter the password M from the keyboard: 64130965347945694872 , The digital tube displays the entered password; press th...

Embodiment 2

[0071] Below again take the Chinese phonetic alphabet of a Chinese sentence as the concrete example that password is set, describe a kind of microcomputer ascending position verification combination lock of the present invention in detail;

[0072] Chinese sentence: feel ∣ things that have been ∣ ∣ not necessarily understand it, only things that are understood can feel it more deeply;

[0073] Corresponding pinyin letters: gan jue ∣dao liao ∣de dong xi ∣bu yi ding li jie ta zhi you li jie liao de dong xi cai neng geng shen ke de gan jue ta.

[0074] Step A. Set the password M with a length of 87 bits: gan jue dao liao de dong xi bu yi ding li jie ta zhi you li jie liao de dong xi cai neng geng shen ke de gan jue ta, and store it in the RAM user of the microcontroller Area.

[0075] Step B: The user needs to segment the password M according to his own needs: set the length of each password to be N 1 =6;N 2 =13;N 3 =22; N 4 =87, password segment M 1For: gan jue; password s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A microcomputer bit addition verifying coded lock comprises the verifying process that a code M with a certain length is set; the code M is segmented: N1, N2, N3, N4...... Ni are set as the lengths of code segments, and meanwhile N1 & lt; N2 & lt; N3 & lt; N4...... & lt; Ni; the code segments at the first bit to the N1th bit of the code are named as M1, the code segments at the first bit to the N2th bit of the code are named as M2, the code segments at the first bit to the N3th bit of the code are named as M3,...... the code segments at the first bit to the Nith bit of the code are named as Mi; the code M1 is input during authentication, the authentication is passed if the input code is correct, if not, the code M2 is input, the authentication is passed if the input code M2 is correct, if not, the code M3 is input,...... till the final code segment Mi is input. The probability of mistakenly inputting code bit addition of a code possessor is very low for short codes, and the probability of mistakenly inputting code bit addition of a codebreaker is very high for long codes.

Description

technical field [0001] The invention relates to a microcomputer combination lock, in particular to a microcomputer upgrade verification combination lock. Background technique [0002] In the existing microcomputer password lock, once the user password is set, the password bits are fixed during the identity verification process, so the limited password bits cannot withstand exhaustive deciphering, and the security is poor. In order to ensure safety, the security of user passwords is now guaranteed by limiting the number of wrong passwords and depriving operation rights of entering wrong passwords beyond the limited number of times. Therefore, there is a contradiction that cannot be unified in the traditional microcomputer password lock, and the user is faced with a dilemma when setting the password: from a security point of view, the longer the password, the higher the security level; but the long password is difficult to remember, cumbersome to operate, and easy to enter mis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 吴成贵
Owner 吴成贵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products