Cipher character string generation method and apparatus

A string and password technology, which is applied in the field of password generation, can solve the problems of threatening the security of payment activities and property security, the high probability of password string repetition, and the password string being easily guessed and cracked.

Inactive Publication Date: 2016-12-07
GUANGZHOU ZHENGFENG ELECTRON TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing methods for generating password strings have problems such as using a single password string generation algorithm to generate password strings, fixed and simple password string generation rules, and high probability of repetition of generated password strings, which lead to the generation of password strings. The password string is easy to guess and crack, which will eventually threaten the security of payment activities and the safety of people's property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher character string generation method and apparatus
  • Cipher character string generation method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cipher character string generation method. The method comprises the following steps: prestoring multiple encryption algorithms; acquiring data to be encrypted in a data set S of cipher character strings to be generated; and by use of the encryption algorithms, performing encryption operation on the data to be encrypted so as to generate the cipher character strings. According to the embodiments of the invention, the cipher character strings are generated through arrangement of the multiple encryption algorithms, and the method and apparatus have the positive effects of reducing the risk of cracking the cipher character strings and improving the security of the cipher character string.

Description

technical field [0001] The present invention relates to the technical field of password generation methods, in particular to a method and device for generating password strings. Background technique [0002] At present, with the popularity of touch screen technology on smart terminal devices, mobile payment methods are becoming more and more popular in the process of commodity transactions. When using mobile payment methods for payment activities, traders often need to enter passwords or verify code; for example, when people use Alipay, WeChat and other payment methods to pay, and open the relevant function to pay the corresponding payment, they will get a password string, which is crucial to the security of the entire payment activity as a security verification code. role. [0003] However, the existing methods for generating password strings have problems such as using a single password string generation algorithm to generate password strings, fixed and simple password st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829G06Q20/3823
Inventor 李正端
Owner GUANGZHOU ZHENGFENG ELECTRON TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products