Multi-dimensional encryption and decryption method
An encryption method, multi-dimensional technology, applied in the field of encryption and decryption, can solve problems such as damage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment approach 1
[0016] Embodiment 1: Integrate the NFC chip with the motion sensor into a device similar to the Barabara fairy wand toy. When setting the password, pick up the device and first make a set of actions similar to the animation of a beautiful girl as the action information. The NFC of the motion sensor The chip senses the action information and transmits it to the device chip, and the device chip stores the read multi-dimensional operation information as multi-dimensional encrypted information, and the encryption is completed. Considering that the encryption and decryption process requires power supply, a button can be added to the device, and every time it is pressed, it will be powered on immediately. Press the button again and it will automatically shut down after 2 minutes. Every time you enter and exit the subway station, you need to make a set of actions similar to the animation of a beautiful girl. For specific actions, you must press the button at the same time and do a com...
Embodiment approach 2
[0017] Embodiment 2: Integrate the chip with the motion sensor into the alarm clock. When setting the password, pick up the alarm clock and sing (password information) to do a complete set of Tai Chi movements (password information). Alarm clock chip, the multi-dimensional operation information read by the alarm clock chip is stored as multi-dimensional encrypted information. After the encryption is completed, when you wake up every morning, you have to hold the alarm clock and sing (password information) and do a complete set of Tai Chi movements (password information) to turn off the beeping sound. During the exercise, the alarm clock will stop beeping, but Once it is still for more than 5 seconds, it will beep again. When the corresponding action is completed, a piece of celebratory music will sound, and then the alarm clock will be turned off. Otherwise, it will keep ringing once it is quiet.
Embodiment approach 3
[0018] Embodiment 3: Integrating a chip with a motion sensor into a wearable device. When setting the password, in front of the gate, complete the complete action within the specified 3 minutes, the motion sensor's sensing action information is transmitted to the gate, and the multi-dimensional operation information read is stored in the gate chip as multi-dimensional encrypted information. Top-secret places (such as inside the company, banking and finance, national defense secrets, etc.), before entering or leaving the gates of these places, press the password reading start button first, and one or more people must complete the complete action within the specified 3 minutes. Start the door switch. If there are multiple people, you can also set the same or different actions in turn to decrypt the switch. If there are multiple security gates, it can be set that each gate must perform different actions to activate the gate switch. It can be combined with voice passwords or butt...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com