Multi-dimensional encryption and decryption method

An encryption method, multi-dimensional technology, applied in the field of encryption and decryption, can solve problems such as damage

Inactive Publication Date: 2018-01-09
GUANGDONG TAKSTAR ELECTRONIC CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problems that various damage risks may be encountered after the smart card with various functions mentioned above is lost, the present invention provides a safe and precise multi-dimensional encryption and decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0016] Embodiment 1: Integrate the NFC chip with the motion sensor into a device similar to the Barabara fairy wand toy. When setting the password, pick up the device and first make a set of actions similar to the animation of a beautiful girl as the action information. The NFC of the motion sensor The chip senses the action information and transmits it to the device chip, and the device chip stores the read multi-dimensional operation information as multi-dimensional encrypted information, and the encryption is completed. Considering that the encryption and decryption process requires power supply, a button can be added to the device, and every time it is pressed, it will be powered on immediately. Press the button again and it will automatically shut down after 2 minutes. Every time you enter and exit the subway station, you need to make a set of actions similar to the animation of a beautiful girl. For specific actions, you must press the button at the same time and do a com...

Embodiment approach 2

[0017] Embodiment 2: Integrate the chip with the motion sensor into the alarm clock. When setting the password, pick up the alarm clock and sing (password information) to do a complete set of Tai Chi movements (password information). Alarm clock chip, the multi-dimensional operation information read by the alarm clock chip is stored as multi-dimensional encrypted information. After the encryption is completed, when you wake up every morning, you have to hold the alarm clock and sing (password information) and do a complete set of Tai Chi movements (password information) to turn off the beeping sound. During the exercise, the alarm clock will stop beeping, but Once it is still for more than 5 seconds, it will beep again. When the corresponding action is completed, a piece of celebratory music will sound, and then the alarm clock will be turned off. Otherwise, it will keep ringing once it is quiet.

Embodiment approach 3

[0018] Embodiment 3: Integrating a chip with a motion sensor into a wearable device. When setting the password, in front of the gate, complete the complete action within the specified 3 minutes, the motion sensor's sensing action information is transmitted to the gate, and the multi-dimensional operation information read is stored in the gate chip as multi-dimensional encrypted information. Top-secret places (such as inside the company, banking and finance, national defense secrets, etc.), before entering or leaving the gates of these places, press the password reading start button first, and one or more people must complete the complete action within the specified 3 minutes. Start the door switch. If there are multiple people, you can also set the same or different actions in turn to decrypt the switch. If there are multiple security gates, it can be set that each gate must perform different actions to activate the gate switch. It can be combined with voice passwords or butt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of encryption and decryption, in particular to a multi-dimensional encryption and decryption method. The encryption method comprises the steps that a device or APP obtains multi-dimensional operating information of a user, wherein the multi-dimensional operating information is limb sound actions of the user and / or action information of the user to the device or APP; the device or APP uses the read multi-dimensional operating information as multi-dimensional encryption information to be saved. The decryption method comprises the steps that the user provides a set of multi-dimensional operating information completely same as the information during encryption for the device or APP, and the device or APP is unlocked. The APP refers to various devices or functional machines which can be held. A secret key set in the method is very high in the safety level, and the loss risk caused after the device is lost is completely eradicated.

Description

technical field [0001] The invention relates to the technical field of encryption and decryption, in particular to a multi-dimensional encryption and decryption method. Background technique [0002] There are more and more smart cards with NFC functions, such as various bus cards, meal cards, access control cards, and work cards. If these cards are lost, those who pick them up or steal them can continue to use these cards, and then may steal the property in the card or steal (through smart cards to enter the company's top secret room, etc.) business secrets, causing great losses to the loser . An existing encryption and decryption operation generally needs to read the face password first, then speak the voice password, then read the key password, and finally read the fingerprint password in chronological order. dimension triggered. Password security is poor. Contents of the invention [0003] Aiming at the problem that various damage risks may be encountered after the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/32H04L9/32
Inventor 杨志豪陈子中
Owner GUANGDONG TAKSTAR ELECTRONIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products