Object trusted identity secure coding method
A security coding and identity technology, applied in the field of trusted identity security coding of things, can solve the problems of counterfeiting, forgery, tampering, and increasing security risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0021] The present invention will be further described below. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0022] Assume that the original code of the object is M, the name code of the manufacturer is N, the production date is P, and the production batch is Q. (M+N+P+Q) forms a complete description of the properties (or attributes) of the thing. We first define the summary of the information of the manufacturer of the object as H, that is: H=N+P+Q, if it is expected to use this method for security protection, then construct the security protection coding formula H'=f(x, H), x is the variable factor parameter, and f is the coding logic. M is the original information of the user, including the affiliated unit, scope of use, control level, etc., which are coded according to the coding rules of the user. Similarly, use the above method to construc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 