Efficient encryption method based on registration service
A technology of registration service and encryption method, which is applied in the field of communication, can solve the problems of Internet information insecurity, Internet information leakage, social and economic losses, etc., and achieve the effect of active network security, prevention of hacker attacks, and elimination of imitation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0106] Such as figure 1 As shown, the registration service-based efficient encryption method user registration process of this embodiment includes:
[0107] The algorithm is implemented based on the registration service, so it is necessary to agree on the algorithm rules when registering. The algorithm rules are encrypted and saved under the user name on the server side, and the simplified parameters and program serial numbers are saved on the client side. The core algorithm rules are implemented through software and hardware. The specific steps as follows:
[0108] S101a, the network service center establishes an encrypted M sequence pool on the server side;
[0109] S102a, the characteristic number of operators of the network service center;
[0110] S103a, the characteristic number of network service center equipment;
[0111] S104a, the user connects to the Internet to perform a registration operation;
[0112] S105a. Associate the artificial feature number provided by...
Embodiment 2
[0116] Such as figure 2 As shown, the registration service-based efficient encryption method user login process of this embodiment includes:
[0117] S101b. The user logs in to the registration server with a user name and a password;
[0118] S102b. After confirming the user, the server randomly selects a set of M sequences from the agreed associated encryption M sequence scheme;
[0119] S103b. The server sends the password scheme to the user in the form of the number of schemes;
[0120] S104b. The server randomly selects the start bit of the feature number cycle;
[0121] S105b. The server transmits the cycle start bit users in an agreed method;
[0122] S106b. The user transmits a set of encrypted data to the server according to the specified data;
[0123] S107b. The server sends an instruction to the user after verifying OK.
Embodiment 3
[0125] Such as image 3 As shown, the user data encryption process of the high-efficiency encryption method based on registration services in this embodiment includes:
[0126] S101c. Determine the start bit of the characteristic number, and arrange the data according to the start bit;
[0127] S102c, perform operations according to a specified algorithm;
[0128] S103c. Send the first frame, and mark the number of frames in clear code;
[0129] S104c, the characteristic number circulates according to the agreed rules;
[0130] S105c, arrange the data according to the shifted characteristic number;
[0131] S106c. Send the second frame, and identify the number of frames;
[0132] S107c, the end of data sending, and the end of sending mark;
[0133] Such as Figure 4As shown, the user data decryption process of the high-efficiency encryption method based on the registration service in this embodiment includes:
[0134] S101d. Determine the frame number of received data; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



