Man-machine interaction application method in cryptology field based on contact connection control instruction

A technology of control instructions and human-computer interaction, applied to encryption devices with shift registers/memory, key distribution, can solve the problems of difficulty in protection, long passwords, and high input time cost, and reduce the number of deciphered. risk, increase the strength of the password, improve the effectiveness of the protection

Active Publication Date: 2019-12-24
陈超
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Risk of short passwords: Short passwords are difficult to protect
[0005] 2. Memory risk: the password is long and difficult to remember
[0006] 3. Input time cost risk: the longer the password, the higher the input time cost
[0007] 4. Risk of peeping: the input environment is seen, can be guessed, and there is a risk of peeping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-machine interaction application method in cryptology field based on contact connection control instruction
  • Man-machine interaction application method in cryptology field based on contact connection control instruction
  • Man-machine interaction application method in cryptology field based on contact connection control instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] see figure 1 , figure 2 , image 3 , Figure 4 with Figure 5 , the present invention provides a technical solution: a human-computer interaction application method in the field of cryptography based on contact connection control instructions, comprising the following steps:

[0037] In order to facilitate the use of ordinary security level users, through the point and line command method, users can directly use the designed "custom point point point line gesture password", the password possibility is: 9 kinds of characters^9 dot matrix sequences^9 The combination of points and lines to the power of 1.9662705047555291361807590852691e+77 is the possibility of this super large value.

[0038] Step 1: Log in to the platform through the network, register and receive the "unique terminal device" according to the rules, and the "unique terminal device" is used as the only login account and password input device;

[0039] Step 2: Start the user's "unique terminal device"...

Embodiment 2

[0052] see figure 1 , figure 2 , image 3 , Image 6 , Figure 7 with Figure 8 , a human-computer interaction application method in the field of cryptography based on a contact connection control instruction, comprising the following steps:

[0053] In order to facilitate the use of users with a higher security level, users can use the "custom parent logical point-line gesture password" through the command method of point and line. The possibility of forming a password is: 70 kinds of characters^9 dot matrix sequences^9 The dot-line combination of power may=2.8375350918001070782446106276312e+149 super large number possibility password.

[0054] Step 1: Log in to the platform through the network, register and receive the "unique terminal device" according to the rules, and the "unique terminal device" is used as the only login account and password input device;

[0055] Step 2: Start the user's "unique terminal device" to connect to the smart device or computer, and ope...

Embodiment 3

[0069] see figure 1 , figure 2 , image 3 , Figure 9 with Figure 10 , a human-computer interaction application method in the field of cryptography based on a contact connection control instruction, comprising the following steps:

[0070] In order to better improve the user's security level, the user can use the "plane array dot-line gesture password", and the possibility of forming the password is: 70 kinds of characters^81-bit password^9 dot matrix sequences^9 dotted lines Combination possibility = a super strong password for a super large number (which cannot be calculated by the computer's built-in calculator).

[0071] Step 1: Log in to the platform through the network, register and receive the "unique terminal device" according to the rules, and the "unique terminal device" is used as the only login account and password input device;

[0072] Step 2: Start the user's "unique terminal device" to connect to the smart device or computer, and open the platform throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a man-machine interaction application method in the cryptology field based on a contact connection control instruction, and the method comprises the following steps: 1, loggingin a platform through a network, registering an account according to a rule, and getting unique terminal equipment as an account, and enabling the unique terminal equipment to serve as a unique loginaccount and password input equipment; 2, starting a user 'unique terminal device' to connect an intelligent device or a computer, and opening a platform through a network to carry out account verification and password input; 3, setting a password according to a custom password design rule, and performing multilayer grouping conversion on the password by a background through prompt operation of aplatform and a display screen; the number of the point locations of the language logic can be any number, the protection effect of the password is greatly improved, the language logic language characters can use any language characters as the basis, and new artificial symbols are used for improving the password strength, so that the risk that the password is decoded is reduced while the requirement of customizing the password by a client is met, and the use of the user is facilitated.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a human-computer interaction application method in the field of cryptography based on a contact connection control command. Background technique [0002] At present, the normal 9-grid unlocking is a very long line composed of random points. The mathematical possibility is 9 to the 9th power (9^9) possibilities, which is 387,420,489. The principle of Morse code is to hide the original text, combined with X smart screen origins for new language conversion and secrecy, the method is "a random combination of up to 5 digits superimposed on the same point and a maximum of 5 digits superimposed on a line", instead of 26 letters and 10 numbers. Due to the use of the international master table, the password can be deciphered reversely at present, and in the new functional era, a single point and a single line are no longer effective means of protection. According to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L29/06
CPCH04L9/0863H04L9/0822H04L9/0894H04L9/0643H04L63/0815Y02P90/02
Inventor 陈超
Owner 陈超
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products