Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encryption and decryption algorithm-based verification method and system, terminal and storage medium

An encryption and decryption algorithm and encryption algorithm technology, which is applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve problems such as being easily cracked, and achieve the effect of ensuring uniqueness and confidentiality.

Pending Publication Date: 2020-04-17
深圳新融典科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the process of commodity or data interaction, the front and back data are public. The verification of the corresponding relationship between the front and back data is easy to be cracked in a conventional way. A method is needed to ensure that the user can actually calculate the encryption result and ensure the encryption. Authenticity verification method and system with unrecognized method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption algorithm-based verification method and system, terminal and storage medium
  • Encryption and decryption algorithm-based verification method and system, terminal and storage medium
  • Encryption and decryption algorithm-based verification method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, a clear and complete description will be made below in conjunction with the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, and Not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] The authenticity verification method based on the encryption and decryption algorithm of the preferred embodiment of the present invention, such as figure 1 shown, see also figure 2 and image 3 , which is implemented as follows:

[0046] S01: Encrypt the label of the product through an encryption algorithm based on obfuscation, and store the encrypted data;

[0047] S02: When verifyi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption algorithm-based verification method. The method comprises the following steps: encryption of a label of a commodity is carried out through an encryption algorithm based on a confusion type, and the encrypted data are stored; when the authenticity of the commodity is checked, the encrypted data is reversely decrypted; and if the successfully decrypted comparison numbers are consistent, the label is true and legal, and if the decrypted comparison numbers are inconsistent, the label is illegal. When the confusion type encryption algorithm is adopted for encryption and decryption, a user can truly calculate an encryption result, the encryption method is also ensured not to be recognized, and therefore uniqueness and confidentiality legalityof number design are guaranteed.

Description

technical field [0001] The present invention relates to the technical field of authentication methods, and more specifically, to an authentication method, system, terminal and storage medium based on encryption and decryption algorithms. Background technique [0002] In the process of commodity or data interaction, the front and back data are public. The verification of the corresponding relationship between the front and back data is easy to be cracked in a conventional way. A method is needed to ensure that the user can actually calculate the encryption result and ensure the encryption. An authenticity verification method and system in which the method is not recognized. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide an authentication method, system, terminal and storage medium based on encryption and decryption algorithms in view of the above-mentioned defects of the prior art. [0004] The technical solutio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/0869H04L9/3228
Inventor 叶光红
Owner 深圳新融典科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products