Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification code or information encryption and decryption system

An information encryption and information decryption technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as theft of user identity and theft of customer money

Pending Publication Date: 2020-04-24
王升
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, many network systems use mobile phone dynamic verification codes to verify identity information. This verification method has been repeatedly exposed and intercepted by intercepting software, and then the identity of the user is stolen and the money of the customer is stolen.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code or information encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0024] Such as figure 1 shown

[0025] The technical solution of the present invention, wherein the system includes 1-verification code or information encryption module, 3-verification code or information decryption module;

[0026] The 1-verification code or information encryption module is integrated in the 2-public network for verification code or information encryption; the 1-verification code or information encryption module is integrated in the 2-public network, which can be integrated through the interface, or can be Integrate by embedding inside the website.

[0027] The 3-verification code or information decryption module is independent of the 2-public network system and is used by individual users alone to decrypt the verification code or information encrypted by individual users.

[0028] In the technical solution of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verification code or information encryption and decryption system, and aims to prevent user properties from being stolen by intercepting a verification code or user transaction information, stealing a user account, tampering the transaction information and the like through the verification code or information encryption and decryption system.

Description

technical field [0001] The invention relates to the Internet field, in particular to a verification code or information encryption and decryption system. Background technique [0002] At present, many network systems use mobile phone dynamic verification codes to verify identity information. This verification method has been repeatedly exposed and intercepted by interception software, and then the user's identity and money have been stolen. Contents of the invention [0003] In order to overcome the defects in the prior art, the object of the present invention is to use a verification code or information encryption and decryption system to solve the above problems. The present invention is achieved through the following technical solutions: [0004] The technical solution of the present invention, wherein the system includes a verification code or information encryption module, a verification code or information decryption module; [0005] The verification code or in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/083H04L63/0428H04L9/0863
Inventor 不公告发明人
Owner 王升