Electronic cigarette management method based on Jerlin code
A management method and technology of electronic cigarettes, applied in tobacco, electrical components, encryption devices with shift registers/memory, etc., can solve problems such as imitation and counterfeiting, weak protection, and lack of encryption and authentication functions, and achieve the goal of improving security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example ;
[0053]Referfigure 1 In one embodiment of the present invention, it provides an electronic cigarette management method based on Jielin code. It is used for cigarettes that are needed to match the cigarette, and electronic cigarettes include smoke and cigarettes. The processor includes a CPU and a storage unit; a storage unit and a flip-flop are provided in the smoke. The storage unit in the tobacco rod stores a first hash value and the LEN, and the first hash value encodes the preset algorithm by Jielin code algorithm, len is used by Jielin code algorithm coding process. Digital fingerprint length. In addition, the CPU in the smoke is used to perform functions such as calculation, call data. The memory cell in the smoke is used to store Jielin code algorithm packets and second plaintext, and the flip flops in the smoke are used to generate trigger signals after contact with the cigarette. It should be noted that there is a built-in power supply for power supply in the cigarette. The ...
no. 2 example ;
[0088]ReferFigures 2 to 4In one embodiment of the present invention, an electronic cigarette management method based on Jialin code is provided. Among them, electronic cigarettes include cigarettes and cigarettes, it should be noted that the internal structure of the tobacco rod and the cigarette has been put forward in the first embodiment, and details will not be described herein. The method includes the following steps:
[0089]S201, set the first password through the client, and then encode the first password through the Jubin code algorithm to obtain the first hash value.
[0090]The client referred to here is a client-based client, such as through the mobile phone and the first client, encoding the first hash value on the phone.
[0091]The specific embodiment of step S201 is:
[0092]S2011 converts the first password into a first binary sequence.
[0093]S2012, randomly generates a positive integer LEN, set the LEN as a preset digital fingerprint length, set the positive real numberH (X)1) ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


