Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital fingerprint processing and signature processing method and device, and storage medium

A technology of digital fingerprint and processing method, which is applied in the direction of electrical digital data processing, digital data protection, instruments, etc., and can solve problems such as insufficient security

Pending Publication Date: 2021-06-01
HUNAN YAOSHENG COMM TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the output length can be obtained directly from the output hash value, the scheme is not safe enough with only this one additional variable hash algorithm based on the existing MD5, SHA, SM3 and other algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital fingerprint processing and signature processing method and device, and storage medium
  • Digital fingerprint processing and signature processing method and device, and storage medium
  • Digital fingerprint processing and signature processing method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example ;

[0062] refer to figure 1 , one embodiment of the present invention provides a kind of digital fingerprint processing method, comprises the following steps:

[0063] S101. Obtain the bit length n of the binary sequence to be processed;

[0064] S102, setting the first positive real number r=2 H(X)-Len / n , H(X) is the normalized information entropy of the binary sequence, and Len is the preset digital fingerprint length of the binary sequence;

[0065] S103. Generate a positive integer key, and add a positive integer key to the first positive real number r to obtain a second positive real number r', where the second positive real number r' is smaller than the first positive real number r;

[0066] S104. Encode the binary sequence based on the weighted probability model to obtain the ciphertext; the weight coefficient in the weighted probability model is the second positive real number r′.

[0067] The coding process based on the weighted probability model in step S104 is as f...

no. 2 example ;

[0085] In order to make it easier for those skilled in the art to understand this solution, based on the first embodiment, an example of an actual application scenario is provided:

[0086] If the method of the first embodiment is applied to the smart door lock, the diversity of the lock cylinder can reach 480 million times, that is, there are 480 million different lock cylinders.

[0087] Assume that a company has purchased multiple smart door locks of the same brand and installed them in various places in the company. If the same password is set for the convenience of remembering the password, if someone cracks it, it will be found that the hash value stored inside is all In the same way, it can be deduced that multiple combination locks use the same password, and it is easy to break the whole ending. Its solution can only be that the user sets different passwords for each door lock, which is inconvenient for the user to manage passwords and also easily forgets the passwords...

no. 3 example ;

[0090] The solution of the first embodiment can be applied in multiple scenarios such as security encryption, unique identification, data verification, hash function, load balancing, and distributed caching. People's daily user password encryption usually uses hash functions such as MD5 and SHA. Because it is irreversible, using the method of the first embodiment can make small differences in dynamic encryption and the result after encryption is very different, so the security is better. it is good.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital fingerprint processing and signature processing method and device and a storage medium, and the digital fingerprint processing method comprises the steps: obtaining the bit length n of a to-be-processed binary sequence; setting a first positive real number r to be equal to 2H (X)-Len / n, wherein H (X) is the normalized information entropy of the binary sequence, and Len is the preset digital fingerprint length of the binary sequence; generating a positive integer key, adding the positive integer key to the first positive real number r to acquire a second positive real number r' ,wherein the second positive real number r' is smaller than the first positive real number r; coding the binary sequence based on a weighted probability model to obtain a ciphertext; wherein a weight coefficient in the weighted probability model is a second positive real number r '. On the basis that the output length of the Hash value can be changed, an additional encryption means, namely the secret key, is additionally added in the weight coefficient, so that the cracking difficulty can be greatly improved, and the security of data encryption is greatly improved.

Description

technical field [0001] The invention relates to the technical field of digital fingerprint signatures, in particular to a digital fingerprint processing and signature processing method, device and storage medium. Background technique [0002] Algorithms such as MD5, SHA, and SM3 are hash algorithms with relatively fixed output lengths currently on the market. These algorithms perform one-dimensional conversion from plaintext to hash value, and have a certain probability of being cracked by violence. For example: MD5-128, already Knowing that its output length is 128bit (bit), at this time, after high-frequency plaintext input such as "123456", the hash value output obtained is fixed and easy to identify. [0003] The application number is CN202010032694.2, and the Chinese invention patent titled "A Digital Fingerprint Processing and Signature Processing Method" provides a hash algorithm with a variable output digital fingerprint length. The Jelling code hash algorithm provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 王杰林欧阳斌肖镭李增应周浪
Owner HUNAN YAOSHENG COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products