Encryption and decryption method for identity authentication of user-free system

A technology of encryption, decryption, and identity verification, applied in user identity/authority verification, transmission system, digital transmission system, etc., can solve the problems of insecure data transmission and slow transmission, and reduce operation time, increase workload, and reduce operation. effect of steps

Pending Publication Date: 2021-10-15
陈飞
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides an encryption and decryption method without user system identity authentication, which is used to solve the situation of insecure and slow data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for identity authentication of user-free system
  • Encryption and decryption method for identity authentication of user-free system
  • Encryption and decryption method for identity authentication of user-free system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, and preferred embodiments described herein are intended to illustrate and explain the present invention, and is not intended to limit the invention.

[0074] Append figure 1 Attachment figure 2 Attachment image 3 Attach Figure 4 As shown, embodiments of the present invention provide an authentication and an encryption method based on client autonomous request, including:

[0075] S1 gets the client's timestamp and unique identification code,

[0076] S2 is calculated on the unique identification code and determines the absolute value of the calculation result;

[0077] S3 splicing the timestamp in the absolute value of the preset number, and assembles to a network request sent to the server;

[0078] S4 performs the network request to decompose the decision calculation of the decimal point disassembly, and determine whether the decimal point of the decimal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption and decryption method for identity authentication of a user-free system, and provides an identity authentication and encryption and decryption method based on an autonomous request of a client, which is characterized by comprising the following steps: S1, acquiring a timestamp and a unique identification code of the client, S2, carrying out hash code calculation on the unique identification code, and determining the absolute value of the calculation result; S3, splicing the absolute values of the timestamps with preset digits, and assembling the spliced absolute values to a network request sent to a server side, S4, carrying out encryption and decryption operation of decimal point disassembly on the network request, judging whether a post-decimal point face value and a pre-decimal point face value after the disassembly are the same or not, and if yes, determining that authentication succeeds; and if not, the authentication fails. According to the technical scheme, firstly, the security is considered, and the security of data transmission is ensured; as for accuracy, the numerical value of the unique identification code of the client is used for judgment and calculation of connection with the server, and the accuracy of butt joint of the two ends is greatly improved; and with regard to transmission efficiency, transmission links are increased, and the client autonomously requests connection, so that operation steps are reduced, and the working efficiency is improved.

Description

Technical field [0001] The present invention relates to the field of data communication and information security, and in particular, to a plus deciptical method without user system identity authentication. Background technique [0002] At present, the additional method of identity authentication of users and equipment is through the authentication code construction process, and the operation will be packet processing. According to the mild decryption of the expressive text, the encryption, the encryption management is analyzed, further, in addition to the group password In addition, the packet password is to be filled, the packet password algorithm itself and the encrypted result are no binding relationship, and the user cannot be authenticated. At the same time, the incomplete packet is subjected to handling, more timely, and in the data transmission process, Uncertain factors are too much, the intensity of encryption is not high, and it is easy to generate safety leak issues, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/60
CPCH04L9/3226H04L9/3236H04L9/3297H04L63/0428G06F21/602
Inventor 陈飞
Owner 陈飞
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products