Random encryption and identity authentication
An identity authentication and random encryption technology, applied in the usage of multiple keys/algorithms, etc., can solve the problems of illegal removal of the authenticator's device, loss of anti-theft function, high risk of theft, etc., to improve security, reliability and safety. The effect of improving sexuality and difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] Embodiment 1: Direct random password encryption and decryption system.
[0052]The random code generated by the authenticator uses the algorithm to directly operate the working method of identity authentication. This method can use a characteristic code or not. Feature codes for enhanced security. This method uses a large number of two-party consensus algorithms to convert the generated random code itself with the predetermined algorithm and then send it out or send it out directly. The other party restores the received data or encrypts the received data with another algorithm or directly uses another Encrypt with an algorithm or encrypt the data again with the same algorithm or send it back, the authenticator judges whether the data sent back is correct: directly compare the received data with the random code generated above, or restore the data with the inverse algorithm Compare the sent data, or compare the data after calculating the data like a key with the receive...
Embodiment 2
[0054] Embodiment 2: Single random encryption and decryption system
[0055] After the authenticated party sends its own characteristic code, the authenticating party receives the characteristic code sent by the authenticated party, searches for the corresponding record, confirms, extracts the corresponding information, and generates a random code or a pseudo-random code at the same time, using the initialization or last negotiation The fixed or non-fixed algorithm X encrypts a random code or pseudo-random code and its own internal code, or encrypts its own random internal code corresponding to the corresponding record, and sends the calculated value together with its own characteristic code, and the authenticated party accepts After receiving the information sent by the authenticator, decrypt the information according to the record, and obtain the data after removing the internal code of the authenticator or the corresponding random internal code, random code or pseudo-random ...
Embodiment 3
[0075] Embodiment 3: Multi-random encryption and decryption system
[0076] After the authenticated party sends out its own characteristic code, the authenticating party sends out its own characteristic code after receiving the characteristic code sent by the authenticated party, and the authenticated party searches and checks the records after receiving the characteristic code sent by the authenticating party, and generates a random code or Pseudo-random code, encrypted with a fixed or non-fixed algorithm that was initialized or last negotiated: random code or pseudo-random code, and its own internal code or its own random internal code corresponding to the corresponding record, and the calculated value and its own characteristic code After receiving the information sent by the authenticated party, the authenticating party searches for the corresponding record according to the characteristic code and extracts the information, decrypts the encrypted information sent by the auth...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 