Radix algorithm encryption method for dynamic password

A computing method and primary technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as affecting computer work, complex methods, and inability to comprehensively prevent

Inactive Publication Date: 2006-04-05
王松
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

3. The most advanced and complex is that hackers leave backdoors in client computers
The shortcoming of these methods is: 1, passive defense, can only guard against constantly updated " trojan horse ", hacker program by constantly upgrading, always lagging behind, headache cure head, foot pain cure foot, can't cure completely; 2, method is complicated , it is difficult for ordinary customers to master and use; 3.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0102] Implementation Mode 1: The basic version of the basic operation encryption method.

[0103] Simply adopt the above Encryption method 1 As an implementation, the decimal one-digit base return algorithm is used as a method of encryption and decryption, and the one-digit base return algorithm in which the single-digit base addition operation is used on the client side for encryption operations, which is an addition operation within 10. It is derived from changes, adopts the simplest calculation method, does not need to memorize complex calculation formulas, and has a fast calculation speed. The answer can be obtained by written and mental calculations. It is very easy to use and easy to be understood and accepted by customers. It is suitable for use in various cultures Level of customers, the most extensive customer base. Anyone who hasn't gone to school can use it.

[0104]The first two cracking methods adopted by hackers can be prevented completely, and there is suffi...

Embodiment approach 2

[0106] Embodiment 2: an advanced version of the basic operation encryption method. adopt Encryption method 6 two or more times the same or different Agreed basic operation rules Composite encryption using the base arithmetic encryption method.

[0107] In actual operation, the return code and additional code are transmitted in the media, and there is a possibility of being intercepted. Agreed basic operation rules It can be agreed in advance, not transmitted in the media, and there is no possibility of being intercepted by hackers. Therefore, even if the hacker adopts the most advanced third cracking method and can intercept the return code and additional code, he also knows that it is encrypted by the basic operation encryption method, and he does not know the specific Agreed basic operation rules Can't crack the password either. Therefore, the advanced version of the basic operation encryption method can theoretically completely prevent password theft.

[0108] The dis...

Embodiment approach 3

[0114] Embodiment 3: Communication version of the basic operation encryption method.

[0115] The hexadecimal base operation encryption method can be used in the field of communication and requires encrypted transmission of data (such as IP packets). Because hexadecimal numbers can be translated into ASCII characters, various symbols, letters, language characters, etc. through various code pages such as Unicode (Unicode), the basic operation encryption method can also encrypt various symbols, English letters, Chinese characters, Japanese, Korean and other languages.

[0116] The content of communication and data needs to be encrypted, which can be agreed as a static password. The important features of using the base operation encryption method in communication encryption are:

[0117] 1. The basic operation encryption method can directly encrypt various symbols, English letters, Chinese characters, Japanese, Korean and other languages ​​through various codes such as Unicode ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a basic operation encryption algorithm which is the discovery in the mathematics field and the application in the encryption field. And it is easy to be learned and spread. The invention can utilizes the variable false code (dynamic code) to solve the problem that the hacker can filch the code with the software as wooden horse. The server transmits the auxiliary code which has same number of bit with the user code to the client end, and the client utilizes the basic operation encryption algorithm to process the basic operation on the real code (stable code) and the auxiliary code, to attain the dynamic code as the false code which will be fed back to the server to be validated. Since each time the random auxiliary code is different, the dynamic code input by client is different, the invention can effectively prevent filching code. In addition, said basic operation encryption algorithm can apply the online bank, bank teller machine, POS, stock deals system, e-main system, online game, electronic business and communication.

Description

technical field [0001] The basic operation encryption method is the invention of the discovery in the field of mathematics, the invention of the algorithm and the application in the field of encryption based on this, and belongs to the single-key block cipher system. At the same time, it can be mixed with some known stream cipher encryption methods to enhance security. [0002] The main function of the basic operation encryption method is to protect the password! The dynamic password that can be calculated by the basic operation encryption method encrypts the static password that people are used to, which is easy to remember but easy to crack. Creatively combine the security of dynamic passwords with the ease of use of static passwords. Users only need to remember the original static password, not the dynamic password. The advanced version not only achieves one-time development on the server on the network, but also permanently and thoroughly prevents "Trojan horse" softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
Inventor 王松
Owner 王松
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products