Radix algorithm encryption method for dynamic password
A computing method and primary technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as affecting computer work, complex methods, and inability to comprehensively prevent
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment approach 1
[0102] Implementation Mode 1: The basic version of the basic operation encryption method.
[0103] Simply adopt the above Encryption method 1 As an implementation, the decimal one-digit base return algorithm is used as a method of encryption and decryption, and the one-digit base return algorithm in which the single-digit base addition operation is used on the client side for encryption operations, which is an addition operation within 10. It is derived from changes, adopts the simplest calculation method, does not need to memorize complex calculation formulas, and has a fast calculation speed. The answer can be obtained by written and mental calculations. It is very easy to use and easy to be understood and accepted by customers. It is suitable for use in various cultures Level of customers, the most extensive customer base. Anyone who hasn't gone to school can use it.
[0104]The first two cracking methods adopted by hackers can be prevented completely, and there is suffi...
Embodiment approach 2
[0106] Embodiment 2: an advanced version of the basic operation encryption method. adopt Encryption method 6 two or more times the same or different Agreed basic operation rules Composite encryption using the base arithmetic encryption method.
[0107] In actual operation, the return code and additional code are transmitted in the media, and there is a possibility of being intercepted. Agreed basic operation rules It can be agreed in advance, not transmitted in the media, and there is no possibility of being intercepted by hackers. Therefore, even if the hacker adopts the most advanced third cracking method and can intercept the return code and additional code, he also knows that it is encrypted by the basic operation encryption method, and he does not know the specific Agreed basic operation rules Can't crack the password either. Therefore, the advanced version of the basic operation encryption method can theoretically completely prevent password theft.
[0108] The dis...
Embodiment approach 3
[0114] Embodiment 3: Communication version of the basic operation encryption method.
[0115] The hexadecimal base operation encryption method can be used in the field of communication and requires encrypted transmission of data (such as IP packets). Because hexadecimal numbers can be translated into ASCII characters, various symbols, letters, language characters, etc. through various code pages such as Unicode (Unicode), the basic operation encryption method can also encrypt various symbols, English letters, Chinese characters, Japanese, Korean and other languages.
[0116] The content of communication and data needs to be encrypted, which can be agreed as a static password. The important features of using the base operation encryption method in communication encryption are:
[0117] 1. The basic operation encryption method can directly encrypt various symbols, English letters, Chinese characters, Japanese, Korean and other languages through various codes such as Unicode ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com