Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password encryption and multi-channel transmission method

An encryption method and multi-channel technology, which is applied in the field of password encryption and multi-channel transmission, can solve the problem of not being able to obtain secret password information

Inactive Publication Date: 2006-07-26
钱丽娜
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For practical applications, the (n, n) secret sharing scheme may also be used. Its principle is similar to the (2, 2) scheme, the difference is that a secret password is split into n sub-passwords, and only the n The secret password can only be obtained if all sub-passwords are obtained, and any information about the secret password cannot be obtained without any sub-password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password encryption and multi-channel transmission method
  • Password encryption and multi-channel transmission method
  • Password encryption and multi-channel transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In the context of applying for a credit card service:

[0073] First: For applicants who apply for a credit card in the business hall, the sub-password or slides are made by the credit card center of the bank, and one of the sub-passwords or a slide is handed over to the staff in charge of business promotion of the bank, in step 1 Among them, the service applicant (520) and the service provider (510) are the user and the credit card center of the bank respectively, and the application form filled out by the user must be obtained from the bank staff, where the bank staff can be the credit card business promotion staff of the bank . In step 2, the credit card center reviews the user's application form and archives the paper application form. In step 3, the bank's credit card center directly mails the credit card and another sub-password or another slide to the user (or only mails the credit card, And send another sub-password or another slide by other means, such as SMS ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to one order transmission method by use of secret sharing or visual cryptography or multi-signal channel suitable for order transmission, which Uses secret sharing or visual cryptography to code the order into multiple sub orders to add the difficulty of stealing orders as the single order can not get secret order any information; the legal user owns all orders through simple computation or transparent film to get original order.

Description

technical field [0001] The invention relates to a multi-channel password transmission method using secret sharing or visual cryptography. Its classification number is: H04K1 / 00, H04L9 / 00 Background technique [0002] In the current market, users want to apply for a certain service, such as applying for a bank credit card, purchasing a mobile phone SIM card (also including applying for an online account, applying for an online stock trading account) and other services. Here comes a big security risk. In addition, since the application for such services has relatively small transaction volume and does not involve ordinary computer operations, it is not necessary to equip each application user with a dedicated computer for each password transmission, let alone a dedicated encryption machine. Considering that users who apply for such services usually do not have cryptography knowledge, it is difficult to ensure that ordinary users can use it correctly even if they are equipped...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCG09C5/00
Inventor 钱丽娜
Owner 钱丽娜
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products