Instruction cipher system and processing method

A cryptographic system and processing method technology, applied in the field of command cryptographic system, can solve problems such as inconvenient use of multi-command cryptographic system, loss of account funds, etc., and achieve the effects of easy acceptance by customers, clear responsibilities, and reduced possibility of profit

Inactive Publication Date: 2007-01-17
刘庆志
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the huge loss of account funds caused by the involuntary disclosure of the password by the bank instruction password system in the prior art, and the inconvenient technical problems of the multi-order password system, the present invention provides a The password will not cause a huge loss of account funds, and at the same time use a more convenient command password system
[0005] In order to overcome the huge loss of account funds caused by the involuntary disclosure of the password by the bank instruction password system in the prior art, and the inconvenient technical problems of the multi-order password system, the present invention provides a The password will not cause a huge loss of account funds, and at the same time use a more convenient command password processing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction cipher system and processing method
  • Instruction cipher system and processing method
  • Instruction cipher system and processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0017] The principle of the invention: In order to solve the resource loss risk problem caused by the involuntary leakage of the password without changing the reserved single password method of the existing command password system, such as the risk of fund loss in the bank account, the invention proposes a command password The theory of the system hides the instructions in the input password, and the input of the real password, instruction password or wrong password corresponds to different results. When entering the command password, only part of the resources can be controlled—that is, part of the balance of the account; it is very secretive, and after involuntary leakage, it not only protects most of the account balance, but also ensures personal safety. At the same time, the present invention provides a practical algorithm for parsing instruction pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for processing command cipher includes applying cipher calibrating module to define rule or algorithm for carrying out operation on input cipher and true cipher, enabling to arrange resource freely if input cipher is consistent with true cipher, executing command to shield resource and enabling to arrange resource partially if input cipher is consistent with predefined command cipher, confirming that input cipher is error cipher and resource can not be used if input cipher is not consistent with either true cipher or command cipher.

Description

【Technical field】 [0001] The invention relates to an instruction encryption system and an instruction encryption processing method. 【Background technique】 [0002] When the current bank account system is designed, when it involves payment, cash withdrawal, transfer and other transactions, the password is used to confirm the legitimacy of the customer's identity. As long as the password is passed, the transaction can be completed within the single or cumulative limit stipulated by the bank. [0003] If passwords are leaked involuntarily, there is a significant risk of financial loss for customers. Although it is possible to reserve multiple sets of passwords when the customer opens an account, the account will show different functional characteristics when using different passwords, thereby reducing the degree of damage to the account funds caused by the forced leakage of the password. However, there are obvious deficiencies in this solution: 1. The existing system of the ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/00G07F19/00
Inventor 刘庆志刘彦杰
Owner 刘庆志
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products