Unlock instant, AI-driven research and patent intelligence for your innovation.

Pedigree code

A technology of verification code and password, which is applied in the field of verification code and can solve problems such as the vulnerability of public key encryption systems

Inactive Publication Date: 2007-04-11
胡旂杨
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As further observed by Diffie and Hellman, public key encryption systems are vulnerable if logs mod q is easy to compute

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described below in conjunction with the examples, but not as a limitation of the present invention.

[0058] First notice:

[0059] a. In the above glossary, the definitions of public key and private key encryption in equations (1)-(4) are used conventionally, but the difference between the following two points should be emphasized: different parentheses are used to indicate the operation content;

[0060] b. The other definitions of equations (5)-(8) in the glossary above are reflections of the invention, and the following preferred embodiment descriptions illustrate the relevant principles of the invention in detail.

[0061] A "manufacturer" (ie creator, producer, or source); the first computer generates a set of several different codes: item code IC, manufacturer code MC, and virtual item code PIC. There is also a fourth cipher that contains information confirming the manufacturer: the manufacturer's fingerprint (MF), which is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Parallel and reflective coding structures inclusive of data from both parties to a transaction are propagated beginning with an algorithm derived maker's code, an item code unique to and associated with a single article made by a maker, and data identifying both the maker and the legitimate acquirer. Use of secure hash algorithms, single and double key encryption are suggested to obtain two virtually irreversible parallel coding structures that reflect the identities of the current and previous owner and are also mathematically reflective in that one code is derivable by either code structure in verification of both authenticity and ownership. Multiple modes of verification with coding printed on a receipt for the article are provided including Internet, offline computer, land line and SMS cellular telephone. Authenticity, non-repudiation, proof of legitimate ownership and provenance are provided for any article of value including pharmaceuticals and other consumable product warranting authentification.

Description

technical field [0001] The present invention is mainly concerned with cryptographic authentication, more precisely, with the cryptographic authentication of printed ciphers and computerized digital information generation, storage and access to a thing. Background technique [0002] Generally speaking, people think that the verification process includes three methods, sometimes used in succession, sometimes used simultaneously. The three methods are: physical distinction, manual authentication and encryption. For example, gold products are generally marked, indicating the gold content in carats: 14k, 18k, and so on. Likewise, silverware is often marked "sterling silver." It usually has other marks indicating the manufacturer, year, country and other information. These marks can be compiled into codes according to the order of the alphabet and the font size. For example, Britain uses this method to represent silverware made hundreds of years ago. [0003] But physical dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/00
CPCG07D7/0033G07D7/0047
Inventor 胡旂楊
Owner 胡旂杨