Pedigree code
A technology of verification code and password, which is applied in the field of verification code and can solve problems such as the vulnerability of public key encryption systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0057] The present invention will be further described below in conjunction with the examples, but not as a limitation of the present invention.
[0058] First notice:
[0059] a. In the above glossary, the definitions of public key and private key encryption in equations (1)-(4) are used conventionally, but the difference between the following two points should be emphasized: different parentheses are used to indicate the operation content;
[0060] b. The other definitions of equations (5)-(8) in the glossary above are reflections of the invention, and the following preferred embodiment descriptions illustrate the relevant principles of the invention in detail.
[0061] A "manufacturer" (ie creator, producer, or source); the first computer generates a set of several different codes: item code IC, manufacturer code MC, and virtual item code PIC. There is also a fourth cipher that contains information confirming the manufacturer: the manufacturer's fingerprint (MF), which is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More