CN106599705A - Encryption method for encrypting input character and corresponding pairing in corresponding library - Google Patents
Encryption method for encrypting input character and corresponding pairing in corresponding library Download PDFInfo
- Publication number
- CN106599705A CN106599705A CN201611201378.3A CN201611201378A CN106599705A CN 106599705 A CN106599705 A CN 106599705A CN 201611201378 A CN201611201378 A CN 201611201378A CN 106599705 A CN106599705 A CN 106599705A
- Authority
- CN
- China
- Prior art keywords
- data
- correspondence
- input
- word
- storehouse
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
The invention relates to the software field, and in particular relates to an encryption method for encrypting input character and corresponding pairing in a corresponding library. The data corresponding to the front part of the corresponding library is a result generated by encrypting general character and is different from the data of the general character; the data of the corresponding library used for the input character is ought to be consistent with this data; after the input character is combined with the password, the data corresponding to the front part of the corresponding library is automatically formed; the retrieval, the comparison and the use can be performed when the data is the same.
Description
Technical field
The present invention relates to software field, it is that the correspondence pairing being more particularly to input in word and correspondence storehouse is encrypted plus
Decryption method.
Background technology
Overall software is encrypted, is thing that each software company will do, this password should be decoded easily.
Correspondence its forward part in correspondence storehouse is the result after encryption, and the word of input should also be encrypted, could matched.
The content of the invention
The purpose of the present invention is:By the present invention, the correspondence in the word and correspondence storehouse of input is set to match and carry out adding
It is close.
The text for correspondingly matching the encryption method being encrypted, being further characterized in that to being input in input word and correspondence storehouse
Word is also encrypted, and automatically forms the data of correspondence forward part in correspondence storehouse;The word of described pair of input is also encrypted, and automatically
The data of correspondence forward part in correspondence storehouse are formed, is exactly that the cipher coding mode invented with me, the password of volume, and input are general
Word is combined, and automatically forms the data of correspondence forward part in correspondence storehouse.
Beneficial effect:Corresponding first half in correspondence storehouse, is the result generated after common language and encryption, and general text
The data of word are different;Word to being input into will be using correspondence storehouse, also should be consistent with this data;The word and password of input
With reference to after, the data of correspondence forward part in correspondence storehouse are automatically formed, data are the same, be only possible to retrieve and comparison is used.
Specific embodiment
Below the present invention is described in detail, and the technical scheme in the embodiment of the present invention is carried out clearly and completely
Description, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Specific embodiment
The text for correspondingly matching the encryption method being encrypted, being further characterized in that to being input in input word and correspondence storehouse
Word is also encrypted, and automatically forms the data of correspondence forward part in correspondence storehouse;The word of described pair of input is also encrypted, and automatically
The data of correspondence forward part in correspondence storehouse are formed, is exactly that the cipher coding mode invented with me, the password of volume, and input are general
Word is combined, and automatically forms the data of correspondence forward part in correspondence storehouse.
Operation principle:
Corresponding first half in correspondence storehouse, is the result generated after common language and encryption, and the data of common language differ
Sample;Word to being input into will be using correspondence storehouse, also should be consistent with this data;After the word of input and password are combined, automatically
Form the data of correspondence forward part in correspondence storehouse.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.To this
Various modifications of a little embodiments will be apparent for those skilled in the art, as defined herein general
Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not
Can be intended to be limited to the embodiments shown herein, and be to fit to consistent with principles disclosed herein and features of novelty
Most wide scope.
Claims (1)
1. the word for correspondingly matching the encryption method being encrypted, being further characterized in that to being input into being input in word and correspondence storehouse
Also encrypt, and automatically form the data of correspondence forward part in correspondence storehouse;The word of described pair of input is also encrypted, and shape automatically
The data of correspondence forward part in correspondence storehouse, are exactly the cipher coding mode invented with me, the password of volume, and the text that input is general
Word is combined, and automatically forms the data of correspondence forward part in correspondence storehouse.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611201378.3A CN106599705A (en) | 2016-12-22 | 2016-12-22 | Encryption method for encrypting input character and corresponding pairing in corresponding library |
CN201711394563.3A CN107944251A (en) | 2016-12-22 | 2017-12-21 | The password and its utilization that a kind of corresponding card produces |
PCT/CN2017/117853 WO2019119381A1 (en) | 2016-12-22 | 2017-12-21 | Password generated by corresponding card and application thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611201378.3A CN106599705A (en) | 2016-12-22 | 2016-12-22 | Encryption method for encrypting input character and corresponding pairing in corresponding library |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106599705A true CN106599705A (en) | 2017-04-26 |
Family
ID=58603113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611201378.3A Pending CN106599705A (en) | 2016-12-22 | 2016-12-22 | Encryption method for encrypting input character and corresponding pairing in corresponding library |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106599705A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
-
2016
- 2016-12-22 CN CN201611201378.3A patent/CN106599705A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107086915B (en) | Data transmission method, data sending end and data receiving end | |
MY192318A (en) | Data sending method and apparatus | |
CN103927357B (en) | Data encryption and retrieval method for database | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
GB2544672A (en) | PUF and address dependent data encryption | |
PH12018500778A1 (en) | Message authentication | |
US9641328B1 (en) | Generation of public-private key pairs | |
CN103942500B (en) | Hash ciphertext re-encryption method based on noise and decryption method after re-encryption | |
CN105246026A (en) | Secure pairing method for intelligent wearable equipment and other equipment | |
CN106357608B (en) | A kind of private data encryption and decryption method towards personal medical treatment & health data | |
CN105138585A (en) | Method and system for partial matching query of encrypted field in database | |
MX2018007696A (en) | Method and system for enhancing the security of a transaction. | |
CN106295403A (en) | A kind of data safety processing method based on hbase and system | |
CN104038336A (en) | Data encryption method based on 3DES | |
CN107248915A (en) | A kind of method for the data message dynamic encryption for preventing from being decrypted by violence | |
JP6487433B2 (en) | Apparatus and method for rekeying for use in a block cipher algorithm | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN105187418B (en) | Weak signature algorithm | |
JP2016525836A5 (en) | ||
GB2553913A (en) | Media key block based broadcast encryption | |
CN106599705A (en) | Encryption method for encrypting input character and corresponding pairing in corresponding library | |
CN102882675A (en) | Password encryption method for social network sites | |
CN106452728A (en) | Data encryption method | |
WO2015188202A3 (en) | Point-to-point secure data store and communication system and method | |
KR101584220B1 (en) | Encoding Method for Maintaining Sorting Order of Encrypted Data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170426 |