CN106650334A - Use method for accelerating encryption and decryption replacement period - Google Patents
Use method for accelerating encryption and decryption replacement period Download PDFInfo
- Publication number
- CN106650334A CN106650334A CN201611201381.5A CN201611201381A CN106650334A CN 106650334 A CN106650334 A CN 106650334A CN 201611201381 A CN201611201381 A CN 201611201381A CN 106650334 A CN106650334 A CN 106650334A
- Authority
- CN
- China
- Prior art keywords
- software
- software website
- mobile phone
- user
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 7
- 230000001788 irregular Effects 0.000 claims description 5
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to the field of software and in particular relates to a use method for accelerating an encryption and decryption replacement period. A software website irregularly inquires mobile phones of users; the mobile phones can automatically response self specific codes meeting registration material; the software website can automatically change a code lock and change a user key; the user can normally use; and quick crack, embezzlement and pirate of the mobile phone can be avoided.
Description
Technical field
The present invention relates to software field, more particularly to accelerates encryption and decrypts the using method of replacement cycle.
Background technology
Overall software is encrypted, is thing that each software company will do, this password should be decoded easily.
Accelerate the replacement cycle, insurance.
The content of the invention
The purpose of the present invention is:By the present invention, avoid usurping as far as possible, pirate.
Accelerate encryption and decrypt the using method of replacement cycle, be further characterized in that software website sends inquiry and obtains just
True response;
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry
Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
Beneficial effect:The irregular mobile phone to user in software website sends inquiry, and it is specific that mobile phone automatically replies the machine
Coding, meets data during registration, and software website also can automatically change the key of user automatically while coded lock is changed
Spoon, user can normally use, it is to avoid be cracked quickly, usurp, pirate.
Specific embodiment
Below the present invention is described in detail, and the technical scheme in the embodiment of the present invention is carried out clearly and completely
Description, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Specific embodiment
Accelerate encryption and decrypt the using method of replacement cycle, its feature also sends inquiry and obtains correct in software website
Response.
The present embodiment is further arranged to:
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry
Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
Operation principle:
The irregular mobile phone to user in software website sends inquiry, and mobile phone automatically replies the machine specific coding, meets registration
When data, software website can automatically change coded lock while, the key of user has also been changed automatically, user can
Normally use.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.To this
Various modifications of a little embodiments will be apparent for those skilled in the art, as defined herein general
Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not
Can be intended to be limited to the embodiments shown herein, and be to fit to consistent with principles disclosed herein and features of novelty
Most wide scope.
Claims (1)
1. accelerate encryption and decrypt the using method of replacement cycle, be further characterized in that software website sends inquiry and obtains correct
Response;
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry
Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611201381.5A CN106650334A (en) | 2016-12-22 | 2016-12-22 | Use method for accelerating encryption and decryption replacement period |
CN201711394563.3A CN107944251A (en) | 2016-12-22 | 2017-12-21 | The password and its utilization that a kind of corresponding card produces |
PCT/CN2017/117853 WO2019119381A1 (en) | 2016-12-22 | 2017-12-21 | Password generated by corresponding card and application thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611201381.5A CN106650334A (en) | 2016-12-22 | 2016-12-22 | Use method for accelerating encryption and decryption replacement period |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106650334A true CN106650334A (en) | 2017-05-10 |
Family
ID=58826491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611201381.5A Pending CN106650334A (en) | 2016-12-22 | 2016-12-22 | Use method for accelerating encryption and decryption replacement period |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650334A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
-
2016
- 2016-12-22 CN CN201611201381.5A patent/CN106650334A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019119381A1 (en) * | 2016-12-22 | 2019-06-27 | 陈勇 | Password generated by corresponding card and application thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105722067B (en) | Data method for encryption/decryption and device on mobile terminal | |
CN1315268C (en) | Method for authenticating users | |
WO2004046846A3 (en) | Automatically generated cryptographic functions for renewable tamper resistant security systems | |
CN105681025A (en) | Security white box realizing method and device for national cipher standard algorithm SM4 | |
WO2006124564A3 (en) | Apparatus for secure digital content distribution and methods therefor | |
RU2008148144A (en) | METHODS AND SYSTEMS FOR PROVIDING A DELAY ON DELIVERY IN A DISTRIBUTION NETWORK | |
CN1746848A (en) | Long-distance updating method of fixed programm of information safety apparatus | |
CN1422399A (en) | System and process for storing securely secret information, apparatus and server to be used in such a system and method for distribution of a digital content | |
CN104038761A (en) | Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping | |
CN104268447A (en) | Encryption method of embedded software | |
CN103177225B (en) | A kind of data managing method and system | |
CN1901443A (en) | Remote de-locking method of information safety device | |
CN1366631A (en) | Method and apparatus for secure content distribution | |
CN105763525A (en) | Identification code generation method, device, identification code decryption method and device | |
RU2016140212A (en) | SYSTEM ARCHITECTURE AND METHOD OF MAKING NETWORK INFORMATION SECURITY | |
CN106650334A (en) | Use method for accelerating encryption and decryption replacement period | |
CN105959099A (en) | Method for encrypting SSR password | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN101453329A (en) | Method for enhancing system security by pre-login | |
CN102624892B (en) | A kind of method preventing plug-in client simulation HTTP request | |
CN108322750B (en) | Encrypted domain HEVC video data hiding method based on residual coefficient modulation | |
JP2016525836A5 (en) | ||
GB2553913A (en) | Media key block based broadcast encryption | |
CN106452728A (en) | Data encryption method | |
CN102546822A (en) | Network hard drive utilization method for ensuring file not to be stolen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170510 |
|
WD01 | Invention patent application deemed withdrawn after publication |