CN106650334A - Use method for accelerating encryption and decryption replacement period - Google Patents

Use method for accelerating encryption and decryption replacement period Download PDF

Info

Publication number
CN106650334A
CN106650334A CN201611201381.5A CN201611201381A CN106650334A CN 106650334 A CN106650334 A CN 106650334A CN 201611201381 A CN201611201381 A CN 201611201381A CN 106650334 A CN106650334 A CN 106650334A
Authority
CN
China
Prior art keywords
software
software website
mobile phone
user
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611201381.5A
Other languages
Chinese (zh)
Inventor
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611201381.5A priority Critical patent/CN106650334A/en
Publication of CN106650334A publication Critical patent/CN106650334A/en
Priority to CN201711394563.3A priority patent/CN107944251A/en
Priority to PCT/CN2017/117853 priority patent/WO2019119381A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the field of software and in particular relates to a use method for accelerating an encryption and decryption replacement period. A software website irregularly inquires mobile phones of users; the mobile phones can automatically response self specific codes meeting registration material; the software website can automatically change a code lock and change a user key; the user can normally use; and quick crack, embezzlement and pirate of the mobile phone can be avoided.

Description

Accelerate encryption and decrypt the using method of replacement cycle
Technical field
The present invention relates to software field, more particularly to accelerates encryption and decrypts the using method of replacement cycle.
Background technology
Overall software is encrypted, is thing that each software company will do, this password should be decoded easily.
Accelerate the replacement cycle, insurance.
The content of the invention
The purpose of the present invention is:By the present invention, avoid usurping as far as possible, pirate.
Accelerate encryption and decrypt the using method of replacement cycle, be further characterized in that software website sends inquiry and obtains just True response;
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
Beneficial effect:The irregular mobile phone to user in software website sends inquiry, and it is specific that mobile phone automatically replies the machine Coding, meets data during registration, and software website also can automatically change the key of user automatically while coded lock is changed Spoon, user can normally use, it is to avoid be cracked quickly, usurp, pirate.
Specific embodiment
Below the present invention is described in detail, and the technical scheme in the embodiment of the present invention is carried out clearly and completely Description, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Specific embodiment
Accelerate encryption and decrypt the using method of replacement cycle, its feature also sends inquiry and obtains correct in software website Response.
The present embodiment is further arranged to:
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
Operation principle:
The irregular mobile phone to user in software website sends inquiry, and mobile phone automatically replies the machine specific coding, meets registration When data, software website can automatically change coded lock while, the key of user has also been changed automatically, user can Normally use.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.To this Various modifications of a little embodiments will be apparent for those skilled in the art, as defined herein general Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not Can be intended to be limited to the embodiments shown herein, and be to fit to consistent with principles disclosed herein and features of novelty Most wide scope.

Claims (1)

1. accelerate encryption and decrypt the using method of replacement cycle, be further characterized in that software website sends inquiry and obtains correct Response;
The software website sends inquiry and obtains correct response, and the irregular mobile phone to user in software website sends inquiry Ask, mobile phone automatically replies the machine specific coding, software website judges to meet data when not meeting registration.
CN201611201381.5A 2016-12-22 2016-12-22 Use method for accelerating encryption and decryption replacement period Pending CN106650334A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201611201381.5A CN106650334A (en) 2016-12-22 2016-12-22 Use method for accelerating encryption and decryption replacement period
CN201711394563.3A CN107944251A (en) 2016-12-22 2017-12-21 The password and its utilization that a kind of corresponding card produces
PCT/CN2017/117853 WO2019119381A1 (en) 2016-12-22 2017-12-21 Password generated by corresponding card and application thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611201381.5A CN106650334A (en) 2016-12-22 2016-12-22 Use method for accelerating encryption and decryption replacement period

Publications (1)

Publication Number Publication Date
CN106650334A true CN106650334A (en) 2017-05-10

Family

ID=58826491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611201381.5A Pending CN106650334A (en) 2016-12-22 2016-12-22 Use method for accelerating encryption and decryption replacement period

Country Status (1)

Country Link
CN (1) CN106650334A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119381A1 (en) * 2016-12-22 2019-06-27 陈勇 Password generated by corresponding card and application thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119381A1 (en) * 2016-12-22 2019-06-27 陈勇 Password generated by corresponding card and application thereof

Similar Documents

Publication Publication Date Title
CN105722067B (en) Data method for encryption/decryption and device on mobile terminal
CN1315268C (en) Method for authenticating users
WO2004046846A3 (en) Automatically generated cryptographic functions for renewable tamper resistant security systems
CN105681025A (en) Security white box realizing method and device for national cipher standard algorithm SM4
WO2006124564A3 (en) Apparatus for secure digital content distribution and methods therefor
RU2008148144A (en) METHODS AND SYSTEMS FOR PROVIDING A DELAY ON DELIVERY IN A DISTRIBUTION NETWORK
CN1746848A (en) Long-distance updating method of fixed programm of information safety apparatus
CN1422399A (en) System and process for storing securely secret information, apparatus and server to be used in such a system and method for distribution of a digital content
CN104038761A (en) Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping
CN104268447A (en) Encryption method of embedded software
CN103177225B (en) A kind of data managing method and system
CN1901443A (en) Remote de-locking method of information safety device
CN1366631A (en) Method and apparatus for secure content distribution
CN105763525A (en) Identification code generation method, device, identification code decryption method and device
RU2016140212A (en) SYSTEM ARCHITECTURE AND METHOD OF MAKING NETWORK INFORMATION SECURITY
CN106650334A (en) Use method for accelerating encryption and decryption replacement period
CN105959099A (en) Method for encrypting SSR password
KR101358375B1 (en) Prevention security system and method for smishing
CN101453329A (en) Method for enhancing system security by pre-login
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN108322750B (en) Encrypted domain HEVC video data hiding method based on residual coefficient modulation
JP2016525836A5 (en)
GB2553913A (en) Media key block based broadcast encryption
CN106452728A (en) Data encryption method
CN102546822A (en) Network hard drive utilization method for ensuring file not to be stolen

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170510

WD01 Invention patent application deemed withdrawn after publication