WO2012100661A1 - Method for electronic blind card verification - Google Patents

Method for electronic blind card verification Download PDF

Info

Publication number
WO2012100661A1
WO2012100661A1 PCT/CN2012/000128 CN2012000128W WO2012100661A1 WO 2012100661 A1 WO2012100661 A1 WO 2012100661A1 CN 2012000128 W CN2012000128 W CN 2012000128W WO 2012100661 A1 WO2012100661 A1 WO 2012100661A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
password
server
value
client
Prior art date
Application number
PCT/CN2012/000128
Other languages
French (fr)
Chinese (zh)
Inventor
郭君艳
Original Assignee
Guo Junyan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guo Junyan filed Critical Guo Junyan
Publication of WO2012100661A1 publication Critical patent/WO2012100661A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • the present invention relates to an electronic dark card system, and more particularly to an electronic dark card verification method. Background technique
  • the randomness of the system's dark cards can be verified, thereby ensuring the true randomness of the system's licensing and avoiding system cheating; at the same time, the user obtains a good user by verifying the authenticity of the card selected by himself. Experience and thus willing to continue to trust and use the system.
  • an electronic dark card verification method comprising the steps of:
  • one or more clients receive a card request message from the user and send the card request message to the server; (2) the server receives the card request message from the client, according to the The card request message generates a randomly scrambled card; (3) the server generates a password for each card, and saves the password to the password book; (4) the server is according to the client The number divides the card's password into a password segment; (5) the server sends the card carrying the password segment and the codebook to each of the clients; (6) the client from Receiving, by the server, the card carrying the cipher segment and the codebook; (7) selecting the card by the client and manipulating the selected card; (8) if the client has completed the card selection and is selected Controlling the card, displaying the card value to the user and splicing the code segment, and comparing the card value corresponding to the password formed by the combination of the password segments with the original card value corresponding to the same password in the password book, If the card values are the same, the verification is successful, otherwise the verification fails.
  • the server and the client are located on the same device or on different devices.
  • the client is a browser.
  • the codebook adopts one or several of the following file formats: a text file, an email or a short message.
  • the password is selected from one or more of a number, a letter, a picture, a special symbol, a formula or an inequality.
  • the step of the server splitting the password of the card into the password segment according to the number of the clients further comprises: performing password splitting according to the number of the clients according to a random ratio, the ratio is between 30 Between % and 70%, including end values.
  • said server transmits a card carrying said cryptogram and said codebook to each of said clients, wherein: said card of said card carrying said cryptographic segment transmitted to said respective said client The values are the same and the cipher fragments are different.
  • FIGS. 1A-1C are schematic diagrams showing configurations of a plurality of exemplary electronic hash systems; and Fig. 2 is a flow chart illustrating electronic dark card verification in accordance with one embodiment of the present invention
  • Figure 3A is a schematic diagram illustrating a Parker card in accordance with one embodiment of the present invention
  • Figure 3B is a schematic diagram illustrating the codebook of the Parker card of Figure 3A, in accordance with one embodiment of the present invention
  • FIG. 4A- 4 E on the display device is a sample screen provided on the device in accordance with a Embodiments of the present invention perform verification of Parker's cards. detailed description
  • FIG. 1A an example configuration is shown in which the electronic hash system 10a includes a single device 20.
  • Device 20 includes a display 22 in which cards are displayed to the user along with other outputs.
  • Display 22 can also include a touch screen adapted to receive input from a user.
  • An image of the control button (not shown) can be displayed on the touch screen, and a button pressed by the user through the touch screen can be detected.
  • device 20 may provide the user with a physical control key.
  • device 20 will also include other components not shown in the figures. For example, include a card reader.
  • system 10b includes a plurality of devices 20 (e.g., device 20 in FIG. 1A) within network 30.
  • each device 20 is connected to a central server 32 in network 30 that controls the dark card system provided to device 20.
  • device 20 and central server 32 communicate with one another in a known manner to provide a hidden card system for user manipulation.
  • central server 32 can communicate data generated by it representing the status or results of the processing phase to device 20. This data is processed by the client application executing on device 20 to display the appropriate output from the hidden system to the user.
  • Devices 20 in a dark card system may be located at the same physical location. Alternatively, devices 20 in a dark card system may be distributed across multiple physical locations.
  • Figure 1C illustrates yet another example configuration in which the hidden card system 10c packages a plurality of sub-networks 34, wherein each sub-network 34 can be established at a different physical location. Subnetworks 34 are connected together by network 30.
  • devices 20 in the hidden card system 10b and/or the hidden card system 10c may constitute a wide area network, where 20 is a personal computer connected together via the Internet, a corporate intranet or other network, and is monitored by the central server 32.
  • the personal computer can be a desktop computer, a laptop computer, or some other computing device.
  • the user can download the client application system to the personal computer from the website of an electronic dark card system operator via the Internet, or copy the client application system from the compact disk or other medium to the personal computer, and execute the client application system for corresponding processing.
  • the user can connect to the central server 32 for processing directly through the browser without executing the client application system.
  • the user's input can be received by a mouse or other input device connected to the personal computer in a known manner.
  • the apparatus 20 on which the method of the electronic hash system can be implemented is not limited to video terminals and computing devices, but may also include, for example, other electromechanical machines, interactive televisions, wireless mobile devices, and any other including display and processing devices.
  • Those of ordinary skill in the art will be able to implement these methods on any standard microprocessor based machine or device with appropriate changes or modifications.
  • FIG. 1A through 1C are provided by way of example only, and in various variant implementations may be other configured devices 20. It will be appreciated that the functionality of the central server 32 may also be provided, for example, by one or more devices 20, but not as a separate device.
  • step 42 the user enters a deal request message on a respective client, such as device 20-1, requesting the card system 10a, 10b or 10c to deal.
  • client receives the card request message and sends the message to a server, such as central server 32, requesting the server to provide the service.
  • server receives a deal request message, and generates a randomly scrambled card based on the request message.
  • the server In step 48, the server generates a unique password for each card, and the generated password can be, for example, a number, letter, picture, special symbol, formula, inequality, or any combination of the above, and save the password to the password.
  • the password book can be, for example, a text file, an email or a short message, or any combination of the above.
  • the server splits the password into password segments. When splitting, the server can split according to the number of users requested, for example, with 3 users, then the ratio can be: 30%, 30 % and 40%, 10%, 20% and 70%, 0%, 10% and 90% or any other suitable ratio between 0% and 100%. Preferably, the split ratio is between 30% and 70%, inclusive.
  • the server sends the card carrying the cipher segment and the code book to the client.
  • the cipher fragments carried may be the same or different.
  • the cryptographic fragments carried are different.
  • the codebook can be sent to the client as an encrypted package.
  • the server sends a key to the client for decrypting the encrypted package containing the password book, so that the user Delayed to see the password book.
  • the client receives the card carrying the cryptogram and the codebook.
  • step 56 the client selects the card and manipulates the selected card, the client can select one or more cards in turn according to the need, and then manipulate the selected card; or first select a portion of the cards in turn and control the selected card. Then take turns to select the cards and then control the selected cards.
  • step 58 a determination is made as to whether the client has completed the card selection and manipulation, and if so, proceeds to step 60, otherwise returns to step 56 to continue the card selection and manipulate the selected card.
  • step 60 the client displays the card value to the user and stitches together the cipher segments corresponding to the same card value of each client.
  • step 62 the client compares the card value corresponding to the password formed by the combination of the cipher segments from the respective clients with the original card value corresponding to the same cipher in the cipher book.
  • step 64 it is determined whether the card values are the same. If they are the same, then the process proceeds to step 66, and the success indicates that the system is completely randomly licensed, and there is no cheating; otherwise, the verification fails, indicating that the system does not randomly issue cards, and there is cheating behavior.
  • Figure 3A illustrates a schematic representation of a hack card in accordance with one embodiment of the present invention.
  • a total of 22 Parker cards are shown, including: cards with values of 10, J, Q, K, and A.
  • the colors are spades, hearts, plums, and squares, as well as the kings and kings without colors.
  • the 22 cards or parts thereof will be used as an example to describe the technical implementation process of detailed dark card verification.
  • a card is represented by a 2-digit hexadecimal number.
  • the basic representation is: 0x00, as shown in Table 1: Ox 0 0
  • Hexadecimal indicator High level Low Table 1 the card value is defined as 2 minimum, A is the largest, the color is the smallest, and the spade is the largest. The arrangement is as follows:
  • the high position indicates the card value, and the data is arranged in order from small to large:
  • High value 1 indicates the card value 2;
  • High value 2 indicates the card value 3;
  • High value 3 indicates the card value 4;
  • High value 4 indicates the card value 5;
  • High value 6 indicates the value of the card 7;
  • High value 7 indicates the card value 8;
  • High value 8 indicates the card value 9;
  • High value 9 indicates the value of the card 10
  • High value a indicates the card value J
  • High value b indicates the card value Q
  • High value c indicates the card value K
  • High value d indicates the card value.
  • the low position indicates the suit color of the card.
  • the data is arranged from small to large in order of color:
  • Low value 1 indicates a square
  • Low value 4 indicates spades.
  • Xiao Wang Da Wang has no suit color, the high position is e and f, and the low position is 0.
  • the definition and arrangement of the above-mentioned card values and suits are only for the examples, and those skilled in the art Any other suitable means of defining cards suitable for computer processing are possible, such as: index representations, double index representations, object representations, and the like.
  • the 22 cards in Fig. 3A are defined as the format shown in Table 2:
  • the codebook is a comparison table between the card value and the password. Each card has a corresponding password, and all the passwords are stored in the code book.
  • Figure 3B is a schematic diagram illustrating the codebook of the Parker card of Figure 3A, in accordance with one embodiment of the present invention.
  • Each of the 22 Parker cards shown has a password in digital form.
  • the codebook can be generated in one or several formats, such as text files, emails, or short messages. Of course, any other suitable format suitable for computer processing ciphers known to those skilled in the art is possible.
  • the hexadecimal values corresponding to the cards are placed in an array.
  • the hexadecimal value is 9-f, and the corresponding decimal value is 9-15.
  • the values are shifted to the left by four bits to get the high value, that is, 9. 10, J, Q, K and ⁇ these cards (brand value), while writing 1-4 in the low position, that is, get the square, plum, red Heart and spades these colors.
  • the hexadecimal values corresponding to Xiao Wang and Da Wang are also placed in the array, which is an array like this:
  • each step of the loop first generates a random integer of the length of the array, such as 17, and exchanges the value of the current index of the array with the value of index 17, so that 22 will be generated for this array after the traversal is completed. Secondary position swapping to achieve the purpose of scrambling arrays.
  • a random integer of the length of the array such as 17, and exchanges the value of the current index of the array with the value of index 17, so that 22 will be generated for this array after the traversal is completed.
  • Secondary position swapping to achieve the purpose of scrambling arrays.
  • any other suitable method for computer-processed randomized cards known to those skilled in the art is possible, such as random extraction, disordered cards, and anti-arrangement. Sequential cards, etc., are briefly described below for the manner in which the two randomized cards are described for the purpose of illustration and are not intended to limit the scope of the invention. Random extraction method for disorderly cards:
  • each loop When the length of the array a is greater than 0, the loop is entered. Each loop generates a random index. The random index is greater than or equal to 0 and smaller than the length of the array a. The value of the corresponding position is taken from the array a and placed into the array b, and the array is taken from the array. Delete the index in a. The length of the a array is reduced by one cycle, and the length of the b array is increased. After 22 cycles, the length of the a array is 0, and the length of the b array is 22. Since each time is a randomly fetched value, the number of scrambled 22s can be obtained in the array b, thereby realizing the randomization of the cards. Anti-arrangement of cards:
  • the start value of the first-order loop is 0, and the end value is an array.
  • the length is decremented by 1.
  • the starting value of the secondary loop is the current value of the primary loop plus one, and the ending value is the length of the array minus 2.
  • a base value such as: 90
  • the password can also be in the form of characters, such as randomly selecting 22 of the 26 English letters.
  • the password may be in the form of a picture, such as vegetables, fruits, and the like.
  • the password can be a special symbol, formula or inequality.
  • the password can be any combination of the above mentioned forms.
  • the form of the password is varied and any other suitable form of password suitable for computer processing known to those skilled in the art may be employed herein.
  • the password of the card is first split according to the number of users, so that each user can only get one password segment of the password, and when all the password segments obtained by the user are combined, You can get the full password.
  • the password will be split according to the number of users in a random ratio, and any suitable ratio from 0% to 100% can be selected.
  • the random ratio is between 30% and 70%, inclusive.
  • the existing two users have obtained the card red heart Q
  • the password is the number 108
  • the random ratio is 0.42.
  • the password split value is 45.36, which is rounded to 45, which is the password fragment of user A
  • the password fragment of user B is 108-45, that is, 63.
  • the password is not a number, but a letter, a picture, a special symbol, a formula or an inequality, or any combination of numbers, letters, pictures, special symbols, formulas or inequalities, a similar split can be made as described above.
  • any other suitable cryptographic splitting method suitable for computer processing that is well known to those skilled in the art can be employed.
  • Fig. 4A shows a codebook containing three cards, which are J, 10 and K, respectively, and corresponding passwords are 42, 69 and 56.
  • Figure 4B shows the card and the codebook carried by the server that have been randomized and carried with the cipher segment after the three users have issued a card request message to the server through their respective clients.
  • Figure 4B-a, Figure 4B-b, and Figure 4B-C show the card selection interface seen by User A, User B, and User C, respectively.
  • the three cards that the user A sees carry the cipher segments 17, 21 and 11 in sequence; the three cards that the user B sees carry the cipher segments 16, 15 and 23 in sequence; the three cards that the user C sees are carried in turn.
  • User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
  • Figure 4C shows the corresponding interface seen after User A, User B, and User C have selected the cards in turn.
  • FIG. 4C-al, FIG. 4C-a2 and FIG. 4C-a3 respectively show the selections seen by the user A, the user B, and the user C after the user A selects the first card, that is, the card carrying the cipher segment 17.
  • Card interface That is, there are two cards remaining on the selection interface, and the two cards seen by the user A carry the password segments 21 and 11 in turn; the two cards seen by the user B carry the password segments 15 and 23 in sequence; the user C sees The two cards carry the cipher segments 33 and 22 in sequence.
  • User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
  • FIG. 4C-bl, FIG. 4C-b2 and FIG. 4C-b3 respectively show the selections seen by the user A, the user B, and the user C after the user B selects the third card, that is, the card carrying the cipher segment 23.
  • Card interface That is, there is one card left on the card selection interface, and the card that the user A sees carries the password segment 21; the card that the user B sees carries the password segment 15; the card that the user C sees carries the password. Fragment 33.
  • User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
  • 4C-c shows the card selection interface that the user A, the user B, and the user C see after the user C selects the middle card, that is, the last card, that is, all the cards have been selected, and the interface is air.
  • FIG. 4D shows the interface of the card back that is seen to be stitched together by the user A, the user B, and the user C after the card is manipulated.
  • the back of the first card contains three cipher segments: 17, 16, and 09, and the combined cipher is 42;
  • the back of the second card contains three cipher segments: 21, 15 and 33, the combined password is 69;
  • the third card The back of the card contains three cryptographic segments: 11, 23, and 22, and the combined password is 56.
  • Fig. 4E shows the interface of the card corresponding to the password obtained by the combination of the password segments seen by the user A, the user B, and the user C.
  • the first card has three cipher segments 17, 16, and 09, the combined cipher is 42 and the corresponding card value is J;
  • the second card has three cipher segments 21, 15 and 33, the combined password is 69, the corresponding card value is 10; and
  • the third card has three password segments 11, 23 and 22, the combined password is 56, and the corresponding card value is K.
  • the verification When comparing the above card value with the original card value corresponding to the same password in the code book, it can be obtained that the same card has the same card value, so the verification is successful, the system randomizes the card, and there is no cheating. However, if the same password has different card values, for example, the combined password is 69, and the corresponding card value is Q, the verification fails, indicating that the system has cheating behavior.
  • the number of dark cards may be any suitable integer value such as 1, 2, 3, 4, 5, 10, 22, 30, 52.
  • the type of the dark card may not be limited to Parker, but may be any form of article as long as it is face down when selected and can know its true value after undergoing selection.

Abstract

A method for electronic blind card verification comprises the following steps: (1)one or more client terminals receive a request message for dealing cards from users, and send the request message to a server;(2)the server receives the request message, and generates random shuffling cards according to the request message;(3)the server generates a password for every card, and saves it in a password book;(4)the server splits the password into password segments according to the number of the client terminals;(5)the server sends the cards with password segments and the password book to every client terminal;(6)the client terminals receive the cards with password segments and the password book;(7)the client terminals select cards and control them;(8)once the client terminals have finished the selecting and controlling of the cards, they display the card values to users and combine the password segments. The card values corresponding to the password combined from the password segments are compared with the original card values corresponding to the same password in the password book. The verification succeeds if the card values are the same, otherwise, the verification fails.

Description

电子暗牌验证方法 技术领域  Electronic dark card verification method
本发明涉及电子暗牌系统, 更具体而言涉及电子暗牌验证方法。 背景技术  The present invention relates to an electronic dark card system, and more particularly to an electronic dark card verification method. Background technique
"暗牌",顾名思义就是牌面向下,在用户进行选择后才能知道其真 正牌值的牌。例如 "抓阄"、棋牌游戏等,都是大家耳熟能详的暗牌系统。  "Dark card", as the name implies, is the card facing down, and the card can be known after the user makes a selection. For example, "grabbing", board games, etc., are all familiar systems.
近年来,随着计算机技术以及互联网技术的迅猛发展, 已经有越来越 多的暗牌系统被开发成电子系统平台, 并在互联网上广泛传播,  In recent years, with the rapid development of computer technology and Internet technology, more and more dark card systems have been developed into electronic system platforms and widely spread on the Internet.
这种电子暗牌系统的普遍使用, 一方面极大地提高了系统的处理 速度和随机性; 另一方面却也招致越来越多的用户对该系统的真正随 机性的质疑。 因为理论上, 系统将 "暗牌" 随机地发送到了用户界面, 等待用户选择; 但是实践中, 在用户将 "暗牌" 翻开之前, 根本就无 从知晓这些供自己选择的牌的真实牌值, 因而也就无从知晓这些供自 己选择的牌是否是真正随机的牌, 也许这些牌都已经由系统预先设定 为某一具体牌值。 因此如何验证系统的暗牌的随机性, 籍此确保系统 发牌的真正随机性, 避免系统作弊, 已经日益成为一个亟需解决的问 题。 发明内容  The widespread use of such electronic dark card systems has greatly improved the processing speed and randomness of the system; on the other hand, it has also led more and more users to question the true randomness of the system. Because in theory, the system randomly sends "dark cards" to the user interface, waiting for the user to choose; but in practice, before the user opens the "dark card", there is no way to know the true card value of the cards for their choice. Therefore, it is impossible to know whether the cards for their choice are truly random cards, and perhaps these cards have been pre-set by the system to a specific card value. Therefore, how to verify the randomness of the system's dark cards, thereby ensuring the true randomness of the system's licensing and avoiding system cheating has become an urgent problem. Summary of the invention
因此, 本发明的一个目的在于提供一种对电子暗牌系统中的电子暗 牌进行验证的方法。 通过使用该方法, 可以验证系统的暗牌的随机性, 籍此确保系统发牌的真正随机性,避免系统作弊; 同时用户通过对其自行 选取的牌的真实性进行验证,获得了良好的用户体验,从而愿意继续信任 并使用该系统。  Accordingly, it is an object of the present invention to provide a method of verifying an electronic dark card in an electronic dark card system. By using this method, the randomness of the system's dark cards can be verified, thereby ensuring the true randomness of the system's licensing and avoiding system cheating; at the same time, the user obtains a good user by verifying the authenticity of the card selected by himself. Experience and thus willing to continue to trust and use the system.
根据本发明的一个方面,提供了一种电子暗牌验证方法, 包括步骤: According to an aspect of the present invention, an electronic dark card verification method is provided, comprising the steps of:
(1)一个或多个客户机从用户接收发牌请求消息, 并向服务器发送所述 发牌请求消息; (2)所述服务器从所述客户机接收所述发牌请求消息, 根据所述发牌请求消息生成随机打乱的牌; (3)所述服务器为每张牌生 成密码, 并将所述密码保存到密码本; (4)所述服务器根据所述客户机 的数量将所述牌的密码拆分成密码片段; (5)所述服务器将携带有所述 密码片段的牌以及所述密码本发送到各个所述客户机; (6)所迷客户机 从所述服务器接收所述携带有所述密码片段的牌以及密码本; (7)所迷 客户机选牌并操控所选择的牌; (8)如果所述客户机已完成选牌以及对 所选择的牌的操控, 则向用户显示牌值并拼合所述密码片段, 将所述密 码片段拼合而成的密码所对应的牌值与所述密码本中的相同密码所对 应的原始牌值比较, 如果牌值相同, 则验证成功, 否则验证失败。 (1) one or more clients receive a card request message from the user and send the card request message to the server; (2) the server receives the card request message from the client, according to the The card request message generates a randomly scrambled card; (3) the server generates a password for each card, and saves the password to the password book; (4) the server is according to the client The number divides the card's password into a password segment; (5) the server sends the card carrying the password segment and the codebook to each of the clients; (6) the client from Receiving, by the server, the card carrying the cipher segment and the codebook; (7) selecting the card by the client and manipulating the selected card; (8) if the client has completed the card selection and is selected Controlling the card, displaying the card value to the user and splicing the code segment, and comparing the card value corresponding to the password formed by the combination of the password segments with the original card value corresponding to the same password in the password book, If the card values are the same, the verification is successful, otherwise the verification fails.
优选地, 所述服务器和所述客户机位于相同的设备上, 或者位于不 同的设备上。  Preferably, the server and the client are located on the same device or on different devices.
优选地, 所述客户机是浏览器。  Preferably, the client is a browser.
优选地,所述密码本采用以下文件格式中的一种或数种:文本文件、 电子邮件或短消息。  Preferably, the codebook adopts one or several of the following file formats: a text file, an email or a short message.
优选地, 所述密码选自数字、 字母、 图片、 特殊符号、 公式或不等 式中的一种或多种。  Preferably, the password is selected from one or more of a number, a letter, a picture, a special symbol, a formula or an inequality.
优选地,所述服务器根据所述客户机的数量将所述牌的密码拆分成 密码片段的步驟进一步包括:根据所述客户机的数量按随机比例进行密 码拆分, 所述比例介于 30%至 70%之间, 包括端值。  Preferably, the step of the server splitting the password of the card into the password segment according to the number of the clients further comprises: performing password splitting according to the number of the clients according to a random ratio, the ratio is between 30 Between % and 70%, including end values.
优选地,所述服务器将携带有所述密码片段的牌以及所述密码本发 送到各个所述客户机, 其中: 发送到各个所述客户机的所述携带有所述 密码片段的牌的牌值相同, 且密码片段各不相同。 附图说明  Advantageously, said server transmits a card carrying said cryptogram and said codebook to each of said clients, wherein: said card of said card carrying said cryptographic segment transmitted to said respective said client The values are the same and the cipher fragments are different. DRAWINGS
为了更好地理解本发明, 下面结合附图通过举例的方式对本发明 作进一步说明, 相同的附图标记表示相同的装置, 其中:  The invention will be further described, by way of example only, with reference to the accompanying drawings,
图 1A-1C是示出了多个示例性的电子暗牌系统的配置的示意图; 图 2是图解了根据本发明的一个实施方案的进行电子暗牌验证的流 程图;  1A-1C are schematic diagrams showing configurations of a plurality of exemplary electronic hash systems; and Fig. 2 is a flow chart illustrating electronic dark card verification in accordance with one embodiment of the present invention;
图 3A是图解了根据本发明的一个实施方案的朴克牌的示意图; 图 3B是图解了根据本发明的一个实施方案的图 3A中的朴克牌的密码 本的示意图;  Figure 3A is a schematic diagram illustrating a Parker card in accordance with one embodiment of the present invention; Figure 3B is a schematic diagram illustrating the codebook of the Parker card of Figure 3A, in accordance with one embodiment of the present invention;
图 4A-4E是设备上的显示器的示例截屏,在该设备上提供了一个根据 本发明的实施方案进行朴克暗牌的验证。 具体实施方式 FIG. 4A- 4 E on the display device is a sample screen provided on the device in accordance with a Embodiments of the present invention perform verification of Parker's cards. detailed description
在下面描述中, 为了说明起见, 描述了很多具体细节以便彻底地理 解本发明的实施方案。 然而, 对于本领域的技术人员而言, 显而易见的 是在不背离本发明思想的前提下,本发明可不采用这些具体细节而采用 其他等效的或替代的方式进行实施。  In the following description, for the purposes of illustration However, it is apparent to those skilled in the art that the present invention may be carried out in other equivalent or alternative manners without departing from the spirit and scope of the invention.
参见图 1A至 1C,示出了多个示例性的电子暗牌系统的配置的示意图。 在图 1A中, 示出了一个示例配置, 其中电子暗牌系统 10a包含了一 个单一设备 20。设备 20包括一个显示器 22,其中牌与其他输出一起被显 示给用户。显示器 22也可以包含一个适于接收来自用户的输入的触摸屏。 在该触摸屏上可以显示控制按钮的图像(未示出), 而被用户通过触摸屏 按下的按钮可被探测到。替代地,设备 20可以为用户提供实体的控制键。 将理解, 设备 20也将包括该附图中未示出的其他部件。 例如, 包括一个 读卡器。  Referring to Figures 1A through 1C, schematic views of the configuration of a plurality of exemplary electronic dark card systems are shown. In Fig. 1A, an example configuration is shown in which the electronic hash system 10a includes a single device 20. Device 20 includes a display 22 in which cards are displayed to the user along with other outputs. Display 22 can also include a touch screen adapted to receive input from a user. An image of the control button (not shown) can be displayed on the touch screen, and a button pressed by the user through the touch screen can be detected. Alternatively, device 20 may provide the user with a physical control key. It will be understood that device 20 will also include other components not shown in the figures. For example, include a card reader.
在图 1B中,示出了另一个示例配置,其中系统 10b包括网络 30内的 多个设备 20 (例如, 图 1A中的设备 20 ) 。 在此示例配置中, 每个设备 20均被连接到网络 30中的中央服务器 32, 该服务器控制被提供到设备 20上的暗牌系统。  In FIG. 1B, another example configuration is shown in which system 10b includes a plurality of devices 20 (e.g., device 20 in FIG. 1A) within network 30. In this example configuration, each device 20 is connected to a central server 32 in network 30 that controls the dark card system provided to device 20.
在一个实施方案中,设备 20和中央服务器 32彼此以已知方式进行通 信, 从而提供暗牌系统供用户操控。 例如, 中央服务器 32可以把由其产 生的代表着处理阶段的状态或结果的数据通信到设备 20。 该数据由在设 备 20上执行的客户端应用系统来处理 以向用户显示来自暗牌系统的适 当输出。  In one embodiment, device 20 and central server 32 communicate with one another in a known manner to provide a hidden card system for user manipulation. For example, central server 32 can communicate data generated by it representing the status or results of the processing phase to device 20. This data is processed by the client application executing on device 20 to display the appropriate output from the hidden system to the user.
暗牌系统(例如系统 10b ) 中的设备 20可以位于相同的物理位置。 替代地, 暗牌系统中的设备 20可以分布在多个物理位置。  Devices 20 in a dark card system (e.g., system 10b) may be located at the same physical location. Alternatively, devices 20 in a dark card system may be distributed across multiple physical locations.
图 1C示出又一示例配置, 暗牌系统 10c包^殳备 20的多个子网络 34,其中每个子网络 34都可以建立在不同的物理位置。子网络 34通过网 络 30而被连接在一起。  Figure 1C illustrates yet another example configuration in which the hidden card system 10c packages a plurality of sub-networks 34, wherein each sub-network 34 can be established at a different physical location. Subnetworks 34 are connected together by network 30.
关于在图 1B和 1C中示出的示例配置,在」个实施方案中,在暗牌系 统 10b和 /或暗牌系统 10c中的设备 20可以组成一个广域网, 其中设备 20是通过因特网、 企业内部网或其它网络连接到一起的个人计算机, 且 被中央服务器 32所监控。 例如, 该个人计算机可以是台式计算机、 膝上 型计算机或某些其他计算设备。用户可以通过因特网从一个电子暗牌系统 运营商的网站下载客户端应用系统到个人计算机,或者从压缩盘或其它媒 介拷贝客户端应用系统到个人计算机,执行该客户端应用系统进行相应处 理。或者,用户可以不执行客户端应用系统而直接通过浏览器连接到中央 服务器 32进行处理。 用户的输入可以通过鼠标或其它以已知方式连接到 该个人计算机的输入设备来被接收。 With regard to the example configurations illustrated in Figures IB and 1C, in one embodiment, devices 20 in the hidden card system 10b and/or the hidden card system 10c may constitute a wide area network, where 20 is a personal computer connected together via the Internet, a corporate intranet or other network, and is monitored by the central server 32. For example, the personal computer can be a desktop computer, a laptop computer, or some other computing device. The user can download the client application system to the personal computer from the website of an electronic dark card system operator via the Internet, or copy the client application system from the compact disk or other medium to the personal computer, and execute the client application system for corresponding processing. Alternatively, the user can connect to the central server 32 for processing directly through the browser without executing the client application system. The user's input can be received by a mouse or other input device connected to the personal computer in a known manner.
将理解, 在其上可以实现电子暗牌系统的方法的设备 20并不限于视 频终端和计算设备, 也可以包括, 例如其他电动机械机器、 互动电视、 无 线移动设备和任意其它包括显示和处理装置的通信设备或处理设备,其中 处理装置适于执行根据本发明的方法的实施方案提供电子暗牌系统的步 骤。本领域普通技术人员将能够通过适当的改变或修改来实现在任意基于 标准微处理器的机器或设备上的这些方法。  It will be appreciated that the apparatus 20 on which the method of the electronic hash system can be implemented is not limited to video terminals and computing devices, but may also include, for example, other electromechanical machines, interactive televisions, wireless mobile devices, and any other including display and processing devices. A communication device or processing device, wherein the processing device is adapted to perform the steps of providing an electronic dark card system in accordance with an embodiment of the method of the present invention. Those of ordinary skill in the art will be able to implement these methods on any standard microprocessor based machine or device with appropriate changes or modifications.
图 1A到 1C中所示的配置只是以示例方式提供的,而在各种变体实现 中可以是其他配置的设备 20。 将理解, 中央服务器 32的功能也可以, 例 如由一个或更多设备 20提供, 而不需要作为一个单独的设备存在。  The configurations shown in Figures 1A through 1C are provided by way of example only, and in various variant implementations may be other configured devices 20. It will be appreciated that the functionality of the central server 32 may also be provided, for example, by one or more devices 20, but not as a separate device.
参见图 2,示出了根据本发明的一个实施方案的电子暗牌验证的流程 图。 在步骤 42中, 用户在各自的客户机一一例如设备 20—一上输入发牌 请求消息, 请求暗牌系统 10a、 10b或 10c发牌。 在步骤 44中, 客户机接 收该发牌请求消息, 并将此消息发送给服务器, 例如中央服务器 32, 请 求服务器提供服务。 在步骤 46中, 服务器接收发牌请求消息, 根据该请 求消息, 生成随机打乱的牌。 在步骤 48中, 服务器为每张牌生成一个唯 一的密码, 所生成的密码可以是, 例如数字、 字母、 图片、 特殊符号、 公 式、 不等式或上述形式的任意组合, 并将此密码保存至密码本, 密码本可 以是, 例如文本文件、 电子邮件或短消息或上述格式的任意组合。在步骤 50中, 服务器将密码拆分成密码片段, 在拆分时, 服务器可以根据所请 求的用户数, 按随机比例进行拆分, 例如有 3个用户, 那么比例可以是: 30%、 30%和 40%, 10%、 20%和 70%, 0%、 10%和 90%或其他在 0%至 100%中的 任意合适的比例。 优选地, 拆分比例介于 30%至 70%之间, 包括端值。 在 步骤 52中, 服务器将携带有密码片段的牌以及密码本发送至客户机, 所 携带的密码片段可以相同,也可以不同。优选地, 所携带的密码片段各不 相同。 另外,在将密码本发送给客户机时, 可以与携带有密码片段的牌同 时发送,使得用户可以同时看到牌和密码本。替代地, 可以将密码本作为 一个加密包发送至客户机,等到客户机完成选牌和操控牌后,服务器再发 送一个密钥至客户机, 以用于解密含有密码本的加密包,使得用户延迟看 到密码本。 在步骤 54中, 客户机接收携带有密码片段的牌以及密码本。 在步骤 56中, 客户机选牌并操控所选择的牌, 客户机可以根据需要轮流 选择 1张或多张牌,然后操控所选择的牌;或者先轮流选择一部分牌并操 控所选择的牌, 然后再轮流选牌再操控所选择的牌。 在步骤 58中, 进行 判断, 客户机是否已经完成选牌和操控, 如果已完成则进入步骤 60, 否 则则回到步骤 56, 继续选牌并操控所选择的牌。 在步骤 60中, 客户机向 用户显示牌值并将各个客户机的相同牌值所对应的密码片段拼合至一起。 在步骤 62中, 客户机将由来自各个客户机的密码片段拼合而成的密码所 对应的牌值与密码本中相同密码所对应的原始牌值进行比较。 在步骤 64 中, 判断牌值是否相同, 如果相同, 则进入步骤 66, 成功, 表明系 统是完全随机发牌,没有作弊;否则,验征失败,表明系统没有随机发牌, 存在作弊行为。 Referring to Figure 2, a flow diagram of electronic dark card verification in accordance with one embodiment of the present invention is shown. In step 42, the user enters a deal request message on a respective client, such as device 20-1, requesting the card system 10a, 10b or 10c to deal. In step 44, the client receives the card request message and sends the message to a server, such as central server 32, requesting the server to provide the service. In step 46, the server receives a deal request message, and generates a randomly scrambled card based on the request message. In step 48, the server generates a unique password for each card, and the generated password can be, for example, a number, letter, picture, special symbol, formula, inequality, or any combination of the above, and save the password to the password. The password book can be, for example, a text file, an email or a short message, or any combination of the above. In step 50, the server splits the password into password segments. When splitting, the server can split according to the number of users requested, for example, with 3 users, then the ratio can be: 30%, 30 % and 40%, 10%, 20% and 70%, 0%, 10% and 90% or any other suitable ratio between 0% and 100%. Preferably, the split ratio is between 30% and 70%, inclusive. In step 52, the server sends the card carrying the cipher segment and the code book to the client. The cipher fragments carried may be the same or different. Preferably, the cryptographic fragments carried are different. In addition, when the codebook is sent to the client, it can be sent simultaneously with the card carrying the cryptogram, so that the user can see both the card and the codebook at the same time. Alternatively, the codebook can be sent to the client as an encrypted package. After the client completes the card selection and the manipulation of the card, the server sends a key to the client for decrypting the encrypted package containing the password book, so that the user Delayed to see the password book. In step 54, the client receives the card carrying the cryptogram and the codebook. In step 56, the client selects the card and manipulates the selected card, the client can select one or more cards in turn according to the need, and then manipulate the selected card; or first select a portion of the cards in turn and control the selected card. Then take turns to select the cards and then control the selected cards. In step 58, a determination is made as to whether the client has completed the card selection and manipulation, and if so, proceeds to step 60, otherwise returns to step 56 to continue the card selection and manipulate the selected card. In step 60, the client displays the card value to the user and stitches together the cipher segments corresponding to the same card value of each client. In step 62, the client compares the card value corresponding to the password formed by the combination of the cipher segments from the respective clients with the original card value corresponding to the same cipher in the cipher book. In step 64, it is determined whether the card values are the same. If they are the same, then the process proceeds to step 66, and the success indicates that the system is completely randomly licensed, and there is no cheating; otherwise, the verification fails, indicating that the system does not randomly issue cards, and there is cheating behavior.
在下文中, 将结合具体的实施例, 进一步详细地阐述本发明。 为了更 清楚地描述本发明, 使得本领域技术人员充分理解本发明的技术实现过 程,将以大众都非常熟知的朴克牌为例进行论述。但是采用这些实施例仅 为了示例性的目的, 并不意在限制本发明的保护范围。  In the following, the invention will be explained in further detail in connection with specific embodiments. In order to more clearly describe the present invention, those skilled in the art will fully understand the technical realization process of the present invention, and will be discussed by taking the Parker card which is well known to the public as an example. However, these examples are for illustrative purposes only and are not intended to limit the scope of the invention.
参见图 3A, 图 3A图解了根据本发明的一个实施方案的朴克牌的示意 图。 其中, 共示出了 22张朴克牌, 包括: 牌值为 10、 J、 Q、 K和 A, 花 色为黑桃、 红心、梅花和方块, 以及没有花色的小王和大王。接下来将以 这 22张牌或其部分为例来描述详细的暗牌验证的技术实现过程。  Referring to Figure 3A, Figure 3A illustrates a schematic representation of a hack card in accordance with one embodiment of the present invention. Among them, a total of 22 Parker cards are shown, including: cards with values of 10, J, Q, K, and A. The colors are spades, hearts, plums, and squares, as well as the kings and kings without colors. Next, the 22 cards or parts thereof will be used as an example to describe the technical implementation process of detailed dark card verification.
1. 定义牌  Definition card
在此, 为了简便起见, 以 2位 16进制数表示一张牌, 基本表示形式 是: 0x00, 如表 1所示: Ox 0 0 Here, for the sake of simplicity, a card is represented by a 2-digit hexadecimal number. The basic representation is: 0x00, as shown in Table 1: Ox 0 0
16进制表示符 高位 低位 表 1 在此定义牌值以 2最小, A最大, 花色以方块最小, 黑桃最大, 排列 形式如下:  Hexadecimal indicator High level Low Table 1 Here, the card value is defined as 2 minimum, A is the largest, the color is the smallest, and the spade is the largest. The arrangement is as follows:
高位表示牌值, 数据从小到大按牌的顺序排列:  The high position indicates the card value, and the data is arranged in order from small to large:
高位值 1: 表示牌值 2;  High value 1: indicates the card value 2;
高位值 2: 表示牌值 3;  High value 2: indicates the card value 3;
高位值 3: 表示牌值 4;  High value 3: indicates the card value 4;
高位值 4: 表示牌值 5;  High value 4: indicates the card value 5;
高位值 5: 表示牌值 6;  High value 5: indicates the card value 6;
高位值 6: 表示牌值 7;  High value 6: indicates the value of the card 7;
高位值 7: 表示牌值 8;  High value 7: indicates the card value 8;
高位值 8: 表示牌值 9;  High value 8: indicates the card value 9;
高位值 9: 表示牌值 10;  High value 9: indicates the value of the card 10;
高位值 a: 表示牌值 J;  High value a: indicates the card value J;
高位值 b: 表示牌值 Q;  High value b: indicates the card value Q;
高位值 c: 表示牌值 K;  High value c: indicates the card value K;
高位值 d: 表示牌值 低位表示牌的花色, 数据从小到大按花色顺序排列:  High value d: indicates the card value. The low position indicates the suit color of the card. The data is arranged from small to large in order of color:
低位值 1: 表示方块;  Low value 1: indicates a square;
低位值 2: 表示梅花;  Low value 2: indicates plum blossom;
低位值 3: 表示红心;  Low value 3: indicates the red heart;
低位值 4: 表示黑桃。 小王大王没有花色, 高位值为 e和 f, 低位是 0。 上述牌值和花色的定义和排列方式仅是用于示例,本领域技术人员所 熟知的任何其他合适的适于计算机处理的定义牌的方式都是可以的, 例 如: 索引表示形式、 双索引表示形式和对象表示形式等。 根据上述牌的定义, 图 3A中的 22张牌被定义为如表 2所示的格式: Low value 4: indicates spades. Xiao Wang Da Wang has no suit color, the high position is e and f, and the low position is 0. The definition and arrangement of the above-mentioned card values and suits are only for the examples, and those skilled in the art Any other suitable means of defining cards suitable for computer processing are possible, such as: index representations, double index representations, object representations, and the like. According to the definition of the above card, the 22 cards in Fig. 3A are defined as the format shown in Table 2:
Figure imgf000009_0001
Figure imgf000009_0001
Figure imgf000009_0002
表 2
Figure imgf000009_0002
Table 2
2. 定义密码本 2. Define a password book
密码本是牌值与密码间的对照表,每张牌都有一个对应的密码,所有 的密码都存储在密码本中。  The codebook is a comparison table between the card value and the password. Each card has a corresponding password, and all the passwords are stored in the code book.
参见图 3B, 图 3B是图解了根据本发明的一个实施方案的图 3A中的 朴克牌的密码本的示意图。 其中所示出的 22张朴克牌的每一张都带有一 个数字形式的密码。  Referring to Figure 3B, Figure 3B is a schematic diagram illustrating the codebook of the Parker card of Figure 3A, in accordance with one embodiment of the present invention. Each of the 22 Parker cards shown has a password in digital form.
密码本可以采用文本文件、电子邮件或短消息中的一种或数种格式生 成。 当然,本领域技术人员所熟知的任何其他合适的适于计算机处理的密 码本的格式都是可以的。  The codebook can be generated in one or several formats, such as text files, emails, or short messages. Of course, any other suitable format suitable for computer processing ciphers known to those skilled in the art is possible.
3. 随机化牌 3. Randomized cards
根据牌定义,将牌所对应的十六进制的值顺序放入一个数组。十六进 制的值 9- f, 对应的十进制的值 9-15, 在遍历时, 先从数字 9开始, 到 13结束, 将这些值左移四位即可得到高位值, 即得到 9、 10、 J、 Q、 K和 Α这些点数(牌值)的牌, 同时在低位写入 1-4, 即得到方块、 梅花、 红 心和黑桃这些花色。每次遍历可得到 4个值,最后将小王和大王所对应的 十六进制的值也放到数组中, 即得到下面这样的一个数组: According to the card definition, the hexadecimal values corresponding to the cards are placed in an array. The hexadecimal value is 9-f, and the corresponding decimal value is 9-15. When traversing, starting from the number 9 and ending at 13, the values are shifted to the left by four bits to get the high value, that is, 9. 10, J, Q, K and Α these cards (brand value), while writing 1-4 in the low position, that is, get the square, plum, red Heart and spades these colors. Each time you traverse, you get 4 values. Finally, the hexadecimal values corresponding to Xiao Wang and Da Wang are also placed in the array, which is an array like this:
0x91, 0x92, 0x93, 0x94, 0x91, 0x92, 0x93, 0x94,
Oxal, 0xa2, 0xa3, 0xa4,  Oxal, 0xa2, 0xa3, 0xa4,
Oxbl, 0xb2, 0xb3, 0xb4,  Oxbl, 0xb2, 0xb3, 0xb4,
Oxcl, 0xc2, 0xc3, 0xc4,  Oxcl, 0xc2, 0xc3, 0xc4,
Oxdl, 0xd2, 0xd3, 0xd4,  Oxdl, 0xd2, 0xd3, 0xd4,
OxeO, Oxf 0。 接着,循环遍历该数组,循环的每一步首先产生一个此数组长度的随 机整数, 如 17, 并将数組的当前索引的值与索引 17的值交换, 如此遍历 完毕后将对此数组产生 22次位置交换, 以达到打乱数组的目的。 当然, 随机化牌的方法有多种,本领域技术人员所熟知的任何其他合适的适于计 算机处理的随机化牌的方法都是可以的,例如随机抽取方式乱序化牌、反 排列方式乱序化牌等, 以下对这两种随机化牌的方式进行简单地描述,该 描述仅是为了示例说明的目的, 并不旨在限制本发明的保护范围。 随机抽取方式乱序化牌:  OxeO, Oxf 0. Then, loop through the array, each step of the loop first generates a random integer of the length of the array, such as 17, and exchanges the value of the current index of the array with the value of index 17, so that 22 will be generated for this array after the traversal is completed. Secondary position swapping to achieve the purpose of scrambling arrays. Of course, there are many methods for randomizing cards, and any other suitable method for computer-processed randomized cards known to those skilled in the art is possible, such as random extraction, disordered cards, and anti-arrangement. Sequential cards, etc., are briefly described below for the manner in which the two randomized cards are described for the purpose of illustration and are not intended to limit the scope of the invention. Random extraction method for disorderly cards:
假定原数组为 a, 长度为 22; 新建一个数组为 b, 长度为 0。  Assume that the original array is a and the length is 22; create a new array of b with a length of 0.
当数组 a的长度大于 0时进入循环,每次循环产生一个随机索引,该 随机索引大于等于 0并且小于数组 a的长度,从数组 a中取出相应位置的 值放入到数组 b, 并从数组 a中删除该索引。每次循环 a数組的长度会减 少 1, b数组的长度会增加 1, 22次循环后, a数组的长度为 0, b数组的 长度为 22。 由于每次都是随机取到的值, 所以数组 b中可得到打乱后的 22个数, 由此可以实现对牌的随机化。 反排列方式乱序化牌:  When the length of the array a is greater than 0, the loop is entered. Each loop generates a random index. The random index is greater than or equal to 0 and smaller than the length of the array a. The value of the corresponding position is taken from the array a and placed into the array b, and the array is taken from the array. Delete the index in a. The length of the a array is reduced by one cycle, and the length of the b array is increased. After 22 cycles, the length of the a array is 0, and the length of the b array is 22. Since each time is a randomly fetched value, the number of scrambled 22s can be obtained in the array b, thereby realizing the randomization of the cards. Anti-arrangement of cards:
利用两个循环来对数组中的值进行交换或不交换,以达到打乱顺序的 目的。  Use two loops to exchange or not swap values in the array to achieve the purpose of scrambling the order.
在一级循环里进入二级循环, 一级循环的起始值为 0, 终止值为数组 长度减 1, 二级循环的起始值为一级循环当前值加 1, 终止值为数组长度 减 2。 Enter the second-level loop in the first-level loop. The start value of the first-order loop is 0, and the end value is an array. The length is decremented by 1. The starting value of the secondary loop is the current value of the primary loop plus one, and the ending value is the length of the array minus 2.
产生一个随机值 1或 0, 看作真或假, 如果这个值是真, 则交换数组 中一级循环当前值和二级循环当前值的位置,循环过程会导致每个位置的 值可能与任何一个位置的值交换, 从而对牌实现随机化。  Generate a random value of 1 or 0, which is treated as true or false. If this value is true, the current value of the first-order loop in the array and the current value of the second-order loop are exchanged. The loop process will cause the value of each position to be any The value of a position is exchanged to randomize the cards.
4. 为每张牌生成密码 4. Generate a password for each card
例如, 当密码采取数字形式时, 可以随机取一个基础值, 如: 90, 从 基础值起, 循环 22次, 每次增加一个数值, 并将它们放入数组, 这将得 到下面这些值: 90, 91 , 92, 93, 94, 95, 96, 97, 98, 99, 100, 101 , 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113。  For example, when the password is in numeric form, you can randomly take a base value, such as: 90, from the base value, loop 22 times, add a value each time, and put them into an array, which will get the following values: 90 , 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113.
密码也可以采用字符形式, 例如随机地选取 26个英文字母中的 22 个。 替代地, 密码可以采用图片形式, 例如蔬菜、 水果等。 替代地, 密码 可以采用特殊符号、公式或不等式。或者, 密码可以是上述提到的形式的 任意组合。密码的形式多种多样,在此可以采用本领域技术人员所熟知的 任何其他合适的适于计算机处理的密码形式。  The password can also be in the form of characters, such as randomly selecting 22 of the 26 English letters. Alternatively, the password may be in the form of a picture, such as vegetables, fruits, and the like. Alternatively, the password can be a special symbol, formula or inequality. Alternatively, the password can be any combination of the above mentioned forms. The form of the password is varied and any other suitable form of password suitable for computer processing known to those skilled in the art may be employed herein.
5. 拆分密码 5. Split password
当将牌发送给用户时 ,首先根据用户数对该牌的密码进行拆分,使得 每位用户只能得到该密码的一个密码片段,而当将所有的用户得到的密码 片段进行拼合后,就可以得到完整的密码。密码将根据用户数按随机比例 进行拆分, 可以选择 0%至 100%中的任意合适的比例。 优选地, 随机比例 介于 30%至 70%之间, 包括端值。  When the card is sent to the user, the password of the card is first split according to the number of users, so that each user can only get one password segment of the password, and when all the password segments obtained by the user are combined, You can get the full password. The password will be split according to the number of users in a random ratio, and any suitable ratio from 0% to 100% can be selected. Preferably, the random ratio is between 30% and 70%, inclusive.
例如, 现有二位用户, 已得到牌红心 Q, 密码是数字 108, 随机比例 为 0. 42。 通过计算 108*0. 42得到密码拆分值为 45. 36, 将它取整为 45, 这是用户 A的密码片段, 用户 B的密码片段是 108-45, 即 63。 当密码不 是数字, 而是字母、 图片、 特殊符号、 公式或不等式, 或数字、 字母、 图 片、特殊符号、公式或不等式的任意组合时, 也可以根据上述方式作类似 的拆分。 当然,可以采用本领域技术人员所熟知的任何其他合适的适于计 算机处理的密码拆分方法。 . 接下来, 请参见图 4A-4E, 示出了一个设备的显示器的示例截屏, 在 该设备上提供了一个根据本发明的实施方案进行朴克暗牌的验证。 For example, the existing two users have obtained the card red heart Q, the password is the number 108, and the random ratio is 0.42. By calculating 108*0.42, the password split value is 45.36, which is rounded to 45, which is the password fragment of user A, and the password fragment of user B is 108-45, that is, 63. When the password is not a number, but a letter, a picture, a special symbol, a formula or an inequality, or any combination of numbers, letters, pictures, special symbols, formulas or inequalities, a similar split can be made as described above. Of course, any other suitable cryptographic splitting method suitable for computer processing that is well known to those skilled in the art can be employed. Next, referring to Figures 4A-4E, an exemplary screen shot of a display of a device is shown on which a verification of a Parker's card is provided in accordance with an embodiment of the present invention.
图 4A示出了其中包含 3张牌的密码本, 分别是 J, 10和 K, 对应的 密码为 42, 69和 56。  Fig. 4A shows a codebook containing three cards, which are J, 10 and K, respectively, and corresponding passwords are 42, 69 and 56.
图 4B示出了 3位用户通过各自的客户机向服务器发出发牌请求消息 后,客户机接收到的由服务器发出的已经经过随机化后的携带有密码片段 的牌和密码本。 图 4B- a、 图 4B-b和图 4B-C分别是用户 A、用户 B和用户 C所看到选牌界面。 其中, 用户 A看到的三张牌依次携带有密码片段 17、 21和 11; 用户 B看到的三张牌依次携带有密码片段 16、 15和 23; 用户 C 看到的三张牌依次携带有密码片段 09、 33和 22。 用户 A、 用户 B和用户 C看到的密码本相同: J, 10和 K, 对应的密码为 42, 69和 56。  Figure 4B shows the card and the codebook carried by the server that have been randomized and carried with the cipher segment after the three users have issued a card request message to the server through their respective clients. Figure 4B-a, Figure 4B-b, and Figure 4B-C show the card selection interface seen by User A, User B, and User C, respectively. The three cards that the user A sees carry the cipher segments 17, 21 and 11 in sequence; the three cards that the user B sees carry the cipher segments 16, 15 and 23 in sequence; the three cards that the user C sees are carried in turn. There are password segments 09, 33 and 22. User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
图 4C示出了分别在用户 A、 用户 B和用户 C轮流选完牌后, 所看到 的相应界面。  Figure 4C shows the corresponding interface seen after User A, User B, and User C have selected the cards in turn.
图 4C-al, 图 4C-a2和图 4C- a3分别示出了在用户 A选了第一张牌, 即携带密码片段 17的牌后, 用户 A、 用户 B和用户 C所看到的选牌界面。 即选牌界面上还剩余两张牌, 用户 A看到的二张牌依次携带有密码片段 21和 11; 用户 B看到的二张牌依次携带有密码片段 15和 23; 用户 C看 到的二张牌依次携带有密码片段 33和 22。 用户 A、 用户 B和用户 C看到 的密码本相同: J, 10和 K, 对应的密码为 42, 69和 56。  4C-al, FIG. 4C-a2 and FIG. 4C-a3 respectively show the selections seen by the user A, the user B, and the user C after the user A selects the first card, that is, the card carrying the cipher segment 17. Card interface. That is, there are two cards remaining on the selection interface, and the two cards seen by the user A carry the password segments 21 and 11 in turn; the two cards seen by the user B carry the password segments 15 and 23 in sequence; the user C sees The two cards carry the cipher segments 33 and 22 in sequence. User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
图 4C-bl , 图 4C- b2和图 4C-b3分别示出了在用户 B选了第三张牌, 即携带密码片段 23的牌后, 用户 A、用户 B和用户 C所看到的选牌界面。 即选牌界面上还剩一张牌, 用户 A看到的该张牌携带有密码片段 21; 用 户 B看到的该张牌携带有密码片段 15; 用户 C看到的该张牌携带有密码 片段 33。 用户 A、 用户 B和用户 C看到的密码本相同: J, 10和 K, 对应 的密码为 42, 69和 56。  4C-bl, FIG. 4C-b2 and FIG. 4C-b3 respectively show the selections seen by the user A, the user B, and the user C after the user B selects the third card, that is, the card carrying the cipher segment 23. Card interface. That is, there is one card left on the card selection interface, and the card that the user A sees carries the password segment 21; the card that the user B sees carries the password segment 15; the card that the user C sees carries the password. Fragment 33. User A, User B, and User C see the same password: J, 10, and K, and the corresponding passwords are 42, 69, and 56.
图 4C-c示出了在用户 C选了中间一张牌, 即最后一张牌后, 用户 A、 用户 B和用户 C所看到的选牌界面, 即已选完所有的牌, 界面为空。  4C-c shows the card selection interface that the user A, the user B, and the user C see after the user C selects the middle card, that is, the last card, that is, all the cards have been selected, and the interface is air.
图 4D示出了在用户 A、 用户 B和用户 C操控完牌后, 所看到的将相 应的密码片段进行拼合的牌背的界面。 如图 4D所示, 第一张牌的牌背包 含三个密码片段: 17、 16和 09, 拼合而成的密码为 42; 第二张牌的牌背 包含三个密码片段: 21、 15和 33, 拼合而成的密码为 69; 以及第三张牌 的牌背包含三个密码片段: 11、 23和 22, 拼合而成的密码为 56。 FIG. 4D shows the interface of the card back that is seen to be stitched together by the user A, the user B, and the user C after the card is manipulated. As shown in Figure 4D, the back of the first card contains three cipher segments: 17, 16, and 09, and the combined cipher is 42; the back of the second card contains three cipher segments: 21, 15 and 33, the combined password is 69; and the third card The back of the card contains three cryptographic segments: 11, 23, and 22, and the combined password is 56.
图 4E示出了用户 A、 用户 B和用户 C所看到的将密码片段拼合后所 得到的密码所对应的牌面的界面。 如图 4E所示, 第一张牌拥有三个密码 片段 17、 16和 09, 拼合而成的密码为 42, 所对应的牌值为 J; 第二张牌 拥有三个密码片段 21、 15和 33,拼合而成的密码为 69, 所对应的牌值为 10;以及第三张牌拥有三个密码片段 11、 23和 22,拼合而成的密码为 56, 所对应的牌值为 K。  Fig. 4E shows the interface of the card corresponding to the password obtained by the combination of the password segments seen by the user A, the user B, and the user C. As shown in Fig. 4E, the first card has three cipher segments 17, 16, and 09, the combined cipher is 42 and the corresponding card value is J; the second card has three cipher segments 21, 15 and 33, the combined password is 69, the corresponding card value is 10; and the third card has three password segments 11, 23 and 22, the combined password is 56, and the corresponding card value is K.
当将上述牌值与密码本中相同密码所对应的原始牌值进行比较时,可 以得到相同的密码具有相同的牌值, 因此验证成功, 系统随机化发牌, 没 有作弊。 但是如果相同的密码具有不同的牌值, 例如拼合而成的密码为 69, 而所对应的牌值为 Q, 则验证失败, 表明系统存在作弊行为。  When comparing the above card value with the original card value corresponding to the same password in the code book, it can be obtained that the same card has the same card value, so the verification is successful, the system randomizes the card, and there is no cheating. However, if the same password has different card values, for example, the combined password is 69, and the corresponding card value is Q, the verification fails, indicating that the system has cheating behavior.
虽然上述的实施例中仅描述了 3张牌的暗牌验证过程,但是,暗牌的 数量可以是 1, 2, 3, 4, 5, 10, 22, 30, 52等任意适合的整数值。暗牌的类型也 可以不限于朴克,而是可以是任意形式的物品,只要其在选择时正面向下, 并在经历选择后就能知道其真实的值即可。  Although only the dark card verification process of three cards is described in the above embodiment, the number of dark cards may be any suitable integer value such as 1, 2, 3, 4, 5, 10, 22, 30, 52. The type of the dark card may not be limited to Parker, but may be any form of article as long as it is face down when selected and can know its true value after undergoing selection.
尽管本发明已结合优选实施方案和特定实施例进行了描述,但并不意 旨本发明的范围被前文中特定的实施方案所限制,因为此处的实施方案在 所有方面均为描述而不为了限制。 在此所描述的本发明可以有许多种变 化, 这种变化不能被认为偏离本发明的精神和范围。 因此, 所有对本领 域技术人员来说显而易见的改变和修改,都包括在本权利要求书的涵盖 范围之内。  Although the present invention has been described in connection with the preferred embodiments and the specific embodiments, it is not intended to . There may be many variations to the invention described herein, and such variations are not to be construed as a departure from the spirit and scope of the invention. All such changes and modifications that are obvious to those skilled in the art are intended to be included within the scope of the appended claims.

Claims

权 利 要 求 书 Claim
1. 一种电子暗牌验证方法, 包括步骤:  1. An electronic dark card verification method, comprising the steps of:
(1)一个或多个客户机从用户接收发牌请求消息, 并向服务器发送 所述发牌请求消息;  (1) One or more clients receive a card request message from the user and send the card request message to the server;
(2)所述服务器从所述客户机接收所述发牌请求消息, 根据所述发 牌请求消息生成随机打乱的牌;  (2) the server receives the card request message from the client, and generates a randomly scrambled card according to the card request message;
(3)所述服务器为每张牌生成密码, 并将所述密码保存到密码本; (3) the server generates a password for each card, and saves the password to the password book;
(4)所述服务器根据所述客户机的数量将所述牌的密码拆分成密码 片段; (4) The server splits the password of the card into a password segment according to the number of the clients;
(5)所述服务器将携带有所述密码片段的牌以及所述密码本发送到 各个所述客户机;  (5) The server transmits the card carrying the ciphertext and the codebook to each of the clients;
(6)所述客户机从所述服务器接收所述携带有所述密码片段的牌以 及密码本;  (6) the client receives the card carrying the cipher segment and the code book from the server;
(7)所述客户机选牌并操控所选择的牌;  (7) the client selects a card and controls the selected card;
(8)如果所述客户机已完成选牌以及对所选择的牌的操控, 则向所 述用户显示牌值并拼合所述密码片段,将所述密码片段拼合而成的密码 所对应的牌值与所述密码本中的相同密码所对应的原始牌值比较,如果 牌值相同, 则验证成功, 否则验证失败。  (8) If the client has completed the card selection and the manipulation of the selected card, the card value is displayed to the user and the password segment is flattened, and the card corresponding to the password segment is combined. The value is compared with the original card value corresponding to the same password in the code book. If the card value is the same, the verification is successful, otherwise the verification fails.
2. 根据权利要求 1所述的电子暗牌验证方法, 其特征在于: 所述 服务器和所述客户机位于相同的设备上, 或者位于不同的设备上。 2. The electronic card verification method according to claim 1, wherein: the server and the client are located on the same device or on different devices.
3. 根据权利要求 2所述的电子暗牌验证方 , 其特征在于, 所述 客户机是浏览器。 The electronic card authenticator according to claim 2, wherein the client is a browser.
4. 根据权利要求 3所述的电子暗牌验证方法, 其特征在于, 所述 密码本采用以下文件格式中的一种或数种: 文本文件、 电子邮件或短消 息。 4. The electronic card verification method according to claim 3, wherein the codebook adopts one or more of the following file formats: a text file, an email, or a short message.
5. 根据权利要求 1至 4中任一所述的电子暗牌验证方法, 其特征 在于, 所述密码选自数字、 字母、 图片、 特殊符号、 公式或不等式中的 一种或多种。 The electronic card verification method according to any one of claims 1 to 4, wherein the password is selected from a number, a letter, a picture, a special symbol, a formula or an inequality. One or more.
6. 根据权利要求 5所述的电子暗牌验证方法, 其特征在于, 所述 服务器根据所述客户机的数量将所述牌的密码拆分成密码片段的步骤, 进一步包括: 根据所述客户机的数量按随机比例进行密码拆分, 所述比 例介于 30%至 70°/。之间, 包括端值。 The electronic card verification method according to claim 5, wherein the step of splitting the password of the card into a password segment according to the number of the clients, further comprising: according to the client The number of machines is cryptographically split at a random ratio, which is between 30% and 70°/. Between, including the end value.
7. 根据权利要求 5所述的电子暗牌验证方法, 其特征在于, 所述 服务器将携带有所述密码片段的牌以及所述密码本发送到各个所述客 户机, 其中: 发送到各个所述客户机的所述携带有所述密码片段的牌的 牌值相同, 且密码片段各不相同。 The electronic card verification method according to claim 5, wherein the server transmits the card carrying the password segment and the codebook to each of the clients, where: The card of the client carrying the cipher segment has the same card value, and the cipher segments are different.
PCT/CN2012/000128 2011-01-24 2012-01-29 Method for electronic blind card verification WO2012100661A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110027198.9 2011-01-24
CN201110027198.9A CN102143167B (en) 2011-01-24 2011-01-24 Electronic hole card verification method

Publications (1)

Publication Number Publication Date
WO2012100661A1 true WO2012100661A1 (en) 2012-08-02

Family

ID=44410389

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/000128 WO2012100661A1 (en) 2011-01-24 2012-01-29 Method for electronic blind card verification

Country Status (2)

Country Link
CN (1) CN102143167B (en)
WO (1) WO2012100661A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143167B (en) * 2011-01-24 2014-05-07 郭君艳 Electronic hole card verification method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531703A (en) * 2001-02-21 2004-09-22 ���������湫˾ Method, apparatus and article for verifying card games, such as playing card distribution
EP1962221A1 (en) * 2007-01-16 2008-08-27 Bally Gaming Inc. Rom bios based trusted encrypted operating system
WO2010043256A1 (en) * 2008-10-15 2010-04-22 Telefonaktiebolaget Lm Ericsson (Publ) A method and apparatus for implementing a virtual scratch-card game
CN101853220A (en) * 2009-04-02 2010-10-06 同方股份有限公司 Mobile storage device with key removal and storage mechanism
CN102143167A (en) * 2011-01-24 2011-08-03 郭君艳 Electronic hole card verification method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN87205815U (en) * 1987-03-31 1988-04-13 陈淑靖 Electronic cipher safe
CN100550726C (en) * 2005-10-19 2009-10-14 华为技术有限公司 A kind of distribution type dynamic secret key management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531703A (en) * 2001-02-21 2004-09-22 ���������湫˾ Method, apparatus and article for verifying card games, such as playing card distribution
EP1962221A1 (en) * 2007-01-16 2008-08-27 Bally Gaming Inc. Rom bios based trusted encrypted operating system
WO2010043256A1 (en) * 2008-10-15 2010-04-22 Telefonaktiebolaget Lm Ericsson (Publ) A method and apparatus for implementing a virtual scratch-card game
CN101853220A (en) * 2009-04-02 2010-10-06 同方股份有限公司 Mobile storage device with key removal and storage mechanism
CN102143167A (en) * 2011-01-24 2011-08-03 郭君艳 Electronic hole card verification method

Also Published As

Publication number Publication date
CN102143167B (en) 2014-05-07
CN102143167A (en) 2011-08-03

Similar Documents

Publication Publication Date Title
CN108769067B (en) Authentication verification method, device, equipment and medium
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN104184740B (en) Trusted transmission method, trusted third party and credible delivery system
CN106599723B (en) File encryption method and device and file decryption method and device
US20150349966A1 (en) Client/server access authentication
TW201626752A (en) Generating a symmetric encryption key
US9641328B1 (en) Generation of public-private key pairs
WO2014161259A1 (en) Verification code processing method, device, terminal and server
JP2010528382A (en) Secure login protocol
US10873448B2 (en) Technique to generate symmetric encryption algorithms
TW201633206A (en) Improved security through authentication tokens
CN106034122A (en) Information processing method, electronic equipment and server
JP2009193336A (en) Processing distribution system, authentication server, distribution server, and processing distribution method
JP2016075765A (en) Authentication encryption device, authentication decryption device, and program therefor
CN106712959A (en) Implementation method and system of communication safety
WO2012100661A1 (en) Method for electronic blind card verification
JP2012068930A (en) Password authentication system and method, and encrypted communication system and method
WO2017029708A1 (en) Personal authentication system
Bowne Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
JP6223907B2 (en) One-stop application system, one-stop application method and program
JP5774567B2 (en) Authentication information input device, server device, authentication system, and program
US10743074B2 (en) Systems and methods for applying a shortcut to a streaming media channel
JP2022549671A (en) Cryptographic services for browser applications
JP6602118B2 (en) Information communication system
JP6165044B2 (en) User authentication apparatus, system, method and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12739198

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12739198

Country of ref document: EP

Kind code of ref document: A1