WO2019119381A1 - Password generated by corresponding card and application thereof - Google Patents

Password generated by corresponding card and application thereof Download PDF

Info

Publication number
WO2019119381A1
WO2019119381A1 PCT/CN2017/117853 CN2017117853W WO2019119381A1 WO 2019119381 A1 WO2019119381 A1 WO 2019119381A1 CN 2017117853 W CN2017117853 W CN 2017117853W WO 2019119381 A1 WO2019119381 A1 WO 2019119381A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
corresponding card
card
code
software
Prior art date
Application number
PCT/CN2017/117853
Other languages
French (fr)
Chinese (zh)
Inventor
陈勇
Original Assignee
陈勇
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201611200735.4A external-priority patent/CN106778309A/en
Priority claimed from CN201611201381.5A external-priority patent/CN106650334A/en
Priority claimed from CN201611201379.8A external-priority patent/CN106789016A/en
Priority claimed from CN201611200731.6A external-priority patent/CN106650331A/en
Priority claimed from CN201611201378.3A external-priority patent/CN106599705A/en
Priority claimed from CN201611200677.5A external-priority patent/CN106599624A/en
Priority claimed from CN201611201380.0A external-priority patent/CN106599706A/en
Application filed by 陈勇 filed Critical 陈勇
Publication of WO2019119381A1 publication Critical patent/WO2019119381A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • the present invention relates to the field of software, and in particular to a password generated by a corresponding card and its use.
  • Encrypting the software is something that every software company has to do. The harder the encrypted password, the harder it is to decrypt.
  • a password generated by a corresponding card and its use characterized by a corresponding card password generated by the corresponding card;
  • the corresponding card password is a new cryptographic technique by adopting a series of technical means by searching the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts.
  • the prepared password is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
  • a password generated by the corresponding card is characterized by forming a corresponding card password
  • the code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
  • the code contains a series of corresponding card technology to form a firing file or an alarm signal.
  • the software website knows that someone has stolen it.
  • a password generated by the corresponding card is characterized in that the sound feature corresponds to the card password ;
  • the sound feature corresponds to a card password, which is a password generated by a personalized phonetic card in the corresponding card, and the digital code used is composed of a local pronunciation digital code of a person's text and a digital code of the person's personalized voice characteristics.
  • the inherent logical relationship of the password is performed by the meaning of the text and the text corresponding to the corresponding voice in the person's phonetic card; the local pronunciation of the person's character is encoded by the specific person.
  • the encoding of the pronunciation with localized pronunciation features; the digital encoding of the person's personalized sound characteristics refers to the specific digital encoding of the person including the sound quality features, the timbre characteristics, and the voicing features.
  • a password generated by the corresponding card is characterized by a complex correspondence card password
  • the complex code corresponds to the card password, and the digital code used is coded corresponding to the sound and word of the card itself as described in the above technical solution, but the logical relationship is changed: it is the meaning of the text content of the two corresponding cards. Form a logical relationship, and together with the code of the sound and word, form the lock and key of the password.
  • a password generated by the corresponding card is characterized by a simple correspondence card password
  • the simple type corresponds to the card password, and the code corresponding to the card's own sound and word is used as a code, and the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back are used as the result of the password or the lock or the key.
  • a password generated by a corresponding card and its application characterized in that the software and the corresponding card and the corresponding card work process are encrypted by using the corresponding card password;
  • the encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password includes: encrypting the search part of the corresponding card, performing the same encryption on the retrieved content, encrypting the corresponding start of the corresponding card, and corresponding to the corresponding card.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the character of the search content is encrypted, so that the code of the retrieved content is consistent with the code of the corresponding part of the corresponding card in the corresponding library, and the search can be performed. get on.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each corresponding correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card and the corresponding relationship. Add another lock to the anti-theft measures.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the password is replaced by the password after the password is encrypted;
  • the password is encrypted after the password is replaced for theft prevention.
  • the password cannot be replaced at all times.
  • the password can be replaced by a single part, or all parts can be replaced together, and the quick change of the replacement period can be accelerated.
  • the individual replacement of the encrypted password replacement method is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for replacing the password in turn;
  • the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, the lock and the key for changing the password in turn, are part of the lock and key for replacing the password, and are also cyclically performed.
  • the encryption replacement mode is replaced together, and is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
  • the quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card password is automatically responded;
  • the automatic response corresponding to the card password is that the software website issues an inquiry and obtains a correct response, and the software website sends an inquiry to the user from time to time. After receiving the inquiry code, the computer and the mobile phone automatically reply to the corresponding correspondence generated by the local machine according to the specific corresponding card.
  • the card password is used by the software website to determine whether it meets the requirements of the non-registration, and is not normally used on multiple devices.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is the method for synthesizing the corresponding card code;
  • the method for synthesizing the corresponding card code is to synthesize a corresponding card code into a corresponding card code, and use the synthesized password to unlock or trigger the lock.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is characterized in that the corresponding card code is decomposed into a plurality of codes;
  • the corresponding card code is decomposed into a plurality of codes, and the code is decomposed into several codes by the accepted corresponding card code, and the code is used to unlock or trigger the lock; in addition, the website transmits the corresponding card code at any time. , the corresponding card password lock is activated, and the corresponding card code lock is timely decomposed into a waste lock.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card usage code is used to start a corresponding relationship;
  • a corresponding relationship is used. After receiving the corresponding card code, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
  • the password generated by the card and the encryption method generated by the corresponding card are characterized by their use;
  • the use, according to the replacement method of the password after the corresponding card password is encrypted, can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.
  • a password generated by a corresponding card and its use characterized by a corresponding card password generated by the corresponding card.
  • the embodiment is further configured to: the corresponding card password is obtained by adopting a series of technical means by searching for the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts.
  • the new password preparation technology, the password generated is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
  • the embodiment is further configured to: a password generated by the corresponding card, characterized in that a corresponding card password is formed.
  • the code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
  • Embodiment 2 is further configured to:
  • the software runs randomly to pass specific code.
  • the specific code can be the corresponding relationship.
  • the code of one place corresponds to the code of another place.
  • the code of somewhere and the code of another place become the password lock. Or the key, the two codes do not match, it becomes an alarm signal, let the software website know that someone is stealing.
  • Embodiment 2 is further configured to:
  • Working principle 3 Preset a set of corresponding cards in the software, and randomly pass specific code when the software is running. Multiple specific codes form a combination code or corresponding new code through the corresponding card, and become a password lock or key, and The hidden code of the software generates an alarm signal to let the software website know that someone is stealing.
  • a password generated by a corresponding card characterized in that the sound feature corresponds to a card password.
  • the sound feature corresponding to the card password is a password generated by the personalized phonetic card in the corresponding card, and the digital code used is encoded by the local pronunciation of a certain person's character and personalized to the person.
  • the digital coding of the sound characteristics is the meaning of the text and the text corresponding to the corresponding voice in the corresponding character card of the person;
  • the local pronunciation of the person's text is digitally encoded, Refers to the encoding of a particular person's pronunciation with localized pronunciation features;
  • the digital encoding of the individual's personalized sound characteristics refers to the specific digital encoding of the person's sound quality, timbre, and voicing features. .
  • the password formed by the personalized sound card is determined by the text part, and the corresponding unique voice code of the person is used for digital communication.
  • a password generated by a corresponding card characterized by a complex correspondence card password.
  • the embodiment is further configured to: the complex corresponding card password, the digital code used, as described in the above technical solution, is a code corresponding to the sound and word of the card itself, but the logical relationship is changed: two corresponding The meaning of the text content of the card forms a logical relationship, and together with the code of the sound and the word, constitutes the lock and key of the password.
  • a password generated by a corresponding card characterized by a simple correspondence card password.
  • the embodiment is further configured to: the simple type corresponding to the card password, the code corresponding to the card's own sound and word, the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back as the result of the password Or lock, key.
  • Working principle as a corresponding card word card, word sound card, sound card, sound card; in word card, one to another text, can give a text for password lock, another national language To make a password key; another type of word card can also set the password in this way; in the word sound card, the word or the pronunciation code can be used as the key, and the other is set as the lock, and the sound card can also do the same.
  • the pronunciation of one language to the pronunciation of another language is also done in the above way. In the same way, the pronunciation of the pronunciation of another language to the pronunciation of one language can still be the same. Form a new password lock and password key.
  • a password generated by a corresponding card and its application characterized in that the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password.
  • the embodiment is further configured to: encrypt the software and the corresponding card and the corresponding card working process by using the corresponding card password, including: encrypting the retrieval part of the corresponding card, performing the same encryption on the retrieved content, and correspondingly starting the corresponding card Encryption, decryption of the corresponding result of the corresponding card, replacement of the password after encryption, automatic response to the corresponding card password, synthesis of the use method of the corresponding card code, corresponding use method of decomposing the card code into multiple codes, the corresponding card code appears Start the use of a corresponding relationship.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by the corresponding card password, and the retrieval content is encrypted, so that the code of the search content and the code of the corresponding part of the corresponding card in the corresponding library are identical, and the retrieval can be performed.
  • the corresponding card password is used to encrypt the working process of the software and the corresponding card and the corresponding card, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card, the corresponding relationship, and the anti-theft measure Add another lock on it.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process.
  • the characteristic is that the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, which is characterized by the password replacement method after the password is encrypted.
  • the embodiment is further configured to: the password replacement method after the password is encrypted for theft prevention, the password cannot be replaced at all times, the password can be replaced by a single part, or all the parts can be replaced together, and the replacement period can be accelerated.
  • the individual replacement of the password replacement method after encryption is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, and the single element of the correspondence relationship, and the lock and the key of the password are alternately replaced.
  • the embodiment is further configured to: the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for changing the password in turn, which are part of the lock and key for replacing the password, It also loops.
  • the replacement of the password replacement method after encryption is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
  • the quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card password is automatically responded.
  • the embodiment is further configured to: the automatic response corresponding to the card password, the software website sends an inquiry and obtains a correct response, the software website sends an inquiry to the user from time to time, and the computer and the mobile phone automatically reply to the machine after receiving the inquiry code.
  • the software website determines whether the data that meets the non-compliance registration is normal, and is used on multiple devices.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is the method for synthesizing the corresponding card code.
  • the embodiment is further configured to: the method for synthesizing the corresponding card code, synthesizing the corresponding card code into a corresponding card code, and using the synthesized password to unlock or trigger the lock.
  • the software pre-plants a set of corresponding card code locks.
  • the software is running, and some parts of the corresponding card code keys are transmitted in real time. Some of the corresponding card code keys become a password through the corresponding card, and several passwords pass another
  • the corresponding card constitutes the corresponding card code key, the corresponding card code key opens the corresponding card code lock, the software can run normally; when the corresponding card code key is not generated, the software stops running or the software website knows that the software is stolen.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the corresponding card code is decomposed into a plurality of codes.
  • the embodiment is further configured to: use the method for decomposing the corresponding card code into a plurality of codes, and decompose the code into a plurality of codes by using the accepted corresponding card code, and use the decomposed code to unlock or trigger the lock;
  • the website transmits the corresponding card code at any time, activates the correspondence of the corresponding card code lock, and decomposes the corresponding card code lock into a waste lock in time.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card usage code is used to start a corresponding relationship.
  • the embodiment is further configured to: when the corresponding card password is generated, the usage method of the corresponding relationship is started. After receiving the corresponding card password, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
  • Encryption of the cryptographic card and the corresponding card to be produced is generated, characterized in that it uses.
  • the embodiment is further configured to: the use, (according to the password replacement method of 2, 5 password encryption), the software can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.

Abstract

A method for generating a corresponding card password and an encryption method therefor, which relate to the field software and which are characterized in a corresponding card password generated by a corresponding card; the corresponding card password is a password compiled by means of a new password compiling technique formed by employing a series of technical means on a searching portion, a corresponding result portion, and a corresponding relationship portion of a card, as well as the whole corresponding card, and a connotation and an extension of the foregoing four parts, and comprises: a simple corresponding card password, a complex corresponding card password, a sound feature corresponding card password, and a corresponding card cipher code. A difficult coding technique is added for one more means of privacy.

Description

一种对应卡产生的密码及其运用A password generated by a corresponding card and its application 技术领域Technical field
本发明涉及软件领域,特别是涉及一种对应卡产生的密码及其运用。The present invention relates to the field of software, and in particular to a password generated by a corresponding card and its use.
背景技术Background technique
对软件进行加密,是每个软件公司都要做的事,加密后的密码,越难解密越好。Encrypting the software is something that every software company has to do. The harder the encrypted password, the harder it is to decrypt.
技术问题technical problem
通过对应卡产生的密码以及通过对应卡产生的加密方式,使密码队伍里增加了新的密码种类,在加密方法上也增加了新的加密方法,让再快的计算机都无发解码。Through the password generated by the corresponding card and the encryption method generated by the corresponding card, a new password type is added to the password team, and a new encryption method is added to the encryption method, so that the fast computer has no decoding.
技术解决方案Technical solution
一种对应卡产生的密码及其运用,其特征在于对应卡产生的对应卡密码;A password generated by a corresponding card and its use, characterized by a corresponding card password generated by the corresponding card;
所述对应卡密码,是通过对对应卡的检索分部分、对应结果部分、对应关系部分、整体对应卡、以及这四个部分的内涵和外延,采取系列技术手段成为新的密码编制技术,所编制出的密码,为对应卡密码;包括:简单对应卡密码、复杂对应卡密码、声音特征对应卡密码、对应卡暗码。The corresponding card password is a new cryptographic technique by adopting a series of technical means by searching the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts. The prepared password is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
有益效果:增添了一种难解的编码技术,让保密多一个途径。Beneficial effect: Adding a difficult coding technique to make confidentiality one more way.
优选的,一种对应卡产生的密码,其特征在于形成一种对应卡暗码; Preferably, a password generated by the corresponding card is characterized by forming a corresponding card password;
所述形成一种对应卡暗码,不起报警作用的编码,通过对应卡技术,成为了报警信号的击发码;应卡暗码可以是纯粹的数字代码,也可以是带对应关系的数字代码。The code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
有益效果:暗码通过系列对应卡技术组成击发文件或报警信号,报警信号的出现,软件网站就知道了有人盗用。Beneficial effect: The code contains a series of corresponding card technology to form a firing file or an alarm signal. When the alarm signal appears, the software website knows that someone has stolen it.
优选的,一种对应卡产生的密码,其特征在于声音特征对应卡密码 Preferably, a password generated by the corresponding card is characterized in that the sound feature corresponds to the card password ;
所述声音特征对应卡密码,是由对应卡中个性化的音字卡生成的密码,使用的数字编码是由某个人文字的地方性读音数字编码与这个人个性化的声音特性的数字编码组成,其密码的内在逻辑关系,是由此声音编码在这个人的音字对应卡中对应出的文字,文字的意思来进行;所述某个人文字的地方性读音数字编码,是指特定的这个人的带地方性读音特征的读音的编码;所述这个人个性化的声音特性的数字编码,是指特定的这个人的包括音质特征、音色特征、音纹特征的数字编码。The sound feature corresponds to a card password, which is a password generated by a personalized phonetic card in the corresponding card, and the digital code used is composed of a local pronunciation digital code of a person's text and a digital code of the person's personalized voice characteristics. The inherent logical relationship of the password is performed by the meaning of the text and the text corresponding to the corresponding voice in the person's phonetic card; the local pronunciation of the person's character is encoded by the specific person. The encoding of the pronunciation with localized pronunciation features; the digital encoding of the person's personalized sound characteristics refers to the specific digital encoding of the person including the sound quality features, the timbre characteristics, and the voicing features.
有益效果:读音的编码加这个人声音特性的编码,成为一组新编码,编码间不存在绝对的逻辑关系。 Beneficial effect : the encoding of the pronunciation plus the encoding of the voice characteristics of the person becomes a new set of codes, and there is no absolute logical relationship between the codes.
优选的,一种对应卡产生的密码,其特征在于复杂式对应卡密码;Preferably, a password generated by the corresponding card is characterized by a complex correspondence card password;
所述复杂式对应卡密码,使用的数字代码,如上个技术方案所述一样是对应卡自身的音、字的编码作代码,但逻辑关系变了:是两个对应卡的文字内容的意思,形成逻辑关系,并和音、字的代码一起,组成密码的锁和钥匙。The complex code corresponds to the card password, and the digital code used is coded corresponding to the sound and word of the card itself as described in the above technical solution, but the logical relationship is changed: it is the meaning of the text content of the two corresponding cards. Form a logical relationship, and together with the code of the sound and word, form the lock and key of the password.
优选的,一种对应卡产生的密码,其特征在于简单式对应卡密码; Preferably, a password generated by the corresponding card is characterized by a simple correspondence card password;
所述简单式对应卡密码,以对应卡自身的音、字的编码作代码,对应卡的检索部分和对应结果部分以及从前到后的单向对应关系作为密码的结果或锁、钥匙。The simple type corresponds to the card password, and the code corresponding to the card's own sound and word is used as a code, and the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back are used as the result of the password or the lock or the key.
一种对应卡产生的密码及其运用,其特征在于用对应卡密码对软件和对应卡、对应卡工作过程进行加密;A password generated by a corresponding card and its application, characterized in that the software and the corresponding card and the corresponding card work process are encrypted by using the corresponding card password;
所述用对应卡密码对软件和对应卡、对应卡工作过程进行加密,包括:对对应卡的检索部分加密,对检索内容进行相同的加密,对对应卡的对应启动的加密,对对应卡的对应结果的解密,加密后密码的更换方式,自动回应对应卡密码,合成对应卡暗码的使用方法,对应卡暗码分解成多个码的使用方法,出现对应卡暗码就启动某个对应关系的使用方法。The encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password includes: encrypting the search part of the corresponding card, performing the same encryption on the retrieved content, encrypting the corresponding start of the corresponding card, and corresponding to the corresponding card The decryption of the corresponding result, the replacement method of the encrypted password, the automatic response to the corresponding card password, the use method of synthesizing the corresponding card code, the use method of decomposing the card code into multiple codes, and the use of the corresponding card code to initiate the use of a corresponding relationship method.
有益效果:避免软件很快破解,被盗用、盗版。 Beneficial effects : Avoid software cracking, being stolen, pirated.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的检索部分加密,使检索部分不能在其他软件上正常使用。Preferably, the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对检索内容进行加密,使检索内容的代码和对应库里的对应卡的检索部分的代码一致,检索才能进行。Preferably, the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the character of the search content is encrypted, so that the code of the retrieved content is consistent with the code of the corresponding part of the corresponding card in the corresponding library, and the search can be performed. get on.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的启动对应关系加密,对应关系触发后才能启动每个对应;避免盗用对应卡、对应关系,在防盗措施上再增加一把锁。 Preferably , the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each corresponding correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card and the corresponding relationship. Add another lock to the anti-theft measures.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的对应结果需要解密,解密后才能成为其他软件的通用文字。 Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于密码加密后密码的更换方式; Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the password is replaced by the password after the password is encrypted;
所述密码加密后密码的更换方式,是为了防盗,密码不能始终不替换,密码可以单个部分的单独换,也可以所有各部分的一起换,更可以加快更换周期的快速换。The password is encrypted after the password is replaced for theft prevention. The password cannot be replaced at all times. The password can be replaced by a single part, or all parts can be replaced together, and the quick change of the replacement period can be accelerated.
更优选的,加密后密码更换方式的单独换,其特征在于同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换其密码的锁和钥匙; More preferably, the individual replacement of the encrypted password replacement method is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for replacing the password in turn;
所述同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换密码的锁和钥匙,就是一部分一部分的更换密码的锁和钥匙,还循环进行。The same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, the lock and the key for changing the password in turn, are part of the lock and key for replacing the password, and are also cyclically performed.
有益效果:既使更换密码能够顺利进行,避免了软件很快被破解,并且实行起来需要运算的要求得以降低。The beneficial effect: even if the replacement password can be smoothly carried out, the software is prevented from being quickly cracked, and the requirement for calculation is reduced.
更优选的,加密后密码更换方式的一起换,其特征在于对软件内,每一个要素,每一类程序,都轮流进行更换,并且密码的锁和钥匙都一起换。 More preferably, the encryption replacement mode is replaced together, and is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
更优选的,加密后密码更换方式的快速换,其特征还在于加快密码的锁和钥匙的更换周期。 More preferably, the quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于自动回应对应卡密码; Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card password is automatically responded;
所述自动回应对应卡密码,是软件网站发出询问和获得正确的回应,软件网站不定期的对使用者发出询问,电脑、手机收到询问码后,自动回复本机根据特定对应卡生成的对应卡密码,以利软件网站判断符合不符合注册时的资料,是不是正常的在多个设备上使用。The automatic response corresponding to the card password is that the software website issues an inquiry and obtains a correct response, and the software website sends an inquiry to the user from time to time. After receiving the inquiry code, the computer and the mobile phone automatically reply to the corresponding correspondence generated by the local machine according to the specific corresponding card. The card password is used by the software website to determine whether it meets the requirements of the non-registration, and is not normally used on multiple devices.
有益效果:避免很快被破解,盗用、盗版。 Beneficial effects : Avoid being cracked, stolen and pirated soon.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于合成对应卡暗码的使用方法; Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is the method for synthesizing the corresponding card code;
所述合成对应卡暗码的使用方法,把几个对应卡暗码合成一个对应卡暗码,用合成的密码去开锁或触发锁住。The method for synthesizing the corresponding card code is to synthesize a corresponding card code into a corresponding card code, and use the synthesized password to unlock or trigger the lock.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对应卡暗码分解成多个码的使用方法; Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is characterized in that the corresponding card code is decomposed into a plurality of codes;
所述对应卡暗码分解成多个码的使用方法,把一个编码通过接受的对应卡暗码,触发分解成几个码,用分解的码去开锁或触发锁住;另外,网站随时传递对应卡暗码,启动对应卡暗码锁的对应,将对应卡暗码锁及时对应分解成废锁。The corresponding card code is decomposed into a plurality of codes, and the code is decomposed into several codes by the accepted corresponding card code, and the code is used to unlock or trigger the lock; in addition, the website transmits the corresponding card code at any time. , the corresponding card password lock is activated, and the corresponding card code lock is timely decomposed into a waste lock.
优选的,用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于出现对应卡暗码就启动某个对应关系的使用方法; Preferably , the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card usage code is used to start a corresponding relationship;
所述出现对应卡暗码就启动某个对应关系的使用方法,收到对应卡暗码后,启动对应卡的对应关系或不启动对应关系去开锁或触发锁住。After the corresponding card code is generated, a corresponding relationship is used. After receiving the corresponding card code, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
应卡产生的密码以及对应卡产生的加密方式,其特征在于其用途;The password generated by the card and the encryption method generated by the corresponding card are characterized by their use;
所述用途,根据对应卡密码加密后密码的更换方式,在非用对应卡密码加密的软件上,也能使用该技术,对加密后的密码进行更换。The use, according to the replacement method of the password after the corresponding card password is encrypted, can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.
有益效果:短周期内更换密码,让密码破解者解出来也没有多少用,避免软件破解后,被盗用、盗版。Beneficial effect: Change the password in a short period of time, so that the password cracker can not solve it, and it is not used much. After the software is cracked, it is stolen and pirated.
有益效果Beneficial effect
在此处键入有益效果描述段落。Type a benefit description paragraph here.
附图说明DRAWINGS
在此处键入附图说明描述段落。Enter the description of the description of the paragraph here.
本发明的最佳实施方式BEST MODE FOR CARRYING OUT THE INVENTION
下面将对本发明进行详细说明,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The present invention will be described in detail below with reference to the preferred embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
实施例Example 11
一种对应卡产生的密码及其运用,其特征在于对应卡产生的对应卡密码。A password generated by a corresponding card and its use, characterized by a corresponding card password generated by the corresponding card.
本实施例进一步设置为:所述对应卡密码,是通过对对应卡的检索分部分、对应结果部分、对应关系部分、整体对应卡、以及这四个部分的内涵和外延,采取系列技术手段成为新的密码编制技术,所编制出的密码,为对应卡密码;包括:简单对应卡密码、复杂对应卡密码、声音特征对应卡密码、对应卡暗码。The embodiment is further configured to: the corresponding card password is obtained by adopting a series of technical means by searching for the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts. The new password preparation technology, the password generated is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
实施例Example 22
本实施例进一步设置为:一种对应卡产生的密码,其特征在于形成一种对应卡暗码。The embodiment is further configured to: a password generated by the corresponding card, characterized in that a corresponding card password is formed.
所述形成一种对应卡暗码,不起报警作用的编码,通过对应卡技术,成为了报警信号的击发码;应卡暗码可以是纯粹的数字代码,也可以是带对应关系的数字代码。The code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
工原理:1在完成对应的过程中,会有很多的解密程序,会产生很多文件,在这些文件中,也产生出暗码;暗码是信号文件,众多信号文件中的暗码通过对应卡组成指令击发文件,击发文件激发隐藏程序,使软件网站知道有人盗用软件。Working principle: 1 In the process of completing the corresponding process, there will be a lot of decryption programs, which will generate a lot of files. In these files, the code is also generated; the code is the signal file, and the code in many signal files is fired by the corresponding card. Files, firing files, trigger hidden programs, and make software sites aware that someone has stolen the software.
实施例Example 33
实施例2进一步设置为:Embodiment 2 is further configured to:
工原理:2软件运行时随机传入特定的代码,特定的代码可以是对应关系,将某处的码对应出另外一处的码,某处的码和另外一处的码,就成为密码锁或钥匙,两码不符,就成为了报警信号,让软件网站知道有人在盗用。Working principle: 2 The software runs randomly to pass specific code. The specific code can be the corresponding relationship. The code of one place corresponds to the code of another place. The code of somewhere and the code of another place become the password lock. Or the key, the two codes do not match, it becomes an alarm signal, let the software website know that someone is stealing.
实施例Example 44
实施例2进一步设置为:Embodiment 2 is further configured to:
工原理:3在软件中预置一组对应卡,并在软件运行时随机传入特定的代码,多个特定的代码通过对应卡组成组合代码或对应出新代码,成为密码锁或钥匙,与软件暗藏的编码,生成报警信号,让软件网站知道有人在盗用。Working principle: 3 Preset a set of corresponding cards in the software, and randomly pass specific code when the software is running. Multiple specific codes form a combination code or corresponding new code through the corresponding card, and become a password lock or key, and The hidden code of the software generates an alarm signal to let the software website know that someone is stealing.
实施例Example 55
一种对应卡产生的密码,其特征在于声音特征对应卡密码。A password generated by a corresponding card, characterized in that the sound feature corresponds to a card password.
本实施例进一步设置为:所述声音特征对应卡密码,是由对应卡中个性化的音字卡生成的密码,使用的数字编码是由某个人文字的地方性读音数字编码与这个人个性化的声音特性的数字编码组成,其密码的内在逻辑关系,是由此声音编码在这个人的音字对应卡中对应出的文字,文字的意思来进行;所述某个人文字的地方性读音数字编码,是指特定的这个人的带地方性读音特征的读音的编码;所述这个人个性化的声音特性的数字编码,是指特定的这个人的包括音质特征、音色特征、音纹特征的数字编码。The embodiment is further configured to: the sound feature corresponding to the card password is a password generated by the personalized phonetic card in the corresponding card, and the digital code used is encoded by the local pronunciation of a certain person's character and personalized to the person. The digital coding of the sound characteristics, the inherent logical relationship of the password, is the meaning of the text and the text corresponding to the corresponding voice in the corresponding character card of the person; the local pronunciation of the person's text is digitally encoded, Refers to the encoding of a particular person's pronunciation with localized pronunciation features; the digital encoding of the individual's personalized sound characteristics refers to the specific digital encoding of the person's sound quality, timbre, and voicing features. .
工作原理:个性化音字卡形成的密码,是由文字部分决定逻辑关系,相对应的这个人的特有的语音编码用来进行数字交流。 Working principle : The password formed by the personalized sound card is determined by the text part, and the corresponding unique voice code of the person is used for digital communication.
实施例Example 66
一种对应卡产生的密码,其特征在于复杂式对应卡密码。A password generated by a corresponding card, characterized by a complex correspondence card password.
本实施例进一步设置为:所述复杂式对应卡密码,使用的数字代码,如上个技术方案所述一样是对应卡自身的音、字的编码作代码,但逻辑关系变了:是两个对应卡的文字内容的意思,形成逻辑关系,并和音、字的代码一起,组成密码的锁和钥匙。The embodiment is further configured to: the complex corresponding card password, the digital code used, as described in the above technical solution, is a code corresponding to the sound and word of the card itself, but the logical relationship is changed: two corresponding The meaning of the text content of the card forms a logical relationship, and together with the code of the sound and the word, constitutes the lock and key of the password.
工原理:用对应卡自身的音、字的编码作代码,但两个代码并不形成密码的锁和钥匙,分别是由代码对应出来的文字,其文字的意思的逻辑关系,才是本组密码的锁和钥匙。Working principle: use the code of the corresponding card's own sound and word as the code, but the two codes do not form the lock and key of the password, respectively, the text corresponding to the code, and the logical relationship of the meaning of the text is the group. Password lock and key.
实施例Example 77
一种对应卡产生的密码,其特征在于简单式对应卡密码。A password generated by a corresponding card, characterized by a simple correspondence card password.
本实施例进一步设置为:所述简单式对应卡密码,以对应卡自身的音、字的编码作代码,对应卡的检索部分和对应结果部分以及从前到后的单向对应关系作为密码的结果或锁、钥匙。The embodiment is further configured to: the simple type corresponding to the card password, the code corresponding to the card's own sound and word, the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back as the result of the password Or lock, key.
工原理:作对应卡分字字卡、字音卡、音字卡、音音卡;在字字卡中,一种到另一种文字,可以给出一种文字做密码锁,另一国种文字做密码钥匙;另一种到这一种的字字卡也可以这样设定密码;在字音卡中,可以把字或读音的代码作为钥匙,另一个设为锁,音字卡有也能够这样做;在音音卡中,一种语言的读音到另一种语言的读音,同样按上面的办法做,另一种语言的读音到一种语言的读音的音音卡用同样的方法,还是能形成新的密码锁和密码钥匙。Working principle: as a corresponding card word card, word sound card, sound card, sound card; in word card, one to another text, can give a text for password lock, another national language To make a password key; another type of word card can also set the password in this way; in the word sound card, the word or the pronunciation code can be used as the key, and the other is set as the lock, and the sound card can also do the same. In a sound card, the pronunciation of one language to the pronunciation of another language is also done in the above way. In the same way, the pronunciation of the pronunciation of another language to the pronunciation of one language can still be the same. Form a new password lock and password key.
实施例Example 88
一种对应卡产生的密码及其运用,其特征在于用对应卡密码对软件和对应卡、对应卡工作过程进行加密。A password generated by a corresponding card and its application, characterized in that the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password.
本实施例进一步设置为:所述用对应卡密码对软件和对应卡、对应卡工作过程进行加密,包括:对对应卡的检索部分加密,对检索内容进行相同的加密,对对应卡的对应启动的加密,对对应卡的对应结果的解密,加密后密码的更换方式,自动回应对应卡密码,合成对应卡暗码的使用方法,对应卡暗码分解成多个码的使用方法,出现对应卡暗码就启动某个对应关系的使用方法。The embodiment is further configured to: encrypt the software and the corresponding card and the corresponding card working process by using the corresponding card password, including: encrypting the retrieval part of the corresponding card, performing the same encryption on the retrieved content, and correspondingly starting the corresponding card Encryption, decryption of the corresponding result of the corresponding card, replacement of the password after encryption, automatic response to the corresponding card password, synthesis of the use method of the corresponding card code, corresponding use method of decomposing the card code into multiple codes, the corresponding card code appears Start the use of a corresponding relationship.
实施例Example 99
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的检索部分加密,使检索部分不能在其他软件上正常使用。The software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
实施例Example 1010
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对检索内容进行加密,使检索内容的代码和对应库里的对应卡的检索部分的代码一致,检索才能进行。The software and the corresponding card and the corresponding card working process are encrypted by the corresponding card password, and the retrieval content is encrypted, so that the code of the search content and the code of the corresponding part of the corresponding card in the corresponding library are identical, and the retrieval can be performed.
实施例Example 1111
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的启动对应关系加密,对应关系触发后才能启动每个对应;避免盗用对应卡、对应关系,在防盗措施上再增加一把锁。The corresponding card password is used to encrypt the working process of the software and the corresponding card and the corresponding card, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card, the corresponding relationship, and the anti-theft measure Add another lock on it.
实施例Example 1212
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的对应结果需要解密,解密后才能成为其他软件的通用文字。The corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process. The characteristic is that the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
实施例Example 1313
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于密码加密后密码的更换方式。The corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, which is characterized by the password replacement method after the password is encrypted.
本实施例进一步设置为:所述密码加密后密码的更换方式,是为了防盗,密码不能始终不替换,密码可以单个部分的单独换,也可以所有各部分的一起换,更可以加快更换周期的快速换;The embodiment is further configured to: the password replacement method after the password is encrypted for theft prevention, the password cannot be replaced at all times, the password can be replaced by a single part, or all the parts can be replaced together, and the replacement period can be accelerated. Quick change
实施例Example 1414
加密后密码更换方式的单独换,其特征在于同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换其密码的锁和钥匙。The individual replacement of the password replacement method after encryption is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, and the single element of the correspondence relationship, and the lock and the key of the password are alternately replaced.
本实施例进一步设置为:所述同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换密码的锁和钥匙,就是一部分一部分的更换密码的锁和钥匙,还循环进行。The embodiment is further configured to: the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for changing the password in turn, which are part of the lock and key for replacing the password, It also loops.
工作原理:马上全部更换所有密码的锁和钥匙,对运算要求比较高,使用者电脑、手机回复也特别多,容易造成软件网站瘫痪;同一类的加密程序,一部分一部分的更换密码的锁和钥匙,还循环进行,就能避免上述问题,使更换密码能够顺利进行。Working principle: All the locks and keys of all passwords will be replaced immediately. The calculation requirements are relatively high, and the user's computer and mobile phone reply are also very many, which is easy to cause the software website to be defective; the same type of encryption program, part of the password change lock and key And also cycle through, you can avoid the above problems, so that the replacement password can be carried out smoothly.
实施例Example 1515
加密后密码更换方式的一起换,其特征在于对软件内,每一个要素,每一类程序,都轮流进行更换,并且密码的锁和钥匙都一起换。The replacement of the password replacement method after encryption is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
实施例Example 1616
加密后密码更换方式的快速换,其特征还在于加快密码的锁和钥匙的更换周期。The quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
实施例Example 1717
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于自动回应对应卡密码。The corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card password is automatically responded.
本实施例进一步设置为:所述自动回应对应卡密码,是软件网站发出询问和获得正确的回应,软件网站不定期的对使用者发出询问,电脑、手机收到询问码后,自动回复本机根据特定对应卡生成的对应卡密码,以利软件网站判断符合不符合注册时的资料,是不是正常的在多个设备上使用。The embodiment is further configured to: the automatic response corresponding to the card password, the software website sends an inquiry and obtains a correct response, the software website sends an inquiry to the user from time to time, and the computer and the mobile phone automatically reply to the machine after receiving the inquiry code. According to the corresponding card password generated by the specific corresponding card, the software website determines whether the data that meets the non-compliance registration is normal, and is used on multiple devices.
实施例Example 1818
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于合成对应卡暗码的使用方法。The software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is the method for synthesizing the corresponding card code.
本实施例进一步设置为:所述合成对应卡暗码的使用方法,把几个对应卡暗码合成一个对应卡暗码,用合成的密码去开锁或触发锁住。The embodiment is further configured to: the method for synthesizing the corresponding card code, synthesizing the corresponding card code into a corresponding card code, and using the synthesized password to unlock or trigger the lock.
工作原理:软件预植一组对应卡暗码锁,软件在运行中,又实时传递一些对应卡暗码钥匙的一部分,几个对应卡暗码钥匙的一部分通过对应卡成为一个密码,几个密码又通过另外的对应卡组成对应卡暗码钥匙,对应卡暗码钥匙打开对应卡暗码锁,软件能正常运行;生成不了对应卡暗码钥匙时,软件就停止运行或软件网站就知道软件被盗。Working principle: The software pre-plants a set of corresponding card code locks. The software is running, and some parts of the corresponding card code keys are transmitted in real time. Some of the corresponding card code keys become a password through the corresponding card, and several passwords pass another The corresponding card constitutes the corresponding card code key, the corresponding card code key opens the corresponding card code lock, the software can run normally; when the corresponding card code key is not generated, the software stops running or the software website knows that the software is stolen.
实施例Example 1919
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对应卡暗码分解成多个码的使用方法。The software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the corresponding card code is decomposed into a plurality of codes.
本实施例进一步设置为:所述对应卡暗码分解成多个码的使用方法,把一个编码通过接受的对应卡暗码,触发分解成几个码,用分解的码去开锁或触发锁住;另外,网站随时传递对应卡暗码,启动对应卡暗码锁的对应,将对应卡暗码锁及时对应分解成废锁。The embodiment is further configured to: use the method for decomposing the corresponding card code into a plurality of codes, and decompose the code into a plurality of codes by using the accepted corresponding card code, and use the decomposed code to unlock or trigger the lock; The website transmits the corresponding card code at any time, activates the correspondence of the corresponding card code lock, and decomposes the corresponding card code lock into a waste lock in time.
实施例Example 2020
用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于出现对应卡暗码就启动某个对应关系的使用方法。The corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card usage code is used to start a corresponding relationship.
本实施例进一步设置为:所述出现对应卡暗码就启动某个对应关系的使用方法,收到对应卡暗码后,启动对应卡的对应关系或不启动对应关系去开锁或触发锁住。The embodiment is further configured to: when the corresponding card password is generated, the usage method of the corresponding relationship is started. After receiving the corresponding card password, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
实施例Example 21twenty one
应卡产生的密码以及对应卡产生的加密方式,其特征在于其用途。 Encryption of the cryptographic card and the corresponding card to be produced is generated, characterized in that it uses.
本实施例进一步设置为:所述用途,(根据2、5密码加密后密码的更换方式)在非用对应卡密码加密的软件上,也能使用该本技术,对加密后的密码进行更换。The embodiment is further configured to: the use, (according to the password replacement method of 2, 5 password encryption), the software can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.
工作原理:没有用对应卡密码加密的软件,也可以用原来的加密密码,进行密码锁和密码钥匙的同时加速替换,还可以改用对应卡密码来进行。Working principle: There is no software encrypted with the corresponding card password, or the original encrypted password can be used to speed up the replacement of the password lock and the password key, and the corresponding card password can be used instead.
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。The above description of the disclosed embodiments enables those skilled in the art to make or use the invention. Various modifications to these embodiments are obvious to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention is not to be limited to the embodiments shown herein, but the scope of the invention is to be accorded
本发明的实施方式Embodiments of the invention
在此处键入本发明的实施方式描述段落。The description paragraphs of the embodiments of the present invention are entered here.
工业实用性Industrial applicability
在此处键入工业实用性描述段落。Type the industrial usability description paragraph here.
序列表自由内容Sequence table free content
在此处键入序列表自由内容描述段落。Type the sequence table free content description paragraph here.

Claims (7)

  1. 一种对应卡产生的密码及其运用,其特征在于对应卡产生的对应卡密码;A password generated by a corresponding card and its use, characterized by a corresponding card password generated by the corresponding card;
    所述对应卡密码,是通过对对应卡的检索分部分、对应结果部分、对应关系部分、整体对应卡、以及这四个部分的内涵和外延,采取系列技术手段成为新的密码编制技术,所编制出的密码,为对应卡密码;包括:简单对应卡密码、复杂对应卡密码、声音特征对应卡密码、对应卡暗码。The corresponding card password is a new cryptographic technique by adopting a series of technical means by searching the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts. The prepared password is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
  2. 根据权利要求(1)一种对应卡产生的密码,其特征在于形成一种对应卡暗码;A password generated by a corresponding card according to claim (1), characterized in that a corresponding card password is formed;
    所述形成一种对应卡暗码,不起报警作用的编码,通过对应卡技术,成为了报警信号的击发码;应卡暗码可以是纯粹的数字代码,也可以是带对应关系的数字代码。The code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
  3. 根据权利要求(2)形成一种对应卡,工原理:1在完成对应的过程中,会有很多的解密程序,会产生很多文件,在这些文件中,也产生出暗码;暗码是信号文件,众多信号文件中的暗码通过对应卡组成指令击发文件,击发文件激发隐藏程序,使软件网站知道有人盗用软件。According to claim (2), a corresponding card is formed, and the working principle is as follows: 1. In the process of completing the corresponding process, there are many decryption programs, and a lot of files are generated, and in these files, a secret code is also generated; the secret code is a signal file. The code in the many signal files is used to fire the file through the corresponding card composition command, and the file is fired to trigger the hidden program, so that the software website knows that someone has stolen the software.
    4. 根据权利要求(2)形成一种对应卡,工原理:2软件运行时随机传入特定的代码,特定的代码可以是对应关系,将某处的码对应出另外一处的码,某处的码和另外一处的码,就成为密码锁或钥匙,两码不符,就成为了报警信号,让软件网站知道有人在盗用。4. According to claim (2), a corresponding card is formed, and the working principle is as follows: 2 when the software is running, a specific code is randomly transmitted, and the specific code may be a corresponding relationship, and the code of a certain place is corresponding to the code of another place, and some The code at the other place and the code at the other place become a password lock or key. If the two codes do not match, it becomes an alarm signal, letting the software website know that someone is stealing.
    5. 根据权利要求(2)形成一种对应卡,工原理:3在软件中预置一组对应卡,并在软件运行时随机传入特定的代码,多个特定的代码通过对应卡组成组合代码或对应出新代码,成为密码锁或钥匙,与软件暗藏的编码,生成报警信号,让软件网站知道有人在盗用。5. Forming a corresponding card according to claim (2), the working principle: 3 presetting a set of corresponding cards in the software, and randomly transmitting a specific code when the software is running, and the specific codes are combined by the corresponding cards. The code or corresponding new code becomes a password lock or key, a hidden code with the software, generates an alarm signal, and lets the software website know that someone is stealing.
    6. 根据权利要求(1)一种对应卡产生的密码,其特征在于声音特征对应卡密码 6. A password generated by a corresponding card according to claim 1 (1), characterized in that the sound feature corresponds to the card password ;
    所述声音特征对应卡密码,是由对应卡中个性化的音字卡生成的密码,使用的数字编码是由某个人文字的地方性读音数字编码与这个人个性化的声音特性的数字编码组成,其密码的内在逻辑关系,是由此声音编码在这个人的音字对应卡中对应出的文字,文字的意思来进行;所述某个人文字的地方性读音数字编码,是指特定的这个人的带地方性读音特征的读音的编码;所述这个人个性化的声音特性的数字编码,是指特定的这个人的包括音质特征、音色特征、音纹特征的数字编码。The sound feature corresponds to a card password, which is a password generated by a personalized phonetic card in the corresponding card, and the digital code used is composed of a local pronunciation digital code of a person's text and a digital code of the person's personalized voice characteristics. The inherent logical relationship of the password is performed by the meaning of the text and the text corresponding to the corresponding voice in the person's phonetic card; the local pronunciation of the person's character is encoded by the specific person. The encoding of the pronunciation with localized pronunciation features; the digital encoding of the person's personalized sound characteristics refers to the specific digital encoding of the person including the sound quality features, the timbre characteristics, and the voicing features.
  4. 根据权利要求(1)一种对应卡产生的密码,其特征在于复杂式对应卡密码;A password generated by a corresponding card according to claim (1), characterized in that the complex corresponding card password;
    所述复杂式对应卡密码,使用的数字代码,如上个技术方案所述一样是对应卡自身的音、字的编码作代码,但逻辑关系变了:是两个对应卡的文字内容的意思,形成逻辑关系,并和音、字的代码一起,组成密码的锁和钥匙。The complex code corresponds to the card password, and the digital code used is coded corresponding to the sound and word of the card itself as described in the above technical solution, but the logical relationship is changed: it is the meaning of the text content of the two corresponding cards. Form a logical relationship, and together with the code of the sound and word, form the lock and key of the password.
  5. 根据权利要求(1)一种对应卡产生的密码,其特征在于简单式对应卡密码;A password generated by a corresponding card according to claim (1), characterized in that the simple type corresponds to the card password;
    所述简单式对应卡密码,以对应卡自身的音、字的编码作代码,对应卡的检索部分和对应结果部分以及从前到后的单向对应关系作为密码的结果或锁、钥匙。The simple type corresponds to the card password, and the code corresponding to the card's own sound and word is used as a code, and the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back are used as the result of the password or the lock or the key.
  6. 一种对应卡产生的密码及其运用,其特征在于用对应卡密码对软件和对应卡、对应卡工作过程进行加密;A password generated by a corresponding card and its application, characterized in that the software and the corresponding card and the corresponding card work process are encrypted by using the corresponding card password;
    所述用对应卡密码对软件和对应卡、对应卡工作过程进行加密,包括:对对应卡的检索部分加密,对检索内容进行相同的加密,对对应卡的对应启动的加密,对对应卡的对应结果的解密,加密后密码的更换方式,自动回应对应卡密码,合成对应卡暗码的使用方法,对应卡暗码分解成多个码的使用方法,出现对应卡暗码就启动某个对应关系的使用方法。The encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password includes: encrypting the search part of the corresponding card, performing the same encryption on the retrieved content, encrypting the corresponding start of the corresponding card, and corresponding to the corresponding card The decryption of the corresponding result, the replacement method of the encrypted password, the automatic response to the corresponding card password, the use method of synthesizing the corresponding card code, the use method of decomposing the card code into multiple codes, and the use of the corresponding card code to initiate the use of a corresponding relationship method.
  7. 根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的检索部分加密,使检索部分不能在其他软件上正常使用。According to claim (9), the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be normally used on other software.
    11、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对检索内容进行加密,使检索内容的代码和对应库里的对应卡的检索部分的代码一致,检索才能进行。11. Encrypting the software and the corresponding card and the corresponding card working process with the corresponding card password according to claim (9), characterized in that the search content is encrypted, so that the code of the retrieved content and the corresponding part of the corresponding card in the corresponding library are The code is consistent and the search can proceed.
    12、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的启动对应关系加密,对应关系触发后才能启动每个对应;避免盗用对应卡、对应关系,在防盗措施上再增加一把锁。12. Encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password according to claim (9), wherein the corresponding correspondence of the corresponding card is encrypted, and each correspondence can be started after the corresponding relationship is triggered; Card, correspondence, add a lock on the anti-theft measures.
    13、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对对应卡的对应结果需要解密,解密后才能成为其他软件的通用文字。13. Encrypting the software and the corresponding card and the corresponding card working process with the corresponding card password according to claim (9), wherein the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
    14、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于密码加密后密码的更换方式;14. Encrypting the software and the corresponding card and the corresponding card working process with the corresponding card password according to claim (9), characterized in that the password is replaced after the password is encrypted;
    所述密码加密后密码的更换方式,是为了防盗,密码不能始终不替换,密码可以单个部分的单独换,也可以所有各部分的一起换,更可以加快更换周期的快速换。The password is encrypted after the password is replaced for theft prevention. The password cannot be replaced at all times. The password can be replaced by a single part, or all parts can be replaced together, and the quick change of the replacement period can be accelerated.
    15、根据权利要求(14)加密后密码更换方式的单独换,其特征在于同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换其密码的锁和钥匙;15. The separate replacement of the encrypted password replacement method according to claim (14), characterized in that the encryption program of the same type and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key of the password are alternately replaced. ;
    所述同一类的加密程序和对应卡的检索部分、对应结果部分、对应关系的单一要素,轮流更换密码的锁和钥匙,就是一部分一部分的更换密码的锁和钥匙,还循环进行。The same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, the lock and the key for changing the password in turn, are part of the lock and key for replacing the password, and are also cyclically performed.
    16、根据权利要求(14)加密后密码更换方式的一起换,其特征在于对软件内,每一个要素,每一类程序,都轮流进行更换,并且密码的锁和钥匙都一起换。16. The replacement of the encrypted password replacement method according to claim (14), wherein each of the elements and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
    17、根据权利要求(14)加密后密码更换方式的快速换,其特征还在于加快密码的锁和钥匙的更换周期。17. The quick change of the encrypted password replacement method according to claim (14), characterized in that the password lock and the key replacement period are accelerated.
    18、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于自动回应对应卡密码;18. Encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password according to claim (9), characterized in that the corresponding card password is automatically responded to;
    所述自动回应对应卡密码,是软件网站发出询问和获得正确的回应,软件网站不定期的对使用者发出询问,电脑、手机收到询问码后,自动回复本机根据特定对应卡生成的对应卡密码,以利软件网站判断符合不符合注册时的资料,是不是正常的在多个设备上使用。The automatic response corresponding to the card password is that the software website issues an inquiry and obtains a correct response, and the software website sends an inquiry to the user from time to time. After receiving the inquiry code, the computer and the mobile phone automatically reply to the corresponding correspondence generated by the local machine according to the specific corresponding card. The card password is used by the software website to determine whether it meets the requirements of the non-registration, and is not normally used on multiple devices.
    19、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于合成对应卡暗码的使用方法;19. Encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password according to claim (9), characterized in that the method for synthesizing the corresponding card code is used;
    所述合成对应卡暗码的使用方法,把几个对应卡暗码合成一个对应卡暗码,用合成的密码去开锁或触发锁住。The method for synthesizing the corresponding card code is to synthesize a corresponding card code into a corresponding card code, and use the synthesized password to unlock or trigger the lock.
    20、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于对应卡暗码分解成多个码的使用方法;20. Encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password according to claim (9), wherein the corresponding card code is decomposed into a plurality of codes;
    所述对应卡暗码分解成多个码的使用方法,把一个编码通过接受的对应卡暗码,触发分解成几个码,用分解的码去开锁或触发锁住;另外,网站随时传递对应卡暗码,启动对应卡暗码锁的对应,将对应卡暗码锁及时对应分解成废锁。The corresponding card code is decomposed into a plurality of codes, and the code is decomposed into several codes by the accepted corresponding card code, and the code is used to unlock or trigger the lock; in addition, the website transmits the corresponding card code at any time. , the corresponding card password lock is activated, and the corresponding card code lock is timely decomposed into a waste lock.
    21、根据权利要求(9)用对应卡密码对软件和对应卡、对应卡工作过程进行加密,其特征在于出现对应卡暗码就启动某个对应关系的使用方法;21. Encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password according to claim (9), wherein the corresponding card usage code is used to initiate a corresponding relationship;
    所述出现对应卡暗码就启动某个对应关系的使用方法,收到对应卡暗码后,启动对应卡的对应关系或不启动对应关系去开锁或触发锁住。After the corresponding card code is generated, a corresponding relationship is used. After receiving the corresponding card code, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
    22、应卡产生的密码以及对应卡产生的加密方式,其特征在于其用途;22. The password generated by the card and the encryption method generated by the corresponding card are characterized by their use;
    所述用途,根据权利要求(14)对应卡密码加密后密码的更换方式,在非用对应卡密码加密的软件上,也能使用该技术,对加密后的密码进行更换。The use according to claim (14) corresponds to the replacement of the password after the card password is encrypted, and the software can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.
     
PCT/CN2017/117853 2016-12-22 2017-12-21 Password generated by corresponding card and application thereof WO2019119381A1 (en)

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
CN201611200735.4A CN106778309A (en) 2016-12-22 2016-12-22 The cipher mode of correspondence software
CN201611201381.5A CN106650334A (en) 2016-12-22 2016-12-22 Use method for accelerating encryption and decryption replacement period
CN201611201379.8A CN106789016A (en) 2016-12-22 2016-12-22 Retrieving portion in correspondence storehouse is a kind of cipher mode of the combination of word and password
CN201611201385 2016-12-22
CN201611200731.6A CN106650331A (en) 2016-12-22 2016-12-22 Generation method for instruction triggering file
CN201611201378.3A CN106599705A (en) 2016-12-22 2016-12-22 Encryption method for encrypting input character and corresponding pairing in corresponding library
CN201611200677.5A CN106599624A (en) 2016-12-22 2016-12-22 Method for generating universal text by corresponding result
CN201611201380.0A CN106599706A (en) 2016-12-22 2016-12-22 Encryption method for changing passwords by turns in encryption program of single category
CN201711394563.3A CN107944251A (en) 2016-12-22 2017-12-21 The password and its utilization that a kind of corresponding card produces
CN201711394563.3 2017-12-21

Publications (1)

Publication Number Publication Date
WO2019119381A1 true WO2019119381A1 (en) 2019-06-27

Family

ID=61942512

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117853 WO2019119381A1 (en) 2016-12-22 2017-12-21 Password generated by corresponding card and application thereof

Country Status (2)

Country Link
CN (1) CN107944251A (en)
WO (1) WO2019119381A1 (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951930A (en) * 2015-04-27 2015-09-30 上海交通大学 Electronic cipher ticket method and system based on bio-information identity verification
WO2016016023A1 (en) * 2014-07-31 2016-02-04 Bundesdruckerei Gmbh Method for producing a digital signature
CN105894296A (en) * 2014-11-30 2016-08-24 黄石木信息科技有限公司 Network anti-fake system and method based on Internet technology
CN106599624A (en) * 2016-12-22 2017-04-26 陈勇 Method for generating universal text by corresponding result
CN106599705A (en) * 2016-12-22 2017-04-26 陈勇 Encryption method for encrypting input character and corresponding pairing in corresponding library
CN106599706A (en) * 2016-12-22 2017-04-26 陈勇 Encryption method for changing passwords by turns in encryption program of single category
CN106650334A (en) * 2016-12-22 2017-05-10 陈勇 Use method for accelerating encryption and decryption replacement period
CN106650331A (en) * 2016-12-22 2017-05-10 陈勇 Generation method for instruction triggering file
CN106778309A (en) * 2016-12-22 2017-05-31 陈勇 The cipher mode of correspondence software

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016016023A1 (en) * 2014-07-31 2016-02-04 Bundesdruckerei Gmbh Method for producing a digital signature
CN105894296A (en) * 2014-11-30 2016-08-24 黄石木信息科技有限公司 Network anti-fake system and method based on Internet technology
CN104951930A (en) * 2015-04-27 2015-09-30 上海交通大学 Electronic cipher ticket method and system based on bio-information identity verification
CN106599624A (en) * 2016-12-22 2017-04-26 陈勇 Method for generating universal text by corresponding result
CN106599705A (en) * 2016-12-22 2017-04-26 陈勇 Encryption method for encrypting input character and corresponding pairing in corresponding library
CN106599706A (en) * 2016-12-22 2017-04-26 陈勇 Encryption method for changing passwords by turns in encryption program of single category
CN106650334A (en) * 2016-12-22 2017-05-10 陈勇 Use method for accelerating encryption and decryption replacement period
CN106650331A (en) * 2016-12-22 2017-05-10 陈勇 Generation method for instruction triggering file
CN106778309A (en) * 2016-12-22 2017-05-31 陈勇 The cipher mode of correspondence software

Also Published As

Publication number Publication date
CN107944251A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
TW379308B (en) Coding apparatus and method, decoding apparatus and method and data processing device and method
US8843745B2 (en) Methods of authorizing a computer license
KR101874721B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN103914901B (en) A kind of method for unlocking and unlocking system
CN104935429B (en) A kind of data processing method and its system using multi-enciphering
US9659181B2 (en) System, apparatus and method for license key permutation
BR0208587A (en) Method and apparatus for changing available resources into a software-implemented feature set containing a plurality of features
CN101859351B (en) System and method for ensuring safe read of data stored in storage
EP1257082A3 (en) A computer useable product for generating data encryption/decryption apparatus
JP2003216037A (en) Cipher key, enciphering device, enciphering/deciphering device, cipher key management device, and deciphering device
JPS5945990B2 (en) Methods for ensuring distribution of encoded keys
US7805616B1 (en) Generating and interpreting secure and system dependent software license keys
Srivastava A survey report on Different Techniques of Image Encryption
IS2451B (en) Keys and locks
CN101833625A (en) File and folder safety protection method based on dynamic password and system thereof
CN105282090A (en) Public URL encryption coding method for preventing illegal access on internet
CN110879875A (en) Hardware encryption device, embedded system copyright protection system and method
JPH11215117A (en) Method and device for key encoding and recovery
CN105763525A (en) Identification code generation method, device, identification code decryption method and device
CA2672046C (en) Quantum program concealing device and quantum program concealing method
CN105959099A (en) Method for encrypting SSR password
WO2009001053A1 (en) Randomisation
WO2019119381A1 (en) Password generated by corresponding card and application thereof
JP2003256060A (en) Authentication method of program use
CN109767221B (en) Block chain security-oriented mobile cross-platform signature method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17935263

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17935263

Country of ref document: EP

Kind code of ref document: A1