WO2019119381A1 - Mot de passe généré par une carte correspondante et son application - Google Patents

Mot de passe généré par une carte correspondante et son application Download PDF

Info

Publication number
WO2019119381A1
WO2019119381A1 PCT/CN2017/117853 CN2017117853W WO2019119381A1 WO 2019119381 A1 WO2019119381 A1 WO 2019119381A1 CN 2017117853 W CN2017117853 W CN 2017117853W WO 2019119381 A1 WO2019119381 A1 WO 2019119381A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
corresponding card
card
code
software
Prior art date
Application number
PCT/CN2017/117853
Other languages
English (en)
Chinese (zh)
Inventor
陈勇
Original Assignee
陈勇
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201611200677.5A external-priority patent/CN106599624A/zh
Priority claimed from CN201611201378.3A external-priority patent/CN106599705A/zh
Priority claimed from CN201611201379.8A external-priority patent/CN106789016A/zh
Priority claimed from CN201611200731.6A external-priority patent/CN106650331A/zh
Priority claimed from CN201611201380.0A external-priority patent/CN106599706A/zh
Priority claimed from CN201611200735.4A external-priority patent/CN106778309A/zh
Priority claimed from CN201611201381.5A external-priority patent/CN106650334A/zh
Application filed by 陈勇 filed Critical 陈勇
Publication of WO2019119381A1 publication Critical patent/WO2019119381A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Definitions

  • the present invention relates to the field of software, and in particular to a password generated by a corresponding card and its use.
  • Encrypting the software is something that every software company has to do. The harder the encrypted password, the harder it is to decrypt.
  • a password generated by a corresponding card and its use characterized by a corresponding card password generated by the corresponding card;
  • the corresponding card password is a new cryptographic technique by adopting a series of technical means by searching the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts.
  • the prepared password is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
  • a password generated by the corresponding card is characterized by forming a corresponding card password
  • the code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
  • the code contains a series of corresponding card technology to form a firing file or an alarm signal.
  • the software website knows that someone has stolen it.
  • a password generated by the corresponding card is characterized in that the sound feature corresponds to the card password ;
  • the sound feature corresponds to a card password, which is a password generated by a personalized phonetic card in the corresponding card, and the digital code used is composed of a local pronunciation digital code of a person's text and a digital code of the person's personalized voice characteristics.
  • the inherent logical relationship of the password is performed by the meaning of the text and the text corresponding to the corresponding voice in the person's phonetic card; the local pronunciation of the person's character is encoded by the specific person.
  • the encoding of the pronunciation with localized pronunciation features; the digital encoding of the person's personalized sound characteristics refers to the specific digital encoding of the person including the sound quality features, the timbre characteristics, and the voicing features.
  • a password generated by the corresponding card is characterized by a complex correspondence card password
  • the complex code corresponds to the card password, and the digital code used is coded corresponding to the sound and word of the card itself as described in the above technical solution, but the logical relationship is changed: it is the meaning of the text content of the two corresponding cards. Form a logical relationship, and together with the code of the sound and word, form the lock and key of the password.
  • a password generated by the corresponding card is characterized by a simple correspondence card password
  • the simple type corresponds to the card password, and the code corresponding to the card's own sound and word is used as a code, and the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back are used as the result of the password or the lock or the key.
  • a password generated by a corresponding card and its application characterized in that the software and the corresponding card and the corresponding card work process are encrypted by using the corresponding card password;
  • the encrypting the software and the corresponding card and the corresponding card working process by using the corresponding card password includes: encrypting the search part of the corresponding card, performing the same encryption on the retrieved content, encrypting the corresponding start of the corresponding card, and corresponding to the corresponding card.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the character of the search content is encrypted, so that the code of the retrieved content is consistent with the code of the corresponding part of the corresponding card in the corresponding library, and the search can be performed. get on.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each corresponding correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card and the corresponding relationship. Add another lock to the anti-theft measures.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the password is replaced by the password after the password is encrypted;
  • the password is encrypted after the password is replaced for theft prevention.
  • the password cannot be replaced at all times.
  • the password can be replaced by a single part, or all parts can be replaced together, and the quick change of the replacement period can be accelerated.
  • the individual replacement of the encrypted password replacement method is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for replacing the password in turn;
  • the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, the lock and the key for changing the password in turn, are part of the lock and key for replacing the password, and are also cyclically performed.
  • the encryption replacement mode is replaced together, and is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
  • the quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card password is automatically responded;
  • the automatic response corresponding to the card password is that the software website issues an inquiry and obtains a correct response, and the software website sends an inquiry to the user from time to time. After receiving the inquiry code, the computer and the mobile phone automatically reply to the corresponding correspondence generated by the local machine according to the specific corresponding card.
  • the card password is used by the software website to determine whether it meets the requirements of the non-registration, and is not normally used on multiple devices.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is the method for synthesizing the corresponding card code;
  • the method for synthesizing the corresponding card code is to synthesize a corresponding card code into a corresponding card code, and use the synthesized password to unlock or trigger the lock.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the method is characterized in that the corresponding card code is decomposed into a plurality of codes;
  • the corresponding card code is decomposed into a plurality of codes, and the code is decomposed into several codes by the accepted corresponding card code, and the code is used to unlock or trigger the lock; in addition, the website transmits the corresponding card code at any time. , the corresponding card password lock is activated, and the corresponding card code lock is timely decomposed into a waste lock.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is that the corresponding card usage code is used to start a corresponding relationship;
  • a corresponding relationship is used. After receiving the corresponding card code, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
  • the password generated by the card and the encryption method generated by the corresponding card are characterized by their use;
  • the use, according to the replacement method of the password after the corresponding card password is encrypted, can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.
  • a password generated by a corresponding card and its use characterized by a corresponding card password generated by the corresponding card.
  • the embodiment is further configured to: the corresponding card password is obtained by adopting a series of technical means by searching for the corresponding part, the corresponding result part, the corresponding relationship part, the overall corresponding card, and the connotation and extension of the four parts.
  • the new password preparation technology, the password generated is the corresponding card password; including: simple corresponding card password, complex corresponding card password, sound feature corresponding card password, corresponding card password.
  • the embodiment is further configured to: a password generated by the corresponding card, characterized in that a corresponding card password is formed.
  • the code forming a corresponding card code and not functioning as an alarm is a sounding code of the alarm signal through the corresponding card technology; the card code may be a pure digital code or a digital code with a corresponding relationship.
  • Embodiment 2 is further configured to:
  • the software runs randomly to pass specific code.
  • the specific code can be the corresponding relationship.
  • the code of one place corresponds to the code of another place.
  • the code of somewhere and the code of another place become the password lock. Or the key, the two codes do not match, it becomes an alarm signal, let the software website know that someone is stealing.
  • Embodiment 2 is further configured to:
  • Working principle 3 Preset a set of corresponding cards in the software, and randomly pass specific code when the software is running. Multiple specific codes form a combination code or corresponding new code through the corresponding card, and become a password lock or key, and The hidden code of the software generates an alarm signal to let the software website know that someone is stealing.
  • a password generated by a corresponding card characterized in that the sound feature corresponds to a card password.
  • the sound feature corresponding to the card password is a password generated by the personalized phonetic card in the corresponding card, and the digital code used is encoded by the local pronunciation of a certain person's character and personalized to the person.
  • the digital coding of the sound characteristics is the meaning of the text and the text corresponding to the corresponding voice in the corresponding character card of the person;
  • the local pronunciation of the person's text is digitally encoded, Refers to the encoding of a particular person's pronunciation with localized pronunciation features;
  • the digital encoding of the individual's personalized sound characteristics refers to the specific digital encoding of the person's sound quality, timbre, and voicing features. .
  • the password formed by the personalized sound card is determined by the text part, and the corresponding unique voice code of the person is used for digital communication.
  • a password generated by a corresponding card characterized by a complex correspondence card password.
  • the embodiment is further configured to: the complex corresponding card password, the digital code used, as described in the above technical solution, is a code corresponding to the sound and word of the card itself, but the logical relationship is changed: two corresponding The meaning of the text content of the card forms a logical relationship, and together with the code of the sound and the word, constitutes the lock and key of the password.
  • a password generated by a corresponding card characterized by a simple correspondence card password.
  • the embodiment is further configured to: the simple type corresponding to the card password, the code corresponding to the card's own sound and word, the corresponding part of the card and the corresponding result part and the one-way correspondence from the front to the back as the result of the password Or lock, key.
  • Working principle as a corresponding card word card, word sound card, sound card, sound card; in word card, one to another text, can give a text for password lock, another national language To make a password key; another type of word card can also set the password in this way; in the word sound card, the word or the pronunciation code can be used as the key, and the other is set as the lock, and the sound card can also do the same.
  • the pronunciation of one language to the pronunciation of another language is also done in the above way. In the same way, the pronunciation of the pronunciation of another language to the pronunciation of one language can still be the same. Form a new password lock and password key.
  • a password generated by a corresponding card and its application characterized in that the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password.
  • the embodiment is further configured to: encrypt the software and the corresponding card and the corresponding card working process by using the corresponding card password, including: encrypting the retrieval part of the corresponding card, performing the same encryption on the retrieved content, and correspondingly starting the corresponding card Encryption, decryption of the corresponding result of the corresponding card, replacement of the password after encryption, automatic response to the corresponding card password, synthesis of the use method of the corresponding card code, corresponding use method of decomposing the card code into multiple codes, the corresponding card code appears Start the use of a corresponding relationship.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the retrieval part of the corresponding card is encrypted, so that the retrieval part cannot be used normally on other software.
  • the software and the corresponding card and the corresponding card working process are encrypted by the corresponding card password, and the retrieval content is encrypted, so that the code of the search content and the code of the corresponding part of the corresponding card in the corresponding library are identical, and the retrieval can be performed.
  • the corresponding card password is used to encrypt the working process of the software and the corresponding card and the corresponding card, and the feature is that the corresponding correspondence of the corresponding card is encrypted, and each correspondence can be started after the corresponding relationship is triggered; avoiding the use of the corresponding card, the corresponding relationship, and the anti-theft measure Add another lock on it.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process.
  • the characteristic is that the corresponding result of the corresponding card needs to be decrypted, and the decrypted file can become the common text of other software.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, which is characterized by the password replacement method after the password is encrypted.
  • the embodiment is further configured to: the password replacement method after the password is encrypted for theft prevention, the password cannot be replaced at all times, the password can be replaced by a single part, or all the parts can be replaced together, and the replacement period can be accelerated.
  • the individual replacement of the password replacement method after encryption is characterized by the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, and the single element of the correspondence relationship, and the lock and the key of the password are alternately replaced.
  • the embodiment is further configured to: the same type of encryption program and the retrieval part of the corresponding card, the corresponding result part, the single element of the correspondence relationship, and the lock and the key for changing the password in turn, which are part of the lock and key for replacing the password, It also loops.
  • the replacement of the password replacement method after encryption is characterized in that each element and each type of program in the software is alternately replaced, and the lock and the key of the password are changed together.
  • the quick change of the password replacement method after encryption is also characterized by speeding up the lock of the password and the replacement period of the key.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card password is automatically responded.
  • the embodiment is further configured to: the automatic response corresponding to the card password, the software website sends an inquiry and obtains a correct response, the software website sends an inquiry to the user from time to time, and the computer and the mobile phone automatically reply to the machine after receiving the inquiry code.
  • the software website determines whether the data that meets the non-compliance registration is normal, and is used on multiple devices.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, and the feature is the method for synthesizing the corresponding card code.
  • the embodiment is further configured to: the method for synthesizing the corresponding card code, synthesizing the corresponding card code into a corresponding card code, and using the synthesized password to unlock or trigger the lock.
  • the software pre-plants a set of corresponding card code locks.
  • the software is running, and some parts of the corresponding card code keys are transmitted in real time. Some of the corresponding card code keys become a password through the corresponding card, and several passwords pass another
  • the corresponding card constitutes the corresponding card code key, the corresponding card code key opens the corresponding card code lock, the software can run normally; when the corresponding card code key is not generated, the software stops running or the software website knows that the software is stolen.
  • the software and the corresponding card and the corresponding card working process are encrypted by using the corresponding card password, which is characterized in that the corresponding card code is decomposed into a plurality of codes.
  • the embodiment is further configured to: use the method for decomposing the corresponding card code into a plurality of codes, and decompose the code into a plurality of codes by using the accepted corresponding card code, and use the decomposed code to unlock or trigger the lock;
  • the website transmits the corresponding card code at any time, activates the correspondence of the corresponding card code lock, and decomposes the corresponding card code lock into a waste lock in time.
  • the corresponding card password is used to encrypt the software and the corresponding card and the corresponding card working process, and the feature is that the corresponding card usage code is used to start a corresponding relationship.
  • the embodiment is further configured to: when the corresponding card password is generated, the usage method of the corresponding relationship is started. After receiving the corresponding card password, the corresponding relationship of the corresponding card is started or the corresponding relationship is not activated to unlock or trigger the lock.
  • Encryption of the cryptographic card and the corresponding card to be produced is generated, characterized in that it uses.
  • the embodiment is further configured to: the use, (according to the password replacement method of 2, 5 password encryption), the software can also be used to replace the encrypted password on the software that is not encrypted by the corresponding card password.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé de génération d'un mot de passe de carte correspondante et un procédé de chiffrement associé, qui se rapportent au domaine des logiciels et qui sont caractérisés par un mot de passe de carte correspondant généré par une carte correspondante ; le mot de passe de carte correspondante est un mot de passe compilé au moyen d'une nouvelle technique de compilation de mot de passe formée en utilisant une série de moyens techniques sur une partie de recherche, une partie de résultat correspondante, et une partie de relation correspondante d'une carte, ainsi que la carte correspondante entière, et une connotation et une extension des quatre parties précédentes, et comprend : un mot de passe de carte correspondante simple, un mot de passe de carte correspondante complexe, un mot de passe de carte correspondante à caractéristique sonore, et un code secret de carte correspondante. Une technique de codage difficile est ajoutée en guise de moyen de protection de la vie privée.
PCT/CN2017/117853 2016-12-22 2017-12-21 Mot de passe généré par une carte correspondante et son application WO2019119381A1 (fr)

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
CN201611200677.5A CN106599624A (zh) 2016-12-22 2016-12-22 对应的结果生成通用文字的方法
CN201611201378.3A CN106599705A (zh) 2016-12-22 2016-12-22 输入文字和对应库里的对应配对进行加密的加密方法
CN201611201385 2016-12-22
CN201611201379.8A CN106789016A (zh) 2016-12-22 2016-12-22 对应库里的检索部分是文字和密码的结合体的一种加密方式
CN201611200731.6A CN106650331A (zh) 2016-12-22 2016-12-22 激发指令文件的生成方法
CN201611201380.0A CN106599706A (zh) 2016-12-22 2016-12-22 单个类别的加密程序内轮流更换密码的加密方法
CN201611200735.4A CN106778309A (zh) 2016-12-22 2016-12-22 对应软件的加密方式
CN201611201381.5A CN106650334A (zh) 2016-12-22 2016-12-22 加快加密和解密更换周期的使用方法
CN201711394563.3A CN107944251A (zh) 2016-12-22 2017-12-21 一种对应卡产生的密码及其运用
CN201711394563.3 2017-12-21

Publications (1)

Publication Number Publication Date
WO2019119381A1 true WO2019119381A1 (fr) 2019-06-27

Family

ID=61942512

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117853 WO2019119381A1 (fr) 2016-12-22 2017-12-21 Mot de passe généré par une carte correspondante et son application

Country Status (2)

Country Link
CN (1) CN107944251A (fr)
WO (1) WO2019119381A1 (fr)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951930A (zh) * 2015-04-27 2015-09-30 上海交通大学 基于生物信息身份验证的电子密码票据方法及系统
WO2016016023A1 (fr) * 2014-07-31 2016-02-04 Bundesdruckerei Gmbh Procédé permettant de produire une signature numérique
CN105894296A (zh) * 2014-11-30 2016-08-24 黄石木信息科技有限公司 一种基于互联网技术的网络防伪系统及方法
CN106599705A (zh) * 2016-12-22 2017-04-26 陈勇 输入文字和对应库里的对应配对进行加密的加密方法
CN106599624A (zh) * 2016-12-22 2017-04-26 陈勇 对应的结果生成通用文字的方法
CN106599706A (zh) * 2016-12-22 2017-04-26 陈勇 单个类别的加密程序内轮流更换密码的加密方法
CN106650334A (zh) * 2016-12-22 2017-05-10 陈勇 加快加密和解密更换周期的使用方法
CN106650331A (zh) * 2016-12-22 2017-05-10 陈勇 激发指令文件的生成方法
CN106778309A (zh) * 2016-12-22 2017-05-31 陈勇 对应软件的加密方式

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016016023A1 (fr) * 2014-07-31 2016-02-04 Bundesdruckerei Gmbh Procédé permettant de produire une signature numérique
CN105894296A (zh) * 2014-11-30 2016-08-24 黄石木信息科技有限公司 一种基于互联网技术的网络防伪系统及方法
CN104951930A (zh) * 2015-04-27 2015-09-30 上海交通大学 基于生物信息身份验证的电子密码票据方法及系统
CN106599705A (zh) * 2016-12-22 2017-04-26 陈勇 输入文字和对应库里的对应配对进行加密的加密方法
CN106599624A (zh) * 2016-12-22 2017-04-26 陈勇 对应的结果生成通用文字的方法
CN106599706A (zh) * 2016-12-22 2017-04-26 陈勇 单个类别的加密程序内轮流更换密码的加密方法
CN106650334A (zh) * 2016-12-22 2017-05-10 陈勇 加快加密和解密更换周期的使用方法
CN106650331A (zh) * 2016-12-22 2017-05-10 陈勇 激发指令文件的生成方法
CN106778309A (zh) * 2016-12-22 2017-05-31 陈勇 对应软件的加密方式

Also Published As

Publication number Publication date
CN107944251A (zh) 2018-04-20

Similar Documents

Publication Publication Date Title
TW379308B (en) Coding apparatus and method, decoding apparatus and method and data processing device and method
US8843745B2 (en) Methods of authorizing a computer license
CN103914901B (zh) 一种开锁方法及开锁系统
CN104935429B (zh) 一种采用多重加密的数据处理方法及其系统
US5416841A (en) Cryptography system
US9659181B2 (en) System, apparatus and method for license key permutation
KR20160045752A (ko) 신분 인증 시스템, 장치, 방법 및 신분 인증 요청 장치
BR0208587A (pt) Método e aparelho para mudar os recursos disponìveis em um conjunto de recursos implementado por software contendo uma pluralidade de recursos
CN101859351B (zh) 保证存储器存储的数据安全读取的系统及方法
EP1257082A3 (fr) Produit utilisable par ordinateur pour générer un dispositif de chiffrage/déchiffrage de données
JP2003216037A (ja) 暗号キー、暗号化装置、暗号化復号化装置、暗号キー管理装置及び復号化装置
JPS5945990B2 (ja) エンコ−ド化キイの配布を確実ならしめるための方法
Srivastava A survey report on Different Techniques of Image Encryption
SE0000795L (sv) Nyckel- och låsanordning
CN105282090A (zh) 一种互联网上防非法访问的公开url加密编码方法
JPH11215117A (ja) 鍵の符号化及び回復方法及び装置
CA2672046C (fr) Dispositif de dissimulation de programme quantique et procede de dissimulation de programme quantique
CN105959099A (zh) 一种实现ssr密码加密的方法
WO2019119381A1 (fr) Mot de passe généré par une carte correspondante et son application
JP2003256060A (ja) プログラム使用認証方法
CN109767221B (zh) 一种面向区块链安全的移动跨平台签名方法
TW202105222A (zh) 一種智能鎖、安全平台及其認證方法
KR101832815B1 (ko) 실시간 매핑에 따른 비밀번호 인증 보안 향상 방법 및 서버
JP2011053909A (ja) パスワードを安全管理する制御機能を組み込んだ情報処理装置
CN109120396A (zh) 一种基于挑战应答码的数据加解密系统的使用方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17935263

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17935263

Country of ref document: EP

Kind code of ref document: A1