Hidden cipher coding and identifying method

Hidden cipher coding and identifying method

  • CN 1,474,317 A
  • Filed: 07/15/2003
  • Published: 02/11/2004
  • Est. Priority Date: 07/15/2003
  • Status: Active Application
First Claim
Patent Images

1. , concealed type cryptography and recognition methods may further comprise the steps:

  • (1) each group password is divided into three parts;

    code, sub-code and interference code, code are the real password of computer approval, are made up of numeral or letter;

    Interference code is the data that the user imports in the process of input code simultaneously at random;

    Sub-code is made up of numeral or letter, is used for identifying code with the position in the password of interference code data, and code, sub-code and sub-code service regeulations all deposit in the Computer Database in advance,When (2) using, the user is to the password of one group of band interfering data of computer input,(3) computer finds out this user'"'"'s code and sub-code from database.(4) computer is isolated code by sub-code and sub-code service regeulations in the database from the password with interfering data of User input,(5) with the isolated code of User input, the code that has with database Central Plains compares, and judges thus the legitimacy of user identity.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×