Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for secure access using newton type polynomial interpolation with parameters

A polynomial interpolation and security access technology, applied in digital data authentication, electrical digital data processing, instruments, etc., can solve problems such as leakage and achieve the effect of ensuring security

Active Publication Date: 2020-06-16
HEFEI UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there are multiple users, if a unified password is provided, it is easy to cause leakage problems; and if different passwords are provided for different users, it will bring a lot of inconvenience
Therefore, the existing encryption technology cannot meet the above needs, which brings a lot of inconvenience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure access using newton type polynomial interpolation with parameters
  • Method and system for secure access using newton type polynomial interpolation with parameters
  • Method and system for secure access using newton type polynomial interpolation with parameters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are some but not all embodiments of the present invention. For ease of description, only the parts related to the invention are shown in the embodiments.

[0042] It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] In the description of the present invention, it should also be noted that, unless otherwise clearly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure accessing method and system by using Newton-type polynomial interpolation with parameters is disclose. The method comprises the following steps of: inputting a digitalpassword to a mobile phone; The mobile phone transmits the digital password to the server; The server verifies the mobile phone number and the digital password, For mobile phone number and digital password authentication, The server takes each digit of the digital cipher as corresponding given interpolation data, utilizes Newton-type polynomial interpolation with parameters, randomly sets the parameters of Newton-type polynomial, generates an image corresponding to the parameters, and sends the image to the mobile phone; The unlocking device receives the image transmitted from the server as astandard image, and scans the image of the handset. When the standard image and the scanned image coincide, the unlocking mechanism of the unlocking device initiates an unlocking operation.

Description

technical field [0001] The present disclosure generally relates to the technical field of secure access to secure resources, and in particular to a secure access method and system using Newton-type polynomial interpolation. Background technique [0002] Typically, in secure resource systems such as doors, computers and other devices, the security device will be unlocked when a user's identity and access rights are verified by an authentication device physically connected to the door, computer and other device. When there are multiple users, if a unified password is provided, it is easy to cause a leakage problem; and if different passwords are provided for different users, it will bring a lot of inconvenience. Therefore, the existing encryption technology cannot meet the above-mentioned needs, which brings a lot of inconvenience. Contents of the invention [0003] In view of the above defects or deficiencies in the prior art, it is desired to provide a secure access schem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/46G06F2221/2141
Inventor 邹乐章义刚宋良图王晓峰陈艳平张洁李婷婷黄前静
Owner HEFEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products