METHOD AND APPARATUS FOR REMEMBERING PASSWORDS WITH LEAST AMOUNT OF MEMORY

    公开(公告)号:US20200211423A1

    公开(公告)日:2020-07-02

    申请号:US16609156

    申请日:2017-04-28

    申请人: Lihui Wang

    发明人: Lihui WANG

    摘要: Disclosed are a method and apparatus for remembering passwords with the least amount of memory, overcoming the disadvantage that previously, passwords or fixed codes, such as credit card numbers, were inconvenient to record and difficult to remember. People's long-term memories regarding ethnic characters, letters, digits and patterns are used; one or two of the above are selected to intersect with blank units or information code matrices, the contents of which can be changed by characters to be set, so as to obtain coincident points and non-coincident points; according to the step of reading information thereabout as specified or according to the steps of filling in, confusing and re-finding fixed codes, passwords or the fixed codes are obtained; regarding a mechanical apparatus, a key, on which an imprint is left by means of pressing a character, can be expanded into long chains, two chains are matched to obtain more logic states, and a plurality of passwords are obtained by means of reading and segmentation as specified; regarding an electronic-type apparatus, three three-colour light-emitting diodes are connected to symmetrical switch buttons to form a matrix template; digits, capital letters and small letters and symbols to be set printed on the template are displayed; according to light colours of the light-emitting diodes and whether same are in a light-emitting state, information codes are arranged as specified; and a canonical character model ensures that the passwords or the fixed codes obtained every time are the same as those set before.

    Format preservation based masking system and method

    公开(公告)号:US10242203B2

    公开(公告)日:2019-03-26

    申请号:US15019743

    申请日:2016-02-09

    摘要: A computer implement format preservation based masking system and method is provided. The system obtains a first set of letters and a private key, and encrypts the first set of letters to obtain an encrypted letters list using the first set and private key. The encrypted letters list comprises a set of encrypted letters. A dynamic map is generated based on the encrypted letters, which includes one or more keys, each key being specific to a letter in the first set letters. A position of each of maskable letters in a second set of letters is calculated using the dynamic map, and performs masking of the maskable letters based on the position of each of the maskable letters to obtain masked data using the dynamic map.

    Format-preserving cipher
    5.
    发明授权

    公开(公告)号:US10009169B2

    公开(公告)日:2018-06-26

    申请号:US15200635

    申请日:2016-07-01

    申请人: Zettaset, Inc.

    发明人: Eric A. Murray

    摘要: A format-preserving cipher including encryption and decryption schemes supporting non-linear access to input data by allowing the selection of portions of data from a potentially larger dataset to be encrypted. The cipher first defines a forward mapping from the allowable ciphertext values to an integer set of the number of such allowable ciphertext values, and a corresponding reverse mapping. It also supports exclusion of a certain set of characters from the ciphering process. An encryption algorithm is provided that encrypts the input plaintext data while preserving its original format and length, and a corresponding decryption algorithm is provided. The cipher advantageously embodies the encryption and decryption of multi-byte values, composite datasets, credit card numbers and discontinuous datasets, thus fitting a variety of industrial needs.

    System and method for data encryption
    6.
    发明授权
    System and method for data encryption 有权
    用于数据加密的系统和方法

    公开(公告)号:US07382878B2

    公开(公告)日:2008-06-03

    申请号:US09888316

    申请日:2001-06-22

    CPC分类号: H04L9/065 Y10S707/99942

    摘要: A system and method for encrypting and/or compressing an input data string is disclosed. The input data string is divided into a plurality of blocks of data that each contains a plurality of bits of data. A block code is used to identify the size of each of the blocks of data. The blocks of data are analyzed to determine how frequently different groups of bits of data are present within each block of data. The blocks of data are also analyzed to determine whether certain relationships among the groups of bits of data exist within the blocks of data. After the blocks of data are analyzed, and in response to the analyses, a control code is generated for each block of data through the use of a control code index. After the control code for each block of data is generated, a position code is also generated for each block of data in response to the control code for the corresponding block of data. The control code, block code, and position code for each of the blocks of data can then be combined to produce an encrypted data string.

    摘要翻译: 公开了一种用于加密和/或压缩输入数据串的系统和方法。 输入数据串被分成多个数据块,每个数据块包含多个数据位。 块代码用于标识每个数据块的大小。 分析数据块以确定在每个数据块内存在不同数据位组的频率。 还分析数据块以确定在数据块内存在数据位组之间的某些关系是否存在。 在分析数据块之后,并且响应于分析,通过使用控制代码索引为每个数据块生成控制代码。 在产生每个数据块的控制代码之后,响应于相应的数据块的控制代码也为每个数据块生成位置代码。 然后可以组合每个数据块的控制码,块码和位置码,以产生加密的数据串。

    Reduced overhead gate level logic encryption

    公开(公告)号:US11282414B2

    公开(公告)日:2022-03-22

    申请号:US15770380

    申请日:2016-10-24

    摘要: There are several approaches to encrypting circuits: combination logic encryption, encrypted gate topologies, transmission gate topologies, and key expansion of gate topologies. One of the approaches provides a circuit having a gate topology comprising a logic gate with integrated key transistors, where the key transistors comprise at least a PMOS stack and an NMOS stack. The PMOS stack comprises a first PMOS switch and a second PMOS switch, where the first and the second PMOS switches have sources to a voltage source and drains that serve as a source to a third PMOS switch. The NMOS stack comprises a first NMOS switch and a second NMOS switch, where the first and the second NMOS switches have sources to ground and drains that serve as a source to a third NMOS switch. Each of the above approaches may encrypt a circuit with certain advantages in delay and power consumption.