http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2011083384-A2
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_fd23a8805f153eafcf2032b87505a47c |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F3-018 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F40-129 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F40-53 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F17-28 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 |
filingDate | 2010-12-18-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_8dbf9f8787f9f3d7fe1bb39cd263928e |
publicationDate | 2011-07-14-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | WO-2011083384-A2 |
titleOfInvention | Method and system to create chinese language seeds from most frequently used characters and their applications |
abstract | The first (main) embodiment of this invention is the method and system to create Chinese language seeds from most frequently used Chinese characters, normal distribution, and IQ (Intelligent Quotient) as a few easily memorizable sentences quantized by IQ levels for various applications. The first application is faster learning of Chinese language to the levels of newspaper reading and simple letter writing. Meanwhile, the second (main) invention embodiment is 2D key the big memorizable secret using general spatial input sequence and specific södoku (??) input sequence to further increase the secret entropy. Second application is secure computer-free cryptography in cases of electricity power failure and computer absence, by using 2D key, pens, papers and books working out the polyalphabetic cipher or Vigenère cipher in Chinese language. The third is a group of eleven variants from the second application by using modified polyalphabetic cipher based on weirdly added symbols, bilingual languages using a second Latin language like English language, pronunciation Romanization, different set sizes of plaintext symbols, ciphertext symbols, and key symbols, starting point of ciphertext or plaintext symbol set, left- right (or up-down) directing of cipher table, random order of symbol set lines in cipher table, as well as skipping number and sequential scrolling number of cipher tables in book form. The fourth is Chinese input method for computer data entry using the frequently used characters quantized into tens of sentences. A third (side) invention embodiment is a complementary Chinese input method for the fourth application by using special stroke encoding of Chinese character structure based on bagua (??), yijing (??), and Chinese character yong (?) (meaning forever). This side invention embodiment is called Yongzi Guaxiang (????) input method. The fourth application and side invention embodiment improve the speed of Chinese input method, and lengthen the symbol set size in the fifth application, which is a computer cryptography using polyalphabetic cipher in Chinese language. The sixth application is a variant of the fifth application by using the good phrase formation strength of Chinese language and hybrid communications network. The seventh is another variant of the fifth application by using key strengthening and multihash key to create pseudo-longer semantic unicity distance and stronger polyalphabetic cipher. The eighth uses the key processing methods of the seventh application, but replaces the cipher tables of Chinese language seeds by other ciphers like AES (Advanced Encryption Standard) cipher to provide alternative sub-key generation techniques. |
isCitedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110061832-A |
priorityDate | 2010-01-05-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 33.