Solved

Key-Generation

Posted on 1998-02-13
5
458 Views
Last Modified: 2010-04-16
I want to implement a regisration for programs I make.  I would like to make a key-generation - where if one's name was "Bill Smith" the key would be "g6za91v"  No matter how big the name or small it is, the key would be 7 char/#s (or any amount)I get the basics but i cant figure out exactly how.  That program will be for me when people registor and i give them their code.  The thing i also need would be a procedure for regitering where it knows what is valid with what charactor. (case sensitive)  I think using ASCII char # then manipulating may work.  
0
Comment
Question by:weinrj
5 Comments
 
LVL 2

Expert Comment

by:kellyjj
ID: 1217305
Are you looking for source code?  If so  look for the web site  'the source site'.  They pleanty of source code that I think may answer your question.
0
 

Author Comment

by:weinrj
ID: 1217306
sorry for failing it....i need the URL
0
 
LVL 1

Accepted Solution

by:
Nexial earned 20 total points
ID: 1217307
Look up 'hash' or 'hashing' in any computer science book.
Essentially you want to hash the user's identifying information
into a standard size string which is unique to that user.  
If you really want to get detailed, then in the last 10 years,
the ACM has published several articles (in COMM ACM) containing
algorighms for minimal perfect hashing, but that level is really unnecessary for your application.

0
 
LVL 1

Expert Comment

by:Nexial
ID: 1217308
AARGH - algorithms, not algorighms!

0
 
LVL 84

Expert Comment

by:ozo
ID: 1217309
If anyone is interested in minimal perfect hashing, here's a nice CACM article:
Practical minimal perfect hash functions for large databases;
Edward A.Fox , Lenwood S.Heath , Qi FanChen , and Amjad M.Daoud;
Commun. ACM 35, 1 (Jan. 1992), Pages 105 - 121

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
send click   without cursor 6 371
Disable ctrl+alt+del 7 675
delphi 8 619
USB Flash Drive Serial Numbers 9 3,893
We need a new way to communicate time sensitive or critical info.   The best part of my role at xMatters is visiting our clients all over the world to learn about how they operate their businesses, share insights that xMatters has gleaned across…
Note: This is the third blog post in a series on email clearinghouses (https://www.xmatters.com/alert-management/blog-email-has-failed-us?utm_campaign=70138000000ydLoAAI&utm_source=exex&utm_medium=article&utm_content=blog-post).   We’ve been talki…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
This video demonstrates how to sync Microsoft Exchange Public Folders with smartphones using CodeTwo Exchange Sync and Exchange ActiveSync. To learn more about CodeTwo Exchange Sync and download the free trial, go to: http://www.codetwo.com/excha…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now