Solved

Key-Generation

Posted on 1998-02-13
5
457 Views
Last Modified: 2010-04-16
I want to implement a regisration for programs I make.  I would like to make a key-generation - where if one's name was "Bill Smith" the key would be "g6za91v"  No matter how big the name or small it is, the key would be 7 char/#s (or any amount)I get the basics but i cant figure out exactly how.  That program will be for me when people registor and i give them their code.  The thing i also need would be a procedure for regitering where it knows what is valid with what charactor. (case sensitive)  I think using ASCII char # then manipulating may work.  
0
Comment
Question by:weinrj
5 Comments
 
LVL 2

Expert Comment

by:kellyjj
Comment Utility
Are you looking for source code?  If so  look for the web site  'the source site'.  They pleanty of source code that I think may answer your question.
0
 

Author Comment

by:weinrj
Comment Utility
sorry for failing it....i need the URL
0
 
LVL 1

Accepted Solution

by:
Nexial earned 20 total points
Comment Utility
Look up 'hash' or 'hashing' in any computer science book.
Essentially you want to hash the user's identifying information
into a standard size string which is unique to that user.  
If you really want to get detailed, then in the last 10 years,
the ACM has published several articles (in COMM ACM) containing
algorighms for minimal perfect hashing, but that level is really unnecessary for your application.

0
 
LVL 1

Expert Comment

by:Nexial
Comment Utility
AARGH - algorithms, not algorighms!

0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
If anyone is interested in minimal perfect hashing, here's a nice CACM article:
Practical minimal perfect hash functions for large databases;
Edward A.Fox , Lenwood S.Heath , Qi FanChen , and Amjad M.Daoud;
Commun. ACM 35, 1 (Jan. 1992), Pages 105 - 121

0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Marketing can be an uncomfortable undertaking, especially if your material is technology based. Luckily, we’ve compiled some simple and (relatively) painless tips to put an end to your trepidation and start your path to success.
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now