| Algorithm 3: IP Marks Authentication algorithm |
| Input: (i) Position and (ii) Constraint function
Output: (i) Legal user (ii) Illegal user /* To satisfy the condition , and are compared, and then judge whether is legal or not */ /* represents the element that satisfies the condition of , represents the same element */ 1: Calculate according to and /* Compare each of and elements */ 2: gets(); gets(); for (i = 0; i < sizeof() / sizeof(); i++) { for (j = 0; j < sizeof() / sizeof(); j++) { if (==) { Store in ; } } } 3: End for /* Evaluate the similarity */ 4: If (sizeof() / sizeof() ≥ 0.8) 5: Output: Legal user 6: else if (sizeof() / sizeof() < 0.8) 7: Output: Illegal user; |