CN101795195B - Method for restricting encrypted certificated electronic map with variable information - Google Patents
Method for restricting encrypted certificated electronic map with variable information Download PDFInfo
- Publication number
- CN101795195B CN101795195B CN2010101044583A CN201010104458A CN101795195B CN 101795195 B CN101795195 B CN 101795195B CN 2010101044583 A CN2010101044583 A CN 2010101044583A CN 201010104458 A CN201010104458 A CN 201010104458A CN 101795195 B CN101795195 B CN 101795195B
- Authority
- CN
- China
- Prior art keywords
- digital signature
- signature file
- data
- electronic chart
- constraint information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
- Navigation (AREA)
Abstract
The invention discloses a method for restricting an encrypted certificated electronic map with variable information. Restriction information is set in a digital signature file by using a plurality of kinds of encryption algorithms. A user can use the electronic map only after the user passes the certification of the digital signature file. The publisher of the electronic map can randomly set a plurality of kinds of restriction information. When a novel electronic map is published, the user can upgrade the electronic map. The upgraded electronic map can only be used for restricting using time, specific user, specific software version or specific device specified in the information, thereby obtaining the goals of protecting the copyright of the electronic map and differently treating different users.
Description
Technical field
The present invention relates to a kind of encryption and authentication method of electronic chart, relate in particular to the method for the variable encrypting and authenticating electronic chart of a kind of constraint information.
Background technology
Along with China's rapid economy development, the improvement of expressway construction and urban transportation is maked rapid progress, and it is very necessary that electronic map updating also becomes.When new electronic chart comes out, just need upgrade to the electronic chart that the frequent customer uses.When not having copyright protection, some frequent customers upgrade behind the electronic chart, and arbitrarily the electronic chart after the release upgrade uses for other users, the interests of infringement electronic chart businessman.Subsequently, needing to occur data such as active coding to activate and just can carry out electronic map updating, but this coding is easy to cracked by the people, the effect of copyright protection is also bad.
In addition, license to the electronic chart that different user uses and generally all have identical rights of using.Such as, the use term of validity of the electronic chart of same version, use the zone all identical, can't be according to the difference of user class, or the difference of user's request, the scope of application and the occasion of electronic chart are distinguished.
Summary of the invention
The technical problem that the present invention will solve is: to the deficiency of prior art; The method of the variable encrypting and authenticating electronic chart of a kind of constraint information is provided; Electronic chart is carried out encrypting and authenticating, and cipher round results is more reliable, and it is big to decode difficulty; Need the constraint information of authentication arbitrarily to add as required, comprise device number, time limit service time of version number, the navigator of user profile, navigation software etc.
Technical scheme of the present invention is: the method for the encrypting and authenticating electronic chart that a kind of constraint information is variable, constraint information is incorporated into the digital signature file of generation, and digital signature file is carried out authentication; The step that generates said digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the first and the first random character sign indicating number of navigation software version number, navigator device number, electronic chart version number, digital signature file are together carried out the SHA encryption, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The said step that digital signature file is carried out authentication comprises:
Step K 1: read digital signature file, read first, second portion, third part respectively;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software.
The more detailed technical scheme of the present invention is:
Said constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.Further, said use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
In the said step K 2; If the data that first, second portion and the second random character sign indicating number of digital signature file carry out obtaining after the md5 encryption together are identical with the third part of digital signature file; Then through the MD5 checking; Otherwise the MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
In the said step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
Advantage of the present invention is: the present invention can prevent that electronic chart is by illegal copies; When new electronic chart upgrades; The user asks for digital signature file to publisher; Through this digital signature file is carried out authentication, could upgrade electronic chart, and the electronic chart after upgrading can only be used for specific user, specific software version and specific equipment.Also can add simultaneously other any multiple restricted informations such as service time, use zone, reach protection electronic chart copyright and treat the purpose of different user with a certain discrimination.This constraint information can add arbitrarily, can carry out multiple restriction to the electronic chart of issue, also can carry out the difference restriction to different user, has increased the diversity of authentication.
In addition, authentication mode of the present invention is more hidden, has adopted public-key cryptographic keys, SHA, MD5 multiple encryption algorithms, and has added the random character sign indicating number by the inner definition of publisher that upgrades synchronously along with the renewal of navigation software, thereby has increased the difficulty of decoding.
Description of drawings
Below in conjunction with accompanying drawing and embodiment the present invention is further described:
Fig. 1 is the flow chart of generation cryptographic digital signature file of the present invention;
Fig. 2 is the flow chart that digital signature file is carried out authentication of the present invention.
Embodiment
Embodiment: when new electronic chart upgraded, the user asked for digital signature file to publisher, and publisher carries out encrypting and authenticating to electronic chart with digital signature file, has only the electronic chart through encrypting and authenticating to be read use by navigation software.
The step that publisher generates digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file.Constraint information can be set arbitrarily as required; Such as; Constraint information can be the electronic chart of agreement useful life, use the zone and/or use user profile etc., user profile comprises information such as navigation software version number, electronic chart version number to be installed and navigator device number.Like this,, strengthened the control initiative of publisher, protected publisher and user's interests the use restriction of electronic chart even the electronic chart of same version concerning different other users of level, possibly employed authority be different, specific.For example: constraint information is the navigator device number, representes that then this edition electronic chart only can supply specific navigator to use, and when the device number that has only navigator is the device number of publisher setting, could use this electronic chart.Again for example, constraint information is for the use regional extent of the electronic chart of agreement, and like Shanghai, through the GPS location, when judging the regional extent that the user leaves Shanghai, then navigation software will be closed automatically.
Step S2: from navigator and navigation software, read navigation software version number, navigator device number and electronic chart version number to be installed; Add the cleartext information of the first of digital signature file; Add one first random character sign indicating number; Together carry out SHA (Secure Hash Algorithm, SHA) and encrypt, obtain first data.The first random character sign indicating number is by the inner definition of publisher, and is outwards not open.
Step S3: be used as plaintext to first data and carry out secret key encryption, obtain the second portion of digital signature file.Plaintext first data of the second portion of digital signature file are the ciphertext after SHA encrypts just, even and the irreversibility that SHA encrypts is cracked the second portion of digital signature file, obtain first data, also can't obtain final clear data.
Step S4: the first and the second portion of digital signature file are treated as a binary stream; And add one second random character sign indicating number; Together carry out MD5 (Message Digest AlgorithmMD5, Message Digest Algorithm 5) and encrypt, obtain the third part of digital signature file.The second random character sign indicating number is also defined by publisher inside, and is not outwards open, and different with the value of the first random character sign indicating number.
Step S5: write file header information, and write first, second portion and third part in proper order, promptly obtain comprising the digital signature file of 3 partial datas.Describe the position section of byte that various piece comprised and storage in the file header information, conveniently read three partial contents, and the description content of digital signature file version number etc. some other.
After the electronic chart issue, the user relies on the user profile of oneself and the device number of navigator to ask for a digital signature file to publisher, and the digital signature file that the user obtains is corresponding one by one with navigator, is unique.When electronic chart is upgraded, need carry out the authentication of digital signature file, its legal rights of using of authentication, the step of authentication comprises:
Step K 1: start navigation software, read digital signature file,, read first, second portion, third part respectively according to the file header information of file.
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking; If the data that obtain after encrypting are identical with the third part of digital signature file,, confirm that file is not distorted then through the MD5 checking; Carry out step K 3; Otherwise the MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
After step K 3:MD5 checking is passed through,, obtain the content of constraint information with the first of PKI decrypted digital signature file.
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data.
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file.
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software; If first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
For example, confirm that constraint information is " data:2011-01-01, Iocation:ShangHai ", implication is 1, on the January of useful life to 2011 of electronic chart, and restriction territory of use is Shanghai.Secret key encryption is " data:2011-01-01, location:ShangHai " expressly, obtains the first of digital signature file.Through the information that the user provides, obtain other expressly: " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", the expression software version number is v1.00.03, device number is QEIF-H26W-2OQS-YQGB; Electronic chart version number is v1.00.04, combines itself and constraint information, adds the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 " of the inner definition of publisher; It is following to obtain whole cleartext informations: " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB, Map:v1.00.04; data:2011-01-01, location:ShangHai, 28BI-MAPS-BSH3-ZPV1 "; It is carried out the SHA encryption obtain the first data ciphertext, again the first data ciphertext is carried out the second portion that secret key encryption obtains digital signature file.Merge the first of digital signature file and second portion then, go up another second random character sign indicating number " E89I-59I2-ETUM-Z3E7 " again, together carry out md5 encryption, obtain the third part of digital signature file.Make digital signature file at last: write file header information earlier, order writes first, second portion and third part then, and digital signature file completes.
During decrypted authentication, at first read digital signature file,, read first, second portion and third part respectively through file header information.Merge first and second portion, and add the second random character sign indicating number " E89I-59I2-ETUM-Z3E7 ", together carry out md5 encryption; If the result who obtains equates that with third part then digital signature file is effective, otherwise; Explain that the user is illegal, withdraw from navigation software.After md5 authentication, the first of decrypted digital signature file obtains " data:2011-01-01, location:ShangHai ", analytical information, and record 1, on January of useful life to 2011 and territory of use are Shanghai.Reading software version number then, information such as device number " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", and the data after first's deciphering of digital signature file add the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 "; Obtain data " Software:v1.00.03; Hardware:QEIF-H26W-2OQS-YQGB, Map:v1.00.04, data:2011-01-01; location:ShangHai, 28BI-MAPS-BSH3-ZPV1 ".This segment data is carried out SHA encrypt, obtain the first data ciphertext.And the second portion of digital signature file carried out the PKI deciphering, obtain second data.Compare first data and second data, if identical, then authentication is passed through, and gets into navigation software; If inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
The above is merely the preferred embodiments of the present invention, can not limit the scope that the present invention implements with this, and all simple conversion of doing according to claim of the present invention and description all should still belong to the protection range that the present invention covers.
Claims (4)
1. the method for the variable encrypting and authenticating electronic chart of a constraint information is characterized in that: constraint information is incorporated into the digital signature file of generation, digital signature file is carried out authentication; The step that generates said digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the cleartext information of the first of navigation software version number, navigator device number, electronic chart version number, digital signature file and the first random character sign indicating number are together carried out SHA encrypt, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The said step that digital signature file is carried out authentication comprises:
Step K 1: read digital signature file,, read first, second portion, third part respectively according to file header information;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software,
Said constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.
2. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: said use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
3. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1; It is characterized in that: in the said step K 2; If the data that first, second portion and the second random character sign indicating number of digital signature file carry out obtaining after the md5 encryption together are identical with the third part of digital signature file, then through the MD5 checking, otherwise the MD5 authentication failed; The electronic chart authentication is not passed through, and withdraws from navigation software.
4. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: in the said step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101044583A CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101044583A CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101795195A CN101795195A (en) | 2010-08-04 |
CN101795195B true CN101795195B (en) | 2012-04-18 |
Family
ID=42587631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101044583A Expired - Fee Related CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101795195B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117851A (en) * | 2011-11-17 | 2013-05-22 | 银视通信息科技有限公司 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
CN102622251B (en) * | 2012-03-07 | 2016-01-06 | 深圳市凯立德欣软件技术有限公司 | The method of navigation software updating and management and server |
CN106933831B (en) * | 2015-12-29 | 2021-07-30 | 阿里巴巴(中国)有限公司 | Indoor map data updating method and device |
CN108055325B (en) * | 2017-12-13 | 2021-01-08 | 广州市和声信息技术有限公司 | Virtual area marking method and system |
CN111462611A (en) * | 2019-01-21 | 2020-07-28 | 马杰 | Method for making, distributing and displaying vector map |
CN116167091B (en) * | 2023-04-24 | 2023-06-30 | 南京麦堤微林信息科技有限公司 | Mapping data encryption method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272252A (en) * | 2008-04-09 | 2008-09-24 | 西安西电捷通无线网络通信有限公司 | Certificate distribution and management method |
CN101489196A (en) * | 2009-01-23 | 2009-07-22 | 暨南大学 | Intelligent vehicle-mounted system |
CN101594226A (en) * | 2009-06-17 | 2009-12-02 | 中兴通讯股份有限公司 | The data guard method and the system that are used for file transfer |
-
2010
- 2010-01-29 CN CN2010101044583A patent/CN101795195B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272252A (en) * | 2008-04-09 | 2008-09-24 | 西安西电捷通无线网络通信有限公司 | Certificate distribution and management method |
CN101489196A (en) * | 2009-01-23 | 2009-07-22 | 暨南大学 | Intelligent vehicle-mounted system |
CN101594226A (en) * | 2009-06-17 | 2009-12-02 | 中兴通讯股份有限公司 | The data guard method and the system that are used for file transfer |
Also Published As
Publication number | Publication date |
---|---|
CN101795195A (en) | 2010-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9342701B1 (en) | Digital rights management system and methods for provisioning content to an intelligent storage | |
US7222232B2 (en) | License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer | |
US6801999B1 (en) | Passive and active software objects containing bore resistant watermarking | |
CN101271501B (en) | Encryption and decryption method and device of digital media file | |
US8782419B2 (en) | Device and method for a backup of rights objects | |
KR100958108B1 (en) | Method and apparatus for protecting illegal program copy of mobile communication terminals | |
US20060282391A1 (en) | Method and apparatus for transferring protected content between digital rights management systems | |
CN101795195B (en) | Method for restricting encrypted certificated electronic map with variable information | |
US7634816B2 (en) | Revocation information management | |
JPWO2004109972A1 (en) | User terminal for license reception | |
KR20020082422A (en) | Copyright protection system and method thereof | |
JP2003158514A (en) | Digital work protection system, recording medium apparatus, transmission apparatus, and playback apparatus | |
CN103237010B (en) | The server end of digital content is cryptographically provided | |
CN103888475A (en) | Method and device for protecting multimedia data | |
CN101174941B (en) | Off-line digital copyright protection method and device for mobile terminal document | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
JP6343869B2 (en) | Portable terminal device and decryption processing program | |
JP2009080772A (en) | Software starting system, software starting method and software starting program | |
KR20090024482A (en) | Key management system for using content and method thereof | |
JP2009284231A (en) | Key generating apparatus, key generating method, key generating program, and electronic apparatus | |
CN110348177B (en) | Copyright protection method and system for media file | |
KR101415786B1 (en) | A Hybrid Design system and method of Online Execution Class and Encryption-based Copyright Protection for Android Apps | |
CN101266640A (en) | Method and apparatus for conditionally decrypting content | |
WO2006073250A3 (en) | Authentication method, encryption method, decryption method, cryptographic system and recording medium | |
US20110004761A1 (en) | Viral file transfer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120418 Termination date: 20140129 |