CN101795195B - Method for restricting encrypted certificated electronic map with variable information - Google Patents

Method for restricting encrypted certificated electronic map with variable information Download PDF

Info

Publication number
CN101795195B
CN101795195B CN2010101044583A CN201010104458A CN101795195B CN 101795195 B CN101795195 B CN 101795195B CN 2010101044583 A CN2010101044583 A CN 2010101044583A CN 201010104458 A CN201010104458 A CN 201010104458A CN 101795195 B CN101795195 B CN 101795195B
Authority
CN
China
Prior art keywords
digital signature
signature file
data
electronic chart
constraint information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010101044583A
Other languages
Chinese (zh)
Other versions
CN101795195A (en
Inventor
张鹏
邹平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUHOU WEIZHI TECHNOLOGY Co Ltd
Original Assignee
SUHOU WEIZHI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUHOU WEIZHI TECHNOLOGY Co Ltd filed Critical SUHOU WEIZHI TECHNOLOGY Co Ltd
Priority to CN2010101044583A priority Critical patent/CN101795195B/en
Publication of CN101795195A publication Critical patent/CN101795195A/en
Application granted granted Critical
Publication of CN101795195B publication Critical patent/CN101795195B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Navigation (AREA)

Abstract

The invention discloses a method for restricting an encrypted certificated electronic map with variable information. Restriction information is set in a digital signature file by using a plurality of kinds of encryption algorithms. A user can use the electronic map only after the user passes the certification of the digital signature file. The publisher of the electronic map can randomly set a plurality of kinds of restriction information. When a novel electronic map is published, the user can upgrade the electronic map. The upgraded electronic map can only be used for restricting using time, specific user, specific software version or specific device specified in the information, thereby obtaining the goals of protecting the copyright of the electronic map and differently treating different users.

Description

The method of the encrypting and authenticating electronic chart that a kind of constraint information is variable
Technical field
The present invention relates to a kind of encryption and authentication method of electronic chart, relate in particular to the method for the variable encrypting and authenticating electronic chart of a kind of constraint information.
Background technology
Along with China's rapid economy development, the improvement of expressway construction and urban transportation is maked rapid progress, and it is very necessary that electronic map updating also becomes.When new electronic chart comes out, just need upgrade to the electronic chart that the frequent customer uses.When not having copyright protection, some frequent customers upgrade behind the electronic chart, and arbitrarily the electronic chart after the release upgrade uses for other users, the interests of infringement electronic chart businessman.Subsequently, needing to occur data such as active coding to activate and just can carry out electronic map updating, but this coding is easy to cracked by the people, the effect of copyright protection is also bad.
In addition, license to the electronic chart that different user uses and generally all have identical rights of using.Such as, the use term of validity of the electronic chart of same version, use the zone all identical, can't be according to the difference of user class, or the difference of user's request, the scope of application and the occasion of electronic chart are distinguished.
Summary of the invention
The technical problem that the present invention will solve is: to the deficiency of prior art; The method of the variable encrypting and authenticating electronic chart of a kind of constraint information is provided; Electronic chart is carried out encrypting and authenticating, and cipher round results is more reliable, and it is big to decode difficulty; Need the constraint information of authentication arbitrarily to add as required, comprise device number, time limit service time of version number, the navigator of user profile, navigation software etc.
Technical scheme of the present invention is: the method for the encrypting and authenticating electronic chart that a kind of constraint information is variable, constraint information is incorporated into the digital signature file of generation, and digital signature file is carried out authentication; The step that generates said digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the first and the first random character sign indicating number of navigation software version number, navigator device number, electronic chart version number, digital signature file are together carried out the SHA encryption, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The said step that digital signature file is carried out authentication comprises:
Step K 1: read digital signature file, read first, second portion, third part respectively;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software.
The more detailed technical scheme of the present invention is:
Said constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.Further, said use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
In the said step K 2; If the data that first, second portion and the second random character sign indicating number of digital signature file carry out obtaining after the md5 encryption together are identical with the third part of digital signature file; Then through the MD5 checking; Otherwise the MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
In the said step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
Advantage of the present invention is: the present invention can prevent that electronic chart is by illegal copies; When new electronic chart upgrades; The user asks for digital signature file to publisher; Through this digital signature file is carried out authentication, could upgrade electronic chart, and the electronic chart after upgrading can only be used for specific user, specific software version and specific equipment.Also can add simultaneously other any multiple restricted informations such as service time, use zone, reach protection electronic chart copyright and treat the purpose of different user with a certain discrimination.This constraint information can add arbitrarily, can carry out multiple restriction to the electronic chart of issue, also can carry out the difference restriction to different user, has increased the diversity of authentication.
In addition, authentication mode of the present invention is more hidden, has adopted public-key cryptographic keys, SHA, MD5 multiple encryption algorithms, and has added the random character sign indicating number by the inner definition of publisher that upgrades synchronously along with the renewal of navigation software, thereby has increased the difficulty of decoding.
Description of drawings
Below in conjunction with accompanying drawing and embodiment the present invention is further described:
Fig. 1 is the flow chart of generation cryptographic digital signature file of the present invention;
Fig. 2 is the flow chart that digital signature file is carried out authentication of the present invention.
Embodiment
Embodiment: when new electronic chart upgraded, the user asked for digital signature file to publisher, and publisher carries out encrypting and authenticating to electronic chart with digital signature file, has only the electronic chart through encrypting and authenticating to be read use by navigation software.
The step that publisher generates digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file.Constraint information can be set arbitrarily as required; Such as; Constraint information can be the electronic chart of agreement useful life, use the zone and/or use user profile etc., user profile comprises information such as navigation software version number, electronic chart version number to be installed and navigator device number.Like this,, strengthened the control initiative of publisher, protected publisher and user's interests the use restriction of electronic chart even the electronic chart of same version concerning different other users of level, possibly employed authority be different, specific.For example: constraint information is the navigator device number, representes that then this edition electronic chart only can supply specific navigator to use, and when the device number that has only navigator is the device number of publisher setting, could use this electronic chart.Again for example, constraint information is for the use regional extent of the electronic chart of agreement, and like Shanghai, through the GPS location, when judging the regional extent that the user leaves Shanghai, then navigation software will be closed automatically.
Step S2: from navigator and navigation software, read navigation software version number, navigator device number and electronic chart version number to be installed; Add the cleartext information of the first of digital signature file; Add one first random character sign indicating number; Together carry out SHA (Secure Hash Algorithm, SHA) and encrypt, obtain first data.The first random character sign indicating number is by the inner definition of publisher, and is outwards not open.
Step S3: be used as plaintext to first data and carry out secret key encryption, obtain the second portion of digital signature file.Plaintext first data of the second portion of digital signature file are the ciphertext after SHA encrypts just, even and the irreversibility that SHA encrypts is cracked the second portion of digital signature file, obtain first data, also can't obtain final clear data.
Step S4: the first and the second portion of digital signature file are treated as a binary stream; And add one second random character sign indicating number; Together carry out MD5 (Message Digest AlgorithmMD5, Message Digest Algorithm 5) and encrypt, obtain the third part of digital signature file.The second random character sign indicating number is also defined by publisher inside, and is not outwards open, and different with the value of the first random character sign indicating number.
Step S5: write file header information, and write first, second portion and third part in proper order, promptly obtain comprising the digital signature file of 3 partial datas.Describe the position section of byte that various piece comprised and storage in the file header information, conveniently read three partial contents, and the description content of digital signature file version number etc. some other.
After the electronic chart issue, the user relies on the user profile of oneself and the device number of navigator to ask for a digital signature file to publisher, and the digital signature file that the user obtains is corresponding one by one with navigator, is unique.When electronic chart is upgraded, need carry out the authentication of digital signature file, its legal rights of using of authentication, the step of authentication comprises:
Step K 1: start navigation software, read digital signature file,, read first, second portion, third part respectively according to the file header information of file.
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking; If the data that obtain after encrypting are identical with the third part of digital signature file,, confirm that file is not distorted then through the MD5 checking; Carry out step K 3; Otherwise the MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
After step K 3:MD5 checking is passed through,, obtain the content of constraint information with the first of PKI decrypted digital signature file.
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data.
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file.
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software; If first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
For example, confirm that constraint information is " data:2011-01-01, Iocation:ShangHai ", implication is 1, on the January of useful life to 2011 of electronic chart, and restriction territory of use is Shanghai.Secret key encryption is " data:2011-01-01, location:ShangHai " expressly, obtains the first of digital signature file.Through the information that the user provides, obtain other expressly: " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", the expression software version number is v1.00.03, device number is QEIF-H26W-2OQS-YQGB; Electronic chart version number is v1.00.04, combines itself and constraint information, adds the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 " of the inner definition of publisher; It is following to obtain whole cleartext informations: " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB, Map:v1.00.04; data:2011-01-01, location:ShangHai, 28BI-MAPS-BSH3-ZPV1 "; It is carried out the SHA encryption obtain the first data ciphertext, again the first data ciphertext is carried out the second portion that secret key encryption obtains digital signature file.Merge the first of digital signature file and second portion then, go up another second random character sign indicating number " E89I-59I2-ETUM-Z3E7 " again, together carry out md5 encryption, obtain the third part of digital signature file.Make digital signature file at last: write file header information earlier, order writes first, second portion and third part then, and digital signature file completes.
During decrypted authentication, at first read digital signature file,, read first, second portion and third part respectively through file header information.Merge first and second portion, and add the second random character sign indicating number " E89I-59I2-ETUM-Z3E7 ", together carry out md5 encryption; If the result who obtains equates that with third part then digital signature file is effective, otherwise; Explain that the user is illegal, withdraw from navigation software.After md5 authentication, the first of decrypted digital signature file obtains " data:2011-01-01, location:ShangHai ", analytical information, and record 1, on January of useful life to 2011 and territory of use are Shanghai.Reading software version number then, information such as device number " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", and the data after first's deciphering of digital signature file add the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 "; Obtain data " Software:v1.00.03; Hardware:QEIF-H26W-2OQS-YQGB, Map:v1.00.04, data:2011-01-01; location:ShangHai, 28BI-MAPS-BSH3-ZPV1 ".This segment data is carried out SHA encrypt, obtain the first data ciphertext.And the second portion of digital signature file carried out the PKI deciphering, obtain second data.Compare first data and second data, if identical, then authentication is passed through, and gets into navigation software; If inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
The above is merely the preferred embodiments of the present invention, can not limit the scope that the present invention implements with this, and all simple conversion of doing according to claim of the present invention and description all should still belong to the protection range that the present invention covers.

Claims (4)

1. the method for the variable encrypting and authenticating electronic chart of a constraint information is characterized in that: constraint information is incorporated into the digital signature file of generation, digital signature file is carried out authentication; The step that generates said digital signature file comprises:
Step S1: confirm constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the cleartext information of the first of navigation software version number, navigator device number, electronic chart version number, digital signature file and the first random character sign indicating number are together carried out SHA encrypt, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The said step that digital signature file is carried out authentication comprises:
Step K 1: read digital signature file,, read first, second portion, third part respectively according to file header information;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5:, obtain second data with the second portion of PKI decrypted digital signature file;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and gets into navigation software,
Said constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.
2. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: said use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
3. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1; It is characterized in that: in the said step K 2; If the data that first, second portion and the second random character sign indicating number of digital signature file carry out obtaining after the md5 encryption together are identical with the third part of digital signature file, then through the MD5 checking, otherwise the MD5 authentication failed; The electronic chart authentication is not passed through, and withdraws from navigation software.
4. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: in the said step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
CN2010101044583A 2010-01-29 2010-01-29 Method for restricting encrypted certificated electronic map with variable information Expired - Fee Related CN101795195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101044583A CN101795195B (en) 2010-01-29 2010-01-29 Method for restricting encrypted certificated electronic map with variable information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101044583A CN101795195B (en) 2010-01-29 2010-01-29 Method for restricting encrypted certificated electronic map with variable information

Publications (2)

Publication Number Publication Date
CN101795195A CN101795195A (en) 2010-08-04
CN101795195B true CN101795195B (en) 2012-04-18

Family

ID=42587631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101044583A Expired - Fee Related CN101795195B (en) 2010-01-29 2010-01-29 Method for restricting encrypted certificated electronic map with variable information

Country Status (1)

Country Link
CN (1) CN101795195B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103117851A (en) * 2011-11-17 2013-05-22 银视通信息科技有限公司 Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN102622251B (en) * 2012-03-07 2016-01-06 深圳市凯立德欣软件技术有限公司 The method of navigation software updating and management and server
CN106933831B (en) * 2015-12-29 2021-07-30 阿里巴巴(中国)有限公司 Indoor map data updating method and device
CN108055325B (en) * 2017-12-13 2021-01-08 广州市和声信息技术有限公司 Virtual area marking method and system
CN111462611A (en) * 2019-01-21 2020-07-28 马杰 Method for making, distributing and displaying vector map
CN116167091B (en) * 2023-04-24 2023-06-30 南京麦堤微林信息科技有限公司 Mapping data encryption method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272252A (en) * 2008-04-09 2008-09-24 西安西电捷通无线网络通信有限公司 Certificate distribution and management method
CN101489196A (en) * 2009-01-23 2009-07-22 暨南大学 Intelligent vehicle-mounted system
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101272252A (en) * 2008-04-09 2008-09-24 西安西电捷通无线网络通信有限公司 Certificate distribution and management method
CN101489196A (en) * 2009-01-23 2009-07-22 暨南大学 Intelligent vehicle-mounted system
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer

Also Published As

Publication number Publication date
CN101795195A (en) 2010-08-04

Similar Documents

Publication Publication Date Title
US9342701B1 (en) Digital rights management system and methods for provisioning content to an intelligent storage
US7222232B2 (en) License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer
US6801999B1 (en) Passive and active software objects containing bore resistant watermarking
CN101271501B (en) Encryption and decryption method and device of digital media file
US8782419B2 (en) Device and method for a backup of rights objects
KR100958108B1 (en) Method and apparatus for protecting illegal program copy of mobile communication terminals
US20060282391A1 (en) Method and apparatus for transferring protected content between digital rights management systems
CN101795195B (en) Method for restricting encrypted certificated electronic map with variable information
US7634816B2 (en) Revocation information management
JPWO2004109972A1 (en) User terminal for license reception
KR20020082422A (en) Copyright protection system and method thereof
JP2003158514A (en) Digital work protection system, recording medium apparatus, transmission apparatus, and playback apparatus
CN103237010B (en) The server end of digital content is cryptographically provided
CN103888475A (en) Method and device for protecting multimedia data
CN101174941B (en) Off-line digital copyright protection method and device for mobile terminal document
CN103237011B (en) Digital content encryption transmission method and server end
JP6343869B2 (en) Portable terminal device and decryption processing program
JP2009080772A (en) Software starting system, software starting method and software starting program
KR20090024482A (en) Key management system for using content and method thereof
JP2009284231A (en) Key generating apparatus, key generating method, key generating program, and electronic apparatus
CN110348177B (en) Copyright protection method and system for media file
KR101415786B1 (en) A Hybrid Design system and method of Online Execution Class and Encryption-based Copyright Protection for Android Apps
CN101266640A (en) Method and apparatus for conditionally decrypting content
WO2006073250A3 (en) Authentication method, encryption method, decryption method, cryptographic system and recording medium
US20110004761A1 (en) Viral file transfer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120418

Termination date: 20140129