CN103259652B - A kind of information decryption method based on timeliness parameter - Google Patents

A kind of information decryption method based on timeliness parameter Download PDF

Info

Publication number
CN103259652B
CN103259652B CN201210139419.6A CN201210139419A CN103259652B CN 103259652 B CN103259652 B CN 103259652B CN 201210139419 A CN201210139419 A CN 201210139419A CN 103259652 B CN103259652 B CN 103259652B
Authority
CN
China
Prior art keywords
user
parameter
timeliness
memory cell
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210139419.6A
Other languages
Chinese (zh)
Other versions
CN103259652A (en
Inventor
沈兵
刘建
冯涛
李晶
卢红洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Transport Telecommunications And Information Center
Original Assignee
China Transport Telecommunications & Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Transport Telecommunications & Information Center filed Critical China Transport Telecommunications & Information Center
Priority to CN201210139419.6A priority Critical patent/CN103259652B/en
Publication of CN103259652A publication Critical patent/CN103259652A/en
Application granted granted Critical
Publication of CN103259652B publication Critical patent/CN103259652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of information decryption method based on timeliness parameter belonging to decoding technique field.It comprises the following steps: 1) carry out compose operation to A random code and B random code and obtain kind of a subcode, carries out compose operation obtain system timeliness parameter K to kind of subcode; 2) user's timeliness parameter is produced according to system timeliness parameter; 3) work limitation parameter is produced according to user's timeliness parameter; 4) use work limitation parameter as key, process is decrypted to enciphered message.Beneficial effect of the present invention is: the present invention uses work limitation parameter to be decrypted information, thus enhances the fail safe of acquisition of information, meanwhile, the invention enables user can only could acquisition information in official hour; Greatly reduce the possibility of information leakage.<!--1-->

Description

A kind of information decryption method based on timeliness parameter
Technical field
The invention belongs to decoding technique field, particularly a kind of information decryption method based on timeliness parameter.
Background technology
In satellite navigation system or other communication systems, usually can set up the flow process of encrypt and decrypt, the data transmission security between user and satellite (or other devices) can be ensured like this.The data that satellite or other devices issue user are the data of encrypting, and now the handheld terminal of user is provided with corresponding decrypted program, and user, to after above-mentioned decrypts information, just can receive corresponding data.
In above-mentioned communication system, corresponding decrypted program does not have time restriction, and user can use at any time; And in some cases, needing classification to set the authority of user, user only has (by its authority) in official hour that decrypted program could be used to be decrypted information, and beyond official hour, user haves no right to use decrypted program.At this moment, existing satellite navigation system or other communication systems can not meet this requirement.
Summary of the invention
The present invention is directed to above-mentioned defect and disclose a kind of information decryption method based on timeliness parameter, it comprises the following steps:
1) compose operation is carried out to A random code and B random code and obtain kind of a subcode, compose operation is carried out to kind of subcode and obtains system timeliness parameter K;
2) user's timeliness parameter is produced according to system timeliness parameter;
The order arrangement successively of first memory cell, the second memory cell, the 3rd memory cell and the 4th memory cell, the data sequence arrangement of above four cell stores just forms user's timeliness parameter;
Encode to the X time, be encoded to 16 ary codes: KLMN by X, this 16 ary codes is without symbol short, and its length is 2 bytes;
Above-mentioned 16 codes processed are carried out cascade 8 times, forms the character string that a length equals 16 bytes, use P here xrepresent; Then, using system timeliness parameter as working key, adopt aes algorithm to P xbe encrypted the character string C obtaining 16 bytes x, i.e. C x=AES (P x, K); Stored in KLMN in the first memory cell, the second memory cell is stored in data 00, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data C x, now the data sequence arrangement of four cell stores is with regard to structure adult human user timeliness parameter;
Encode to Y month, by being encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: the length of KLMNPQ, PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade and obtain a character string for 5 times, the afterbody cascade 16 system character string by this character string: PQ, finally obtains the character string that a length is 16 bytes, uses PP here xYrepresent;
By C xas working key, adopt aes algorithm to PP xYbe encrypted the character string CC obtaining 16 bytes xY, i.e. CC xY=AES (PP xY, C x); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data CC xY, the now data sequence arrangement of four cell stores just forms moon user timeliness parameter;
Z week is encoded, by being encoded to 16 system character string: ST Z week, the 16 system character strings that then X Y month Z week is corresponding are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represents the 1st thoughtful 4th week respectively, KLMNPQST is carried out cascade 4 times, obtain the character string that a length is 16 bytes, use PPP here xYZrepresent;
By CC xYas working key, adopt aes algorithm to PPP xYZbe encrypted the character string CCC obtaining 16 bytes xYZ, i.e. CC xYZ=AES (PPP xYZ, CC xY); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data ST, and the 4th memory cell is stored in data CCC xYZ; , the now data sequence arrangement of four cell stores just forms all user's timeliness parameters;
3) work limitation parameter is produced according to user's timeliness parameter;
According to current time, judge time corresponding to user's timeliness parameter whether in effective time section, namely judge whether current time belongs to time corresponding to user's timeliness parameter;
If judged result is no, then terminate; If the determination result is YES, then according to step 2) dispersion treatment is carried out to user's timeliness parameter, obtain year user's timeliness parameter, moon user timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, moon user timeliness parameter and all user's timeliness parameters are activated, obtains work limitation parameter;
4) use work limitation parameter as key, process is decrypted to enciphered message.
The length of the data of described 4th cell stores is 16 bytes, 24 bytes or 32 bytes.
Beneficial effect of the present invention is: the present invention uses work limitation parameter to be decrypted information, thus enhances the fail safe of acquisition of information, meanwhile, the invention enables user can only could acquisition information in official hour; Greatly reduce the possibility of information leakage.
Accompanying drawing explanation
Fig. 1 is workflow diagram of the present invention;
Fig. 2 is the memory cell schematic diagram of user's timeliness parameter.
Embodiment
Below in conjunction with accompanying drawing, preferred embodiment is elaborated.It is emphasized that following explanation is only exemplary, instead of in order to limit the scope of the invention and apply.
As shown in Figure 1, a kind of information decryption method based on timeliness parameter comprises the following steps:
1) compose operation is carried out to A random code and B random code and obtain kind of a subcode, compose operation is carried out to kind of subcode and obtains system timeliness parameter K;
2) user's timeliness parameter is produced according to system timeliness parameter;
As shown in Figure 2, the order arrangement successively of the first memory cell, the second memory cell, the 3rd memory cell and the 4th memory cell, the data sequence arrangement of above four cell stores just forms user's timeliness parameter;
Encode to the X time, be encoded to 16 ary codes: KLMN by X, this 16 ary codes is without symbol short, and its length is 2 bytes;
Above-mentioned 16 codes processed are carried out cascade 8 times, forms the character string that a length equals 16 bytes, use P here xrepresent; Then, using system timeliness parameter as working key, adopt aes algorithm to P xbe encrypted the character string C obtaining 16 bytes x, i.e. C x=AES (P x, K); Stored in KLMN in the first memory cell, the second memory cell is stored in data 00, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data C x, now the data sequence arrangement of four cell stores is with regard to structure adult human user timeliness parameter;
The production process of the year user Ageing Treatment parameter of such as 2007 is as follows:
X=”07D7”,P X=”07D707D707D707D707D707D707D707D7”
C X=AES(P X,K),
Then the year user Ageing Treatment parameter of 2007 is
07D7 00 00 C X
Encode to Y month, by being encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: the length of KLMNPQ, PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade and obtain a character string for 5 times, the afterbody cascade 16 system character string by this character string: PQ, finally obtains the character string that a length is 16 bytes, uses PP here xYrepresent;
By C xas working key, adopt aes algorithm to PP xYbe encrypted the character string CC obtaining 16 bytes xY, i.e. CC xY=AES (PP xY, C x); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data CC xY, the now data sequence arrangement of four cell stores just forms moon user timeliness parameter;
The generation of the moon user Ageing Treatment parameter in such as in March, 2007
PP XY=”07D70307D70307D70307D70307D70303”
CC XY=AES(PP XY,C X),
Then the year user Ageing Treatment parameter of 2007 is
07D7 03 00 CC XY
Z week is encoded, by being encoded to 16 system character string: ST Z week, the 16 system character strings that then X Y month Z week is corresponding are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represents the 1st thoughtful 4th week (set 4th week herein and extend to last day of this month) respectively, KLMNPQST is carried out cascade 4 times, obtain the character string that a length is 16 bytes, use PPP here xYZrepresent;
By CC xYas working key, adopt aes algorithm to PPP xYZbe encrypted the character string CCC obtaining 16 bytes xYZ, i.e. CC xYZ=AES (PPP xYZ, CC xY); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data ST, and the 4th memory cell is stored in data CCC xYZ; , the now data sequence arrangement of four cell stores just forms all user's timeliness parameters;
The generation of all user's Ageing Treatment parameters of the 1st week in such as in March, 2007
PPP XYZ=”07D7030107D7030107D7030107D70301”
CCC XYZ=AES(PPP XYZ,C XY),
Then the year user Ageing Treatment parameter of 2007 is
07D7 03 01 CCC XYZ
3) work limitation parameter is produced according to user's timeliness parameter;
According to current time, judge time corresponding to user's timeliness parameter whether in effective time section, namely judge whether current time belongs to time corresponding to user's timeliness parameter;
If judged result is no, then terminate; If the determination result is YES, then according to step 2) dispersion treatment is carried out to user's timeliness parameter, obtain year user's timeliness parameter, moon user timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, moon user timeliness parameter and all user's timeliness parameters are activated, obtains work limitation parameter;
4) use work limitation parameter as key, process is decrypted to enciphered message.
The length of the data of the 4th cell stores is 16 bytes, 24 bytes or 32 bytes.

Claims (2)

1. based on an information decryption method for timeliness parameter, it is characterized in that, it comprises the following steps:
1) compose operation is carried out to A random code and B random code and obtain kind of a subcode, compose operation is carried out to kind of subcode and obtains system timeliness parameter K;
2) user's timeliness parameter is produced according to system timeliness parameter;
The order arrangement successively of first memory cell, the second memory cell, the 3rd memory cell and the 4th memory cell, the data sequence arrangement of above four cell stores just forms user's timeliness parameter;
Encode to the X time, be encoded to 16 ary codes: KLMN by X, this 16 ary codes is without symbol short, and its length is 2 bytes;
Above-mentioned 16 codes processed are carried out cascade 8 times, forms the character string that a length equals 16 bytes, use P here xrepresent; Then, using system timeliness parameter as working key, adopt aes algorithm to P xbe encrypted the character string C obtaining 16 bytes x, i.e. C x=AES (P x, K); Stored in KLMN in the first memory cell, the second memory cell is stored in data 00, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data C x, now the data sequence arrangement of four cell stores is with regard to structure adult human user timeliness parameter;
Encode to Y month, by being encoded to 16 system character string: PQ Y month, then 16 system character strings of X Y month correspondence are: the length of KLMNPQ, PQ is 1 byte, and its value is 00-0c, and wherein 01-0c represents January respectively to December; KLMNPQ is carried out cascade and obtain a character string for 5 times, the afterbody cascade 16 system character string by this character string: PQ, finally obtains the character string that a length is 16 bytes, uses PP here xYrepresent;
By C xas working key, adopt aes algorithm to PP xYbe encrypted the character string CC obtaining 16 bytes xY, i.e. CC xY=AES (PP xY, C x); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data 00, and the 4th memory cell is stored in data CC xY, the now data sequence arrangement of four cell stores just forms moon user timeliness parameter;
Z week is encoded, by being encoded to 16 system character string: ST Z week, the 16 system character strings that then X Y month Z week is corresponding are: KLMNPQST, the length of ST is 1 byte, its value is 00-04, and wherein 01-04 represents the 1st thoughtful 4th week respectively, KLMNPQST is carried out cascade 4 times, obtain the character string that a length is 16 bytes, use PPP here xYZrepresent;
By CC xYas working key, adopt aes algorithm to PPP xYZbe encrypted the character string CCC obtaining 16 bytes xYZ, i.e. CC xYZ=AES (PPP xYZ, CC xY); Stored in KLMN in the first memory cell, the second memory cell is stored in data PQ, and the 3rd stores list stored in data ST, and the 4th memory cell is stored in data CCC xYZ, the now data sequence arrangement of four cell stores just forms all user's timeliness parameters;
3) work limitation parameter is produced according to user's timeliness parameter;
According to current time, judge time corresponding to user's timeliness parameter whether in effective time section, namely judge whether current time belongs to time corresponding to user's timeliness parameter;
If judged result is no, then terminate; If the determination result is YES, then according to step 2) dispersion treatment is carried out to user's timeliness parameter, obtain year user's timeliness parameter, moon user timeliness parameter and all user's timeliness parameters;
Year user timeliness parameter, moon user timeliness parameter and all user's timeliness parameters are activated, obtains work limitation parameter;
4) use work limitation parameter as key, process is decrypted to enciphered message.
2. a kind of information decryption method based on timeliness parameter according to claim 1, is characterized in that, the length of the data of described 4th cell stores is 16 bytes, 24 bytes or 32 bytes.
CN201210139419.6A 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter Active CN103259652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210139419.6A CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210139419.6A CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Publications (2)

Publication Number Publication Date
CN103259652A CN103259652A (en) 2013-08-21
CN103259652B true CN103259652B (en) 2015-12-16

Family

ID=48963370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210139419.6A Active CN103259652B (en) 2012-05-07 2012-05-07 A kind of information decryption method based on timeliness parameter

Country Status (1)

Country Link
CN (1) CN103259652B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU728942B2 (en) * 1995-06-30 2001-01-18 Canon Kabushiki Kaisha A communication apparatus and a communication system
CN101833629B (en) * 2009-03-11 2011-10-26 南京理工大学 Software area authorization encryption method and implementing device therefor
CN102012993B (en) * 2010-11-29 2012-07-11 北京卓微天成科技咨询有限公司 Methods and devices for selectively encrypting and decrypting data

Also Published As

Publication number Publication date
CN103259652A (en) 2013-08-21

Similar Documents

Publication Publication Date Title
CN102546181B (en) Cloud storage encrypting and deciphering method based on secret key pool
CN102012993B (en) Methods and devices for selectively encrypting and decrypting data
CN102594548B (en) Method capable of achieving data sectional encryption and decryption
CN105468990A (en) Sensitive information management control method and apparatus
CN104052658A (en) Privacy protection system and method based on social network
CN103684760A (en) Method, device and system for encryption and decryption of communication
CN101996298A (en) Encrypting method and decrypting method corresponding to same
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN104660590B (en) A kind of file encryption secure cloud storage scheme
NZ596935A (en) Generating an encryption/decryption key by comparing data sets received from a central server
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN101383703A (en) Dynamic ciphering system and method based on broad sense information field
CN104268480A (en) XML (extensive markup language) configuration file security protection processing method and system
CN103441841A (en) Automatic encrypting and decrypting system and method for welding data
CN115022102B (en) Transmission line monitoring data transmission method and device, computer equipment and storage medium
CN102663325A (en) A method and system for binding of software and hardware
CN105100085A (en) Information encryption and decryption methods and devices
CN102571804A (en) Internet of things center first login method based on product identification code
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN106375083A (en) Encryption-decryption method based on Base64 and device thereof
CN105379172B (en) Device and method for the key updating used in Tuber yield
CN103942500A (en) Hash ciphertext re-encryption method based on noise and decryption method after re-encryption
CN103532700A (en) Communication message encryption and decryption model of electricity consumption information collecting system
CN103259646B (en) A kind of information decryption method based on satellite navigation system
CN111740831B (en) Electric power data encryption transmission method, system and readable medium for multiplex and production detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220106

Address after: 101399 room 1115, 6 Anfu street, Houshayu Town, Shunyi District, Beijing

Patentee after: Jiaoxin Beidou Technology Co.,Ltd.

Patentee after: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

Address before: 100011 rear body of Chaoyang District foreign and foreign embassy in Beijing

Patentee before: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230425

Address after: 100011 No. 1, back of Andingmen Waiguan, Chaoyang District, Beijing

Patentee after: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER

Address before: 101399 room 1115, 6 Anfu street, Houshayu Town, Shunyi District, Beijing

Patentee before: Jiaoxin Beidou Technology Co.,Ltd.

Patentee before: CHINA TRANSPORT TELECOMMUNICATIONS AND INFORMATION CENTER