CN103916241A - Respiratory machine function selection encryption method - Google Patents

Respiratory machine function selection encryption method Download PDF

Info

Publication number
CN103916241A
CN103916241A CN201210592514.1A CN201210592514A CN103916241A CN 103916241 A CN103916241 A CN 103916241A CN 201210592514 A CN201210592514 A CN 201210592514A CN 103916241 A CN103916241 A CN 103916241A
Authority
CN
China
Prior art keywords
code
encryption
function
functional configuration
configuration code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210592514.1A
Other languages
Chinese (zh)
Other versions
CN103916241B (en
Inventor
王堃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Aeonmed Co Ltd
Original Assignee
Beijing Aeonmed Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Aeonmed Co Ltd filed Critical Beijing Aeonmed Co Ltd
Priority to CN201210592514.1A priority Critical patent/CN103916241B/en
Publication of CN103916241A publication Critical patent/CN103916241A/en
Application granted granted Critical
Publication of CN103916241B publication Critical patent/CN103916241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a respiratory machine function selection encryption method. In the method, a unique identification code and a function code of a machine are combined to obtain a first functional configuration code; first encryption is conducted for the first functional configuration code to obtain a configuration code, and the configuration code is transmitted to a supplier; the supplier decrypts the configuration code to obtain the first functional configuration code; the supplier verifies the machine, sets a second functional configuration code, conducts second encryption to obtain a registration code, and transmits the registration code to a user; the user receives and enters the registration code to the machine, and the machine decrypts the registration code to obtain the second functional configuration code, and reads out the second functional configuration code to turn on or off corresponding functions to the second functional configuration code. The respiratory machine function selection encryption method manages the on and off of all the functions of the respiratory machine via a password, and reduces the complexity of software configuration management, while ensuring that the password for each product is absolutely unique; and both an encryption operator and algorithm must be acquired to crack the password, and thus the security of the password is enhanced.

Description

A kind of encryption method of lung ventilator function apolegamy
Technical field
The present invention relates to field of medical appliances, relate in particular to a kind of encryption method for the apolegamy of lung ventilator function.
Background technology
Current lung ventilator function is more and more abundanter, needs for user's difference, and same type also can be provided with different apolegamy function and accessory.The function that can match for lung ventilator, such as different ventilating mode, measuring abilities etc. generally arranges switch and opens these functions in user interface.And the mode of encrypting that conventionally all accesses to your password manages licensing of function, only have user to match after this function, the password providing by supplier could be opened corresponding function, uses.
The Crypted password using at present, generally adopts that a function is fixing uses a password, or forms random Crypted password by the random number that operating system generates.
Use fixing function password, refer to that identical function is all to open or close with identical password.This can cause all product individualities of the different types of machines with this function to open this function by this identical password.Like this, if once password is revealed, this function of so all products can be opened.
Use the cipher mode of random number, refer to for each function of each product individuality and produce at random a password, the defect that this method can avoid above-mentioned use fixed function password to exist, but also there is such problem in the cipher mode of this random number: although be random generation in code surface, but the random number generating due to operating system is pseudo random number, namely even repeatedly all produce an identical random number very possible twice, so still there is the individual possibility of opening identical function with same password of two products.So the privacy degrees of the cipher mode of this random number is still not high, and is easily cracked., open because each function needs to produce a password at random meanwhile, therefore increased workload and the complexity of software configuration management.
Therefore, provide a kind of strong security, be difficult for being cracked, and the method for reduction software configuration management workload and complexity has very important significance.
Summary of the invention
The object of the invention is to propose a kind of encryption method for lung ventilator or the apolegamy of other machines function, can manage the opening and closing of all functions in lung ventilator by a password, reduce the complexity of software administration configuration.Simultaneously, because this password is that unique identifying number by using each product individuality is encrypted and obtains, the password that has guaranteed each product individuality is definitely unique.In addition, encryption method provided by the invention has also been utilized encryption operator, even if cryptographic algorithm has been revealed like this, but still cannot decryption in the situation that not knowing to encrypt operator, make like this encrypted code be not easy to be cracked, strengthen the fail safe of encrypted code, thereby guaranteed the fail safe of product individuality.
For reaching this object, the present invention by the following technical solutions:
An encryption method for function apolegamy, comprises the following steps successively:
S100: the unique identifier of machine and the function code corresponding with function are combined and obtained the first functional configuration code; S200: use the encryption operator and random the first encryption number of times producing that produce at random to carry out the first encryption to described the first functional configuration code, obtain configuration code, and this configuration code is sent to supplier; S300: supplier receives described configuration code, uses the method deciphering corresponding with the first encryption, obtains described the first functional configuration code; S400: supplier identifies checking according to unique identifier and function code in described the first functional configuration code to machine, and require described the first functional configuration code to modify according to user, be set to the second functional configuration code, require to arrange the second functional configuration code according to user, and described encryption operator and random the second encryption number of times producing of use carries out the second encryption to the second functional configuration code, obtain registration code, and this registration code is sent to user; S500: user receives above-mentioned registration code and inputs machine, machine uses with described second and encrypts corresponding method deciphering, obtain the second functional configuration code, open or close the function corresponding with this second functional configuration code by reading this second functional configuration code.
Wherein, step S200 also comprises: S210: use the encryption operator of described random generation and random the first encryption number of times producing to carry out the first encryption to described functional configuration code, obtain the first encrypted code; S220: encrypt number of times by described first and be attached to the first encrypted code, make the first encryption number of times become a part for the first encrypted code, and use described encryption operator again to encrypt, obtain the configuration code of machine.Step S220 is attached to described the first encryption number of times at the end of described the first encrypted code.First encrypts number of times identifies by double figures, if not enough double-digit, at a high position 0 polishing.
Wherein, step S400 also comprises: S410: use the encryption operator of described random generation and random the second encryption number of times producing to carry out the second encryption to described the second functional configuration code, obtain the second encrypted code; S420: encrypt number of times by described second and be attached to described the second encrypted code, make the second encryption number of times become a part for the second encrypted code, and use described encryption operator again to encrypt, obtain described registration code.Step S420 also comprises: S421: produce at random a numerical value I, as inserting figure place, wherein this numerical value I is greater than 1, and is less than the character string figure place of described the second encrypted code; S422: insert described second at the numerical digit I place of described the second encrypted code and encrypt number of times, and this insertion numerical digit I is attached to the second encrypted code end, making the second encryption number of times and inserting numerical digit becomes a part for the second password; S423: use described encryption operator once to encrypt again the coding producing in described step S422, obtain described registration code.Wherein, insert figure place I and described second and encrypt number of times respectively by double figures mark, if not enough double-digit, at a high position 0 polishing.
Wherein, the function code corresponding with function produced by following methods: S1001: function is numbered, with the corresponding difference in functionality of different numerical digits of eight-digit binary number character string, and this digit value is to open function corresponding to this numerical digit at 1 o'clock, otherwise, if this digit value is, close function corresponding to this numerical digit at 0 o'clock; S1002: described binary coding is scaled to two hexadecimal numerical value, the part using this hexadecimal numerical value as function code.
The generation of encrypting operator comprises the following steps: S001: the order increasing progressively with ASCII character is set up the table of comparisons of ASCII character and numeral and English alphabet, obtains First ray table; S002: reset the order of First ray table, obtain random array, using this random array as described encryption operator.
The method that uses this encryption operator to be encrypted comprises the following steps: S0001: the position PCi of each character Ci in First ray table in the character string of acquisition presentation function configuration code; S0002: read in and encrypt the ASCII character APci on the PCi of position in operator; S0003: the ASCII character Apci that inquiry obtains at step S0002 in described First ray table, obtains the character CAApci corresponding with this ASCII character Apci, using this character character on the Ci ' of relevant position in the code through encrypting.The first encryption number of times and second is encrypted number of times and is respectively the random any number producing between 0-99.
Accompanying drawing explanation
Fig. 1 is the encryption method schematic flow sheet of the function apolegamy that provides of the specific embodiment of the invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, in accompanying drawing, only show part related to the present invention but not entire infrastructure.
Juche idea of the present invention is, a kind of encryption method of lung ventilator function apolegamy is provided, and the method comprises the following steps successively:
S100: the unique identifier of machine and the function code corresponding with function are combined and obtained the first functional configuration code;
S200: use the encryption operator and random the first encryption number of times producing that produce at random to carry out the first encryption to described the first functional configuration code, obtain configuration code, and this configuration code is sent to supplier;
S300: supplier receives described configuration code, uses the method deciphering corresponding with the first encryption, obtains described the first functional configuration code;
S400: supplier identifies checking according to unique identifier and function code in described the first functional configuration code to machine, and require described the first functional configuration code to modify according to user, be set to the second functional configuration code, and described encryption operator and random the second encryption number of times producing of use carries out the second encryption to the second functional configuration code, obtain registration code, and this registration code is sent to user;
S500: user receives above-mentioned registration code and inputs machine, machine uses with described second and encrypts corresponding method deciphering, obtain the second functional configuration code, open or close the function corresponding with this second functional configuration code by reading this second functional configuration code.
That is to say, encryption method provided by the invention, by the function coding using on the unique identifier of each product individuality and this product is encrypted, is managed, is controlled the service condition of multiple functions in each product individuality.Specifically, each product is equipped with unique identification marking at the Shi Douhui that dispatches from the factory, form the unique identifier of this product, the namely ID of product, and configuration code is the one coding that has recorded the functional status that this product realizes, from this coding, can learn the function that current production is opened and the function of closing.Encryption method provided by the invention is combined above-mentioned unique identifier and function code, then is encrypted, and will be stored in product individuality through the configuration code of encrypting.In the time that user need to open or close certain function, configuration code is sent to supplier, supplier can learn that by configuration code whether current production is through identification checking, namely whether be authorized to use, and the current function opening of this machine, and according to user's requirement, new configuration code is set, after being encrypted, new configuration code sends to user.User is by after in new configuration code input product individuality, in product, can be decrypted with the method corresponding with encryption method, obtain new functional configuration code, by reading this new functional configuration code, can control function corresponding with this functional configuration code in product and be unlocked or be closed.
Several terms that first need to use the present invention make an explanation: because the present invention can use in the function apolegamy of any medical machinery is controlled, in order better method of the present invention to be described, only describe with lung ventilator herein.Therefore, should be understood that, the function apolegamy encryption method that the present invention carries is not restricted to and uses in lung ventilator.
ID code
ID code be the instruments such as lung ventilator self with unique authentication coding.Every machine has an ID code, and can not repeat with the ID code of other machine.Hereinafter, for method provided by the invention is more easily understood, use following example to describe: ABCD-EFGH-IJKL
Functional configuration code
Lung ventilator has different types of machines, the function that every kind of type can be realized is also different, and for different type of machines, can not rely on the configuration of specific model and use plurality of optional function, in each machine, the summation of operable optional function item is called function bag.
According to type (namely Configuration Type) and can additionally select to open or the function (namely function bag) of closing, work out a kind of functional configuration code.The end of this code is with two groups of hexadecimal numerical value of two four string representations, and the front two of hexadecimal numerical value represents the Configuration Type of this machine, namely type, the optional function bag that this machine of rear two bit representations is opened, the function of namely having opened.
In the coding of expression Configuration Type, use 8 strings of binary characters to represent 16 system numerical value, from F 1to F 88 strings of binary characters altogether: 00000000 represents whole coding.Wherein, the corresponding numerical digit F of each Configuration Type i, be F successively from low level a to high position 1-F 8.Can be arranged to as known to the skilled person the numerical value of each, numerical value 1 represents "True", and numerical value 0 represents "No".For example corresponding first F of Configuration Type 1 1, use 00000001 expression, be converted into 16 systems and be 01.The corresponding second F of Configuration Type 2 2, represent with 00000010, be scaled 16 systems and be 02.Corresponding the 3rd F of Configuration Type 3 3, represent to be scaled 16 systems with 00000100 and be 04, by that analogy.Finally in Configuration Type coding, by the Configuration Type coding with this 16 system numeric representation lung ventilator.
Function code also uses similar coded system, uses 8 strings of binary characters to represent 16 system numerical value, is followed successively by E from low level a to high position 1to O 8, totally 8, every kind of corresponding numerical digit of optional function item, numerical value " 1 " represents "True", namely opens function corresponding to this numerical digit; Numerical value " 0 " represents that "No" namely closes function corresponding to this numerical digit.The for example corresponding E of optional function 1 1, code 1 use 00000001 of opening this function represents, being scaled 16 system numerical value is 01; The corresponding numerical digit E of optional function 2 2, the code of opening this function represents with 00000010, being scaled 16 system numerical value is 02; The corresponding numerical digit E of optional function 3 3, the code of opening this function represents with 00000100, being scaled 16 system numerical value is 03, by that analogy.If select to open multiple functions, the numerical digit corresponding to these multiple functions be set to respectively to 1 simultaneously simultaneously, for example, the optional function bag of machine is function 1 and function 3, namely this machine has been opened function 1 and function 3, as mentioned above, represent with binary code 00000101, being scaled 16 system numerical value is 05.By that analogy, final in functional configuration code the function code using this hexadecimal numerical value as this lung ventilator.
It should be noted that hexadecimal numerical value double figures used herein represents, if two of less thaies, in a high position with 0 polishing, to encode in the time forming functional configuration code.
Therefore, as above, machine ID code is ABCD-EFGH-IJKL, and type is Configuration Type 2, uses binary coding representation 00000010, is converted into hexadecimal Configuration Type and is encoded to 02; Here take the additional function bag of this machine as optional function 2 and optional function 3 describe as example, opening the binary coding that this function bag is corresponding is 00000110, being scaled hexadecimal function code is 06; Obtaining like this function code is 0206.
Above ID identification code and function code are combined according to sequencing, obtained functional configuration code: ABCD-EFGH-IJKL-0206.
From above-described example, can learn, use encryption method provided by the invention, can in coding, comprise multiple Configuration Types and multiple optional function.For example use eight-digit binary number string representation, can be up to 16 kinds of Configuration Types and the 16 kinds of optional functions that can open.
Below the cryptographic algorithm using in the present invention is described.
Out of order arthmetic statement
As well known in the skilled person, the coding of machine adopts digital 0-9 and English alphabet A-Z totally 36 character compositions.In out of order algorithm provided by the invention, the ASCII character of numeral and English alphabet is arranged in to a table of comparisons by ASCII character by the order increasing progressively, and as First ray table, in table, the order of ASCII character is: 48-57,65-90, difference corresponding digital 0-9 and English alphabet A-Z successively.
Above First ray table is rearranged, obtain at random new array, only describe array 1:55,90,52,53 herein using array 1 as the random one group of ordered series of numbers producing as example, 54,56,57,73,65,67,68,69,48,70,71,86,72,84,74,88,89,75,51,76,77,78,79,50,80,81,49,82,83,85,66,87.This array 1 is one and encrypts operator, and this encryption operator produces at random for each lung ventilator, and is stored in this lung ventilator, and the encryption and decryption of multiple codings that this lung ventilator is produced are all used the encryption operator of this lung ventilator.
For the character string that will encrypt, for the character Ci of each numerical digit, first in First ray table, find out the position P of Ci ci, then read in the P in array 1 cilocational ASCII character A pci; Return in First ray table, read A pcicorresponding character CA apci, by this character CA apcias encrypt after character string at position P cion character.
For example, in character string 0123ABCD, primary character is 0, i.e. C 1=0, in First ray table, 0 position P 0at the 1st, namely P 0=1; Then on the position 1 in array 1, read ASCII character, A 1=55; Return in First ray table A 1the character CA that (namely ASCII character 55) is corresponding 55=7; , after current encryption, the character of the 1st of encrypted characters string is C 1'=7.Equally, the 2nd of character string the character C 2=1, in First ray table, 1 position is at the 2nd, namely P 1=2; In array 1, the ASCII character of the 2nd is 90, namely A 2=90, get back in First ray table the corresponding character Z of ASCII character 90, namely CA 90=Z; Like this, in the character string after encryption, second character is C 2'=Z.By that analogy, the 8th C of character string 8=D; The position P of D in First ray table d=14; In array 1, the digital A on the 14th 14=70; Get back in First ray table the character CA of ASCII character 70 correspondences 70=F; Therefore after encrypting, the 8th character of character string is C 8'=F.According to above method, character string 0123ABCD is encrypted, the result of encryption is: 7Z45DE0F.
Like this, after string encoding, allow user just can not identify original character string, reach the effect of encryption.In the encryption method process of the following stated, all use this cryptographic algorithm to describe for example as the part of ciphering process.
Encrypted code
Encrypted code is kept in product individuality, the character string that the functional configuration code being made up of ID code and function code calculates through cryptographic algorithm.Functional configuration code ABCD-EFGH-IJKL-0206 as in the example above of example, the encrypted code obtaining after using above-mentioned encryption operator once to encrypt is: 56TD-H00W-ENKG-1R46, is the encrypted code in this lung ventilator.
Described encrypted code is kept in the middle of each lung ventilator, in the time of each startup lung ventilator, system reads this encrypted code, be decrypted according to the decryption method corresponding with above-mentioned encryption method, obtain the real functional configuration code of above-described this product, thereby according to the corresponding function in the information operation lung ventilator in this functional configuration code.
In addition, configuration code is encrypted and is obtained in the process of lung ventilator configuration code, first, system need to read this encrypted code, and anti-deciphering obtains real functional configuration code, re-uses afterwards above-described encryption method and is encrypted.
Configuration code
Configuration code is encrypted and obtains above-described functional configuration code, configuration code is sent to supplier by user, supplier deciphers configuration code, obtain real functional configuration code and can learn the ID code of lung ventilator, type (namely Configuration Type) and the function bag (function items of namely having opened) having selected.In the time that user need to open the optional function in lung ventilator, the first current configuration code of read machine from lung ventilator, and the configuration code of reading is informed to manufacturer.
The concrete generation step of configuration code is: produce at random the numerical value between 0 – 99 as the first encryption number of times, functional configuration code is encrypted, repeat this encryption number of times, obtain the first encrypted code; The first encryption number of times of above-mentioned generation is attached to the end of the first encrypted code; Carry out Standard Encryption one time, what obtain is exactly described configuration code again.Specifically describe as an example of above-mentioned functional configuration code ABCD-EFGH-IJKL-0206 example.The random encryption number of times producing is take 12 as example, and, to functional configuration code encryption 12 times, the result obtaining is GJTV-A505-J6SW-KR1U.The first encryption number of times is directly increased to coding ending, obtain GJTV-A505-J6SW-KR1U-12, carry out Standard Encryption one time to having added first the first encrypted code of encrypting number of times, final result is GQBU-5MXD-DR0S-PJH3-RJ, is the configuration code that user reads from lung ventilator again.In this embodiment, use ten's digit 12 to describe as example, it may occur to persons skilled in the art that, can also represent to encrypt number of times by the numeral of other systems such as hexadecimal.
Like this, this configuration code can make a distinction with above-mentioned encrypted code, and has increased and crack difficulty.While reading this configuration code due to user, all produce at random one first at every turn and encrypt number of times, therefore make all differences of configuration code that at every turn read; In ciphering process, the first described encryption number of times is increased in the first encrypted code, form a part for the first encrypted code, be encrypted again, after making this configuration code once decipher, can obtain the first encryption number of times, be decrypted and can obtain real the first functional configuration code of lung ventilator according to this first encryption number of times.
Registration code
The coding that registration code provides for user according to user's requirement for manufacturer, the information comprising in this coding has the unique identifier of machine, namely ID code, the Configuration Type of this machine, and the function of this machinery requirement realization.Machine, by reading the functional configuration code of corresponding information in this registration code, can be upgraded to the type of needs and function, opens or close corresponding software function.
The cipher mode of registration code is similar to the cipher mode of configuration code, and the difference of the two is encrypted code to add the position difference in the first encrypted code, has further strengthened the level of encryption of registration code and the difficulty being cracked.In the ciphering process of registration code, except random generation second is encrypted number of times, also numerical digit I is inserted in one of random generation, the second encryption number of times is inserted to the position of the random number I in character string, and insertion position I is recorded in to the end of the second encrypted code character string.Concrete mode is as follows: the truth function configuration code of machine is: ABCD-EFGH-IJKL-0206.Get the random value of 0 – 99 as the second encryption number of times, same, for example get 12, the truth function configuration code of machine to be carried out to 12 times and encrypt, result is GJTV-A505-J6SW-KR1U, describes here using this result as the second encrypted code.Afterwards, get the random value of 0-15 as insertion position I, for example I=1, the 1st at the second encrypted code inserts the second encryption number of times 12, and this insertion position I=1 is attached to the end of the second encrypted code, and result is G12J-TVA5-05J6-SWKR-1U01.The result obtaining is carried out to Standard Encryption again one time, even carry out once out of order encryption with above-mentioned encryption operator, result is: XRVU-W6HN-7GWZ-0166-QWTR.
As what can find out from above example, insert position and represent with double figures too, the supplying with 0 in a high position of two of less thaies.And because carrying out the configuration code of example in this specification is 16, therefore, the insertion position I selecting, between 0-15, is understandable that, if the configuration code figure place of encoding is more, can select wider numerical value to produce this insertion position herein.
Decoding
As the skilled personnel can understand, using above-described method to be encrypted, after producing configuration code or registration code, can use identical method in reverse order this coding to be decoded through the configuration code of encryption or the recipient of registration code.For example, after receiving configuration code, first use encryption operator and above-described ASCII character and the First ray table that numeral and English alphabet contrast once to decipher, obtain containing and encrypt number of times or encrypt number of times and the coding that inserts bit digital; By this encryption number of times or encrypt number of times and depart from from coding with inserting together with bit digital, remaining coding is decrypted according to encrypting number of times, finally just can obtain original configuration code or the registration code that machine can read and identify.
Direct beneficial effect of the present invention is that encrypted code is unique, due to using the unique identifier of each product as a part of encrypting, therefore can not produce the identical situation of encrypted code of two products.Meanwhile, adopt the cipher mode of encrypting operator to make the effect of encrypting obtain duplicate protection, unless the particular content of cryptographic algorithm and operator are revealed simultaneously, otherwise be difficult to crack.In addition,, because the Configuration Type to each product and function choosing-item are as a part for encrypted code, therefore every product uses a password can control the unlatching of all functions or close.
Be understandable that the unique ID of above-described machine can also use the coding that other can unique this product of sign, unique sign such as unique ID, unique physical address of network interface card of such as CPU.
Algorithm expansion
Above-described out of order algorithm is inquired about according to the ASCII character array of rearrangement.Be referred to as out of order table here, encrypt operator.Because the order of encrypting operator is random alignment, therefore we can use multiple different encryption operators, and character string is repeatedly encrypted.Encrypt operator for each, also can repeatedly encrypt.Meanwhile, such as, character in the coded string (functional configuration code etc.) that can encrypt needs do the operation of resequencing simultaneously, such as the reach of each character position or after move.According to this kind of mode, can encrypt different results to same character string.
The present invention has used the mode of encrypting operator to be encrypted calculating.As mentioned above, each encryption operator is random generation, and the character string sequence of the encryption operator using while therefore encryption is all not identical.Also can not use encryption operator to be encrypted, but directly solidify a character string sequence of upsetting in algorithm, can realize equally identical effect, the intensity of just encrypting has been lowered.
The present invention can be applied to Anesthesia machine equally, on the electronic equipments such as patient monitor.Cryptographic algorithm itself is applicable to the application that all character types are encrypted simultaneously.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious variations, readjust and substitute and can not depart from protection scope of the present invention.Therefore, although the present invention is described in further detail by above embodiment, the present invention is not limited only to above embodiment, in the situation that not departing from the present invention's design, can also comprise more other equivalent embodiment, and scope of the present invention is determined by appended claim scope.

Claims (10)

1. an encryption method for lung ventilator function apolegamy, is characterized in that, the method comprises the following steps:
S100: the unique identifier of machine and the function code corresponding with function are combined and obtained the first functional configuration code;
S200: use the encryption operator and random the first encryption number of times producing that produce at random to carry out the first encryption to described the first functional configuration code, obtain configuration code, and this configuration code is sent to supplier;
S300: supplier receives described configuration code, uses the method deciphering corresponding with the first encryption, obtains described the first functional configuration code;
S400: supplier identifies checking according to unique identifier and function code in described the first functional configuration code to machine, and require described the first functional configuration code to modify according to user, be set to the second functional configuration code, and use described encryption operator and random the second encryption number of times producing to carry out the second encryption to the second functional configuration code, obtain registration code, and this registration code is sent to user;
S500: user receives above-mentioned registration code and inputs machine, machine uses with described second and encrypts corresponding method deciphering, obtain the second functional configuration code, open or close the function corresponding with this second functional configuration code by reading this second functional configuration code.
2. the encryption method of lung ventilator function apolegamy according to claim 1, is characterized in that, described step S200 also comprises:
S210: use the encryption operator of described random generation and random the first encryption number of times producing to carry out the first encryption to described functional configuration code, obtain the first encrypted code;
S220: described the first encryption number of times is attached to the end of described the first encrypted code, makes the first encryption number of times become a part for the first encrypted code, and use described encryption operator again to encrypt, obtain the configuration code of machine.
3. the encryption method of function apolegamy according to claim 1 and 2, is characterized in that, described first encrypts number of times identifies by double figures, if not enough double-digit, at a high position 0 polishing.
4. the encryption method of function apolegamy according to claim 1, is characterized in that, described step S400 also comprises:
S410: use the encryption operator of described random generation and random the second encryption number of times producing to carry out the second encryption to described the second functional configuration code, obtain the second encrypted code;
S420: encrypt number of times by described second and be attached to described the second encrypted code, make the second encryption number of times become a part for the second encrypted code, and use described encryption operator again to encrypt, obtain described registration code.
5. the encryption method of function apolegamy according to claim 4, is characterized in that, described step S420 also comprises:
S421: produce at random a numerical value I, as inserting figure place, wherein this numerical value I is greater than 1, and is less than the character string figure place of described the second encrypted code;
S422: insert described second at the numerical digit I place of described the second encrypted code and encrypt number of times, and this insertion numerical digit I is attached to the second encrypted code end, making the second encryption number of times and inserting numerical digit becomes a part for the second password;
S423: use described encryption operator once to encrypt again the coding producing in described step S422, obtain described registration code.
6. the encryption method of function apolegamy according to claim 5, is characterized in that, described insertion figure place I and described second encrypts number of times respectively by double figures mark, if not enough double-digit, at a high position 0 polishing.
7. the encryption method of function apolegamy according to claim 1, is characterized in that, the function code corresponding with function produced by following methods:
S1001: function is numbered, and with the corresponding difference in functionalitys of different numerical digits of eight-digit binary number character string, and this digit value is to open function corresponding to this numerical digit at 1 o'clock, otherwise, if this digit value is, close function corresponding to this numerical digit at 0 o'clock;
S1002: described binary coding is scaled to two hexadecimal numerical value, the part using this hexadecimal numerical value as function code.
8. the encryption method of function apolegamy according to claim 1, is characterized in that, the generation of described encryption operator comprises the following steps:
S001: the order increasing progressively with ASCII character is set up the table of comparisons of ASCII character and numeral and English alphabet, obtains First ray table;
S002: reset the order of First ray table, obtain random array, using this random array as described encryption operator.
9. the encryption method of function apolegamy according to claim 8, is characterized in that, the method that uses encryption operator to be encrypted in described step S200 and step S400 comprises the following steps:
S0001: each character C in the character string of acquisition presentation function configuration code iposition P in First ray table ci;
S0002: read in and encrypt position P in operator cion ASCII character A pci;
S0003: the ASCII character A that inquiry obtains at step S0002 in described First ray table pci, obtain and this ASCII character A pcicorresponding character CA apci, using this character relevant position C in the code through encrypting i' on character.
10. the encryption method of function apolegamy according to claim 1, is characterized in that, described the first encryption number of times and second is encrypted number of times and is respectively the random any number producing between 0-99.
CN201210592514.1A 2012-12-29 2012-12-29 A kind of encryption method of machine function apolegamy Active CN103916241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210592514.1A CN103916241B (en) 2012-12-29 2012-12-29 A kind of encryption method of machine function apolegamy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210592514.1A CN103916241B (en) 2012-12-29 2012-12-29 A kind of encryption method of machine function apolegamy

Publications (2)

Publication Number Publication Date
CN103916241A true CN103916241A (en) 2014-07-09
CN103916241B CN103916241B (en) 2017-12-08

Family

ID=51041662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210592514.1A Active CN103916241B (en) 2012-12-29 2012-12-29 A kind of encryption method of machine function apolegamy

Country Status (1)

Country Link
CN (1) CN103916241B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106354523A (en) * 2015-07-15 2017-01-25 北京谊安医疗系统股份有限公司 Breathing machine configuration upgrading method
CN108880812A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and system of data encryption
CN111669406A (en) * 2020-06-28 2020-09-15 山东大学 Safe data transmission method and system for noninvasive ventilator
CN112865970A (en) * 2021-02-20 2021-05-28 普源精电科技股份有限公司 Electronic test equipment and configuration method of matching function

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091485A1 (en) * 2003-09-12 2005-04-28 Tatsuya Imai Method of setting digital certificate to authenticate communication apparatus
CN101601040A (en) * 2006-10-24 2009-12-09 麦德爱普斯股份有限公司 Be used for the system and method for communicating by letter based on adapter with Medical Devices
CN101770374A (en) * 2008-12-26 2010-07-07 北京谊安医疗系统股份有限公司 Machine software function starting method and system
CN201965948U (en) * 2010-12-31 2011-09-07 高秀强 Encrypted wire rod for blood oxygen monitor
CN102631739A (en) * 2012-05-10 2012-08-15 苏州麦迪斯顿医疗科技有限公司 Universal data processing system for ventilator

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091485A1 (en) * 2003-09-12 2005-04-28 Tatsuya Imai Method of setting digital certificate to authenticate communication apparatus
CN101601040A (en) * 2006-10-24 2009-12-09 麦德爱普斯股份有限公司 Be used for the system and method for communicating by letter based on adapter with Medical Devices
CN101770374A (en) * 2008-12-26 2010-07-07 北京谊安医疗系统股份有限公司 Machine software function starting method and system
CN201965948U (en) * 2010-12-31 2011-09-07 高秀强 Encrypted wire rod for blood oxygen monitor
CN102631739A (en) * 2012-05-10 2012-08-15 苏州麦迪斯顿医疗科技有限公司 Universal data processing system for ventilator

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106354523A (en) * 2015-07-15 2017-01-25 北京谊安医疗系统股份有限公司 Breathing machine configuration upgrading method
CN108880812A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and system of data encryption
CN108880812B (en) * 2017-05-09 2022-08-09 北京京东尚科信息技术有限公司 Method and system for data encryption
CN111669406A (en) * 2020-06-28 2020-09-15 山东大学 Safe data transmission method and system for noninvasive ventilator
CN112865970A (en) * 2021-02-20 2021-05-28 普源精电科技股份有限公司 Electronic test equipment and configuration method of matching function

Also Published As

Publication number Publication date
CN103916241B (en) 2017-12-08

Similar Documents

Publication Publication Date Title
US11615411B2 (en) POS system with white box encryption key sharing
CN101765996B (en) Device and method for remote authentication and transaction signatures
WO2018046008A1 (en) Storage design method of blockchain encrypted radio frequency chip
CN100592687C (en) Encryption communication system for generating passwords on the basis of start information on both parties of communication
CN106778205A (en) Verified with the no data storehouse of physics unclonable function
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN102750510A (en) Credible two-dimensional code scheme based on public key infrastructure (PKI) and HASH algorithm
CN105871857A (en) Authentication method, authentication device, authentication system and treatment equipment
CN101485137A (en) Method and apparatus for encrypting/decrypting data
TWI517653B (en) An electronic device and method for cryptographic material provisioning
CN101447870A (en) Safe storage method of private key based on technology of distributed password
CN106055931B (en) Mobile terminal software safe component system and the cipher key system for the system
US20100027786A1 (en) Dynamic encryption authentication
CN108141350A (en) The method of transaction is ensured from non-security terminal
CN103916241A (en) Respiratory machine function selection encryption method
JP2011512562A (en) Random encryption and decryption method for access and communication data
CN110322600A (en) The control method and electronic lock of electronic lock
CN100459495C (en) Password dynamic enciphering inputmethod of public emipering mode
EP3335370B1 (en) Enhanced obfuscation or randomization for secure product identification and verification
ES2708805T3 (en) Payment terminal for shared use
CN105989309A (en) Password
CN107278357B (en) Cryptographic system and method
CN115174261A (en) Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution
CN101424142B (en) Lock, unlocking method thereof, lock administrative center and control method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant