CN102594561A - Password changing type encryption method of numerical control system access rights - Google Patents

Password changing type encryption method of numerical control system access rights Download PDF

Info

Publication number
CN102594561A
CN102594561A CN2012100297216A CN201210029721A CN102594561A CN 102594561 A CN102594561 A CN 102594561A CN 2012100297216 A CN2012100297216 A CN 2012100297216A CN 201210029721 A CN201210029721 A CN 201210029721A CN 102594561 A CN102594561 A CN 102594561A
Authority
CN
China
Prior art keywords
img
password
jpg
gif
portrait
Prior art date
Application number
CN2012100297216A
Other languages
Chinese (zh)
Inventor
周辉
刘翔云
刘洪亮
盛超丰
Original Assignee
济南二机床集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 济南二机床集团有限公司 filed Critical 济南二机床集团有限公司
Priority to CN2012100297216A priority Critical patent/CN102594561A/en
Publication of CN102594561A publication Critical patent/CN102594561A/en

Links

Abstract

The invention relates to a password changing type encryption method of numerical control system access rights, which is characterized by including: a. judging the powering up state; if numerical control system is not powered up again, b is performed; otherwise, d is performed; b. judging period of validity, if existing passwords are in the period of validity, d is performed; otherwise, c is performed; c. maintaining the existing passwords unchanged; d. generating password seeds, the number of the seeds is positive integer and >=2; e. calculating the function value based on the password seeds, and the function value is a current password; f. judging whether a password input by users is correct. According to the encryption method, new password seeds are generated by powering up again on the numerical control system or after the end of the password validity period, and the formula for calculating passwords based on the password seeds are grasped by relevant authorized officers, accordingly, even though a password is carelessly leaked to non-authorized officers, the password can be used only once, reliable protection for important data of the numerical control system is achieved to the largest extent.

Description

The variation cipher encryption method of digital control system access right
Technical field
The present invention relates to a kind of variation cipher encryption method of digital control system access right, in particular, relate in particular to a kind of variation cipher encryption method that produces the digital control system access right of random cipher according to the random number that produces.
Background technology
Cryptoguard is as a kind of effective protected mode of numerical control device; Its protection numerical control device is avoided unauthorized personnel's operation; For example the SIEMENS digital control system has 3 grades of password access authorities, relates to the read-write protection of significant datas such as lathe parameter, global variable, initialization files.Because what it adopted is fixed password, makes that the fail safe of this protection mechanism is lower, can't prevent unauthorized personnel's access system significant data effectively; In case the parameter in the machine tool system, variable or initialization files are modified, can cause technology to be revealed or the initiation misoperation, cause the loss that is difficult to remedy.
Summary of the invention
The present invention provides a kind of variation cipher encryption method that produces the digital control system access right of random cipher according to the random number that produces in order to overcome the shortcoming of above-mentioned technical problem.
The variation cipher encryption method of digital control system access right of the present invention, its special feature is, may further comprise the steps: the judgement that powers on of a. system, whether digital control system is judged for re-powering; If not re-powering execution in step b; Like system for re-powering execution in step d; B. cryptographic validity is judged, whether existing password is judged before the deadline; If execution in step d not before the deadline; If execution in step c before the deadline; C. keep existing password constant; D. produce cryptographic seed; Produce<img file=" 339865DEST_PATH_IMAGE001.GIF " he=" 16 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> individual positive integer stochastic variable, each stochastic variable is as the cryptographic seed that generates password; Wherein,<img file=" 729258DEST_PATH_IMAGE001.GIF " he=" 16 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> is positive integer,<img file=" 13609DEST_PATH_IMAGE001.GIF " he=" 16 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " >=2; E. according to<img file=" 426135DEST_PATH_IMAGE001.GIF " he=" 16 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> the individual cryptographic seed that produces in the steps d; Calculate the functional value of function<img file=" 250872DEST_PATH_IMAGE002.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 120 " />, this functional value is as the current password of digital control system; Wherein<img file=" 432455DEST_PATH_IMAGE003.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 97 " /> is positive integer; F. the password correctness is judged, whether the password that judges is keyed in is identical with current password, and as identical, then the system password lock is opened; As inequality, then coded lock keeps shut.Among the step a, re-power, then need produce new password like system; Among the step b, the term of validity end like password also need produce new password; In the steps d, <img file=" 950024DEST_PATH_IMAGE001.GIF " he=" 16 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> individual cryptographic seed is the positive integer that produces at random; Calculate current password according to function <img file=" 849846DEST_PATH_IMAGE002.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 120 " /> among the step e.
The variation cipher encryption method of digital control system access right of the present invention; Said establishes 3 cryptographic seed and is respectively a, b, c, and the amount of a that produces in the steps d, b, c is respectively: a=Random (x; X+1; X+2 ..., y) y>and x>0; B=Random (m, m+1, m+2 ..., n) n>and m>0; C=Random (v, v+1, v+2 ..., u) u>and v>0;
Among the step e, the expression formula that generates the function of password is:
Function<img file=" 589952DEST_PATH_IMAGE007.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 17 " />,<img file=" 694175DEST_PATH_IMAGE008.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> and<img file=" 850349DEST_PATH_IMAGE009.GIF " he=" 25 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> be three with a; B is the functional expression of independent variable, selects for use which function to produce the value decision of password by c; Wherein a, b, c, x, m, v, y, n, u are positive integer; And<img file=" 709721DEST_PATH_IMAGE010.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 16 " />≤v,<img file=" 318557DEST_PATH_IMAGE011.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 18 " >=u; Random () is for produce the positive integer in the bracket at random.<img file=" 554366DEST_PATH_IMAGE005.GIF " he=" 22 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 84 " /> is with a; B; C is the piecewise function of independent variable, and it adopts <img file=" 565047DEST_PATH_IMAGE007.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 17 " />, <img file=" 533003DEST_PATH_IMAGE008.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> or <img file=" 691452DEST_PATH_IMAGE009.GIF " he=" 25 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> relevant with the value of c.
The variation cipher encryption method of digital control system access right of the present invention, the password that said function produces are 5 to 6 positive integer.Select for use and each cryptographic seed of password formula the confirming of the positive integer collection that produces of relying should be taken into account the decoding difficulty of password and two aspects of convenience of calculating.The password formula is more complicated, the decoding difficulty of the bigger then password of positive integer collection number range is big more, but also makes the difficulty of calculating password increase.From the angle of actual needs, it also is unnecessary decoding difficulty excessive simultaneously, therefore can make compromisely between the two above, and the positive integer of choosing 5 to 6 is comparatively suitable as password.
The variation cipher encryption method of digital control system access right of the present invention, after digital control system powered on, cryptographic seed information can be obtained arbitrarily.Only guaranteed cryptographic seed information is open to everyone, could guarantee that operating personnel pass through cryptographic seed according to the cryptographic calculations function, calculate corresponding password.
The variation cipher encryption method of digital control system access right of the present invention after this changes the cipher encryption method, also comprises the step of importing fixed password code.This just is equivalent to combine variation cipher encryption method of the present invention with existing fixed formula password code, makes its secret effect better.
The invention has the beneficial effects as follows: variation cipher encryption method of the present invention; Through re-powering in digital control system or after cryptographic validity finishes, producing new cryptographic seed, and grasped by the associated authorization personnel according to the formula of cryptographic seed calculating password; Even certain password is revealed accidentally and is given the unauthorized person like this; Also only can use once, realize that to greatest extent beneficial effect is remarkable to the reliably protecting of digital control system significant data.
Description of drawings
Fig. 1 is the schematic diagram of variation cipher of the present invention encryption side;
Fig. 2 is the program flow diagram of variation cipher of the present invention encryption side.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further.
As Fig. 1 and Fig. 2 provide the schematic diagram and the program flow diagram of variation cipher of the present invention encryption side, it may further comprise the steps:
Whether a. system's judgement that powers on is judged for re-powering digital control system; If not re-powering execution in step b; Like system for re-powering execution in step d;
B. cryptographic validity is judged, whether existing password is judged before the deadline; If execution in step d not before the deadline; If execution in step c before the deadline;
C. keep existing password constant;
D. produce cryptographic seed, produce a, b, three positive integer stochastic variables of c, each stochastic variable is as the cryptographic seed that generates password; The formula that produces stochastic variable is following:
a=Random(x,x+1,x+2,…,y) y>x>0;
b=Random(m,m+1,m+2,…,n) n>m>0;
c=Random(v,v+1,v+2,…,u) u>v>0;
Random () is for produce the positive integer in the bracket at random; Wherein x, m, v, y, n, u are positive integer,
E-1. obtain cryptographic seed, obtain cryptographic seed through man-machine interface;
E-2. according to 3 cryptographic seed that produce in the steps d; To the formula authorized person place of calculating password; Calculate the functional value of function , this functional value is as the current password of digital control system; Computing formula is:
Function<img file=" 52846DEST_PATH_IMAGE007.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 17 " />,<img file=" 364879DEST_PATH_IMAGE008.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> and<img file=" 350153DEST_PATH_IMAGE009.GIF " he=" 25 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> be three with a; B is the functional expression of independent variable, selects for use which function to produce the value decision of password by c; Wherein a, b, c are positive integer; And<img file=" 722228DEST_PATH_IMAGE010.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 16 " />≤v,<img file=" 792952DEST_PATH_IMAGE011.GIF " he=" 24 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 18 " >=u;
D. the password correctness is judged, whether the password that judges is keyed in is identical with current password, and as identical, then the system password lock is opened; As inequality, then coded lock keeps shut.
In the said method step; The number of cryptographic seed can be for a plurality of; The password figure place that produces can be 5~6, and select for use and each cryptographic seed of password formula the confirming of the positive integer collection that produces of relying should be taken into account the decoding difficulty of password and two aspects of convenience of calculating.The password formula is more complicated, the decoding difficulty of the bigger then password of positive integer collection number range is big more, but also makes the difficulty of calculating password increase.From the angle of actual needs, it also is unnecessary decoding difficulty excessive simultaneously, therefore can above make between the two compromise.
Fixed cryptoguard mechanism is adopted in original digital control system access right control, reveals accidentally in case its defective is password, and then the significant data of digital control system is in not shielded state fully.The present invention is a kind of type variable cryptoguard technology; Each digital control system starts all can have a new password to produce; Password must calculate through cryptographic seed, and Calculation Method has only the authorized person to grasp, even certain password is revealed to the unauthorized person accidentally like this; Also only can use once, so just realize reliably protecting to greatest extent the digital control system significant data.Cryptographic seed allows anyone the man-machine interface inquiry through digital control system to obtain, but the password formula then should guarantee only to be grasped by the associated authorization personnel.

Claims (5)

1. the variation cipher encryption method of a digital control system access right is characterized in that, may further comprise the steps:
Whether a. system's judgement that powers on is judged for re-powering digital control system; If not re-powering execution in step b; Like system for re-powering execution in step d;
B. cryptographic validity is judged, whether existing password is judged before the deadline; If execution in step d not before the deadline; If execution in step c before the deadline;
C. keep existing password constant;
D. produce cryptographic seed; Produce<img file=" 2012100297216100001DEST_PATH_IMAGE001.GIF " he=" 16 " id=" ifm0001 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> individual positive integer stochastic variable, each stochastic variable is as the cryptographic seed that generates password; Wherein,<img file=" 281792DEST_PATH_IMAGE001.GIF " he=" 16 " id=" ifm0002 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " /> is positive integer,<img file=" 976078DEST_PATH_IMAGE001.GIF " he=" 16 " id=" ifm0003 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 14 " >=2;
E. according to the individual cryptographic seed that produces in the steps d; Calculate the functional value of function , this functional value is as the current password of digital control system; Wherein is positive integer;
F. the password correctness is judged, whether the password that judges is keyed in is identical with current password, and as identical, then the system password lock is opened; As inequality, then coded lock keeps shut.
2. the variation cipher encryption method of digital control system access right according to claim 1; It is characterized in that: said ; If 3 cryptographic seed are respectively a, b, c, the amount of a that produces in the steps d, b, c is respectively:
a=Random(x,x+1,x+2,…,y) y>x>0;
b=Random(m,m+1,m+2,…,n) n>m>0;
c=Random(v,v+1,v+2,…,u) u>v>0;
Among the step e, the expression formula that generates the function of password is:
Function<img file=" 2012100297216100001DEST_PATH_IMAGE007.GIF " he=" 24 " id=" ifm0010 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 17 " />,<img file=" 886091DEST_PATH_IMAGE008.GIF " he=" 24 " id=" ifm0011 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> and<img file=" 2012100297216100001DEST_PATH_IMAGE009.GIF " he=" 25 " id=" ifm0012 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 20 " /> be three with a; B is the functional expression of independent variable, selects for use which function to produce the value decision of password by c; Wherein a, b, c, x, m, v, y, n, u are positive integer; And<img file=" 215441DEST_PATH_IMAGE010.GIF " he=" 24 " id=" ifm0013 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 16 " />≤v,<img file=" DEST_PATH_IMAGE011.GIF " he=" 24 " id=" ifm0014 " img-content=" drawing " img-format=" jpg " inline=" no " orientation=" portrait " wi=" 18 " >=u; Random () is for produce the positive integer in the bracket at random.
3. the variation cipher encryption method of digital control system access right according to claim 2 is characterized in that: the password that said function produces is 5 to 6 a positive integer.
4. the variation cipher encryption method of digital control system access right according to claim 1 and 2 is characterized in that: after digital control system powered on, cryptographic seed information can be obtained arbitrarily.
5. the variation cipher encryption method of digital control system access right according to claim 1 and 2 is characterized in that: after this variation cipher encryption method, also comprise the step of importing fixed password code.
CN2012100297216A 2012-02-10 2012-02-10 Password changing type encryption method of numerical control system access rights CN102594561A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100297216A CN102594561A (en) 2012-02-10 2012-02-10 Password changing type encryption method of numerical control system access rights

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100297216A CN102594561A (en) 2012-02-10 2012-02-10 Password changing type encryption method of numerical control system access rights

Publications (1)

Publication Number Publication Date
CN102594561A true CN102594561A (en) 2012-07-18

Family

ID=46482786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100297216A CN102594561A (en) 2012-02-10 2012-02-10 Password changing type encryption method of numerical control system access rights

Country Status (1)

Country Link
CN (1) CN102594561A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000065A (en) * 2020-08-14 2020-11-27 广东科杰机械自动化有限公司 Control method, device and equipment of machine tool

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
CN101510244A (en) * 2009-03-12 2009-08-19 深圳市优密科技有限公司 Display module, password generating system with display function and method thereof
CN101763473A (en) * 2008-12-25 2010-06-30 佛山市顺德区汉达精密电子科技有限公司 Variable cipher device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
CN1937498A (en) * 2006-10-09 2007-03-28 网之易信息技术(北京)有限公司 Dynamic cipher authentication method, system and device
CN101763473A (en) * 2008-12-25 2010-06-30 佛山市顺德区汉达精密电子科技有限公司 Variable cipher device and method
CN101510244A (en) * 2009-03-12 2009-08-19 深圳市优密科技有限公司 Display module, password generating system with display function and method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000065A (en) * 2020-08-14 2020-11-27 广东科杰机械自动化有限公司 Control method, device and equipment of machine tool

Similar Documents

Publication Publication Date Title
US10666436B2 (en) Federated key management
JP2020009500A (en) Data security service
JP6542962B2 (en) Delayed data access
CA2527836C (en) An in-circuit security system and methods for controlling access to and use of sensitive data
US20190098001A1 (en) Secure authorization systems and methods
JP6430540B2 (en) Portable identity verification device based on biometric authentication
US8183980B2 (en) Device authentication using a unidirectional protocol
Schneier Cryptographic design vulnerabilities
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
ES2632795T3 (en) Payment system
CN100386740C (en) Systems and methods for detecting a security breach in a computer system
US9992023B2 (en) System for transparent authentication across installed applications
CN105933119B (en) A kind of authentication method and equipment
CN101272237B (en) Method and system for automatically generating and filling login information
JP2016515235A (en) Policy enforcement with relevant data
CN103502992B (en) For the system and method for anti-tamper guiding
CN201408535Y (en) Trusted hard disk facing to trusted computation cryptograph supporting platform
CN101350724B (en) Encrypting method base on biology characteristic information
CN100412840C (en) User identification with improved password input method
CN101364984B (en) Method for guarantee safety of electronic file
CN100446022C (en) Method for safely dispensing electronic document
CN103763313B (en) File protection method and system
CN106953724A (en) The method of dynamic encryption formula fingerprint sensor and dynamic encryption finger print data
CN101419652B (en) Software and hardware combined program protecting method
CN104751036B (en) A kind of computer information safe system

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120718

C05 Deemed withdrawal (patent law before 1993)