CN102857336A - Encryption method, decryption method and system for dot matrix files - Google Patents

Encryption method, decryption method and system for dot matrix files Download PDF

Info

Publication number
CN102857336A
CN102857336A CN201110180002XA CN201110180002A CN102857336A CN 102857336 A CN102857336 A CN 102857336A CN 201110180002X A CN201110180002X A CN 201110180002XA CN 201110180002 A CN201110180002 A CN 201110180002A CN 102857336 A CN102857336 A CN 102857336A
Authority
CN
China
Prior art keywords
encryption
lattice file
file
lattice
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110180002XA
Other languages
Chinese (zh)
Inventor
李铭
陈晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN201110180002XA priority Critical patent/CN102857336A/en
Publication of CN102857336A publication Critical patent/CN102857336A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides an encryption method, a decryption method and a system for dot matrix files. The encryption method includes the following steps of encrypting the dot matrix files, and storing a secret key for decrypting encrypted dot matrix files into a softdog. By the encryption method, the decryption method and the system, safety and reliability of encryption and decryption of the dot matrix files are improved.

Description

The encryption method, decryption method and the system that are used for lattice file
Technical field
The present invention relates to print field, in particular to the encryption method, decryption method and the system that are used for lattice file.
Background technology
Along with the application of information technology, press is constantly towards the direction progress of digitlization procedure.Under this tendency influence, digital printing work flow software is printed already industry and generally accepts, and becomes pith indispensable in the New Times typography.
Lattice file is as the content vector between digital printing work flow software and output equipment, and its confidentiality quality is directly connected to the commercial interest of content supplier, will cause profound influence to whole industry on long terms.
The inventor finds usually to use in the prior art single software approach that lattice file is carried out encryption and decryption.Yet, because lattice file circumstance complication in transmission and use procedure is changeable, so purely use the effect of single software approach encryption and decryption not ideal.
Summary of the invention
The present invention aims to provide encryption method, decryption method and the system for lattice file, to solve the not high problem of lattice file fail safe of prior art.
In an embodiment of the present invention, provide a kind of encryption method for lattice file, may further comprise the steps: lattice file is encrypted; To be kept at softdog for the key of the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of encryption system for lattice file, having comprised: encryption device is used for lattice file is encrypted; Softdog is used for the key that access is used for the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of decryption method for lattice file, may further comprise the steps: print-out device reads the lattice file of encryption; Print-out device connects softdog, and reads key from softdog; Print-out device adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of decryption system for lattice file, having comprised: softdog is used for access keys; Print-out device is used for reading the lattice file of encryption, and connects softdog, reads key from softdog, adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of encryption method for lattice file, may further comprise the steps: lattice file is encrypted; To be kept at the intelligent encryption dog for key and the decipherment algorithm of the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of encryption system for lattice file, having comprised: encryption device is used for lattice file is encrypted; The intelligent encryption dog is used for preserving key and decipherment algorithm for the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of decryption method for lattice file, may further comprise the steps: print-out device reads the lattice file of encryption; Print-out device connects the intelligent encryption dog, and enables the intelligent encryption dog; The intelligent encryption dog adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
In an embodiment of the present invention, also provide a kind of decryption system for lattice file, having comprised: print-out device, be used for reading the lattice file of encryption, and connect the intelligent encryption dog, enable the intelligent encryption dog; The intelligent encryption dog be used for to preserve is used for key and the decipherment algorithm of the lattice file of enabling decryption of encrypted, when being printed output device and enabling, adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
The encryption method of the above embodiment of the present invention, decryption method and system, because adopted softdog or intelligent encryption dog to the lattice file encryption and decryption, encrypt the not high problem of dot matrix file security so overcome simple employing software mode, improved the security reliability of lattice file encryption and decryption.
Description of drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, consists of the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 shows the flow chart that is used for according to an embodiment of the invention the encryption method of lattice file;
Fig. 2 shows the schematic diagram that is used for according to an embodiment of the invention the encryption system of lattice file;
Fig. 3 shows the flow chart that is used for according to an embodiment of the invention the decryption method of lattice file;
Fig. 4 shows the schematic diagram that is used for according to an embodiment of the invention the decryption system of lattice file;
Fig. 5 shows the flow chart that is used for according to another embodiment of the present invention the encryption method of lattice file;
Fig. 6 shows the schematic diagram that is used for according to another embodiment of the present invention the encryption system of lattice file;
Fig. 7 shows the flow chart that is used for according to another embodiment of the present invention the decryption method of lattice file;
Fig. 8 shows the schematic diagram that is used for according to another embodiment of the present invention the decryption system of lattice file;
Fig. 9 shows the schematic diagram of the encrypting and deciphering system that is used for lattice file in accordance with a preferred embodiment of the present invention;
Figure 10 shows the flow chart of the encrypting and deciphering system execution decipherment algorithm of Fig. 9;
Figure 11 shows and generates according to an embodiment of the invention the preview graph of encrypting lattice file;
Figure 12 shows the pre-aobvious figure of dot matrix content after the deciphering of Figure 11.
Embodiment
Below with reference to the accompanying drawings and in conjunction with the embodiments, describe the present invention in detail.
Fig. 1 shows the flow chart that is used for according to an embodiment of the invention the encryption method of lattice file, may further comprise the steps:
Step S10 encrypts lattice file;
Step S20 will be kept at softdog for the key of the lattice file of enabling decryption of encrypted.
Usually use single software approach that lattice file is encrypted in the prior art.Yet because lattice file circumstance complication in transmission and use procedure is changeable, the effect of purely using single software approach to encrypt is not ideal.And the encryption method of the present embodiment has adopted softdog that lattice file is encrypted, and this encryption lattice file can be to be generated by different approaches, but can only be decrypted by the decruption key in the softdog.Because this is the technical scheme that a kind of software and hardware combines, encrypt the not high problem of dot matrix file security so overcome simple employing software mode, improved the security reliability that lattice file is encrypted.
Fig. 3 shows the flow chart that is used for according to an embodiment of the invention the decryption method of lattice file, may further comprise the steps:
Step S30, print-out device read the lattice file of encryption;
Step S40, print-out device connects softdog, and reads key from softdog;
Step S50, print-out device adopt key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
The equipment output software can correctly be explained, file content can be converted into the discernible form of rear end output equipment and this can be outputed to the rear end output equipment the content of encrypting lattice file.
The decryption method of this embodiment is the decryption method corresponding with the encryption method of Fig. 1 embodiment, can be used for the lattice file that deciphering Fig. 1 embodiment encrypts.
It should be noted that in the middle of practice, encryption method and the decryption method combination of this two embodiment can be realized.Below encryption method and the decryption method of each embodiment, and the encryption system of each embodiment and decryption system be in the middle of practice, can be in conjunction with realizing.
Preferably, step S10 does not allow interrupt in the process of implementation, and the unique lattice file that obtains encrypting of execution result and do not produce alternative document.This perhaps obtains key and the cryptographic algorithm thereof of lattice file, thereby has further improved fail safe so that the invader can't pass through interrupt mode by intermediate file.
Preferably, softdog has sign, also uses this sign when lattice file is encrypted.Adopt the preferred embodiment, even so that the invader has copied key, if do not steal softdog hardware itself, so also because can't obtain the sign of softdog, cause to decipher lattice file, thereby further improved the fail safe of lattice file.
Preferably, softdog has sign, and print-out device also reads sign from softdog, and adopts key and this sign to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.The decryption method of the preferred embodiment can be used for the lattice file that the deciphering above preferred embodiment is encrypted.
Fig. 2 shows the schematic diagram that is used for according to an embodiment of the invention the encrypting and deciphering system of lattice file, comprising:
Encryption device 10 is used for lattice file is encrypted;
Softdog 30 is used for the key that access is used for the lattice file of enabling decryption of encrypted.
This encryption system has adopted softdog that lattice file is encrypted, because this is the technical scheme that a kind of software and hardware combines, encrypts the not high problem of dot matrix file security so overcome simple employing software mode, has improved the security reliability that lattice file is encrypted.
Fig. 4 shows the schematic diagram that is used for according to an embodiment of the invention the decryption system of lattice file, comprising:
Softdog 30 is used for access keys;
Print-out device 20 is used for reading the lattice file of encryption, and connects softdog 30, reads key from softdog 30, adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
The decryption system of this embodiment can be used for the lattice file that the encryption system of deciphering Fig. 3 is encrypted.
Preferably, softdog has sign, also uses this sign when encryption device is encrypted lattice file.Adopt the preferred embodiment, even so that the invader has copied key, if do not steal softdog hardware itself, so also because can't obtain the sign of softdog, cause to decipher lattice file, thereby further improved the fail safe of lattice file.
Preferably, softdog has sign, and print-out device also reads sign from softdog, and adopts key and this sign to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.The decryption system of the preferred embodiment can be used for the lattice file that the encryption system of deciphering above preferred embodiment is encrypted.
Fig. 5 shows the flow chart that is used for according to another embodiment of the present invention the encryption method of lattice file, may further comprise the steps:
Step S15 encrypts lattice file;
Step S25 will be kept at the intelligent encryption dog for key and the decipherment algorithm of the lattice file of enabling decryption of encrypted.
Softdog is a kind of security product that is inserted in the software and hardware combining on the parallel port of computer, and the software developer carries out exchanges data by interface parameters and softdog, is a kind of hardware-based cryptographic of maturation.The development occurred so far four generation product, up-to-date development the 4th generation softdog be the intelligent encryption dog, it is by on stream writing the intelligent encryption dog behind one section code encryption, at the code that moves voluntarily in the intelligent encryption dog in the intelligent encryption dog, its operation result of routine call is finished encryption when program is moved.The intelligent encryption dog has the ability that dog is embedded in code and is placed on run time version in the dog, and extraneous program can only obtain the code execution result by querying command, and this mode has been stopped the possibility that software cracks theoretically.
This encryption method has adopted the intelligent encryption dog that lattice file is encrypted, because this is the technical scheme that a kind of software and hardware combines, encrypt the not high problem of dot matrix file security so overcome simple employing software mode, with respect to softdog, further improved the security reliability that lattice file is encrypted.
It should be noted that, can the decipherment algorithm that be used for the deciphering lattice file be write the intelligent encryption dog temporarily, also can when making the intelligent encryption dog, just embed decipherment algorithm, in this case, should should adopt the cryptographic algorithm corresponding with the decipherment algorithm in the intelligent encryption dog to encrypt lattice file by encryption device.
What carry out in the intelligent encryption dog can be the deciphering core algorithm, is the part in the decipherment algorithm, does not have the participation of this deciphering core algorithm, and decrypting process can't correctly be carried out.Remove the outer whole lattice file decryption logics of core code that embed the intelligent encryption dog and can contain in the equipment output software of print-out device operation, need to call the intelligent encryption dog in the decrypting process and finish whole decrypting process.In a sets of plan, whole decrypting process is definite constant.
Fig. 7 shows the flow chart that is used for according to another embodiment of the present invention the decryption method of lattice file, may further comprise the steps:
Step S35, print-out device read the lattice file of encryption;
Step S45, print-out device connects the intelligent encryption dog, and enables the intelligent encryption dog;
Step S55, the intelligent encryption dog adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
The decryption method of this embodiment is the decryption method corresponding with the encryption method of Fig. 5 embodiment, can be used for the lattice file that deciphering Fig. 1 embodiment encrypts.
Preferably, the step that lattice file is encrypted does not allow interrupt in the process of implementation, and the unique lattice file that obtains encrypting of execution result and do not produce alternative document.This perhaps obtains key and the cryptographic algorithm thereof of lattice file, thereby has further improved fail safe so that the invader can't pass through interrupt mode by intermediate file.
Preferably, the intelligent encryption dog has sign, also uses this sign when lattice file is encrypted.Adopt the preferred embodiment, so that even the invader has copied key, if do not steal intelligent encryption dog hardware itself, so also because can't obtain the sign of intelligent encryption dog, cause to decipher lattice file, thereby further improved the fail safe of lattice file.
Preferably, the intelligent encryption dog has sign, and the intelligent encryption dog adopts key and this sign to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.The decryption method of the preferred embodiment can be used for the lattice file that the deciphering above preferred embodiment is encrypted.
Fig. 6 shows the schematic diagram that is used for according to another embodiment of the present invention the encryption system of lattice file, comprising:
Encryption device 10 is used for lattice file is encrypted;
Intelligent encryption dog 40 is used for preserving the key for the lattice file of enabling decryption of encrypted.
This encryption system has adopted the intelligent encryption dog to the lattice file encryption and decryption, because this is the technical scheme that a kind of software and hardware combines, encrypt the not high problem of dot matrix file security so overcome simple employing software mode, improved the security reliability that lattice file is encrypted.
Fig. 8 shows the schematic diagram that is used for according to another embodiment of the present invention the decryption system of lattice file, comprising:
Print-out device 20 is used for reading the lattice file of encryption, and connects intelligent encryption dog 40, enables intelligent encryption dog 40;
Intelligent encryption dog 40 be used for to preserve is used for key and the decipherment algorithm of the lattice file of enabling decryption of encrypted, when being printed output device 20 and enabling, adopts key to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.
Preferably, the intelligent encryption dog has sign, also uses this sign when encryption device is encrypted lattice file.Adopt the preferred embodiment, so that even the invader has copied key, if do not steal intelligent encryption dog hardware itself, so also because can't obtain the sign of intelligent encryption dog, cause to decipher lattice file, thereby further improved the fail safe of lattice file.
Preferably, the intelligent encryption dog has sign, and the intelligent encryption dog adopts key and this sign to carry out decipherment algorithm, with the lattice file of enabling decryption of encrypted.The decryption system of the preferred embodiment can be used for the lattice file that the encryption system of deciphering above preferred embodiment is encrypted.
It should be noted that cryptographic algorithm that above-mentioned a plurality of embodiment adopts is only required must adopt key to be decrypted, and does not limit what cryptographic algorithm of concrete employing.So long as the cryptographic algorithm that adopts key to be decrypted may be used to the embodiment of the invention.
It should be noted that above-mentioned a plurality of embodiment does not limit each softdog or intelligent encryption dog intelligence can only be stored a key.Therefore embodiments of the invention allow each softdog or intelligent encryption dog intelligence to have enough memory spaces, can store a plurality of keys, a plurality of keys can consist of lattice file of a key string deciphering, also can be used for the encryption and decryption of a plurality of lattice files.
Fig. 9 shows the schematic diagram of the encrypting and deciphering system that is used for lattice file in accordance with a preferred embodiment of the present invention, comprising:
Conversion equipment, the capable of transplant document format file of standard is converted to lattice file, in the present embodiment, the capable of transplant document format file of standard is pdf document, after being translated into lattice file, can generate simultaneously a preview graph as shown in figure 11 checks for user's preview, and arrange according to the order that the user needs that (the former figure of Figure 11 is coloured picture, be respectively from top to bottom the gradual change vitta of indigo plant, magenta, Huang, black and white, brown among the figure, because the cause of printing and publishing, this figure is shown as artwork master);
Encryption device 10 is encrypted lattice file;
Write the decruption key of lattice file in the intelligent encryption dog 40, the deciphering core code can just embed when making the intelligent encryption dog, if enciphering and deciphering algorithm is not made an amendment, then need not again to embed the deciphering core code;
Print-out device 20 comprises: lattice file deciphering module 25; Pre-aobvious module 22 as shown in figure 12, is used for the lattice file (Figure 12 former figure be coloured picture, in figure from top to bottom be respectively the gradual change vitta of indigo plant, magenta, Huang, black and white, brown, because the cause of printing and publishing, this figure be shown as artwork master) of pre-explicit solution after close; Layout module 24 is used for making the large version of layout; Output module 26 is used for the lattice file after output is deciphered; Derive module 28, the lattice file after being used for deciphering everywhere.
Figure 10 shows the flow chart of the encrypting and deciphering system execution decipherment algorithm of Fig. 9, and the present embodiment may further comprise the steps take a pdf document as example:
Step S102, print-out device imports the lattice file of encrypting;
Step S104 inserts the intelligent encryption dog, begins deciphering;
Step S106, print-out device 20 call the intelligent encryption dog and read the encryption key string that records in the intelligent encryption dog;
Step S108 judges whether " return " key" string of intelligent encryption dog, if do not return, then explanation is wrong intelligent encryption dog, finishes decrypting process;
Step S110, if correctly return, lattice file deciphering module 25 reads successively an encryption key and is decrypted processing;
Step S112 submits to intelligent encryption dog 40 to carry out the deciphering core code and obtain execution result in the processing procedure;
Whether step S114 can check decipher correct after deciphering finishes.In generating encryption lattice file process a sign can be set encrypts together in company with the dot matrix content, after deciphering finishes, whether be restored to raw content according to standard and judge whether successful decryption, if judge unsuccessful, then re-execute step S108, get next encryption key and carry out dot matrix deciphering, until judge successfully or all keys Decryption failures all.
From above description, can find out, the above embodiments of the present invention are for the defective that exists in the prior art, dot matrix decruption key, core decipherment algorithm write want third-party softdog or intelligent encryption dog, be used in conjunction with each other by equipment output software and softdog or intelligent encryption dog, the mode of encrypting the correct deciphering of lattice file improved the security reliability of lattice file encryption and decryption.
The present invention is distributed to the dot matrix decrypting process in two kinds of different carriers, guarantees the opaque of decrypting process with softdog or the high confidentiality of intelligent encryption dog, greatly reduces to encrypt the probability that lattice file is illegally cracked.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, carried out by calculation element thereby they can be stored in the storage device, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1. an encryption method that is used for lattice file is characterized in that, may further comprise the steps:
Lattice file is encrypted;
To be kept at softdog for the key of the lattice file of deciphering described encryption.
2. method according to claim 1 is characterized in that, the described step that lattice file is encrypted does not allow interrupt in the process of implementation, and execution result is unique obtains the lattice file of described encryption and do not produce alternative document.
3. method according to claim 1 is characterized in that, described softdog has sign, also uses described sign when described lattice file is encrypted.
4. an encryption system that is used for lattice file is characterized in that, comprising:
Encryption device is used for lattice file is encrypted;
Softdog is used for access for the key of the lattice file of deciphering described encryption.
5. a decryption method that is used for lattice file is characterized in that, may further comprise the steps:
Print-out device reads the lattice file of encryption;
Described print-out device connects softdog, and reads described key from described softdog;
Described print-out device adopts described key to carry out decipherment algorithm, to decipher the lattice file of described encryption.
6. method according to claim 5, it is characterized in that, described softdog has sign, and described print-out device also reads described sign from described softdog, and adopt described key and described sign to carry out decipherment algorithm, to decipher the lattice file of described encryption.
7. a decryption system that is used for lattice file is characterized in that, comprising:
Softdog is used for access keys;
Print-out device is used for reading the lattice file of described encryption, and connects described softdog, reads described key from described softdog, adopts described key to carry out decipherment algorithm, to decipher the lattice file of described encryption.
8. an encryption method that is used for lattice file is characterized in that, may further comprise the steps:
Lattice file is encrypted;
To be kept at the intelligent encryption dog for key and the decipherment algorithm of the lattice file of deciphering described encryption.
9. method according to claim 8 is characterized in that, the described step that lattice file is encrypted does not allow interrupt in the process of implementation, and execution result is unique obtains the lattice file of described encryption and do not produce alternative document.
10. method according to claim 8 is characterized in that, described intelligent encryption dog has sign, also uses described sign when described lattice file is encrypted.
11. an encryption system that is used for lattice file is characterized in that, comprising:
Encryption device is used for lattice file is encrypted;
The intelligent encryption dog is used for preserving key and decipherment algorithm for the lattice file of deciphering described encryption.
12. a decryption method that is used for lattice file is characterized in that, may further comprise the steps:
Print-out device reads the lattice file of encryption;
Described print-out device connects the intelligent encryption dog, and enables described intelligent encryption dog;
Described intelligent encryption dog adopts described key to carry out described decipherment algorithm, to decipher the lattice file of described encryption.
13. method according to claim 12 is characterized in that, described intelligent encryption dog has sign, and described intelligent encryption dog adopts described key and described sign to carry out decipherment algorithm, to decipher the lattice file of described encryption.
14. a decryption system that is used for lattice file is characterized in that, comprising:
Print-out device is used for reading the lattice file of described encryption, and connects the intelligent encryption dog, enables the intelligent encryption dog;
The intelligent encryption dog is used for preserving key and decipherment algorithm for the lattice file of deciphering described encryption, when being enabled by described print-out device, adopts described key to carry out described decipherment algorithm, to decipher the lattice file of described encryption.
CN201110180002XA 2011-06-28 2011-06-28 Encryption method, decryption method and system for dot matrix files Pending CN102857336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110180002XA CN102857336A (en) 2011-06-28 2011-06-28 Encryption method, decryption method and system for dot matrix files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110180002XA CN102857336A (en) 2011-06-28 2011-06-28 Encryption method, decryption method and system for dot matrix files

Publications (1)

Publication Number Publication Date
CN102857336A true CN102857336A (en) 2013-01-02

Family

ID=47403548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110180002XA Pending CN102857336A (en) 2011-06-28 2011-06-28 Encryption method, decryption method and system for dot matrix files

Country Status (1)

Country Link
CN (1) CN102857336A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598873A (en) * 2004-08-17 2005-03-23 顾泽苍 Network screen coding control method capable of recording mass data on paper
CN101537751A (en) * 2009-04-10 2009-09-23 顾泽苍 Novel method for processing anti-counterfeit printing
CN101719246A (en) * 2009-12-04 2010-06-02 佛山市安讯智能科技有限公司 Method for authenticating and fast outputting soft-dog of text electronic seal
CN101917267A (en) * 2010-08-13 2010-12-15 福州星网视易信息系统有限公司 Method for storing random key based on encryption file capable of storing softdog

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598873A (en) * 2004-08-17 2005-03-23 顾泽苍 Network screen coding control method capable of recording mass data on paper
CN101537751A (en) * 2009-04-10 2009-09-23 顾泽苍 Novel method for processing anti-counterfeit printing
CN101719246A (en) * 2009-12-04 2010-06-02 佛山市安讯智能科技有限公司 Method for authenticating and fast outputting soft-dog of text electronic seal
CN101917267A (en) * 2010-08-13 2010-12-15 福州星网视易信息系统有限公司 Method for storing random key based on encryption file capable of storing softdog

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834868A (en) * 2015-04-28 2015-08-12 一铂有限公司 Electronic data protection method, device and terminal equipment

Similar Documents

Publication Publication Date Title
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
US20040260923A1 (en) Content processing apparatus and content protection program
CN101533654B (en) Apparatus, method, and computer program product for processing information
CN106100850B (en) Intelligent and safe chip signing messages transmission method and system based on two dimensional code
CN101854243B (en) Circuit system design encryption circuit and encryption method thereof
CN101719205B (en) Digital copyright management method and system
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
CN109767375A (en) The method and system of image watermark insertion and retrospect
US20080208886A1 (en) Encryption based silicon IP protection
WO2017045594A1 (en) Anti-counterfeit method
CN105229965A (en) Equipment identification system and equipment authenticating method
CN101968834A (en) Encryption method and device for anti-copy plate of electronic product
CN101685425A (en) Mobile storage device and method of encrypting same
CN105207773A (en) Method, system and device for management, synchronization and backup of data encryption key
CN1979511B (en) File data safety management system and method
CN106059762A (en) Data security processing method and apparatus
CN104142803A (en) Method for copy-protected storage of information on a data carrier
JP2009135890A (en) Encryption apparatus, decryption apparatus, and cryptography system
CN101739532B (en) Method and system for processing digital content according to a workflow
CN104616039A (en) Card sending method and card sending device for RFID label
CN112039876A (en) Data ferrying method, device, equipment and medium
CN102857336A (en) Encryption method, decryption method and system for dot matrix files
CN206907059U (en) China second-generation identity card reads encryption system
CN215182077U (en) Intelligent processing module for project file subsection itemizing
CN111611603B (en) Safe volume production control equipment of SATA interface

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130102