CN103248477A - Dynamic encryption method and device - Google Patents
Dynamic encryption method and device Download PDFInfo
- Publication number
- CN103248477A CN103248477A CN2013101525515A CN201310152551A CN103248477A CN 103248477 A CN103248477 A CN 103248477A CN 2013101525515 A CN2013101525515 A CN 2013101525515A CN 201310152551 A CN201310152551 A CN 201310152551A CN 103248477 A CN103248477 A CN 103248477A
- Authority
- CN
- China
- Prior art keywords
- password
- cryptographic session
- session frame
- eject
- clear crytpographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention is applicable to the technical field of electron and provides a dynamic encryption method and a dynamic encryption device. The dynamic encryption method comprises the steps as follows: recording dynamic operation information including total operation days, total operation time and pop-up time of a password dialog box; operating to obtain advanced encryption password and secondary encryption password according to a preset operation rule; and carrying out encryption by using the advanced encryption password and the secondary encryption password. According to the invention, the password is dynamically calculated, and in different time periods, control is achieved via different passwords, so that the problems that in the prior art the confidentiality is low and multi-user operation confidentiality can not be satisfied are solved.
Description
Technical field
The invention belongs to electronic technology field, relate in particular to a kind of dynamic encrypting method and device.
Background technology
Electronic equipment is because the information of storage or broadcast has certain privacy at present, therefore the user generally adopts password that electronic equipment is encrypted, but encrypting generally is fixed password, though perhaps be fixed password, regularly change by artificial the realization, when having a plurality of users to operate for electronic equipment, adopt the fixed password confidentiality good inadequately, can not satisfy the confidentiality demand of multi-user operation.
Summary of the invention
The object of the invention is to provide a kind of dynamic encrypting method and device, and is bad with the confidentiality that the solution prior art exists, and can not satisfy the problem of the confidentiality demand of multi-user operation.
Embodiments of the invention are achieved in that a kind of dynamic encrypting method, said method comprising the steps of:
Record operation multidate information, described multidate information comprise that the total fate of operation, operation total time and cryptographic session frame eject number of times;
According to default operation rule, computing obtains superencipherment password and secondary Crypted password;
Use described superencipherment password and described secondary Crypted password to be encrypted.
Embodiments of the invention are achieved in that a kind of dynamic resolution decryption method, said method comprising the steps of:
According to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises the total fate of operation, described prestored information comprises that the preset password dialog box ejects fate at interval;
Receive the clear crytpographic key of input;
Determine the rank of described clear crytpographic key;
Rank according to described clear crytpographic key is decrypted.
Another purpose of embodiments of the invention is to provide a kind of dynamic encrypting device, and described device comprises:
Record cell is used for record operation multidate information, and described operation multidate information comprises that the total fate of operation, operation total time and cryptographic session frame eject number of times;
Arithmetic element is used for according to default operation rule, and computing obtains superencipherment password and secondary Crypted password;
Ciphering unit is used for using described superencipherment password and secondary Crypted password to be encrypted.
Another purpose of embodiments of the invention is to provide a kind of dynamic decryption device, and described device comprises:
Eject password unit, for according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises that TV moves total fate, and described prestored information comprises the default cryptographic session frame fate interval of ejecting;
Receive password unit, be used for receiving the clear crytpographic key of input;
Determine level units, be used for determining the rank of described clear crytpographic key;
Decrypting device is used for being decrypted according to the rank of described clear crytpographic key.
The present invention realizes different time sections by password is realized dynamic calculation, controls by different passwords, and the confidentiality that has solved the prior art existence is bad, can not satisfy the problem of multi-user operation confidentiality demand.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the realization flow figure of the dynamic encrypting method that provides of the embodiment of the invention;
Fig. 2 is the realization flow figure of the dynamic resolution decryption method that provides of the embodiment of the invention;
Fig. 3 is the modular structure figure of the dynamic encrypting device that provides of the embodiment of the invention;
Fig. 4 is the modular structure figure of the dynamic decryption device that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explaining the present invention, and be not used in restriction the present invention.
The embodiment of the invention provides dynamic encrypting method, and the executive agent of described method is the dynamic encryption television equipment, described method as shown in Figure 1, concrete steps comprise:
S11, record operation multidate information.
In the present embodiment, the main body of executive logging operation multidate information comprises electronic equipments such as television set, computer, and described operation multidate information includes but not limited to move total fate, operation total time and cryptographic session frame and ejects number of times.
Need to prove that operation is that electronic equipments such as TV or computer dispatch from the factory after the zero clearing data total time, again start record operation total time just, the unused time did not calculate in operation total time, and shutdown is to TV operation total time zero clearing; Move total fate for the zero clearing data of dispatching from the factory after, move fate total start shooting again with regard to the opening entry TV, even TV shutdown, still record television is moved total fate, it is integer that the TV of record moves total fate, less than 24 hours by 1 day record.
S12, the default operation rule of basis, computing obtains superencipherment password and secondary Crypted password.
In the present embodiment, adopt the mode of two-stage password to be encrypted, described two-stage password comprises superencipherment password and secondary Crypted password, described superencipherment password has the authority of the overall situation, here Quan Ju authority refers to any cryptographic session frame, all use the superencipherment password to be encrypted, be encrypted and be decrypted with secondary Crypted password with the superencipherment password in addition.
Particularly, the method for realization S12 comprises:
According to default operation rule, to described operation multidate information with according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password.
In the present embodiment, prestored information includes but not limited to initial password, media interviews control (Media Access Control, MAC) address, the preset password dialog box ejects fate and cryptographic session frame ejection frequency threshold value at interval, initial password is the password that electronic equipment arranges when dispatching from the factory, the client can inform by the mode of specification in manufacturer, MAC Address is address fixing when dispatching from the factory, the MAC Address of every electronic equipment is all different, the preset password dialog box ejects the interval fate and is used for the time that the cryptographic session frame ejects is controlled, and the cryptographic session frame ejects frequency threshold value and is used for calculating and the encryption of secondary Crypted password are controlled.
Need to prove, when the cryptographic session frame ejects number of times greater than cryptographic session frame ejection frequency threshold value, continue to eject the cryptographic session frame, do not eject the corresponding secondary Crypted password of number of times but do not calculate the cryptographic session frame, do not use secondary Crypted password that dialog box is encrypted.
Further concrete, according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and comprise:
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move;
Wherein, described MainP represents the superencipherment password.
Above-mentioned implementation only is the optional superencipherment pin mode that calculates, can also adopt other modes to calculate by operation multidate information and/or prestored information, the people who generally only electronic equipment is had authority at the highest level for superencipherment cryptographic calculations mode grasps.
Further concrete, according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain secondary Crypted password and comprise:
According to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
Eject frequency threshold value when the cryptographic session frame ejects number of times greater than the cryptographic session frame, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
Need to prove, at first calculate the frame of cryptographic session for the first time in the said method and eject corresponding secondary Crypted password, the calculating of the corresponding secondary Crypted password of the frame of cryptographic session for the second time ejection number of times depends on the frame of cryptographic session for the first time and ejects corresponding secondary Crypted password, and the rest may be inferred.
Further, described according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the corresponding secondary Crypted password of cryptographic session frame ejection number of times and be specially:
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents that the cryptographic session frame ejects number of times, SubP (N) expression cryptographic session frame ejects corresponding secondary Crypted password the N time, POPN<<SubP (N-1) expression ejects the N position that inferior cryptographic session frame (N-1) ejects corresponding secondary Crypted password, when N is 1, SubP0 represents initial password, and described t ejects fate at interval for the preset password dialog box.
According to said method, can calculate for the first time that the cryptographic session frame ejects corresponding secondary Crypted password, the frame of cryptographic session for the second time ejects corresponding secondary Crypted password, equal the cryptographic session frame and eject frequency threshold value until the cryptographic session frame ejects number of times.
Suppose that it is 10 that the cryptographic session frame ejects frequency threshold value, once can calculate the cryptographic session frame according to said method and eject ten cryptographic session frames of corresponding secondary Crypted password to for the first time and eject corresponding secondary Crypted password.
S13, the described superencipherment password of use and described secondary Crypted password are encrypted.
Particularly, the method for realization S13 comprises:
Use described superencipherment password that all cryptographic session frames are encrypted and when the cryptographic session frame ejects number of times and ejects frequency threshold value smaller or equal to the cryptographic session frame, use described secondary Crypted password that corresponding cryptographic session frame is encrypted.
Equaling 10 with cryptographic session frame ejection frequency threshold value is example, the superencipherment password is to all cryptographic session frames, ejecting corresponding secondary Crypted password for the first time with the cryptographic session frame is encrypted the cryptographic session frame that ejects for the first time, ejecting corresponding secondary Crypted password for the second time with the cryptographic session frame is encrypted the cryptographic session frame that ejects for the second time, and the like, be encrypted up to eject the cryptographic session frame of corresponding secondary Crypted password to the tenth ejection for the tenth time with the cryptographic session frame.
In the present embodiment, calculate superencipherment password and cryptographic session frame respectively and eject corresponding secondary Crypted password for the first time, and calculate the cryptographic session frame successively and eject corresponding secondary Crypted password for the second time and eject corresponding secondary Crypted password to cryptographic session frame the tenth time, the user who does not understand this cover operation rule and essential information is difficult to crack superencipherment password and secondary Crypted password, can reach the better effect of confidentiality, and according to different periods modification passwords, has confidentiality preferably, used by different user according to superencipherment password and secondary Crypted password in addition, can solve the problem of multi-user operation confidentiality.
The embodiment of the invention provides the dynamic resolution decryption method, and the executive agent of described method is dynamic resolution cipher telegram view apparatus, described method as shown in Figure 2, concrete steps comprise:
S21, according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame.
In the present embodiment, the operation multidate information includes but not limited to move total time, the total fate of operation and cryptographic session frame and ejects number of times, comprise prestored information initial password, MAC Address, preset password dialog box eject fate and cryptographic session frame ejection frequency threshold value at interval, when preset rules ejects cryptographic session frame fate interval integral multiple for move total fate when TV for presetting, eject the cryptographic session frame.
For example, arrange 30 days in the prestored information and be that the preset password dialog box ejects fate at interval, the total fate of putting down in writing in the operation multidate information of operation is 30 days, 60 days, waited in 90 days when being the fate of 30 days integral multiples, and can eject the cryptographic session frame.
The clear crytpographic key of S22, reception input.
S23, determine the rank of described clear crytpographic key.
Need to prove, when being encrypted, rank and the authority of superencipherment password and secondary Crypted password have been determined, when clear crytpographic key equals the superencipherment password, this clear crytpographic key is senior clear crytpographic key, when clear crytpographic key equaled secondary Crypted password, this clear crytpographic key was secondary clear crytpographic key.The user calculates clear crytpographic key by default operation rule, TV operation multidate information and the prestored information that obtains television encryption.
Optionally, realize that described S23 comprises:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
Need to prove, secondary clear crytpographic key has a plurality of, secondary clear crytpographic key is corresponding with cryptographic session frame ejection number of times, suppose that a secondary clear crytpographic key is that corresponding dialog box ejection number of times is 3 o'clock clear crytpographic key, when but cryptographic session is ejected for the 2nd time, it also is wrong importing this secondary clear crytpographic key, can not be decrypted.
S24, be decrypted according to the rank of described clear crytpographic key.
The method of specific implementation S24 is specially:
When clear crytpographic key is senior clear crytpographic key, be decrypted and no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, so that when the total fate of operation ejects the integral multiple of interval fate for the preset password dialog box, eject the cryptographic session frame again.
Need to prove that not exclusively deciphering refers to the follow-up cryptographic session frame that ejects again.
Present embodiment can arrive the effect that password is effectively managed by classification, for example certain customers only allow a period of time TV is operated and to be watched, perhaps certain customers only allow a period of time visit computer, can allow it understand secondary clear crytpographic key computational methods and relevant information, it only can be decrypted TV in the part-time section.
Optionally, said method also comprises:
When receive clear crytpographic key errors number when reaching 5 times, shutdown automatically.
In the present embodiment, by errors number is limited, prevent that the user is by ceaselessly attempting carrying out the possibility of decryption.
The embodiment of the invention provides dynamic encrypting device, and described device specifically comprises as shown in Figure 3:
Ciphering unit 33 is used for using described superencipherment password and secondary Crypted password to be encrypted.
Optionally, described arithmetic element 32 specifically is used for:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises that initial password, media interviews control MAC Address, preset password dialog box eject at interval fate and eject cryptographic session frame threshold value.
Optionally, described arithmetic element 32 comprises:
Superencipherment crypto-operation module 321 and secondary Crypted password computing module 322.
Superencipherment crypto-operation module 321 is used for according to default operation rule, described operation multidate information and/or prestored information is carried out computing obtain described superencipherment password, and described MainP represents the superencipherment password,
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move.
Secondary Crypted password computing module 322, be used for according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
When the cryptographic session frame ejects number of times greater than ejecting cryptographic session frame threshold value, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
Optionally, described secondary Crypted password computing module 322 is further used for:
When the cryptographic session frame ejects number of times smaller or equal to ejecting cryptographic session frame threshold value, calculate the cryptographic session frame and eject corresponding secondary Crypted password and the corresponding secondary Crypted password of cryptographic session frame ejection number of times for the first time,
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the secondary Crypted password of cryptographic session frame correspondence is ejected in SubP (N) expression for the N time, POPN<<SubP (N-1) expression ejects the N position of the second level television encryption password of (N-1) inferior ejection cryptographic session frame correspondence, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
The embodiment of the invention provides dynamic decryption device, and described device specifically comprises as shown in Figure 4:
Receive password unit 42, be used for receiving the clear crytpographic key of input;
Determine level units 43, be used for determining the rank of described clear crytpographic key;
Decrypting device 44 is used for being decrypted according to the rank of described clear crytpographic key.
Optionally, described definite level units 43 specifically is used for:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
Optionally, described decrypting device 44 specifically is used for:
When clear crytpographic key is senior clear crytpographic key, be decrypted, no longer eject the cryptographic session frame;
When clear crytpographic key is the secondary clear crytpographic key that the cryptographic session frame ejects the number of times correspondence, not exclusively decipher, so that when moving total fate and ejecting at interval the fate integral multiple for the preset password dialog box, eject the cryptographic session frame again.
Optionally, described device also comprises:
One of ordinary skill in the art will appreciate that to each included module of above-described embodiment is to divide according to function logic, but be not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional module also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
Those of ordinary skills it is also understood that, realize that all or part of step in above-described embodiment method is to instruct relevant hardware to finish by program, described program can be in being stored in read/write memory medium, and described storage medium comprises ROM/RAM etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (19)
1. a dynamic encrypting method is characterized in that, described method comprises:
Record operation multidate information, described multidate information comprise that the total fate of operation, operation total time and cryptographic session frame eject number of times;
According to default operation rule, computing obtains superencipherment password and secondary Crypted password;
Use described superencipherment password and described secondary Crypted password to be encrypted.
2. the method for claim 1 is characterized in that, described basis is preset operation rule, carries out that computing obtains the superencipherment password and secondary Crypted password is specially:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises and ejects initial password, media interviews control MAC Address, preset password dialog box at interval fate and cryptographic session frame eject frequency threshold value.
3. method as claimed in claim 2 is characterized in that, described basis is preset operation rule, described operation multidate information and/or prestored information is carried out the step that computing obtains described superencipherment password comprise:
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move;
Wherein, described MainP represents the superencipherment password.
4. method as claimed in claim 2 is characterized in that, described basis is preset operation rule, described operation multidate information and/or prestored information is carried out the step that computing obtains secondary Crypted password comprise:
According to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
Eject frequency threshold value when the cryptographic session frame ejects number of times greater than the cryptographic session frame, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
5. method as claimed in claim 4, it is characterized in that, described according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time; Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the corresponding secondary Crypted password of cryptographic session frame ejection number of times and be specially:
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the N time cryptographic session frame of SubP (N) expression ejects corresponding secondary Crypted password, POPN<<SubP (N-1) expression ejects the N position that (N-1) inferior cryptographic session frame ejects corresponding secondary Crypted password, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
6. the method for claim 1 is characterized in that, the described superencipherment password of described use and described secondary Crypted password are encrypted and are specially:
Use described superencipherment password that all cryptographic session frames are encrypted and when the cryptographic session frame ejects number of times and ejects frequency threshold value smaller or equal to the cryptographic session frame, use described secondary Crypted password that corresponding cryptographic session frame is encrypted.
7. a dynamic resolution decryption method is characterized in that, described method comprises:
According to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises the total fate of operation, described prestored information comprises that the preset password dialog box ejects fate at interval;
Receive the clear crytpographic key of input;
Determine the rank of described clear crytpographic key;
Rank according to described clear crytpographic key is decrypted.
8. method as claimed in claim 7 is characterized in that, the rank of described definite described clear crytpographic key is specially:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
9. method as claimed in claim 7 is characterized in that, described rank according to described clear crytpographic key is decrypted and is specially:
When clear crytpographic key is senior clear crytpographic key, be decrypted and no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, be to preset when ejecting cryptographic session frame interval fate integral multiple so that move total fate, eject the cryptographic session frame again.
10. method as claimed in claim 7 is characterized in that, described method also comprises:
When the clear crytpographic key errors number that receives reaches 5 times, shutdown automatically.
11. a dynamic encrypting device is characterized in that, described device comprises:
Record cell is used for record operation multidate information, and described operation multidate information comprises that the total fate of operation, operation total time and cryptographic session frame eject number of times;
Arithmetic element is used for according to default operation rule, and computing obtains superencipherment password and secondary Crypted password;
Ciphering unit is used for using described superencipherment password and secondary Crypted password to be encrypted.
12. device as claimed in claim 11 is characterized in that, described arithmetic element specifically is used for:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises that initial password, media interviews control MAC Address, preset password dialog box eject at interval fate and eject cryptographic session frame threshold value.
13. device as claimed in claim 12 is characterized in that, described arithmetic element comprises:
Superencipherment crypto-operation module is used for according to default operation rule, described operation multidate information and/or prestored information is carried out computing obtain described superencipherment password, and described MainP represents the superencipherment password,
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move.
14. device as claimed in claim 12 is characterized in that, described arithmetic element comprises:
Secondary Crypted password computing module, be used for according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
When the cryptographic session frame ejects number of times greater than ejecting cryptographic session frame threshold value, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
15. device as claimed in claim 14 is characterized in that, described secondary Crypted password computing module further specifically is used for:
When the cryptographic session frame ejects number of times smaller or equal to ejecting cryptographic session frame threshold value, calculate the cryptographic session frame and eject corresponding secondary Crypted password and the corresponding secondary Crypted password of cryptographic session frame ejection number of times for the first time,
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the secondary Crypted password of cryptographic session frame correspondence is ejected in SubP (N) expression for the N time, POPN<<SubP (N-1) expression ejects the N position of the second level television encryption password of (N-1) inferior ejection cryptographic session frame correspondence, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
16. a dynamic decryption device is characterized in that, described device comprises:
Eject password unit, for according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises that TV moves total fate, and described prestored information comprises the default cryptographic session frame fate interval of ejecting;
Receive password unit, be used for receiving the clear crytpographic key of input;
Determine level units, be used for determining the rank of described clear crytpographic key;
Decrypting device is used for being decrypted according to the rank of described clear crytpographic key.
17. device as claimed in claim 16 is characterized in that, described definite level units specifically is used for:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
18. device as claimed in claim 16 is characterized in that, described decrypting device specifically is used for:
When clear crytpographic key is senior clear crytpographic key, be decrypted, no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, be to preset when ejecting cryptographic session frame interval fate integral multiple so that move total fate, eject the cryptographic session frame again.
19. device as claimed in claim 16 is characterized in that, described device also comprises:
The shutdown control unit is used for reaching 5 times when the clear crytpographic key errors number that receives shutdown automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310152551.5A CN103248477B (en) | 2013-04-27 | 2013-04-27 | A kind of dynamic encrypting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310152551.5A CN103248477B (en) | 2013-04-27 | 2013-04-27 | A kind of dynamic encrypting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103248477A true CN103248477A (en) | 2013-08-14 |
CN103248477B CN103248477B (en) | 2015-12-23 |
Family
ID=48927714
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310152551.5A Active CN103248477B (en) | 2013-04-27 | 2013-04-27 | A kind of dynamic encrypting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103248477B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105022965A (en) * | 2015-07-14 | 2015-11-04 | 广东欧珀移动通信有限公司 | Data encryption method and apparatus |
CN106027229A (en) * | 2016-07-28 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Encryption and decryption method and system based on intelligent terminal compass |
CN106973325A (en) * | 2017-03-29 | 2017-07-21 | 成都三零凯天通信实业有限公司 | Terrestrial digital television set box receives the safety recognizing method of signal |
CN107704736A (en) * | 2017-09-28 | 2018-02-16 | 广东欧珀移动通信有限公司 | Unlocking method and a device, computer equipment, computer-readable recording medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1756152A (en) * | 2004-04-05 | 2006-04-05 | 王松 | Radix algorithm encryption method for dynamic password |
EP1737156A2 (en) * | 2005-06-24 | 2006-12-27 | HiTRUST. COM Incorporated | Password encrypted data storage and retrieval method |
CN101166091A (en) * | 2006-10-19 | 2008-04-23 | 阿里巴巴公司 | A dynamic password authentication method and service end system |
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
-
2013
- 2013-04-27 CN CN201310152551.5A patent/CN103248477B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1756152A (en) * | 2004-04-05 | 2006-04-05 | 王松 | Radix algorithm encryption method for dynamic password |
EP1737156A2 (en) * | 2005-06-24 | 2006-12-27 | HiTRUST. COM Incorporated | Password encrypted data storage and retrieval method |
CN101166091A (en) * | 2006-10-19 | 2008-04-23 | 阿里巴巴公司 | A dynamic password authentication method and service end system |
CN102411682A (en) * | 2011-08-01 | 2012-04-11 | 吴成贵 | Password setting and authentication method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105022965A (en) * | 2015-07-14 | 2015-11-04 | 广东欧珀移动通信有限公司 | Data encryption method and apparatus |
CN106027229A (en) * | 2016-07-28 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Encryption and decryption method and system based on intelligent terminal compass |
CN106027229B (en) * | 2016-07-28 | 2019-04-23 | 武汉斗鱼网络科技有限公司 | A kind of encryption and decryption method and system based on intelligent terminal compass |
CN106973325A (en) * | 2017-03-29 | 2017-07-21 | 成都三零凯天通信实业有限公司 | Terrestrial digital television set box receives the safety recognizing method of signal |
CN107704736A (en) * | 2017-09-28 | 2018-02-16 | 广东欧珀移动通信有限公司 | Unlocking method and a device, computer equipment, computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
CN103248477B (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11601409B2 (en) | Establishing a secure communication session with an external security processor | |
CN101977108B (en) | Public key media key block | |
CN100524265C (en) | Apparatus and method for operating plural applications between portable storage device and digital device | |
CN105263051A (en) | Portable authorization device | |
CN102164320A (en) | Improved terminal based on conditional access technology | |
CN102461114A (en) | Method for performing double domain encryption a memory device | |
CN101312398A (en) | Method and apparatus for encryption and sending content and method and apparatus for decrypting content | |
CN103248477A (en) | Dynamic encryption method and device | |
CN107925795B (en) | Apparatus for decrypting encrypted media content and server controlling decryption | |
CN103200387A (en) | Protection method and protection system of surveillance video content | |
CN102461113B (en) | Method and system for content replication control | |
CN109147109A (en) | Lockset, mobile terminal, lockset control method and Lock control system | |
TW200307437A (en) | Secured storage method of encrypted data on a personal digital recorder | |
CN101281579B (en) | The method and apparatus of the digital content in protection USB mass storage device | |
CN103684740A (en) | Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal | |
CN101505400A (en) | Bi-directional set-top box authentication method, system and related equipment | |
JP2006518134A5 (en) | ||
CN104486677A (en) | Set top box data playing method, playing system and set top box | |
KR101440585B1 (en) | Memory card with encryption functions | |
CN205283718U (en) | High definition digital video safety protection system | |
CN104486081A (en) | Encryption transmission method and system of NFC (Near Field Communication) device data | |
CN104504306A (en) | Method and equipment both for encrypting files | |
CN104244030A (en) | Recorded program sharing method and system | |
CN103945047A (en) | Data secrecy method of security mobile phone | |
CN104035890A (en) | Static random access memory based programmable gate array chip encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |