CN103248477A - Dynamic encryption method and device - Google Patents

Dynamic encryption method and device Download PDF

Info

Publication number
CN103248477A
CN103248477A CN2013101525515A CN201310152551A CN103248477A CN 103248477 A CN103248477 A CN 103248477A CN 2013101525515 A CN2013101525515 A CN 2013101525515A CN 201310152551 A CN201310152551 A CN 201310152551A CN 103248477 A CN103248477 A CN 103248477A
Authority
CN
China
Prior art keywords
password
cryptographic session
session frame
eject
clear crytpographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101525515A
Other languages
Chinese (zh)
Other versions
CN103248477B (en
Inventor
刘兆祥
冯仓胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth RGB Electronics Co Ltd
Original Assignee
Shenzhen Skyworth RGB Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth RGB Electronics Co Ltd filed Critical Shenzhen Skyworth RGB Electronics Co Ltd
Priority to CN201310152551.5A priority Critical patent/CN103248477B/en
Publication of CN103248477A publication Critical patent/CN103248477A/en
Application granted granted Critical
Publication of CN103248477B publication Critical patent/CN103248477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention is applicable to the technical field of electron and provides a dynamic encryption method and a dynamic encryption device. The dynamic encryption method comprises the steps as follows: recording dynamic operation information including total operation days, total operation time and pop-up time of a password dialog box; operating to obtain advanced encryption password and secondary encryption password according to a preset operation rule; and carrying out encryption by using the advanced encryption password and the secondary encryption password. According to the invention, the password is dynamically calculated, and in different time periods, control is achieved via different passwords, so that the problems that in the prior art the confidentiality is low and multi-user operation confidentiality can not be satisfied are solved.

Description

A kind of dynamic encrypting method and device
Technical field
The invention belongs to electronic technology field, relate in particular to a kind of dynamic encrypting method and device.
Background technology
Electronic equipment is because the information of storage or broadcast has certain privacy at present, therefore the user generally adopts password that electronic equipment is encrypted, but encrypting generally is fixed password, though perhaps be fixed password, regularly change by artificial the realization, when having a plurality of users to operate for electronic equipment, adopt the fixed password confidentiality good inadequately, can not satisfy the confidentiality demand of multi-user operation.
Summary of the invention
The object of the invention is to provide a kind of dynamic encrypting method and device, and is bad with the confidentiality that the solution prior art exists, and can not satisfy the problem of the confidentiality demand of multi-user operation.
Embodiments of the invention are achieved in that a kind of dynamic encrypting method, said method comprising the steps of:
Record operation multidate information, described multidate information comprise that the total fate of operation, operation total time and cryptographic session frame eject number of times;
According to default operation rule, computing obtains superencipherment password and secondary Crypted password;
Use described superencipherment password and described secondary Crypted password to be encrypted.
Embodiments of the invention are achieved in that a kind of dynamic resolution decryption method, said method comprising the steps of:
According to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises the total fate of operation, described prestored information comprises that the preset password dialog box ejects fate at interval;
Receive the clear crytpographic key of input;
Determine the rank of described clear crytpographic key;
Rank according to described clear crytpographic key is decrypted.
Another purpose of embodiments of the invention is to provide a kind of dynamic encrypting device, and described device comprises:
Record cell is used for record operation multidate information, and described operation multidate information comprises that the total fate of operation, operation total time and cryptographic session frame eject number of times;
Arithmetic element is used for according to default operation rule, and computing obtains superencipherment password and secondary Crypted password;
Ciphering unit is used for using described superencipherment password and secondary Crypted password to be encrypted.
Another purpose of embodiments of the invention is to provide a kind of dynamic decryption device, and described device comprises:
Eject password unit, for according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises that TV moves total fate, and described prestored information comprises the default cryptographic session frame fate interval of ejecting;
Receive password unit, be used for receiving the clear crytpographic key of input;
Determine level units, be used for determining the rank of described clear crytpographic key;
Decrypting device is used for being decrypted according to the rank of described clear crytpographic key.
The present invention realizes different time sections by password is realized dynamic calculation, controls by different passwords, and the confidentiality that has solved the prior art existence is bad, can not satisfy the problem of multi-user operation confidentiality demand.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the realization flow figure of the dynamic encrypting method that provides of the embodiment of the invention;
Fig. 2 is the realization flow figure of the dynamic resolution decryption method that provides of the embodiment of the invention;
Fig. 3 is the modular structure figure of the dynamic encrypting device that provides of the embodiment of the invention;
Fig. 4 is the modular structure figure of the dynamic decryption device that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explaining the present invention, and be not used in restriction the present invention.
The embodiment of the invention provides dynamic encrypting method, and the executive agent of described method is the dynamic encryption television equipment, described method as shown in Figure 1, concrete steps comprise:
S11, record operation multidate information.
In the present embodiment, the main body of executive logging operation multidate information comprises electronic equipments such as television set, computer, and described operation multidate information includes but not limited to move total fate, operation total time and cryptographic session frame and ejects number of times.
Need to prove that operation is that electronic equipments such as TV or computer dispatch from the factory after the zero clearing data total time, again start record operation total time just, the unused time did not calculate in operation total time, and shutdown is to TV operation total time zero clearing; Move total fate for the zero clearing data of dispatching from the factory after, move fate total start shooting again with regard to the opening entry TV, even TV shutdown, still record television is moved total fate, it is integer that the TV of record moves total fate, less than 24 hours by 1 day record.
S12, the default operation rule of basis, computing obtains superencipherment password and secondary Crypted password.
In the present embodiment, adopt the mode of two-stage password to be encrypted, described two-stage password comprises superencipherment password and secondary Crypted password, described superencipherment password has the authority of the overall situation, here Quan Ju authority refers to any cryptographic session frame, all use the superencipherment password to be encrypted, be encrypted and be decrypted with secondary Crypted password with the superencipherment password in addition.
Particularly, the method for realization S12 comprises:
According to default operation rule, to described operation multidate information with according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password.
In the present embodiment, prestored information includes but not limited to initial password, media interviews control (Media Access Control, MAC) address, the preset password dialog box ejects fate and cryptographic session frame ejection frequency threshold value at interval, initial password is the password that electronic equipment arranges when dispatching from the factory, the client can inform by the mode of specification in manufacturer, MAC Address is address fixing when dispatching from the factory, the MAC Address of every electronic equipment is all different, the preset password dialog box ejects the interval fate and is used for the time that the cryptographic session frame ejects is controlled, and the cryptographic session frame ejects frequency threshold value and is used for calculating and the encryption of secondary Crypted password are controlled.
Need to prove, when the cryptographic session frame ejects number of times greater than cryptographic session frame ejection frequency threshold value, continue to eject the cryptographic session frame, do not eject the corresponding secondary Crypted password of number of times but do not calculate the cryptographic session frame, do not use secondary Crypted password that dialog box is encrypted.
Further concrete, according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and comprise:
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move;
Wherein, described MainP represents the superencipherment password.
Above-mentioned implementation only is the optional superencipherment pin mode that calculates, can also adopt other modes to calculate by operation multidate information and/or prestored information, the people who generally only electronic equipment is had authority at the highest level for superencipherment cryptographic calculations mode grasps.
Further concrete, according to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain secondary Crypted password and comprise:
According to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
Eject frequency threshold value when the cryptographic session frame ejects number of times greater than the cryptographic session frame, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
Need to prove, at first calculate the frame of cryptographic session for the first time in the said method and eject corresponding secondary Crypted password, the calculating of the corresponding secondary Crypted password of the frame of cryptographic session for the second time ejection number of times depends on the frame of cryptographic session for the first time and ejects corresponding secondary Crypted password, and the rest may be inferred.
Further, described according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the corresponding secondary Crypted password of cryptographic session frame ejection number of times and be specially:
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents that the cryptographic session frame ejects number of times, SubP (N) expression cryptographic session frame ejects corresponding secondary Crypted password the N time, POPN<<SubP (N-1) expression ejects the N position that inferior cryptographic session frame (N-1) ejects corresponding secondary Crypted password, when N is 1, SubP0 represents initial password, and described t ejects fate at interval for the preset password dialog box.
According to said method, can calculate for the first time that the cryptographic session frame ejects corresponding secondary Crypted password, the frame of cryptographic session for the second time ejects corresponding secondary Crypted password, equal the cryptographic session frame and eject frequency threshold value until the cryptographic session frame ejects number of times.
Suppose that it is 10 that the cryptographic session frame ejects frequency threshold value, once can calculate the cryptographic session frame according to said method and eject ten cryptographic session frames of corresponding secondary Crypted password to for the first time and eject corresponding secondary Crypted password.
S13, the described superencipherment password of use and described secondary Crypted password are encrypted.
Particularly, the method for realization S13 comprises:
Use described superencipherment password that all cryptographic session frames are encrypted and when the cryptographic session frame ejects number of times and ejects frequency threshold value smaller or equal to the cryptographic session frame, use described secondary Crypted password that corresponding cryptographic session frame is encrypted.
Equaling 10 with cryptographic session frame ejection frequency threshold value is example, the superencipherment password is to all cryptographic session frames, ejecting corresponding secondary Crypted password for the first time with the cryptographic session frame is encrypted the cryptographic session frame that ejects for the first time, ejecting corresponding secondary Crypted password for the second time with the cryptographic session frame is encrypted the cryptographic session frame that ejects for the second time, and the like, be encrypted up to eject the cryptographic session frame of corresponding secondary Crypted password to the tenth ejection for the tenth time with the cryptographic session frame.
In the present embodiment, calculate superencipherment password and cryptographic session frame respectively and eject corresponding secondary Crypted password for the first time, and calculate the cryptographic session frame successively and eject corresponding secondary Crypted password for the second time and eject corresponding secondary Crypted password to cryptographic session frame the tenth time, the user who does not understand this cover operation rule and essential information is difficult to crack superencipherment password and secondary Crypted password, can reach the better effect of confidentiality, and according to different periods modification passwords, has confidentiality preferably, used by different user according to superencipherment password and secondary Crypted password in addition, can solve the problem of multi-user operation confidentiality.
The embodiment of the invention provides the dynamic resolution decryption method, and the executive agent of described method is dynamic resolution cipher telegram view apparatus, described method as shown in Figure 2, concrete steps comprise:
S21, according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame.
In the present embodiment, the operation multidate information includes but not limited to move total time, the total fate of operation and cryptographic session frame and ejects number of times, comprise prestored information initial password, MAC Address, preset password dialog box eject fate and cryptographic session frame ejection frequency threshold value at interval, when preset rules ejects cryptographic session frame fate interval integral multiple for move total fate when TV for presetting, eject the cryptographic session frame.
For example, arrange 30 days in the prestored information and be that the preset password dialog box ejects fate at interval, the total fate of putting down in writing in the operation multidate information of operation is 30 days, 60 days, waited in 90 days when being the fate of 30 days integral multiples, and can eject the cryptographic session frame.
The clear crytpographic key of S22, reception input.
S23, determine the rank of described clear crytpographic key.
Need to prove, when being encrypted, rank and the authority of superencipherment password and secondary Crypted password have been determined, when clear crytpographic key equals the superencipherment password, this clear crytpographic key is senior clear crytpographic key, when clear crytpographic key equaled secondary Crypted password, this clear crytpographic key was secondary clear crytpographic key.The user calculates clear crytpographic key by default operation rule, TV operation multidate information and the prestored information that obtains television encryption.
Optionally, realize that described S23 comprises:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
Need to prove, secondary clear crytpographic key has a plurality of, secondary clear crytpographic key is corresponding with cryptographic session frame ejection number of times, suppose that a secondary clear crytpographic key is that corresponding dialog box ejection number of times is 3 o'clock clear crytpographic key, when but cryptographic session is ejected for the 2nd time, it also is wrong importing this secondary clear crytpographic key, can not be decrypted.
S24, be decrypted according to the rank of described clear crytpographic key.
The method of specific implementation S24 is specially:
When clear crytpographic key is senior clear crytpographic key, be decrypted and no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, so that when the total fate of operation ejects the integral multiple of interval fate for the preset password dialog box, eject the cryptographic session frame again.
Need to prove that not exclusively deciphering refers to the follow-up cryptographic session frame that ejects again.
Present embodiment can arrive the effect that password is effectively managed by classification, for example certain customers only allow a period of time TV is operated and to be watched, perhaps certain customers only allow a period of time visit computer, can allow it understand secondary clear crytpographic key computational methods and relevant information, it only can be decrypted TV in the part-time section.
Optionally, said method also comprises:
When receive clear crytpographic key errors number when reaching 5 times, shutdown automatically.
In the present embodiment, by errors number is limited, prevent that the user is by ceaselessly attempting carrying out the possibility of decryption.
The embodiment of the invention provides dynamic encrypting device, and described device specifically comprises as shown in Figure 3:
Record cell 31 is used for record operation multidate information, and described operation multidate information comprises that the total fate of operation, operation total time and cryptographic session frame eject number of times;
Arithmetic element 32 is used for according to default operation rule, and computing obtains superencipherment password and secondary Crypted password;
Ciphering unit 33 is used for using described superencipherment password and secondary Crypted password to be encrypted.
Optionally, described arithmetic element 32 specifically is used for:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises that initial password, media interviews control MAC Address, preset password dialog box eject at interval fate and eject cryptographic session frame threshold value.
Optionally, described arithmetic element 32 comprises:
Superencipherment crypto-operation module 321 and secondary Crypted password computing module 322.
Superencipherment crypto-operation module 321 is used for according to default operation rule, described operation multidate information and/or prestored information is carried out computing obtain described superencipherment password, and described MainP represents the superencipherment password,
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move.
Secondary Crypted password computing module 322, be used for according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
When the cryptographic session frame ejects number of times greater than ejecting cryptographic session frame threshold value, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
Optionally, described secondary Crypted password computing module 322 is further used for:
When the cryptographic session frame ejects number of times smaller or equal to ejecting cryptographic session frame threshold value, calculate the cryptographic session frame and eject corresponding secondary Crypted password and the corresponding secondary Crypted password of cryptographic session frame ejection number of times for the first time,
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the secondary Crypted password of cryptographic session frame correspondence is ejected in SubP (N) expression for the N time, POPN<<SubP (N-1) expression ejects the N position of the second level television encryption password of (N-1) inferior ejection cryptographic session frame correspondence, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
The embodiment of the invention provides dynamic decryption device, and described device specifically comprises as shown in Figure 4:
Eject password unit 41, be used for ejecting the cryptographic session frame according to operation multidate information, prestored information and preset rules, described operation multidate information comprises that TV moves total fate, and described prestored information comprises that the preset password dialog box ejects fate at interval;
Receive password unit 42, be used for receiving the clear crytpographic key of input;
Determine level units 43, be used for determining the rank of described clear crytpographic key;
Decrypting device 44 is used for being decrypted according to the rank of described clear crytpographic key.
Optionally, described definite level units 43 specifically is used for:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
Optionally, described decrypting device 44 specifically is used for:
When clear crytpographic key is senior clear crytpographic key, be decrypted, no longer eject the cryptographic session frame;
When clear crytpographic key is the secondary clear crytpographic key that the cryptographic session frame ejects the number of times correspondence, not exclusively decipher, so that when moving total fate and ejecting at interval the fate integral multiple for the preset password dialog box, eject the cryptographic session frame again.
Optionally, described device also comprises:
Shutdown control unit 45 is used for reaching 5 times when the clear crytpographic key errors number that receives shutdown automatically.
One of ordinary skill in the art will appreciate that to each included module of above-described embodiment is to divide according to function logic, but be not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional module also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
Those of ordinary skills it is also understood that, realize that all or part of step in above-described embodiment method is to instruct relevant hardware to finish by program, described program can be in being stored in read/write memory medium, and described storage medium comprises ROM/RAM etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (19)

1. a dynamic encrypting method is characterized in that, described method comprises:
Record operation multidate information, described multidate information comprise that the total fate of operation, operation total time and cryptographic session frame eject number of times;
According to default operation rule, computing obtains superencipherment password and secondary Crypted password;
Use described superencipherment password and described secondary Crypted password to be encrypted.
2. the method for claim 1 is characterized in that, described basis is preset operation rule, carries out that computing obtains the superencipherment password and secondary Crypted password is specially:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises and ejects initial password, media interviews control MAC Address, preset password dialog box at interval fate and cryptographic session frame eject frequency threshold value.
3. method as claimed in claim 2 is characterized in that, described basis is preset operation rule, described operation multidate information and/or prestored information is carried out the step that computing obtains described superencipherment password comprise:
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move;
Wherein, described MainP represents the superencipherment password.
4. method as claimed in claim 2 is characterized in that, described basis is preset operation rule, described operation multidate information and/or prestored information is carried out the step that computing obtains secondary Crypted password comprise:
According to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
Eject frequency threshold value when the cryptographic session frame ejects number of times greater than the cryptographic session frame, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
5. method as claimed in claim 4, it is characterized in that, described according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time; Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the corresponding secondary Crypted password of cryptographic session frame ejection number of times and be specially:
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the N time cryptographic session frame of SubP (N) expression ejects corresponding secondary Crypted password, POPN<<SubP (N-1) expression ejects the N position that (N-1) inferior cryptographic session frame ejects corresponding secondary Crypted password, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
6. the method for claim 1 is characterized in that, the described superencipherment password of described use and described secondary Crypted password are encrypted and are specially:
Use described superencipherment password that all cryptographic session frames are encrypted and when the cryptographic session frame ejects number of times and ejects frequency threshold value smaller or equal to the cryptographic session frame, use described secondary Crypted password that corresponding cryptographic session frame is encrypted.
7. a dynamic resolution decryption method is characterized in that, described method comprises:
According to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises the total fate of operation, described prestored information comprises that the preset password dialog box ejects fate at interval;
Receive the clear crytpographic key of input;
Determine the rank of described clear crytpographic key;
Rank according to described clear crytpographic key is decrypted.
8. method as claimed in claim 7 is characterized in that, the rank of described definite described clear crytpographic key is specially:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
9. method as claimed in claim 7 is characterized in that, described rank according to described clear crytpographic key is decrypted and is specially:
When clear crytpographic key is senior clear crytpographic key, be decrypted and no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, be to preset when ejecting cryptographic session frame interval fate integral multiple so that move total fate, eject the cryptographic session frame again.
10. method as claimed in claim 7 is characterized in that, described method also comprises:
When the clear crytpographic key errors number that receives reaches 5 times, shutdown automatically.
11. a dynamic encrypting device is characterized in that, described device comprises:
Record cell is used for record operation multidate information, and described operation multidate information comprises that the total fate of operation, operation total time and cryptographic session frame eject number of times;
Arithmetic element is used for according to default operation rule, and computing obtains superencipherment password and secondary Crypted password;
Ciphering unit is used for using described superencipherment password and secondary Crypted password to be encrypted.
12. device as claimed in claim 11 is characterized in that, described arithmetic element specifically is used for:
According to default operation rule, described operation multidate information and/or prestored information are carried out computing obtain described superencipherment password and described secondary Crypted password, described prestored information comprises that initial password, media interviews control MAC Address, preset password dialog box eject at interval fate and eject cryptographic session frame threshold value.
13. device as claimed in claim 12 is characterized in that, described arithmetic element comprises:
Superencipherment crypto-operation module is used for according to default operation rule, described operation multidate information and/or prestored information is carried out computing obtain described superencipherment password, and described MainP represents the superencipherment password,
The MainP=MAC address;
Or MainP=moves total fate;
Or the total fate in MainP=MAC address+move.
14. device as claimed in claim 12 is characterized in that, described arithmetic element comprises:
Secondary Crypted password computing module, be used for according to described initial password, cryptographic session frame eject that number of times is 1, the preset password dialog box ejects at interval fate and MAC Address and calculates the cryptographic session frame and eject corresponding secondary Crypted password for the first time;
Eject number of times, preset password dialog box ejection interval fate and last cryptographic session frame according to the cryptographic session frame and eject corresponding secondary Crypted password, calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times;
When the cryptographic session frame ejects number of times greater than ejecting cryptographic session frame threshold value, no longer calculate the cryptographic session frame and eject the corresponding secondary Crypted password of number of times.
15. device as claimed in claim 14 is characterized in that, described secondary Crypted password computing module further specifically is used for:
When the cryptographic session frame ejects number of times smaller or equal to ejecting cryptographic session frame threshold value, calculate the cryptographic session frame and eject corresponding secondary Crypted password and the corresponding secondary Crypted password of cryptographic session frame ejection number of times for the first time,
SubP (N)=POPN<<SubP (N-1)+t*N+MAC address;
Wherein, described N represents to eject cryptographic session frame number of times, the secondary Crypted password of cryptographic session frame correspondence is ejected in SubP (N) expression for the N time, POPN<<SubP (N-1) expression ejects the N position of the second level television encryption password of (N-1) inferior ejection cryptographic session frame correspondence, when N is 1, SubP0 represents initial password, and described t ejects cryptographic session frame fate at interval for default.
16. a dynamic decryption device is characterized in that, described device comprises:
Eject password unit, for according to operation multidate information, prestored information and preset rules, eject the cryptographic session frame, described operation multidate information comprises that TV moves total fate, and described prestored information comprises the default cryptographic session frame fate interval of ejecting;
Receive password unit, be used for receiving the clear crytpographic key of input;
Determine level units, be used for determining the rank of described clear crytpographic key;
Decrypting device is used for being decrypted according to the rank of described clear crytpographic key.
17. device as claimed in claim 16 is characterized in that, described definite level units specifically is used for:
Judge whether clear crytpographic key is senior clear crytpographic key;
If described clear crytpographic key is not senior clear crytpographic key, judge whether described clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times.
18. device as claimed in claim 16 is characterized in that, described decrypting device specifically is used for:
When clear crytpographic key is senior clear crytpographic key, be decrypted, no longer eject the cryptographic session frame;
When clear crytpographic key is that the cryptographic session frame ejects the corresponding secondary clear crytpographic key of number of times, not exclusively decipher, be to preset when ejecting cryptographic session frame interval fate integral multiple so that move total fate, eject the cryptographic session frame again.
19. device as claimed in claim 16 is characterized in that, described device also comprises:
The shutdown control unit is used for reaching 5 times when the clear crytpographic key errors number that receives shutdown automatically.
CN201310152551.5A 2013-04-27 2013-04-27 A kind of dynamic encrypting method and device Active CN103248477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310152551.5A CN103248477B (en) 2013-04-27 2013-04-27 A kind of dynamic encrypting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310152551.5A CN103248477B (en) 2013-04-27 2013-04-27 A kind of dynamic encrypting method and device

Publications (2)

Publication Number Publication Date
CN103248477A true CN103248477A (en) 2013-08-14
CN103248477B CN103248477B (en) 2015-12-23

Family

ID=48927714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310152551.5A Active CN103248477B (en) 2013-04-27 2013-04-27 A kind of dynamic encrypting method and device

Country Status (1)

Country Link
CN (1) CN103248477B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN106027229A (en) * 2016-07-28 2016-10-12 武汉斗鱼网络科技有限公司 Encryption and decryption method and system based on intelligent terminal compass
CN106973325A (en) * 2017-03-29 2017-07-21 成都三零凯天通信实业有限公司 Terrestrial digital television set box receives the safety recognizing method of signal
CN107704736A (en) * 2017-09-28 2018-02-16 广东欧珀移动通信有限公司 Unlocking method and a device, computer equipment, computer-readable recording medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756152A (en) * 2004-04-05 2006-04-05 王松 Radix algorithm encryption method for dynamic password
EP1737156A2 (en) * 2005-06-24 2006-12-27 HiTRUST. COM Incorporated Password encrypted data storage and retrieval method
CN101166091A (en) * 2006-10-19 2008-04-23 阿里巴巴公司 A dynamic password authentication method and service end system
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1756152A (en) * 2004-04-05 2006-04-05 王松 Radix algorithm encryption method for dynamic password
EP1737156A2 (en) * 2005-06-24 2006-12-27 HiTRUST. COM Incorporated Password encrypted data storage and retrieval method
CN101166091A (en) * 2006-10-19 2008-04-23 阿里巴巴公司 A dynamic password authentication method and service end system
CN102411682A (en) * 2011-08-01 2012-04-11 吴成贵 Password setting and authentication method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105022965A (en) * 2015-07-14 2015-11-04 广东欧珀移动通信有限公司 Data encryption method and apparatus
CN106027229A (en) * 2016-07-28 2016-10-12 武汉斗鱼网络科技有限公司 Encryption and decryption method and system based on intelligent terminal compass
CN106027229B (en) * 2016-07-28 2019-04-23 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal compass
CN106973325A (en) * 2017-03-29 2017-07-21 成都三零凯天通信实业有限公司 Terrestrial digital television set box receives the safety recognizing method of signal
CN107704736A (en) * 2017-09-28 2018-02-16 广东欧珀移动通信有限公司 Unlocking method and a device, computer equipment, computer-readable recording medium

Also Published As

Publication number Publication date
CN103248477B (en) 2015-12-23

Similar Documents

Publication Publication Date Title
US11601409B2 (en) Establishing a secure communication session with an external security processor
CN101977108B (en) Public key media key block
CN100524265C (en) Apparatus and method for operating plural applications between portable storage device and digital device
CN105263051A (en) Portable authorization device
CN102164320A (en) Improved terminal based on conditional access technology
CN102461114A (en) Method for performing double domain encryption a memory device
CN101312398A (en) Method and apparatus for encryption and sending content and method and apparatus for decrypting content
CN103248477A (en) Dynamic encryption method and device
CN107925795B (en) Apparatus for decrypting encrypted media content and server controlling decryption
CN103200387A (en) Protection method and protection system of surveillance video content
CN102461113B (en) Method and system for content replication control
CN109147109A (en) Lockset, mobile terminal, lockset control method and Lock control system
TW200307437A (en) Secured storage method of encrypted data on a personal digital recorder
CN101281579B (en) The method and apparatus of the digital content in protection USB mass storage device
CN103684740A (en) Encrypting method and system, decrypting method and system, encryption and decryption method and system for photo album of mobile terminal
CN101505400A (en) Bi-directional set-top box authentication method, system and related equipment
JP2006518134A5 (en)
CN104486677A (en) Set top box data playing method, playing system and set top box
KR101440585B1 (en) Memory card with encryption functions
CN205283718U (en) High definition digital video safety protection system
CN104486081A (en) Encryption transmission method and system of NFC (Near Field Communication) device data
CN104504306A (en) Method and equipment both for encrypting files
CN104244030A (en) Recorded program sharing method and system
CN103945047A (en) Data secrecy method of security mobile phone
CN104035890A (en) Static random access memory based programmable gate array chip encryption method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant