CN104243148A - Encryption method and encryption device - Google Patents

Encryption method and encryption device Download PDF

Info

Publication number
CN104243148A
CN104243148A CN201310252786.1A CN201310252786A CN104243148A CN 104243148 A CN104243148 A CN 104243148A CN 201310252786 A CN201310252786 A CN 201310252786A CN 104243148 A CN104243148 A CN 104243148A
Authority
CN
China
Prior art keywords
data
encryption
redundant
encrypted
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310252786.1A
Other languages
Chinese (zh)
Inventor
袁继友
谢庆旭
姚恩东
蒋卫东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Original Assignee
ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD filed Critical ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Priority to CN201310252786.1A priority Critical patent/CN104243148A/en
Publication of CN104243148A publication Critical patent/CN104243148A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an encryption method. According to the method, redundant data are generated by means of a group of data changing constantly, an encryption algorithm is more complex, important information is hidden better so that the obtained encrypted data can not be deciphered easily even if the data are intercepted many times, and the safety of the transmission process of the encrypted data can be ensured. The invention further discloses an encryption device.

Description

Encryption method and encryption device
Technical field
The present invention relates to data encryption technology, particularly relate to a kind of encryption method and a kind of encryption device.
Background technology
Encryption changes original information data with certain special algorithm, even if make undelegated user obtain the information of having encrypted, but because not knowing the method for deciphering, still cannot understand the content of information.In order to the safety of transfer of data in the process of transfer of data, the information that need transmit spreads out of after encryption again, even if so important information is intercepted and captured, does not know how to decipher so also need not worry that important information is revealed because of it.
General information encryption is divided into two steps, and one is mapping operations, and two is add a large amount of redundant informations.Actual application is the combination of above-mentioned two steps, important information is hidden in the redundant information of magnanimity, goes formation enciphered data to transmit.
If when intercepting and capturing the information after above-mentioned encryption, the redundant information that the information of each intercepting and capturing removes important information data is all invariable, as long as intercept and capture two group encryption data, after comparing rejects constant " extremely " data, no matter remaining important information data adopt how advanced mapping operations is encrypted, and are all easy to be cracked.
Summary of the invention
Based on this, be necessary the problem be easily cracked when being intercepted and captured for enciphered data, the encryption method that a kind of important information is more hidden is provided.
Meanwhile, a kind of encryption device is also provided.
A kind of encryption method, comprises the steps:
By one group according to data genaration redundant data based on the binary data of the first Changing Pattern change;
Be-encrypted data is integrally inserted described redundant data and obtain enciphered data.
Wherein in an embodiment, described basic data is the count value produced by high-speed counter counting.
Wherein in an embodiment, automatic clear when described high-speed counter count down to predetermined count value also restarts counting.
Wherein in an embodiment, described predetermined count value is prime number.
Wherein in an embodiment, the basis that the step of described generation redundant data is also included in described basic data generates the step of redundant data according to predetermined compound mode with one group of auxiliary data.
Wherein in an embodiment, described auxiliary data is the binary data with the second Changing Pattern.
Wherein in an embodiment, described auxiliary data is calendar data.
Wherein in an embodiment, described auxiliary data comprises at least 1 group calendar data, and described often group calendar data is the binary time data comprising year, month, day, hour, min, second.
Wherein in an embodiment, described predetermined compound mode is: be that a plug-in unit is inserted in described basic data respectively with at least one bit in the binary value of described auxiliary data, and the plug-in unit described auxiliary data being divided into equal its number of bits at the most is also dispersed in described basic data.
Wherein in an embodiment, also comprise the step of described redundant data being carried out to the first mapping, the described first step mapped is to the direct negate of data of the default figure place of described redundant data or the data of the default figure place of described redundant data is carried out negate according to the data of the corresponding figure place in the residue figure place of described redundant data.
Wherein in an embodiment, also comprise the step of described be-encrypted data being carried out to the second mapping, described second map step be to described be-encrypted data preset figure place the direct negate of data or the data of the default figure place of described be-encrypted data are carried out negate according to the data of the corresponding figure place in the residue figure place of described be-encrypted data.
A kind of encryption device, comprising:
Basic data generation module, for generating the basic data of the first Changing Pattern;
Main control module, connects described basic data generation module, for generation of be-encrypted data, generates redundant data and be encrypted acquisition enciphered data by described redundant data to described be-encrypted data based on described basic data.
Wherein in an embodiment, described basic data generation module comprises the high-speed counter unit of at least one cascade, and described basic data is the count value that the high-speed counter unit of described cascade is produced by counting.
Wherein in an embodiment, described high-speed counter unit is MC74HC4020AD high-speed counter chip.
Wherein in an embodiment, described basic data generation module also comprises data packetization unit, described data packetization unit connects described high-speed counter unit and described main control module respectively, sends described main control module to for the basic data packing produced by described high-speed counter unit.
Wherein in an embodiment, described first Changing Pattern is that the high-speed counter element count of described cascade restarts counting to automatic clear during predetermined count value.
Wherein in an embodiment, also comprise auxiliary data generation module, described auxiliary data generation module connects described main control module, for generating the auxiliary data of the second Changing Pattern and described auxiliary data transmission being generated described redundant data by described auxiliary data for described main control module to described main control module generation based on described basic data.
Wherein in an embodiment, described auxiliary data generation module comprises at least one calendar data generation unit, and each described calendar data generation unit connects described main control module respectively.
Wherein in an embodiment, described calendar data generation unit is SD2403API-G calendar chip.
Wherein in an embodiment, described main control module comprises:
Be-encrypted data generation unit, produces corresponding be-encrypted data by linkage function request module according to the request of described function request module;
Redundant data generation unit, connects described basic data generation module, for generating described redundant data based on described basic data;
Ciphering unit, connects described be-encrypted data generation unit and described redundant data generation unit respectively, generates described enciphered data for described be-encrypted data is integrally inserted described redundant data.
Wherein in an embodiment, described main control module is ATmega16-16AI chip.
Wherein in an embodiment, also comprise interface module, described interface module comprises some interface units, and each described interface unit connects described main control module respectively, for exporting the described enciphered data of different encryption level.
Above-mentioned encryption method and encryption device, the data genaration redundant data constantly changed by a group, even if more hidden repeatedly intercepting and capturing of the more complicated enciphered data making to obtain of cryptographic algorithm is also not easily cracked, ensure that the safety in encrypted data transmission process.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart of one embodiment of the invention;
Fig. 2 is the encryption method flow chart of another embodiment of the present invention;
Fig. 3 is the encryption device module map of one embodiment of the invention;
Fig. 4 is the encryption device module map of another embodiment of the present invention;
Fig. 5 is the chip connection layout of one embodiment of the invention encryption device.
Embodiment
A kind of encryption method and a kind of encryption device, had the binary data generation redundant data of respective Changing Pattern, and generate enciphered data further by mapping operations by least two groups when being encrypted be-encrypted data.Be there is by least two groups the data genaration redundant data of respective Changing Pattern, make the enciphered data complexity of generation higher, also can not be decoded easily even if make above-mentioned enciphered data be intercepted and captured in transmitting procedure, prevent the leakage of important information, fail safe stronger.
Below in conjunction with drawings and Examples, a kind of encryption method of the present invention and a kind of encryption device are described in more detail.
Shown in Fig. 1, it is the encryption method flow chart of one embodiment of the invention.With reference to figure 1, a kind of encryption method, specifically comprises the steps:
Step S110: by one group according to data genaration redundant data based on the binary data of the first Changing Pattern change.
Above-mentioned basic data can be the count value produced by high-speed counter counting.High-speed counter refers to and can calculate than plain scan frequency pulse signal faster, its operation principle and general counter similar, just the response time of counting channel is shorter, generally counts with the frequency of KHZ.Concrete, the precision of above-mentioned high-speed counter can be 30MHZ, represents in 1 second and can count 300,000,000 times.
When basic data be high-speed counter produce count value time, the Changing Pattern of above-mentioned basic data is the automatic clear restart to count when high-speed counter count down to a predetermined count value.If basic data is the count value of a keeping count always, if enciphered data is is repeatedly intercepted and captured in encrypted data transmission process, also there is the possibility be cracked.So, by arranging above-mentioned count value automatic clear restart counting when counting down to a predetermined count value, making enciphered data more complicated, reducing the possibility be cracked when above-mentioned enciphered data is is repeatedly intercepted and captured in transmitting procedure.
Above-mentioned predetermined count value is a prime number that numerical value is relatively large in the maximum magnitude of above-mentioned basic data.Above-mentioned prime number is a set point, can based on a prime number maximum within the scope of data bits.Prime number, also known as prime number, refers to be greater than in the natural number of 1 at one, except 1 and this integer self, and the number can not divided exactly by other natural numbers.Relative with prime number is called conjunction number, closes number and refers to except can by 1 with except itself dividing exactly in natural number, the number can also divided exactly by other number.When to decrypt encrypted data, if redundant data is one close number, be conducive to the deciphering of enciphered data, and basic data is unfavorable for the deciphering of above-mentioned enciphered data when being set to prime number, even if when above-mentioned enciphered data is intercepted and captured or repeatedly intercepted and captured, also be difficult to crack, further increase the fail safe of enciphered data.
Concrete, above-mentioned count value can be 84 bits.Relative, if the figure place of above-mentioned basic data is higher, the complexity of the enciphered data generated below is higher, thus fail safe in above-mentioned encrypted data transmission process is also just relatively higher.
If above-mentioned basic data be one group along with the continuous regular increase of time lengthening, reset and then continue to increase, if repeatedly intercepted and captured in the enciphered data generated thereafter, also there is the possibility that is cracked.So above-mentioned basic data can be the combination of the continuous change count value that several groups of high-speed counters produce, wherein often to organize when count value can start count with different counting initial values and reach the pre-set count values of separately setting automatic clear restart to count respectively, add the complexity of basic data, improve the fail safe in encrypted data transmission process.
In other examples, above-mentioned basic data also can be the data that other have certain Changing Pattern, is not limited to the count value that above-mentioned high-speed counter produces.
Shown in Fig. 2, it is the encryption method flow chart of another embodiment of the present invention.
If, if the enciphered data of transmission repeatedly can be intercepted and captured, also there is the possibility that enciphered data is cracked, so need regular for above-mentioned basic data change to upset in the regular growth of above-mentioned basic data, clearing continue regular growth.
With reference to figure 2, the step of above-mentioned cryptographic algorithm also comprises the steps:
Step S120: generate redundant data with one group of auxiliary data according to predetermined compound mode on the basis of above-mentioned basic data.
In other embodiments, also by auxiliary data the Changing Pattern of above-mentioned basic data can be upset and obtain redundant data.Above-mentioned auxiliary data can be that one group of invariable fixing binary data also can be the binary data that a group has the second Changing Pattern.Concrete, when above-mentioned auxiliary data is the binary data with the second Changing Pattern, above-mentioned auxiliary data can be calendar data.One group of calendar data is the binary time data comprising year, month, day, hour, min, second.Wherein, initial time can free setting being represented by binary data.Above-mentioned calendar data is distributed in above-mentioned basic data, the above-mentioned basic data of insertion of one one also can form the plug-in unit being less than its number of bits and be then distributed in above-mentioned basic data, upset the rule change of above-mentioned basic data, the complexity of further enhancing enciphered data, improves the fail safe in above-mentioned encrypted data transmission process.
Above-mentionedly be distributed in basic data by after calendar data segmentation, order after calendar data segmentation can be inserted into above-mentioned basic data or calendar data segmentation is distributed in above-mentioned basic data after upsetting original order again, make redundant data more complicated and make that the enciphered data that generates further is more hidden to be not easily cracked.
Above-mentioned auxiliary data can be one group of calendar data also can comprise at least two group calendar datas, above-mentioned Duo Zu Hitachi data are distributed in above-mentioned basic data respectively, the complexity of further enhancing redundant data also improves the disguise of enciphered data further, improves the fail safe in above-mentioned encrypted data transmission process.
In other embodiments, above-mentioned auxiliary data also can be the data that other have certain change regulation, is not limited to calendar data.
Step S130: be-encrypted data is integrally inserted redundant data and obtain enciphered data.
The request of the acquisition enciphered data that encryption device sends for function request module generates be-encrypted data, and is transferred to above-mentioned functions request module after generating enciphered data.The difference request sent according to above-mentioned functions request module or for different function request module, above-mentioned be-encrypted data can be a string effective license address, crucial encrypted message or the key instruction etc. from higher level.Above-mentioned be-encrypted data is integrally inserted in above-mentioned redundant data and generates enciphered data.Above-mentioned be-encrypted data is also binary number.
With reference to figure 2, above-mentioned encryption method comprises further:
Step S150: the first mapping is carried out to described redundant data.
First mapping is carried out to redundant data, wherein first map step be to redundant data preset figure place the direct negate of data or the data of the default figure place of above-mentioned redundant data are carried out negate according to the data of the corresponding figure place in the residue figure place of above-mentioned redundant data.Such as, eight-digit number 10010110 in above-mentioned redundant data, carries out negate by first four according to latter four and obtains 11110110.
In other examples, also can map above-mentioned redundant data according to other mapping algorithm.
Step S170: the second mapping is carried out to described be-encrypted data.
Second mapping is carried out to be-encrypted data, wherein second map step be to be-encrypted data preset figure place the direct negate of data or the data of the default figure place of above-mentioned be-encrypted data are carried out negate according to the data of the corresponding figure place in the residue figure place of above-mentioned be-encrypted data.
In other examples, also mapping operations can be carried out according to other mapping algorithm to above-mentioned be-encrypted data.
In other embodiments, also on the basis of above-mentioned basic data, redundant data can be generated by the auxiliary data that many groups are different, not limit and can only comprise two groups of data in order to generate redundant data.On the basis of one group of basic data constantly changed, corresponding helper data set number is more, the complexity of the redundant data of the more complicated generation of Changing Pattern is higher, and corresponding enciphered data is more hidden, and the fail safe in transmitting procedure is higher.
Figure 3 shows that the encryption device module map of one embodiment of the invention.
With reference to figure 3, a kind of encryption device, comprises basic data generation module 110 and the main control module 130 of connection.Basic data generation module 110 generates the basic data having the first Changing Pattern, and main control module 130 generates be-encrypted data, based on basic data, generate redundant data and is encrypted acquisition enciphered data by redundant data to be-encrypted data.
The data genaration redundant data constantly changed by one group, makes cryptographic algorithm more complicated, even if make important information more hidden and make enciphered data repeatedly be intercepted and captured in transmitting procedure to be also not easily cracked, ensure that the fail safe in encrypted data transmission process.
Shown in Fig. 4, it is the encryption device module map of another embodiment of the present invention.
With reference to figure 4, above-mentioned basic data generation module 110 comprises the high-speed counter unit 112 of at least one cascade, and basic data is the count value that the high-speed counter unit 112 of cascade is produced by counting.Concrete, above-mentioned high-speed counter unit 112 is MC74HC4020AD high-speed counter, produces the binary counting of 14.When above-mentioned high-speed counter unit 112 number is 6, data based on the count results producing 84.
Along with the continuity of time, the count results that above-mentioned high-speed counter unit 112 produces constantly increases until then automatic clear restarts counting when reaching default count results.In order to reduce the probability be cracked when enciphered data is intercepted and captured in the process transmitted, the count results arranging above-mentioned expectation is prime number.
With reference to figure 4, above-mentioned basic data generation module 110 also comprises data packetization unit 114, data packetization unit 114 connects high-speed counter unit 112 and main control module 130 respectively, sends main control module 130 to for the basic data packing produced by high-speed counter unit 112.Concrete, above-mentioned data packetization unit 114 is MCP23017 chip, and the quantity of quantity set data packetization unit 114 for high-speed counter unit 112.When high-speed counter unit 112MC74HC4020AD high-speed counter and quantity is 6 time, corresponding MCP23017 chip is 4, and the packing of the count results that produced by the MC74HC4020AD high-speed counter of 6 cascades is transferred to main control module 130.
With reference to figure 4, above-mentioned encryption device also comprises auxiliary data generation module 150, above-mentioned auxiliary data generation module 150 connects above-mentioned main control module 130, for generating the auxiliary data of the second Changing Pattern and above-mentioned auxiliary data transmission being generated to main control module 130 and generate redundant data by above-mentioned auxiliary data for main control module 130 based on above-mentioned basic data.
Above-mentioned auxiliary data generation module 150 comprises at least one calendar data generation unit 152, and above-mentioned calendar data generation unit 152 connects main control module 130 respectively.Concrete, above-mentioned calendar data generation unit 152 is SD2403API-G calendar chip.
With reference to figure 4, above-mentioned main control module 130 comprises the be-encrypted data generation unit 132, ciphering unit 134 and the redundant data generation unit 136 that connect successively.Be-encrypted data generation unit 132 is by linkage function request module 200 and produce corresponding be-encrypted data according to the request of function request module 200, redundant data generation unit 136 connects basic data generation module 110 and auxiliary data generation module 150 respectively and based on above-mentioned basic data, basic data is inserted in above-mentioned auxiliary data segmentation and generates redundant data, and described be-encrypted data is integrally inserted described redundant data and generated described enciphered data by ciphering unit 134.
Concrete, above-mentioned main control module 130 can be ATmega16-16AI chip.
Further, above-mentioned encryption device also comprises interface module 170, above-mentioned interface module 170 comprises the interface unit (not shown) of some different output levels, above-mentioned interface unit connects above-mentioned ciphering unit 134 and function request module 200 respectively, for transmitting the request of above-mentioned functions request module 200 and the enciphered data exporting different stage is transferred to corresponding function request module 200 to function request module 200 or according to the dissimilar of be-encrypted data.
Shown in Fig. 5, it is the chip connection layout of the encryption device of one embodiment of the invention.
Concrete, when above-mentioned high-speed counter unit 112 for MC74HC4020AD high-speed counter and above-mentioned MC74HC4020AD high-speed counter be 6, above-mentioned data packetization unit 114 for MCP23017 chip and above-mentioned MCP23017 chip be 4, above-mentioned calendar data generation unit 152 for SD2403API-G calendar chip and above-mentioned SD2403API-G calendar chip be 4, above-mentioned main control module 130 for ATmega16-16AI chip time, corresponding chip connection layout is as shown in Figure 5.
Above-mentioned encryption device completes the encryption to be-encrypted data by above-mentioned cryptographic algorithm, realizes improving the fail safe in encrypted data transmission process.
The above embodiment only have expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (22)

1. an encryption method, is characterized in that, comprises the steps:
By one group according to data genaration redundant data based on the binary data of the first Changing Pattern change;
Be-encrypted data is integrally inserted described redundant data and obtain enciphered data.
2. encryption method according to claim 1, is characterized in that, described basic data is the count value produced by high-speed counter counting.
3. encryption method according to claim 2, is characterized in that, automatic clear when described high-speed counter count down to predetermined count value also restarts counting.
4. encryption method according to claim 3, is characterized in that, described predetermined count value is prime number.
5. encryption method according to claim 1, is characterized in that, the basis that the step of described generation redundant data is also included in described basic data generates the step of redundant data according to predetermined compound mode with one group of auxiliary data.
6. encryption method according to claim 5, is characterized in that, described auxiliary data is the binary data with the second Changing Pattern.
7. encryption method according to claim 6, is characterized in that, described auxiliary data is calendar data.
8. encryption method according to claim 7, is characterized in that, described auxiliary data comprises at least 1 group calendar data, and described often group calendar data is the binary time data comprising year, month, day, hour, min, second.
9. encryption method according to claim 5, it is characterized in that, described predetermined compound mode is: be that a plug-in unit is inserted in described basic data respectively with at least one bit in the binary value of described auxiliary data, and the plug-in unit described auxiliary data being divided into equal its number of bits at the most is also dispersed in described basic data.
10. encryption method according to claim 1, it is characterized in that, also comprise the step of described redundant data being carried out to the first mapping, the described first step mapped is to the direct negate of data of the default figure place of described redundant data or the data of the default figure place of described redundant data is carried out negate according to the data of the corresponding figure place in the residue figure place of described redundant data.
11. encryption methods according to claim 1, it is characterized in that, also comprise the step of described be-encrypted data being carried out to the second mapping, described second map step be to described be-encrypted data preset figure place the direct negate of data or the data of the default figure place of described be-encrypted data are carried out negate according to the data of the corresponding figure place in the residue figure place of described be-encrypted data.
12. 1 kinds of encryption devices, is characterized in that, comprising:
Basic data generation module, for generating the basic data of the first Changing Pattern;
Main control module, connects described basic data generation module, for generation of be-encrypted data, generates redundant data and be encrypted acquisition enciphered data by described redundant data to described be-encrypted data based on described basic data.
13. encryption devices according to claim 12, is characterized in that, described basic data generation module comprises the high-speed counter unit of at least one cascade, and described basic data is the count value that the high-speed counter unit of described cascade is produced by counting.
14. encryption devices according to claim 13, is characterized in that, described high-speed counter unit is MC74HC4020AD high-speed counter chip.
15. encryption devices according to claim 13, it is characterized in that, described basic data generation module also comprises data packetization unit, described data packetization unit connects described high-speed counter unit and described main control module respectively, sends described main control module to for the basic data packing produced by described high-speed counter unit.
16. encryption devices according to claim 13, is characterized in that, described first Changing Pattern is that the high-speed counter element count of described cascade restarts counting to automatic clear during predetermined count value.
17. encryption devices according to claim 12, it is characterized in that, also comprise auxiliary data generation module, described auxiliary data generation module connects described main control module, for generating the auxiliary data of the second Changing Pattern and described auxiliary data transmission being generated described redundant data by described auxiliary data for described main control module to described main control module generation based on described basic data.
18. encryption devices according to claim 17, is characterized in that, described auxiliary data generation module comprises at least one calendar data generation unit, and each described calendar data generation unit connects described main control module respectively.
19. encryption devices according to claim 18, is characterized in that, described calendar data generation unit is SD2403API-G calendar chip.
20. encryption devices according to claim 12, is characterized in that, described main control module comprises:
Be-encrypted data generation unit, produces corresponding be-encrypted data by linkage function request module according to the request of described function request module;
Redundant data generation unit, connects described basic data generation module, for generating described redundant data based on described basic data;
Ciphering unit, connects described be-encrypted data generation unit and described redundant data generation unit respectively, generates described enciphered data for described be-encrypted data is integrally inserted described redundant data.
21. encryption devices according to claim 12, is characterized in that, described main control module is ATmega16-16AI chip.
22. encryption devices according to claim 12, it is characterized in that, also comprise interface module, described interface module comprises some interface units, each described interface unit connects described main control module respectively, for exporting the described enciphered data of different encryption level.
CN201310252786.1A 2013-06-24 2013-06-24 Encryption method and encryption device Pending CN104243148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310252786.1A CN104243148A (en) 2013-06-24 2013-06-24 Encryption method and encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310252786.1A CN104243148A (en) 2013-06-24 2013-06-24 Encryption method and encryption device

Publications (1)

Publication Number Publication Date
CN104243148A true CN104243148A (en) 2014-12-24

Family

ID=52230560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310252786.1A Pending CN104243148A (en) 2013-06-24 2013-06-24 Encryption method and encryption device

Country Status (1)

Country Link
CN (1) CN104243148A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1150726A (en) * 1995-09-15 1997-05-28 汤姆森多媒体公司 Process for pledging data for secure data exchange protocol
CN1226109A (en) * 1998-02-13 1999-08-18 慈孟夫 Digital multi-changeable enciphering method and device while three control-state combination
CN1716853A (en) * 2004-06-30 2006-01-04 中国科学技术大学 Group broadcast cipher key managing method based on physical layer
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
CN101667260A (en) * 2009-10-20 2010-03-10 上海公用事业自动化工程有限公司 Anti-copy dual-frequency label
CN101925056A (en) * 2009-06-10 2010-12-22 华为技术有限公司 Scrambling code sequence generation method, device and system for scrambling or descrambling
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
US20120036319A1 (en) * 2007-07-06 2012-02-09 Bondurant Matthew D Commonality factoring for removable media
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device
CN102970129A (en) * 2012-11-16 2013-03-13 深圳光启创新技术有限公司 Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1150726A (en) * 1995-09-15 1997-05-28 汤姆森多媒体公司 Process for pledging data for secure data exchange protocol
CN1226109A (en) * 1998-02-13 1999-08-18 慈孟夫 Digital multi-changeable enciphering method and device while three control-state combination
CN1716853A (en) * 2004-06-30 2006-01-04 中国科学技术大学 Group broadcast cipher key managing method based on physical layer
CN101008972A (en) * 2006-01-27 2007-08-01 北京飞天诚信科技有限公司 Security control methods for date transmission process of software protection device and device thereof
US20120036319A1 (en) * 2007-07-06 2012-02-09 Bondurant Matthew D Commonality factoring for removable media
CN101925056A (en) * 2009-06-10 2010-12-22 华为技术有限公司 Scrambling code sequence generation method, device and system for scrambling or descrambling
CN102025482A (en) * 2009-09-10 2011-04-20 中国科学院华南植物园 Virtual genome-based cryptosystem (VGC)
CN101667260A (en) * 2009-10-20 2010-03-10 上海公用事业自动化工程有限公司 Anti-copy dual-frequency label
US20130016832A1 (en) * 2011-07-15 2013-01-17 Fujitsu Semiconductor Limited Security device
CN102970129A (en) * 2012-11-16 2013-03-13 深圳光启创新技术有限公司 Time information-based signal encrypting and decrypting method and time information-based signal encrypting and decrypting device

Similar Documents

Publication Publication Date Title
CN109474423B (en) Data encryption and decryption method, server and storage medium
CN104821944A (en) Hybrid encrypted network data security method and system
RU2013126419A (en) METHOD FOR PERFORMING A FINANCIAL TRANSACTION THROUGH UNPROTECTED COMMON USE COMMUNICATION INFRASTRUCTURE AND DEVICE FOR THIS
CN104063334A (en) Encryption method and system based on data attributions
CN101894235B (en) Smart card security session system
CN103974122A (en) Set top box chip and digital signature implementation method applied to same
CN103731270A (en) Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN110138795B (en) Multi-step mixed encryption and decryption method in communication process
CN103716166A (en) Self-adaptation hybrid encryption method and device and encryption communication system
CN103378971A (en) Data encryption system and method
CN105468935A (en) Method, sending end, tool end and burning end for guaranteeing safe burning of KEY
CN102945356A (en) Access control method and system for search engine under cloud environment
CN113225297A (en) Data hybrid encryption method, device and equipment
CN109934001A (en) A kind of data ciphering method based on normal cloud model
CN106302514A (en) The dynamic encrypting method of memory card and decryption method and device thereof
GB2498063A (en) Checking acceptance of a string by automaton
CN203289456U (en) Encryption device
CN105825135A (en) Encryption chip, encryption system, encryption method and decryption method
CN112469039B (en) Mobile terminal security authorization method based on security chip
CN105391677A (en) Information transmission method and mobile terminal
CN109597811A (en) A kind of distributed security data basd link block storage method
CN107222473B (en) Method and system for encrypting and decrypting API service data at transport layer
CN104954362A (en) Serial number encryption-decryption method and device
CN104243148A (en) Encryption method and encryption device
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141224

WD01 Invention patent application deemed withdrawn after publication