CN110677245B - Coordinate transformation parameter encryption and decryption method based on dongle - Google Patents

Coordinate transformation parameter encryption and decryption method based on dongle Download PDF

Info

Publication number
CN110677245B
CN110677245B CN201910917223.7A CN201910917223A CN110677245B CN 110677245 B CN110677245 B CN 110677245B CN 201910917223 A CN201910917223 A CN 201910917223A CN 110677245 B CN110677245 B CN 110677245B
Authority
CN
China
Prior art keywords
parameter
dongle
parameters
coordinate
coordinate conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910917223.7A
Other languages
Chinese (zh)
Other versions
CN110677245A (en
Inventor
王友昆
余章蓉
陈裕汉
张君华
朱发浩
魏保峰
董国桥
唐秀娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunming Institute Of Surveying And Mapping
Original Assignee
Kunming Institute Of Surveying And Mapping
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunming Institute Of Surveying And Mapping filed Critical Kunming Institute Of Surveying And Mapping
Priority to CN201910917223.7A priority Critical patent/CN110677245B/en
Publication of CN110677245A publication Critical patent/CN110677245A/en
Application granted granted Critical
Publication of CN110677245B publication Critical patent/CN110677245B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

The invention discloses a parameter encryption and decryption method based on coordinate conversion of a dongle, which comprises the steps of reading text parameters, encrypting parameters, writing parameters, reading parameters in the dongle, decrypting parameters, converting coordinates and the like, and the functions of encrypting parameters, decrypting parameters, converting coordinates and the like are put into the dongle for realization, so that the method can be fixedly used by some professional secrecy-related personnel, and the problem that parameter files are copied or decoded is solved. By adopting a double encryption algorithm, the decrypted text file needs to be decrypted by using the privacy of the dongle in addition to the password of the user, so that the aim of double protection is fulfilled. The method effectively avoids divulgence of the conversion parameters and the coordinate conversion process, greatly improves the confidentiality intensity, and occupies small storage memory.

Description

Coordinate transformation parameter encryption and decryption method based on dongle
Technical Field
The invention belongs to the technical field of coordinate encryption, and relates to a coordinate transformation parameter encryption and decryption method based on a dongle.
Background
With the implementation of the requirement that the country comprehensively uses the 2000 national geodetic coordinate system in 2018, 7 months, various types of homeland resource space data need to be converted into the 2000 national geodetic coordinate system. Although the 2000 national geodetic coordinate system has been fully deployed, the need for interconversion between the 1954 beijing coordinate system, the 1980 siemens coordinate system, the 2000 national geodetic coordinate system, and the independent coordinate systems established based on the above coordinate systems still exists in actual work. Mapping geographic information data is a fundamental and strategic resource involved in national security. According to the regulations of the national secret catalogue of surveying and mapping management work, the interconversion parameters between the national geodetic coordinate system, the geocentric coordinate system and the independent coordinate system belong to the confidentiality range of absolute confidentiality. Based on the requirement of secrecy of the conversion parameters, how to ensure that the conversion parameters are not divulged is a problem to be solved in the coordinate conversion process.
The softdog is encrypted and protected by using information stored in hardware, the softdog of the USB interface is read and verified by the software through a special instruction, and the softdog hardware is not easy to copy, so that the protection performance is good, and the application is wide in the aspect of preventing software piracy. The basic principle of the dongle is to continuously perform operations such as access or read-write and the like on the hardware dongle in the software execution process, and confirm the validity and validity of software operations, so as to achieve the purpose of protecting the software copyright. At present, the development of the dongle has been developed to a fifth generation product, which not only can provide the function of software copyright protection, but also can provide a storage space of dozens to hundreds of KB's and independent chip arithmetic capability, and can implant some key algorithms or sensitive data into the dongle, and use the dongle chip to read and write data, execute algorithms, and return results, thereby realizing the protection of the key algorithms and sensitive data.
The invention adopts the method that the coordinate conversion parameters are stored in the dongle in an encrypted manner, and the functions of encrypting, decrypting, coordinate conversion and the like of the parameters are realized in the dongle, thereby effectively blocking the leakage of the conversion parameters and improving the confidentiality of the conversion parameters.
Disclosure of Invention
In order to achieve the purpose, the invention provides a coordinate transformation parameter encryption and decryption method based on a dongle, which has high confidentiality and small occupied storage memory.
The technical scheme adopted by the invention is that the method comprises the following steps:
step S1, open dongle authentication: opening the dongle to verify the authorization condition, and confirming the authorization correctness and the operation authority to ensure normal use;
step S2, reading text parameters: reading a character file storing the coordinate conversion parameters, converting the character file into a corresponding byte stream, and storing the byte stream in a dongle for encryption;
step S3, parameter encryption: encrypting the coordinate conversion parameter by combining a symmetric encryption algorithm and an asymmetric encryption algorithm, firstly inputting an encryption password by a user, symmetrically encrypting the coordinate conversion parameter by using the symmetric encryption algorithm to obtain first encrypted data, and then asymmetrically encrypting the first encrypted data by using a public key of a dongle to obtain second encrypted data which are the encrypted coordinate conversion parameter;
step S4, parameter writing: writing the encrypted coordinate conversion parameters into a storage area of the dongle;
step S5, reading the parameters in the dog: reading a cryptographic coordinate conversion parameter of a cryptographic dog storage area by using a data reading interface of the cryptographic dog;
step S6, decryption of parameters: decrypting the encrypted coordinate conversion parameter by using a private key of the dongle to obtain first decrypted data, inputting a password by a user, and decrypting the first decrypted data for the second time by using a symmetric encryption algorithm to obtain a decrypted coordinate conversion parameter;
step S7, coordinate conversion: and performing coordinate conversion on the decrypted coordinate conversion parameters by using a coordinate conversion model.
Further, in step S2, before the coordinate conversion parameter is read, a coordinate system name index and a parameter type index are established, and then the coordinate system name index, the parameter type index and the coordinate parameter are read.
Further, the coordinate system name index and the parameter type index are stored in an unsigned short integer mode.
Furthermore, the coordinate parameters are stored in a single-precision floating point type.
Furthermore, when the single-precision floating-point type effective decimal number cannot meet the requirement of the coordinate parameter on the decimal number precision, the decimal number precision is amplified by several times and then stored, and the decimal number precision is divided by the corresponding multiple when calling and converting.
Furthermore, a TDES symmetric algorithm and an RSA asymmetric algorithm are adopted.
Furthermore, when the number of data characters to be processed by the RSA asymmetric algorithm exceeds 1024 bits, the data characters need to be processed in a segmented mode, the processing mode is that the length of the number of bytes after the first encryption is calculated, the length of the characters is less than 1024 bits, then 0 is used for completing, the length of the characters exceeds 1024 bits, the processing is carried out according to a 1024 segmented encryption mode, and the part which is less than 1024 bits after the segmentation is also completed by 0.
Further, in order to ensure that the dongle is used on a designated computer, the CPU of the computer hardware and the unique number A of the mainboard are obtained, the dongle is encrypted by using the public key of the dongle to obtain encrypted data B, when the software is used, the encrypted data B is decrypted by using the private key of the dongle, the decrypted content A 'is compared with the unique number A of the CPU of the computer hardware and the unique number A of the mainboard, and if the decrypted content A' is consistent with the unique number A of the CPU of the computer hardware and the unique number A of the mainboard, the encrypted data.
Further, the coordinate conversion model mainly comprises a plane four-parameter conversion model, a Boolean seven-parameter model, a three-dimensional seven-parameter conversion model, a two-dimensional seven-parameter conversion model, a three-dimensional seven-parameter model and a polynomial fitting model.
Further, the softdog adopts 5 points of fineness.
The invention has the beneficial effects that:
1. the problem of keeping the conversion parameters is solved. The traditional coordinate conversion parameters are stored in a computer hard disk by adopting a plaintext or an encryption algorithm, the parameter file is called when the coordinate conversion is needed, the conversion parameters are easily copied or decoded, the conversion parameters are encrypted and then stored in a dongle, the conversion parameters can be fixedly used by some professional secrecy-involved personnel, and the problem that the parameter file is copied or decoded is solved. The dongle can be used only by some professionals, and can be used in a special computer, so that the use range is limited.
2. The secrecy strength of coordinate transformation is improved. By adopting a double encryption algorithm, the decrypted text file needs to be decrypted by using the privacy of the dongle in addition to the password of the user, so that the aim of double protection is fulfilled. Even if the dongle is lost, the file cannot be decrypted if the password set by the user is unknown.
3. By establishing parameter index and storing numerical value in byte, the space of memory card can be greatly saved. Only 22 bytes are needed for one plane four parameter, only 34 bytes are needed for one Boolean Cy seven parameter, and the storage space is reduced by 80 percent compared with the prior art. Meanwhile, the price of the dongle has a direct relationship with the storage space, so that the storage space is reduced, and the cost can be saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of coordinate transformation parameter encryption and decryption;
fig. 2 is a coordinate transformation parameter encryption algorithm.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The deep thought exquisite 5 dongle (hereinafter exquisite 5) is a new generation hardware dongle produced by Beijing deep thought shield science and technology corporation, and has the advantages of high safety, high operation speed, large storage space, full built-in encryption algorithm and the like.
The invention uses the sharpening 5 to encrypt and decrypt the coordinate conversion parameter. The parameter encryption process includes reading text parameters, encrypting parameters, and writing parameters, and the parameter decryption process includes reading parameters in the dog, decrypting parameters, and converting coordinates, as shown in fig. 1.
Step S1, turn on finish 5 verification: and (3) performing various functional operations by using the sharp 5, opening the sharp 5 to verify the authorization condition, confirming the authorization correctness and the operation authority, and ensuring the normal use of the device.
Step S2, reading text parameters: reading a plurality of coordinate conversion parameters, converting the coordinate conversion parameters into corresponding byte streams according to the designed structure length, and storing the byte streams in the sharpening device 5 for encryption. In order to save storage space, a coordinate system name index and a parameter type index are established and stored by adopting an unsigned short integer (UShort), and coordinate parameters are stored by adopting a single-precision floating point (float).
For example, the coordinate transformation parameters of the plane four parameters include a source coordinate system name, a target coordinate system name, a parameter type, a translation parameter Dx, a translation parameter Dy, a scale parameter M, and a rotation parameter a.
The translation parameter, the rotation parameter and the scale parameter can be stored by a single-precision floating point type (float) or a double-precision floating point type (double) numerical type. The coordinate system name establishment parameter type may be stored using unsigned short integer (UShort).
If the coordinate system names are stored by using characters (string), the occupied storage space is large, and redundancy exists, so that data redundancy is reduced by establishing indexes for different areas and different coordinate system names. Taking four sets of coordinate systems of Kunming area as an example, a coordinate system index table shown in Table 1 is established. The interconversion relationship of the four sets of coordinate systems in the Kunming area has 6 combinations, if 96 bytes are occupied according to character storage, and if only 24 bytes are occupied by adopting an index mode, the coordinate system index is established, so that the storage space is greatly saved.
TABLE 1 coordinate system index Table
Name (R) Indexing Remarks for note
Kunming 1954 1 1954 Beijing coordinate system of Kunming region
Kunming 1980 2 1980 sienna coordinate system of Kunming region
Kunming 2000 3 2000 national geodetic coordinate system of Kunming City region
Kunming 1987 4 Local coordinate system of Kunming city area
The above parameter types may also be indexed, for example, the plane four parameter is index 1 and the boolean parameter is index 2. Both the coordinate system name index and the parameter type index can be stored in an unsigned short integer (UShort). The translation parameter, the rotation parameter and the scale parameter can be stored by a single-precision floating point type (float) or a double-precision floating point type (double) numerical type. The unit of the translation parameter is meter, and the single-precision floating point type can meet the requirement of effective decimal place (3 bits). For the situation that the single-precision floating-point type significant decimal digit 7 bits can not meet the decimal precision of the rotation parameter and the scale parameter, the single-precision floating-point type significant decimal digit can be amplified by a plurality of times (such as 1E6) and then stored, and the single-precision floating-point type significant decimal digit is divided by the corresponding multiple when calling conversion. The logical structure of the plane four parameters is shown in table 2, and one plane four parameter will occupy 22 bytes.
TABLE 2 planar four parameter logic Structure
Figure BDA0002216541410000051
Reading the four plane parameters according to the data type sequence of the table 2, reading an index 1 at the 1 st, storing by adopting unsigned short integer (Ushort), and occupying 2 bytes, namely a source coordinate system is Kunming 1954; reading the 2 nd index 2, storing by adopting unsigned short integer (Ushort), occupying 2 bytes, namely a target coordinate system of Kunming 1980; reading the 3 rd index 1, storing by adopting unsigned short integer (Ushort), occupying 2 bytes, namely the parameter type is a plane four parameter; then, four coordinate parameters are read and stored by a single precision floating point (float), which occupies 4 × 4-16 bytes and is respectively four coordinate parameters Dx, Dy, M, and a.
For example, the conversion parameters of the seven parameters of the boolean sha include a source coordinate system name, a target coordinate system name, a parameter type, a translation parameter Dx, a translation parameter Dy, a translation parameter Dz, a rotation parameter Rx, a rotation parameter Ry, a rotation parameter Rz, and a scale parameter M. The logical structure of the seven boolean parameters is shown in table 3, and one seven boolean parameter would occupy 34 bytes.
TABLE 3 logical Structure of seven parameters of Boolean Sha
Figure BDA0002216541410000052
Reading the seven parameters of the Boolean Sha according to the data type sequence of the table 3, reading an index 1 at the 1 st, storing by adopting unsigned short integer (Ushort), and occupying 2 bytes, namely a source coordinate system is Kunming 1954; reading the 2 nd index 2, storing by adopting unsigned short integer (Ushort), occupying 2 bytes, namely a target coordinate system of Kunming 1980; reading the 3 rd index 2, storing by adopting unsigned short integer (Ushort), occupying 2 bytes, namely the parameter type is a seven-Boolean parameter; then, seven coordinate parameters are read and stored by adopting a single precision floating point type (float), and the coordinate parameters occupy 28 bytes which are 4 multiplied by 7 and are respectively four coordinate parameters of Dx, Dy, Dz, Rx, Ry, Rz and M.
Step S3, parameter encryption: as shown in fig. 2, the coordinate transformation parameter is encrypted by combining a symmetric encryption algorithm and an asymmetric encryption algorithm, and the TDES symmetric algorithm and the RSA asymmetric algorithm are used in this embodiment. Firstly, a user manually inputs an encryption password to convert the encryption password into a user key, a TDES symmetric algorithm is used for symmetrically encrypting a coordinate conversion parameter to obtain symmetric encryption data, namely first encryption data, an SDK key generation interface SlcRsa Generation Key provided by the Rough 5 is used for generating a unique public key of the Rough 5, the public key of the Rough 5 is used for carrying out RSA asymmetric encryption on the first encryption data to obtain asymmetric encryption data, namely second encryption data, and finally the encrypted coordinate conversion parameter is obtained.
Step S4, parameter writing: the encrypted coordinate conversion parameters are written in the storage area of the key 5.
Step S5, reading the parameters in the dog: and reading the encrypted coordinate conversion parameters of the storage area of the sharpening 5 by using the data reading interface of the sharpening 5.
Step S6, decryption of parameters: the parameter decryption is opposite to the parameter encryption process, an SDK key generation interface SlcRsaGenerateKey provided by the key generation device 5 is used for generating a private key, the private key is used for decrypting the encrypted coordinate conversion parameter to obtain first decrypted data, a user inputs a password, and the TDES symmetric algorithm is used for decrypting the first decrypted data for the second time to obtain the decrypted coordinate conversion parameter.
Step S7, coordinate conversion: and carrying out coordinate conversion on the decrypted coordinate conversion parameters by using a corresponding conversion model.
Common coordinate conversion models include a seven-parameter boolean sha model, a seven-parameter three-dimensional conversion model, a seven-parameter two-dimensional conversion model, a seven-parameter three-dimensional model, a four-parameter two-dimensional conversion model, a polynomial fitting model, and the like. The present embodiment takes a planar four-parameter transformation model (two-dimensional four-parameter transformation model) and a boolean seven-parameter transformation model, which are widely applied in the area coordinate transformation, as an example for explanation.
The symmetric encryption key is generated by a user password, so that parameters can be encrypted and used only by a coordinate conversion person who knows the password, and the asymmetric encryption public key and private key are generated by a dongle, so that the public key and the private key can be reset before encryption, and different keys are generated.
The generation of the key can be bound with hardware of a computer to ensure that the dongle is used on the appointed computer, and the specific method is that the unique serial number A of the CPU and the mainboard of the computer hardware is obtained, and the public key of the dongle is used for encrypting the unique serial number A to obtain encrypted data B. When the software is used, the encrypted data B is decrypted by the private key of the dongle, the decrypted content A 'is compared with the unique number A of the CPU and the mainboard of the computer hardware, and if the decrypted content A' is consistent with the unique number A of the CPU and the mainboard of the computer hardware, the encrypted data B passes through. Therefore, after the program is started, the program exits according to whether the hardware serial number A stored in the dongle is consistent with that stored in the dongle.
The number of bytes of the RSA asymmetric algorithm is generally 1024 bits, when the length of the data to be processed exceeds the length, the data needs to be processed in a segmented mode, the processing mode is that firstly, the length of the number of bytes after the data is encrypted for the first time is calculated, when the data is encrypted by using the asymmetric encryption RSA, the encrypted data is ensured to be 1024 bits and less than 1024 bits, and then 0 is used for completing the data; and if the number of the bits exceeds 1024, the encryption is carried out according to a 1024-segment encryption mode, and the part which is less than 1024 bits after segmentation is also filled with 0.
The unique serial number A of the CPU and the mainboard of the computer hardware is obtained, and the public key of the dongle is used for encrypting the unique serial number A to obtain encrypted data B. When the software is used, the B is decrypted by a private key of the dongle, the decrypted content A ' is compared with the unique number A of the CPU and the mainboard of the computer hardware, and if the decrypted content A ' is consistent with the unique number A of the CPU and the mainboard of the computer hardware, the decrypted content A ' passes through. Therefore, after the program is started, the program exits according to whether the hardware serial number A stored in the dongle is consistent with that stored in the dongle.
The invention can greatly save the space of the memory card by establishing the parameter index and storing the numerical value by bytes. According to the requirement of national coordinate system conversion, generally one county (city, district) needs to store 4 sets of coordinate systems, namely, 4 coordinate systems of 1954 Beijing coordinate system, 1980 Xian coordinate system, 2000 national geodetic coordinate system and local coordinate system are converted with each other, and the number of conversion parameters is 6. For only needing to store the conversion parameters of 1 county (city and district), the storage space of the common dongle can meet the storage requirement. If storage of state (city) or provincial coordinate conversion parameters is to be handled, the storage requirement may not be satisfied if the conversion parameters are not specially processed. For example, 129 counties (cities and districts) in Yunnan province, 774-129 × 6 parameters are reached if the conversion parameters need to be stored.
If the parameter file is stored in the text ASCII, a plane four parameter takes about 100 bytes and a Boolean seven parameter takes about 160 bytes. If the plane four parameters and the boolean nutgrass parameters of 129 areas are stored at the same time, a storage space of 197KB ═ 100+160 × 774/1024 is needed, and a storage space of 42KB ═ 22+34 × 774/1024 is needed to establish the parameter index to store the plane four parameters and the boolean nutgrass parameters of the 129 areas.
At present, the price of the dongle has a direct relationship with the storage space, and even the common 64KB dongle can meet the storage requirements of different conversion parameters of provincial counties (cities and districts) after being processed by the algorithm. If the storage space of the dongle is 128KB, 5900 plane four parameters can be stored, or about 4300 boolean sarsa seven parameters can be stored, and the requirement of interconversion parameters of about 400 counties (cities and districts) and 4 coordinate systems can be simultaneously stored.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (4)

1. A coordinate transformation parameter encryption and decryption method based on a dongle is characterized by comprising the following steps:
step S1, open dongle authentication: opening the dongle to verify the authorization condition, and confirming the authorization correctness and the operation authority to ensure normal use;
step S2, reading text parameters: firstly establishing a coordinate system name index and a parameter type index, and then reading the coordinate system name index, the parameter type index and the coordinate parameter; the coordinate system name index, the parameter type index and the coordinate parameter are coordinate conversion parameters; reading a character file storing the coordinate conversion parameters, converting the character file into a corresponding byte stream, and storing the byte stream in a dongle for encryption; the coordinate system name index and the parameter type index are stored in an unsigned short integer mode; the coordinate parameters are stored in a single-precision floating point type; when the single-precision floating-point type effective decimal place can not meet the requirement of the coordinate parameters on the decimal place precision, the decimal place precision is amplified by times and then stored, and the decimal place precision is divided by the corresponding times when calling and converting;
step S3, parameter encryption: encrypting the coordinate conversion parameter by combining a symmetric encryption algorithm and an asymmetric encryption algorithm, firstly inputting an encryption password by a user, symmetrically encrypting the coordinate conversion parameter by using the symmetric encryption algorithm to obtain first encrypted data, and then asymmetrically encrypting the first encrypted data by using a public key of a dongle to obtain second encrypted data which are the encrypted coordinate conversion parameter; adopting TDES symmetrical algorithm and RSA asymmetrical algorithm;
step S4, parameter writing: writing the encrypted coordinate conversion parameters into a storage area of the dongle;
step S5, reading the parameters in the dog: reading a cryptographic coordinate conversion parameter of a cryptographic dog storage area by using a data reading interface of the cryptographic dog;
step S6, decryption of parameters: decrypting the encrypted coordinate conversion parameter by using a private key of the dongle to obtain first decrypted data, inputting a password by a user, and decrypting the first decrypted data for the second time by using a symmetric encryption algorithm to obtain a decrypted coordinate conversion parameter;
step S7, coordinate conversion: carrying out coordinate conversion on the decrypted coordinate conversion parameters by using a coordinate conversion model; the coordinate conversion model comprises a seven-parameter Boolean Sa model, a three-dimensional seven-parameter conversion model, a two-dimensional seven-parameter conversion model, a three-dimensional seven-parameter model and a polynomial fitting model.
2. The method for encrypting and decrypting the coordinate conversion parameter based on the dongle according to claim 1, wherein when the number of the data characters to be processed by the RSA asymmetric algorithm exceeds 1024 bits, the data characters need to be segmented, and the processing method includes firstly calculating the length of the byte number after the first encryption, wherein the length of the characters is less than 1024 bits, then completing the characters by 0, wherein the length of the characters exceeds 1024 bits, the method is performed according to a 1024-segment encryption method, and the parts which are less than 1024 bits after the segmentation are also completed by 0.
3. The method for encrypting and decrypting the coordinate transformation parameter based on the dongle as claimed in claim 1, wherein in order to ensure that the dongle is used on a designated computer, the unique serial number a of the CPU and the motherboard of the computer hardware is obtained, the public key of the dongle is used for encrypting the encrypted data to obtain encrypted data B, when the software is used, the private key of the dongle is used for decrypting the encrypted data B, and the decrypted content a ' is compared with the obtained unique serial number a of the CPU and the motherboard of the computer hardware, and if the encrypted content a ' is consistent with the obtained unique serial number a of the CPU and the motherboard of the computer hardware, the decrypted content a ' passes.
4. The dongle-based coordinate conversion parameter encryption and decryption method of claim 1, wherein the dongle employs finish 5.
CN201910917223.7A 2019-09-26 2019-09-26 Coordinate transformation parameter encryption and decryption method based on dongle Active CN110677245B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910917223.7A CN110677245B (en) 2019-09-26 2019-09-26 Coordinate transformation parameter encryption and decryption method based on dongle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910917223.7A CN110677245B (en) 2019-09-26 2019-09-26 Coordinate transformation parameter encryption and decryption method based on dongle

Publications (2)

Publication Number Publication Date
CN110677245A CN110677245A (en) 2020-01-10
CN110677245B true CN110677245B (en) 2020-09-25

Family

ID=69079279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910917223.7A Active CN110677245B (en) 2019-09-26 2019-09-26 Coordinate transformation parameter encryption and decryption method based on dongle

Country Status (1)

Country Link
CN (1) CN110677245B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114001650B (en) * 2021-09-16 2023-09-29 北京市测绘设计研究院 Encryption method for conversion parameters of local coordinate system and arbitrary plane coordinate system
CN114500042A (en) * 2022-01-25 2022-05-13 中煤航测遥感集团有限公司 Pipeline coordinate data transmission method and device and computer equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322224B1 (en) * 2000-09-14 2008-11-05 The Board Of Trustees Of The Leland Stanford Junior University Assessing condition of a joint and cartilage loss

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071935A (en) * 2015-07-09 2015-11-18 浪潮通用软件有限公司 Data processing method, heterogeneous system and integrated system
CN106557682B (en) * 2016-10-28 2019-08-16 无锡海斯凯尔医学技术有限公司 The authority checking method and device of softdog
CN107391463A (en) * 2017-07-20 2017-11-24 上海金大师网络科技有限公司 A kind of market data compression method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322224B1 (en) * 2000-09-14 2008-11-05 The Board Of Trustees Of The Leland Stanford Junior University Assessing condition of a joint and cartilage loss

Also Published As

Publication number Publication date
CN110677245A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
CN102163268B (en) The term of execution verifying software code the method and apparatus of integrality
CN108090329A (en) A kind of method and device that digital watermarking encipherment protection is carried out to content of text
CN109547201B (en) Encryption method of root key, computer readable storage medium and terminal equipment
EP3667535A1 (en) Storage data encryption and decryption device and method
CN110677245B (en) Coordinate transformation parameter encryption and decryption method based on dongle
WO2020073508A1 (en) Method and device for adding and extracting audio watermark, electronic device and medium
CN104657670A (en) Data encryption based safety use method of configuration file
CN105320895A (en) High performance autonomous hardware engine for online encryption processing
CN111010266B (en) Message encryption and decryption, reading and writing method and device, computer equipment and storage medium
CN111832031B (en) Family file processing method and device, computer equipment and storage medium
CN116582246B (en) Vector geospatial data exchange cipher watermarking method based on chaos and zero watermarking
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
CN104732159A (en) File processing method and file processing device
CN104298926A (en) Method and device for running encrypted file
JP2002351742A (en) Data protecting device
CN112231718A (en) Data encryption processing method and device, computer equipment and storage medium
CN111104693A (en) Android platform software data cracking method, terminal device and storage medium
CN115906124A (en) Revit project file encryption method, decryption method, device and equipment
CN102270182A (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
Yuping et al. Research and realization of multi-level encryption method for database
US10505714B2 (en) Floating point cohort based encryption
CN111079165B (en) Data processing method, data processing device, equipment and storage medium
CN110147677A (en) The safe encrypted electronic signature mouse of quantum, computer and its encryption method
CN112749402B (en) Electronic data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant