CN111294322B - Data file distribution system of encryption counter - Google Patents

Data file distribution system of encryption counter Download PDF

Info

Publication number
CN111294322B
CN111294322B CN201811501188.2A CN201811501188A CN111294322B CN 111294322 B CN111294322 B CN 111294322B CN 201811501188 A CN201811501188 A CN 201811501188A CN 111294322 B CN111294322 B CN 111294322B
Authority
CN
China
Prior art keywords
ckey
data
counter
encryption
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811501188.2A
Other languages
Chinese (zh)
Other versions
CN111294322A (en
Inventor
卢君明
洪享
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Kingchip Electronics Technology Co ltd
Original Assignee
Shanghai Kingchip Electronics Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Kingchip Electronics Technology Co ltd filed Critical Shanghai Kingchip Electronics Technology Co ltd
Priority to CN201811501188.2A priority Critical patent/CN111294322B/en
Publication of CN111294322A publication Critical patent/CN111294322A/en
Application granted granted Critical
Publication of CN111294322B publication Critical patent/CN111294322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data file distribution system of an encryption counter, which comprises a download software CKEY _ LOAD and CKEY distribution data file at a PC terminal, a CKEY data downloader and a CKEY encryption counter; the distributed data files are downloaded to the CKEY data downloader through the download software of the computer end (PC end), and then the corresponding effective times and authority control are downloaded to the encryption counter CKEY through the CKEY data downloader.

Description

Data file distribution system of encryption counter
Technical Field
The invention relates to the technical field of data file distribution, in particular to a data file distribution system of an encryption counter.
Background
In many production facilities, there are many devices that are charged or time-charged for various technical and economic reasons among the end users, so there is a dedicated encryption counter in the device to count the users' services. Once the number of times or the number of hours purchased by the user is used up, when the user needs to add or update the valid number of times or the number of hours, one processing method is to return the whole equipment to the manufacturer or the equipment maintenance personnel to the client for software upgrade or modification of the valid number of times. This method of treatment requires the logistics of the equipment or the back-and-forth movement of the maintenance personnel, and is very poor in terms of economy and timeliness.
A convenient processing method is to design an independent encryption counter (CKEY, CryptoKey), to make the counting function independent to a device with the size similar to a U disk, and to place the counting condition and the authority control of the device in the CKEY. As long as the client uses different encryption counters, there may be different usage rights and counting situations. After the customer uses the available times of the current CKEY, the customer can continue to use the equipment as long as the available times in the CKEY are updated again or a new CKEY is purchased. This approach is a significant improvement in economic cost compared to the transport of the entire facility and the back-and-forth handling of maintenance personnel. However, updating and purchasing of CKEY data still requires logistics transportation, and is not fast enough in timeliness compared with long-distance logistics or transnational transactions. To this end, we have designed a data file distribution system that encrypts counters.
Disclosure of Invention
In order to solve the defects of the prior art, the invention discloses a data file distribution system of an encryption counter, which can ensure that a user can purchase effective times in real time according to needs, transmit data files through a network and update the encryption counter in real time, and avoid the trouble of mailing the CKEY of the encryption counter.
The invention discloses a data file distribution system of an encryption counter, which comprises a download software CKEY _ LOAD and CKEY distribution data file at a PC terminal, a CKEY data downloader and a CKEY encryption counter;
the download software CKEY _ LOAD is PC-side software and realizes the functions of reading CKEY distribution data files, checking completeness, downloading CKEY frequency distribution data to a CKEY data downloader through serial port communication and reading CKEY data downloader information;
the CKEY distributes data files: the distributed data file is a distributed data file sent to a client and comprises a UID of CKEY, an end count value of the last configuration, the effective count times of the current configuration, the end count value of the current configuration and data of other CRC (cyclic redundancy check) codes, wherein the effective count times of the current configuration is the end count value of the current configuration-the end count value of the last configuration;
the CKEY data downloader: the method is characterized in that the method is communicated with PC end software through a serial port, so that a PC end software instruction is received, CKEY is updated according to counting information, CKEY information is read and transmitted to the PC end software;
the CKEY encryption counter: is an encryption counter used by the user equipment.
Furthermore, the CKEY encryption counter is an EEPROM memory embedded with a 128-bit cryptographic algorithm, and is embedded with a value-added memory area, where the value-added memory area is an area stored after adding data in an instruction field, and the value-added memory area can be used as an addition counter, and when the CKEY encryption counter is used as a user equipment frequency counter, the addition operation of an internal counter can be performed only through an encryption communication mode.
Further, the CKEY encryption counter also stores a unique corresponding identification code, that is, the UID, the device authority, the current valid end counter value, and the unique key information of the communication key, where the valid number of times in the CKEY encryption counter is the difference between the end count value in the CKEY and the currently used count value.
Further, the CKEY data distribution file contains the following key information: the key information is stored by adopting plaintext and ciphertext encrypted through a cryptographic algorithm, and simultaneously carries CRC (cyclic redundancy check) codes.
Furthermore, the downloading software CKEY _ LOAD of the PC side realizes the checking of the CKEY distribution data file, the checking of CKEY encryption counter information, the recharging operation of the downloading data file and the recording operation of the operation information by the PC side.
Furthermore, the CKEY data downloader realizes communication with a PC (personal computer) end through a universal serial communication module, can receive an instruction sent by the PC end and accesses and operates the CKEY encryption counter; the data of the distributed data file sent by the PC end can be received, the ciphertext part in the distributed data file is decrypted and the consistency of the data is checked, the communication between the data and the CKEY encryption counter is processed in an encryption communication mode, and the key process of recharging is prevented from being effectively acquired by a client.
The beneficial effects are that: according to the current computer technology and network transmission technology, data files are transmitted to users in real time, corresponding effective times and authority control are downloaded to an encryption counter CKEY through a matched CKEY counting downloader by using PC end software of a user end, and the data files needing to be distributed can be safely updated to the encryption counter CKEY in real time through the data distribution system.
The data file distribution system has the technical advantages that:
1. the response speed is high, and after a customer makes a service request, a service provider can complete the service by only sending a mail through the Internet.
2. The cost of personnel rushing or logistics mailing is avoided.
3. The security is higher, the reliability and controllability of remote upgrading are ensured through a mathematical encryption algorithm, and data replay attack and data tampering attack which may be initiated by lawless persons can be effectively resisted.
Drawings
FIG. 1 is a system flow diagram of a data file distribution system for encryption counters of the present invention;
FIG. 2 is a communication block diagram of a CKEY data downloader of a data file distribution system of an encryption counter according to the present invention;
fig. 3 is a communication block diagram of CKEY of a data file distribution system of an encryption counter according to the present invention.
Detailed Description
As shown in fig. 1, the invention discloses a data file distribution system of an encryption counter, which comprises two parts at a PC end, namely a download software CKEY _ LOAD and a CKEY data distribution file, wherein the download software CKEY _ LOAD at the PC end realizes the functions of checking the CKEY distribution data file, checking information of a CKEY encryption counter, recharging the download data file and recording operation information at the PC end, and the download software CKEY _ LOAD performs file consistency check on the CKEY distribution data file, checking plaintext data consistency of key information, providing UID of target CKEY, displaying effective recharging data and the like.
The download software CKEY _ LOAD accesses a serial connection CKEY data downloader, can acquire and display information such as UID (user identifier), end counter value, current effective times, control authority and the like of a connected CKEY encryption counter, and can also provide necessary information for generating a distribution data file for a producer of the distribution data file.
Downloading the software CKEY _ LOAD can simply match the acquired CKEY encryption counter with the information of the distributed data file, and if the CKEY encryption counter and the distributed data file are inconsistent, necessary instructions are provided, for example, when the UID of the connected CKEY encryption counter is inconsistent with the UID of the distributed data file, the target CKEY is inconsistent.
The downloading software CKEY _ LOAD can realize the data downloading and recharging operation of the CKEY distribution data file relative to the corresponding CKEY encryption counter.
The CKEY data distribution file of the PC end comprises the following key information: key information, namely current counting end value information of the current distribution CKEY, current distribution CKEY authority control information and the like, corresponding to the current distribution data file, wherein the valid counting times of the current configuration are the ending counting value of the current configuration and the ending counting value of the last configuration, the key information is stored by adopting plaintext and ciphertext encrypted through a cryptographic algorithm, the information carries CRC (cyclic redundancy check) codes so as to carry out data consistency check, and the whole data distribution file carries the CRC codes so as to carry out data consistency check of the file and ensure that the file information is not tampered.
The CKEY data distribution file is designed in such a way that the influence of characteristics of easy copying, easy storage and easy change of the data file on the CKEY data distribution can be avoided; the method can avoid that the same CKEY data is distributed to different CKEY encryption counters for recharging; the same CKEY data distribution file is avoided, and the same CKEY encryption counter is repeatedly charged; the method avoids the situation that the same CKEY data distributes files, and after the data are tampered, the CKEY encryption counter is charged.
The CKEY encryption counter is provided with a unique identification code UID, so that the problem that a CKEY data file is distributed to different CKEY encryption counters can be solved; the last counting end value information and the current counting end value information in the data file are combined with the ending counter value of the CKEY encryption counter, so that the problem that one data file is reused for many times can be avoided; the plaintext and the ciphertext of the key information are stored, and the existence of the data consistency check code ensures that the data is not easy to be falsified.
CKEY data downloader contains hardware design module and software design, and wherein the hardware design module contains: the device comprises a main control MCU, a serial port communication module, a CKEY encryption counter communication module, an I2C EEPROM module and an LED indication module; the software design module comprises: the device comprises a PC end communication interface processing part, a PC instruction processing part, a communication encryption information processing part of a CKEY encryption counter and an I2C EEPROM processing part.
The CKEY data downloader realizes communication with a PC (personal computer) end through a universal serial communication module, can receive an instruction sent by the PC end and accesses and operates a CKEY encryption counter; the data of the distributed data file sent by the PC end can be received, the ciphertext part in the distributed data file is decrypted and the consistency of the data is checked, the communication between the data and the CKEY encryption counter is processed in an encryption communication mode, and the key process of recharging is prevented from being effectively acquired by a client.
As shown in fig. 2, in the application example of the CKEY data downloader, the core control part is a main control MCU module, wherein software developed by MCU realizes software processing of serial port communication with the PC, an instruction processing part issued by the PC, a communication encryption information processing part of the CKEY encryption counter, an I2C EEPROM processing part, a key processing part, and an LED display part, and according to the hardware structure of each part, a complete function of writing the distributed data file into CKEY is realized.
As shown in fig. 3, in the application example of writing the distributed data file into the CKEY, the encrypted memory chip stores the unique corresponding identification code, i.e., the UID, the device authority, the current valid end counter value, and the unique key information of the communication key, wherein the valid number counter can only implement a function of subtracting one when connected to the client device, so as to avoid the increase of abnormal number, and the increase of the count number can only be controlled by the downloader, and when connected to the CKEY data downloader, the authorized count number can be increased according to the data distribution file issued by the PC.
The CKEY encryption counter is an EEPROM memory embedded with a cryptographic algorithm, an increment memory area is embedded, the area can be added with data in an instruction area and then stored, the increment memory area can be used as an addition counter, when the CKEY encryption counter is used as an equipment frequency counter, the addition operation of an internal counter can be carried out only in an encryption communication mode, the used frequency or the number of times of customer equipment is increased, and further the effective frequency of customers is reduced.
Meanwhile, the unique corresponding identification code, namely UID, equipment authority, the effective end counter value and the unique key information of the communication key, are also stored in the CKEY encryption counter to prevent the CKEY encryption counter from being cloned by lawbreakers, wherein the effective times of the CKEY encryption counter is the difference between the end count value and the current used count value in the CKEY, and once the client device detects that the current used times reaches or exceeds the end count value, the client device gives an alarm and stops corresponding operation.
In the data distribution system, the CKEY encryption counter is used as a receiving terminal for final data distribution, and can be recharged by increasing the technical count value of the CKEY under the control of a CKEY data downloader.
The invention is implemented as follows: the distributed data files are downloaded to the CKEY data downloader through the download software of the computer end (PC end), and then the corresponding effective times and authority control are downloaded to the encryption counter CKEY through the CKEY data downloader. By adopting the technical scheme, the data file is transmitted to the user in real time according to the current computer technology and network transmission technology, the corresponding effective times and authority are downloaded to the CKEY of the encryption counter by using PC end software of the user end through a matched CKEY counting downloader, and the data file to be distributed can be safely updated to the CKEY of the encryption counter in real time through the data distribution system.
Finally, it should be noted that: the above embodiments are only used to illustrate the present invention and do not limit the technical solutions described in the present invention; thus, while the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted; all such modifications and variations are intended to be included herein within the scope of this disclosure and the present invention and protected by the following claims.

Claims (3)

1. A data file distribution system for encryption counters, characterized by: the system comprises a download software CKEY _ LOAD and CKEY distribution data file at a PC terminal, a CKEY data downloader and a CKEY encryption counter;
the download software CKEY _ LOAD is PC-side software and realizes the functions of reading CKEY distribution data files, checking completeness, downloading CKEY frequency distribution data to a CKEY data downloader through serial port communication and reading CKEY data downloader information;
the CKEY distributes data files: the distributed data file is a distributed data file sent to a client and comprises a UID of CKEY, an end count value of the last configuration, the effective count times of the current configuration, the end count value of the current configuration and data of other CRC (cyclic redundancy check) codes, wherein the effective count times of the current configuration is the end count value of the current configuration-the end count value of the last configuration;
the CKEY data downloader: the method is characterized in that the method is communicated with PC end software through a serial port, so that a PC end software instruction is received, CKEY is updated according to counting information, CKEY information is read and transmitted to the PC end software;
the CKEY encryption counter: is the encryption counter used by the user equipment,
the CKEY encryption counter also stores a unique corresponding identification code, namely UID, equipment authority, an effective end counter value and unique key information of a communication key, wherein the effective times in the CKEY encryption counter is the difference between an end count value in the CKEY and a currently used count value;
the CKEY data downloader realizes communication with a PC (personal computer) end through a universal serial port communication module, receives an instruction sent by the PC end and accesses and operates a CKEY encryption counter; the data of the distributed data file sent by the PC end is received, the ciphertext part in the distributed data file is decrypted and the consistency of the data is checked, the communication between the data and the CKEY encryption counter is processed in an encryption communication mode, and the key recharging process is prevented from being effectively acquired by a client;
the CKEY data distribution file contains the following key information: the key information is stored by adopting plaintext and ciphertext encrypted through a cryptographic algorithm, and simultaneously carries CRC (cyclic redundancy check) codes; when the effective number counter is connected with client equipment, the function of subtracting one can be realized, the condition that abnormal numbers are increased is avoided, the increase of the counting number can be controlled only by a downloader, and when the CKEY data downloader is connected, authorized counting numbers can be increased according to a data distribution file issued by a PC (personal computer) terminal.
2. The data file distribution system of the encryption counter according to claim 1, characterized in that: the CKEY encryption counter is an EEPROM memory embedded with a 128-bit cipher algorithm, and is embedded with a value-added storage area, the value-added storage area is an area which is stored after being added with data in an instruction area, the value-added storage area is used as an addition counter, and when the CKEY encryption counter is used as a user equipment frequency counter, the addition operation of an internal counter can be carried out only in an encryption communication mode.
3. The data file distribution system of the encryption counter according to claim 1, characterized in that: and the download software CKEY _ LOAD of the PC terminal realizes the check of the CKEY distribution data file, the check of CKEY encryption counter information, the recharging operation of the download data file and the recording operation of the operation information by the PC terminal.
CN201811501188.2A 2018-12-10 2018-12-10 Data file distribution system of encryption counter Active CN111294322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811501188.2A CN111294322B (en) 2018-12-10 2018-12-10 Data file distribution system of encryption counter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811501188.2A CN111294322B (en) 2018-12-10 2018-12-10 Data file distribution system of encryption counter

Publications (2)

Publication Number Publication Date
CN111294322A CN111294322A (en) 2020-06-16
CN111294322B true CN111294322B (en) 2022-03-29

Family

ID=71028823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811501188.2A Active CN111294322B (en) 2018-12-10 2018-12-10 Data file distribution system of encryption counter

Country Status (1)

Country Link
CN (1) CN111294322B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386369A (en) * 1993-07-12 1995-01-31 Globetrotter Software Inc. License metering system for software applications
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NO311197B1 (en) * 2000-03-02 2001-10-22 Ramirez Olguin Nelson Eric Security system against illegal use or copying of electronic data
US20100303229A1 (en) * 2009-05-27 2010-12-02 Unruh Gregory Modified counter mode encryption
US8843767B2 (en) * 2011-07-06 2014-09-23 The Boeing Company Secure memory transaction unit
US20150350894A1 (en) * 2014-05-29 2015-12-03 Entersekt, LLC Method and System for Establishing a Secure Communication Channel

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386369A (en) * 1993-07-12 1995-01-31 Globetrotter Software Inc. License metering system for software applications
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof

Also Published As

Publication number Publication date
CN111294322A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
US6195432B1 (en) Software distribution system and software utilization scheme for improving security and user convenience
US8155320B2 (en) Data storage device, management server, integrated circuit, data update system, home electric apparatuses, data update method, encryption method, and encryption/decryption key generation method
EP3909220B1 (en) System and method for secure detokenization
US20150222426A1 (en) Method and System for Transferring Firmware or Software to a Plurality of Devices
CN104040933A (en) Differential client-side encryption of information originating from client
CN103729942A (en) Method and system for transmitting transmission key from terminal server to key server
CN104969245A (en) Apparatus and methods for secure element transactions and management of assets
CN103095457A (en) Login and verification method for application program
CN101138242A (en) An interactive television system
US11468437B2 (en) Method and system for license server synchronization
US20140351600A1 (en) Method and apparatus for authenticating static transceiver data and method of operating an ais transceiver
CN106330936A (en) Plug-in data transmission method, client and server
US20130036160A1 (en) License issuing system, client terminal, server, and license issuing method
KR20040028086A (en) Contents copyright management system and the method in wireless terminal
CN111294322B (en) Data file distribution system of encryption counter
EP2950229B1 (en) Method for facilitating transactions, computer program product and mobile device
JP2020052761A (en) Payment processing method and payment processing system
CN111143788B (en) License processing method, electronic device, and storage medium
JP4737974B2 (en) ONLINE SHOPPING SYSTEM AND USER MANAGEMENT DEVICE, NET STORE DEVICE, AND USER TERMINAL DEVICE
KR102014275B1 (en) A method for processing encryption of card information and an appapratus using it
CN209028611U (en) A kind of UKEY crawler of data distribution file
CN108848089B (en) Data encryption method and data transmission system
CN101414333B (en) Time safety transfer apparatus and time update method for transfer system
CN111415148A (en) Method and device for non-inductive payment, electronic equipment and storage medium
KR101752291B1 (en) Mobile phone micro payment processing agency services apparatus for management and earn points, and operating method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant