CN116432195A - Encryption method and device, encryption lock, electronic equipment and storage medium - Google Patents

Encryption method and device, encryption lock, electronic equipment and storage medium Download PDF

Info

Publication number
CN116432195A
CN116432195A CN202211714587.3A CN202211714587A CN116432195A CN 116432195 A CN116432195 A CN 116432195A CN 202211714587 A CN202211714587 A CN 202211714587A CN 116432195 A CN116432195 A CN 116432195A
Authority
CN
China
Prior art keywords
key information
encryption
original data
encrypted data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211714587.3A
Other languages
Chinese (zh)
Inventor
王宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luster LightTech Co Ltd
Original Assignee
Luster LightTech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luster LightTech Co Ltd filed Critical Luster LightTech Co Ltd
Priority to CN202211714587.3A priority Critical patent/CN116432195A/en
Publication of CN116432195A publication Critical patent/CN116432195A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses an encryption method, an encryption device, an encryption lock, an electronic device, and a nonvolatile computer-readable storage medium. Under the condition that a request for storing original data is received, reading key information stored in an encryption lock, wherein the original data is data generated by target software authorized by the encryption lock; and encrypting the original data according to the key information to generate encrypted data. Under the condition that a request for storing the original data is received, the key information stored in the encryption lock is read so as to complete targeted encryption of the original data, and then the original data is encrypted according to the key information to generate encrypted data, so that the original data cannot be easily leaked out. Therefore, compared with the encryption technology capable of encrypting software only, the encryption lock can be used for encrypting the original data, so that the risk of stealing the original data in the software is reduced, and the security of the original data is improved.

Description

Encryption method and device, encryption lock, electronic equipment and storage medium
Technical Field
The present application relates to the field of encryption technology, and more particularly, to an encryption method, an encryption apparatus, an encryption lock, an electronic device, and a non-volatile computer-readable storage medium.
Background
In order to prevent software from being stolen and ensure the safety of the software, encryption and authorization of the software are usually performed by using an encryption lock, and a machine station loading the software can only use the software when the encryption lock and the software are matched. However, in different projects, developers need to develop different programs according to different requirements, and store the programs as projects. In the existing encryption technology, the encryption lock only aims at software, and the engineering in the software cannot be encrypted, so that the risk that the engineering is stolen in the software possibly occurs, and the safety of the engineering is further affected.
Disclosure of Invention
The embodiment of the application provides an encryption method, an encryption device, an encryption lock, an electronic device and a nonvolatile computer readable storage medium.
The encryption method comprises the steps that under the condition that a request for storing original data is received, key information stored in an encryption lock is read, and the original data is data generated by target software authorized by the encryption lock; and encrypting the original data according to the key information to generate encrypted data.
The encryption device of the embodiment of the application comprises a reading module and an encryption module. The reading module is used for reading the key information stored in the encryption lock under the condition that a request for storing original data is received, wherein the original data is data generated by target software authorized by the encryption lock. The encryption module is used for encrypting the original data according to the key information so as to generate encrypted data.
The encryption lock of the embodiment of the application comprises a storage space, wherein the storage space stores key information, the key information is used for encrypting the original data to generate encrypted data, and the original data is data generated by target software authorized by the encryption lock.
The electronic device of the embodiment of the application comprises a processor, wherein the processor is used for reading key information stored in the encryption lock connected with the electronic device under the condition that a request for storing original data is received, and the original data is data generated by target software authorized by the encryption lock; and encrypting the original data according to the key information to generate encrypted data.
The non-transitory computer readable storage medium of the embodiments of the present application includes a computer program that, when executed by a processor, causes the processor to execute the encryption method. The encryption method comprises the steps of reading key information stored in the encryption lock under the condition that a request for storing original data is received, wherein the original data is data generated by target software authorized by the encryption lock; and encrypting the original data according to the key information to generate encrypted data.
According to the encryption method, the encryption device, the encryption lock, the electronic equipment and the nonvolatile computer readable storage medium, under the condition that a request for storing original data is received, key information stored in the encryption lock is read so as to complete targeted encryption of the original data, and then the original data is encrypted according to the key information to generate encrypted data, so that the original data cannot be easily leaked out. Therefore, compared with the encryption technology capable of encrypting software only, the encryption lock can be used for encrypting the original data, so that the risk of stealing the original data in the software is reduced, and the security of the original data is improved.
Additional aspects and advantages of embodiments of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of embodiments of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow diagram of an encryption method of some embodiments of the present application;
FIG. 2 is a schematic plan view of a dongle of certain embodiments of the present application;
FIG. 3 is a flow diagram of an encryption method of some embodiments of the present application;
FIG. 4 is a flow diagram of an encryption method of some embodiments of the present application;
FIG. 5 is a flow diagram of an encryption method of some embodiments of the present application;
FIG. 6 is a block diagram of an encryption device according to some embodiments of the present application;
FIG. 7 is a schematic plan view of an electronic device according to some embodiments of the present application;
FIG. 8 is a schematic diagram of a connection state of a non-volatile computer readable storage medium and a processor according to some embodiments of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for explaining the embodiments of the present application and are not to be construed as limiting the embodiments of the present application.
Referring to fig. 1 and 2, an embodiment of the present application provides an encryption method, including:
step 011: under the condition that a request for storing original data is received, reading key information stored in the encryption lock 100, wherein the original data is data generated by target software authorized by the encryption lock 100;
specifically, the encryption lock is an intelligent tool with a software protection function provided for a software developer, and can be used for preventing corresponding software from being illegally used. The original data is data generated by the target software authorized by the dongle 100. The existing encryption lock 100 only encrypts the software, and can open the software as long as the encryption lock 100 is authorized by the software, so as to attempt to access all original data in the software, so that the security of the original data is lower, the original data is easily copied randomly in the software, the situation of being stolen occurs, and the original data has poor controllability and cannot be managed and controlled. For a software developer writing original data, after the original data is released in one piece of software, the original data may be copied and used by an unauthorized machine, so that normal revenue is affected, and economic loss is caused.
In order to solve the problems, the original data is encrypted, so that the safety and the controllability of the original data are improved. First, when original data has been generated and needs to be saved, that is, when a request for saving the original data is received, key information stored in the encryption lock 100 is read so as to encrypt the original data according to the key information.
Step 012: the original data is encrypted according to the key information to generate encrypted data.
Specifically, after the key information of the encryption lock 100 is acquired, the original data may be encrypted according to the key information to generate encrypted data. Thus, the encryption of the original data is completed, so that other encryption locks 100 authorized by the target software cannot unlock the encrypted data to acquire the original data, thereby improving the security and controllability of the original data.
Further, when the original data is encrypted according to the key information, the original data is changed from an unencrypted state to an encrypted state by writing the key information into the original data. The original data written with the key information is then saved to generate encrypted data. Thus, the encryption of the original data can be completed through the key information, and only the encryption lock 100 with the key information consistent with the key information in the original data can unlock the encrypted data, so that the staff can use the original data.
In the encryption method of the embodiment of the present application, when a request for storing original data is received, key information stored in the encryption lock 100 is read, so that targeted encryption of the original data is completed, and then the original data is encrypted according to the key information to generate encrypted data, so that the original data cannot be easily leaked. Thus, compared to the encryption technology that can only encrypt software, the encryption lock 100 can be utilized to encrypt the original data, so as to reduce the risk of the original data being stolen in the software, thereby increasing the security of the original data.
Referring to fig. 2 and 3, in some embodiments, the encryption method further includes:
step 013: writing information of the target software and key information into a storage space of the encryption lock 100;
step 014: in the case where the information of the target software in the storage space matches the target software, the target software is authorized to read and write the encryption lock 100.
Specifically, the encryption lock 100 has a certain storage space inside, which can be used to store information and key information of the target software, and the encryption lock 100 can only obtain authorization of the software stored with the corresponding information in the storage space. In order to increase the security of the target software, some target software may also be subject to encryption, so that the encryption lock 100 also needs to obtain authorization of the target software. When the encryption lock 100 unlocks a piece of encrypted data, if the target software where the encrypted data is located also presents an encrypted state, the encryption lock 100 needs to obtain authorization of the target software and the encrypted data at the same time, otherwise, the encryption lock 100 cannot unlock the target software, and further the unlocking of the encrypted data is completed.
Therefore, the information of the target software and the key information need to be written into the storage space of the encryption lock 100 at this time, so that subsequent authorization verification is facilitated. When the target software needs to be used, the encryption lock 100 can be used, then the target software can acquire the information of the target software in the storage space of the encryption lock 100, and under the condition that the information of the target software in the storage space is matched with the target software, the read-write permission of the target software to the encryption lock 100 is authorized, and at the moment, the target software can be started to be used. Thus, the target software can be unlocked by using the encryption lock 100, and the unauthorized encryption lock 100 can not open the target software, so that the controllability and the security of the target software can be improved conveniently.
Referring to fig. 2 and 4, in some embodiments, the encryption method further includes:
step 015: under the condition that a request for opening the encrypted data is received, reading the key information stored in the encryption lock 100 and the key information of the encrypted data, and comparing the key information stored in the encryption lock 100 with the key information of the encrypted data;
step 016: in the case where the key information stored in the encryption lock 100 is identical to the key information of the encrypted data, the encrypted data is unlocked to acquire the original data.
Specifically, after the original data is encrypted, only the encryption lock 100 storing the same key information can complete the unlocking of the encrypted data and acquire the original data. Therefore, in the case of receiving a request for opening the encrypted data, the key information stored in the encryption lock 100 and the key information of the encrypted data are read, respectively, and the key information stored in the encryption lock 100 is compared with the key information of the encrypted data, so as to determine whether the encryption lock 100 has obtained the authorization of the target software. In the case where the key information stored in the encryption lock 100 is identical to the key information of the encrypted data, the encrypted data is unlocked to acquire the original data. In this way, by comparing the key information stored in the encryption lock 100 with the key information of the encrypted data, it is ensured that only the authorized encryption lock 100 can unlock the encrypted data and obtain the original data, so that effective management and control of the original data are facilitated, the security of the original data is improved, and even if other encryption locks 100 obtain the authorization of the target software where the original data is located, the original data cannot be obtained as long as the key information corresponding to the original data is not stored in the encryption lock 100.
For example, the target software has original data a and original data B in it, and both original data have been encrypted, resulting in encrypted data a and encrypted data B, respectively. The encryption lock a stores the key information corresponding to the encrypted data a, the encryption lock B stores the key information corresponding to the encrypted data B, and both the encryption locks 100 can obtain the authorization of the target software. Then, when decryption is performed, the encryption lock a will acquire authorization of the target software, and then complete unlocking of the encrypted data a, so as to obtain the original data a, however, since the encryption lock a has no key information corresponding to the encrypted data B, when the encryption lock a is used, the encrypted data B will not unlock the unauthorized encryption lock 100, and will always present an encrypted state, so that the risk of theft of the original data B is reduced. Similarly, when the encryption lock B is used, authorization of target software is firstly obtained, and unlocking of the encrypted data B is completed, so that the original data B can be obtained, the encrypted data A always presents an encryption state, and the original data A cannot be obtained under the condition that the used encryption lock is not the encryption lock A.
And when the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data, the encryption method further includes:
step 017: in the case where the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data, unlocking of the encrypted data is prohibited and a hint message is issued.
That is, when the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data, it can be confirmed that the encryption lock 100 does not obtain the authorization of the encrypted data, unlocking the encrypted data is forbidden and prompt information is sent, at this time, the original data is still in an encrypted state, and related personnel still cannot use the original data, so that management and control of the original data are ensured, the risk of illegal acquisition of the original data is reduced, and the security of the original data is improved.
Referring to fig. 2 and 5, in some embodiments, the encryption method further includes:
step 018: encrypting the key information in the encrypted data again based on a preset encryption algorithm to generate secondary encrypted data;
step 019: reading key information stored in the encryption lock 100 and decrypting the secondary encrypted data to obtain encrypted data when a request for opening the encrypted data is received;
step 020: comparing the key information stored in the encryption lock 100 with the key information of the encrypted data;
step 021: in the case where the key information stored in the encryption lock 100 is identical to the key information of the encrypted data, the encrypted data is unlocked to acquire the original data.
Specifically, if the key information is directly written into the encrypted data without any processing, there is a risk that the key information may be leaked. Therefore, in order to secure the key information, the key information in the encrypted data is further secondarily encrypted, that is, the key information in the encrypted data is secondarily encrypted based on a preset encryption Algorithm, for example, an MD5Message-Digest Algorithm (MD 5) to generate secondarily encrypted data. When a request for opening the encrypted data is received, the key information stored in the encryption lock 100 may be read, and the secondary encrypted data may be decrypted based on a preset decryption algorithm, so that the encrypted data may be obtained. And then comparing the key information stored in the encryption lock 100 with the key information of the encrypted data, and unlocking the encrypted data when the key information stored in the encryption lock 100 is consistent with the key information of the encrypted data, thereby obtaining the original data. Therefore, the key information in the encrypted data can be exposed only when the key information is unlocked through secondary encryption of the key information, so that the risk that the key information of the encrypted data is easily leaked out is reduced, and the safety and controllability of the original data are improved.
For example, the MD5 information digest algorithm may be used as the preset encryption algorithm and the preset decryption algorithm. After the encrypted data is generated, the key information in the encrypted data is processed using the MD5message digest algorithm to generate the secondary encrypted data. After the original data is required to be acquired, the decryption of the secondary encrypted data is finished by using an MD5 information summary algorithm, so that the encrypted data is acquired. The key information stored in the encryption lock 100 and the key information of the encrypted data are then read and compared. When the two are consistent, the representative encryption lock 100 has obtained authorization of the original data, and the encrypted data can be unlocked at this time to obtain the original data.
Step 017 is also executed when the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data, that is, when the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data, unlocking the encrypted data is prohibited and a prompt message is issued. At this time, the software can learn that the encryption lock does not obtain authorization of the original data, and the original data is still in an encrypted state. Therefore, the security of the original data can be ensured, and the risk of stealing the original data in the software is reduced.
Referring to fig. 6, in order to better implement the encryption method according to the embodiment of the present application, the embodiment of the present application further provides an encryption device 10. The encryption device 10 may include a reading module 11 and an encryption module 12. The reading module 11 is configured to read key information stored in the encryption lock 100 when a request for storing original data is received, where the original data is data generated by target software authorized by the encryption lock 100. The encryption module 12 is used for encrypting the original data according to the key information to generate encrypted data.
The encryption device 10 further comprises a writing module 13 and an authorization module 14. The writing module 13 writes information of the target software and key information into the storage space of the encryption lock 100; the authorization module 14 authorizes the read-write authority of the target software to the encryption lock 100 in the case where the information of the target software in the storage space matches the target software.
The writing module 13 is specifically configured to write key information to the original data, so that the original data is changed from an unencrypted state to an encrypted state.
The encryption device 10 further comprises a saving module 15. The saving module 15 is used for saving the original data written with the key information to generate encrypted data.
The reading module 11 is specifically configured to, when receiving a request for opening encrypted data, read key information stored in the encryption lock 100 and key information of the encrypted data, and compare the key information stored in the encryption lock 100 with the key information of the encrypted data.
The encryption device 10 further includes an unlocking module 16. The unlocking module 16 is configured to unlock the encrypted data to obtain the original data in a case where the key information stored in the encryption lock 100 is consistent with the key information of the encrypted data.
The encryption module 12 is specifically configured to encrypt the key information in the encrypted data again based on a preset encryption algorithm, so as to generate secondary encrypted data.
The reading module 11 is specifically configured to, when receiving a request for opening encrypted data, read key information stored in the encryption lock 100, and decrypt the secondary encrypted data to obtain the encrypted data.
The encryption device 10 further comprises a contrast module 17. The comparing module 17 is used for comparing the key information stored in the encryption lock 100 with the key information of the encrypted data.
The unlocking module 16 is specifically configured to unlock the encrypted data to obtain the original data when the key information stored in the encryption lock 100 is consistent with the key information of the encrypted data.
The encryption device 10 further includes a disabling module 18. The prohibiting module 18 is configured to prohibit unlocking of the encrypted data and issue a prompt message in a case where the key information stored in the encryption lock 100 is inconsistent with the key information of the encrypted data.
Referring to fig. 2, the encryption lock 100 of the embodiment of the present application includes a storage space, where key information is stored in the storage space, where the key information is used to encrypt original data to generate encrypted data, and the original data is data generated by target software authorized by the encryption lock 100.
Specifically, the appearance of the encryption lock 100 is similar to that of a usb disk, and the encryption lock 100 includes a certain storage space, so that the encryption lock 100 can unlock corresponding encrypted data by storing corresponding key information in the storage space of the encryption lock 100; by storing information of the target software in the memory space of the encryption lock 100, the encryption lock 100 is enabled to acquire authorization of the target software. When the original data needs to be acquired, the encryption lock 100 is inserted into the machine station to complete the decryption of the encrypted data and the authorization of the acquisition target software. Therefore, after receiving the insertion operation of the encryption lock 100, the target software in the machine station will first go back to the information of the software in the encryption lock 100, so as to determine whether to authorize the encryption lock 100. When the information of the target software in the storage space matches the target software, the read-write authority of the target software to the encryption lock 100 is authorized. And then obtaining the key information stored in the encryption lock 100, comparing the key information with the key information in the encrypted data in the software, and if the key information stored in the encryption lock 100 is consistent with the key information of a certain encrypted data, obtaining the authorization of the encrypted data by the representative encryption lock 100, and at the moment, unlocking the encrypted data and obtaining the original data.
Thus, the equipment manufacturer can authorize the encryption lock 100 storing the corresponding key information and the information of the target software, thereby improving the convenience of authorization. Compared with the method for decrypting by inputting the password, the method for decrypting by using the encryption lock 100 with the appearance being hardware can enable a worker to decrypt by inserting the encryption lock 100 into a corresponding machine, so that convenience of decryption operation is improved, and usability of the encryption lock 100 is improved. And if the number of the machines is large, a great deal of time and labor are spent for inputting the passwords each time, so that the encryption lock 100 is used for decryption, the decryption speed can be improved, and the use experience of a user can be improved conveniently.
Referring to fig. 7, the electronic device 200 in the embodiment of the present application includes a processor 20, where the processor 20 is configured to read key information stored in the encryption lock 100 connected to the electronic device 200 when a request for storing original data is received, where the original data is data generated by target software authorized by the encryption lock 100; and encrypting the original data according to the key information to generate encrypted data.
Referring to fig. 8, the embodiment of the present application further provides a non-volatile computer readable storage medium 300, on which a computer program 310 is stored, and when the computer program 310 is executed by the processor 20, the steps of the encryption method in any of the above embodiments are implemented, which is not described herein for brevity.
In the description of the present specification, reference to the terms "certain embodiments," "in one example," "illustratively," and the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiments or examples is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the present application, and that variations, modifications, alternatives, and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the present application.

Claims (10)

1. An encryption method based on an encryption lock, comprising:
under the condition that a request for storing original data is received, reading key information stored in the encryption lock, wherein the original data is data generated by target software authorized by the encryption lock; a kind of electronic device with high-pressure air-conditioning system
Encrypting the original data according to the key information to generate encrypted data.
2. The encryption method according to claim 1, characterized by further comprising:
writing the information of the target software and the key information into a storage space of the encryption lock;
and authorizing the read-write permission of the target software to the encryption lock under the condition that the information of the target software in the storage space is matched with the target software.
3. The encryption method according to claim 1, wherein encrypting the original data based on the key information to generate encrypted data comprises:
writing the key information to the original data so that the original data is changed from an unencrypted state to an encrypted state; a kind of electronic device with high-pressure air-conditioning system
The original data written to the key information is saved to generate the encrypted data.
4. A method of encrypting according to claim 3, further comprising:
reading the key information stored in the encryption lock and the key information of the encrypted data under the condition of receiving a request for opening the encrypted data, and comparing the key information stored in the encryption lock with the key information of the encrypted data;
and unlocking the encrypted data to acquire the original data under the condition that the key information stored in the encryption lock is consistent with the key information of the encrypted data.
5. A method of encrypting according to claim 3, further comprising:
encrypting the key information in the encrypted data again based on a preset encryption algorithm to generate secondary encrypted data;
reading the key information stored in the encryption lock and decrypting the secondary encrypted data under the condition of receiving a request for opening the encrypted data to obtain the encrypted data;
comparing the key information stored in the encryption lock with the key information of the encrypted data;
and unlocking the encrypted data to acquire the original data under the condition that the key information stored in the encryption lock is consistent with the key information of the encrypted data.
6. An encryption method according to claim 4 or 5, further comprising:
and under the condition that the key information stored in the encryption lock is inconsistent with the key information of the encrypted data, prohibiting unlocking the encrypted data and sending prompt information.
7. An encryption apparatus, comprising:
the reading module is used for reading the key information stored in the encryption lock under the condition that a request for storing original data is received, wherein the original data is data generated by target software authorized by the encryption lock; a kind of electronic device with high-pressure air-conditioning system
And the encryption module is used for encrypting the original data according to the key information so as to generate encrypted data.
8. The encryption lock is characterized by comprising a storage space, wherein the storage space stores key information, the key information is used for encrypting original data to generate encrypted data, and the original data is data generated by target software authorized by the encryption lock.
9. The electronic equipment is characterized by comprising a processor, wherein the processor is used for reading key information stored in an encryption lock connected with the electronic equipment under the condition that a request for storing original data is received, and the original data is data generated by target software authorized by the encryption lock; and encrypting the original data according to the key information to generate encrypted data.
10. A non-transitory computer readable storage medium containing a computer program which, when executed by a processor, causes the processor to perform the encryption method of any one of claims 1-6.
CN202211714587.3A 2022-12-29 2022-12-29 Encryption method and device, encryption lock, electronic equipment and storage medium Pending CN116432195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211714587.3A CN116432195A (en) 2022-12-29 2022-12-29 Encryption method and device, encryption lock, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211714587.3A CN116432195A (en) 2022-12-29 2022-12-29 Encryption method and device, encryption lock, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116432195A true CN116432195A (en) 2023-07-14

Family

ID=87089618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211714587.3A Pending CN116432195A (en) 2022-12-29 2022-12-29 Encryption method and device, encryption lock, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116432195A (en)

Similar Documents

Publication Publication Date Title
KR100809977B1 (en) Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
JP4550050B2 (en) Usage authentication method, usage authentication program, information processing apparatus, and recording medium
KR0138770B1 (en) Electronic keying scheme for locking data
US8341751B2 (en) Software license management
CN102456111B (en) Method and system for license control of Linux operating system
US7853787B2 (en) Peripheral device for programmable logic controller
CN109800605A (en) A kind of fail-safe computer
US20090187770A1 (en) Data Security Including Real-Time Key Generation
EP3314807B1 (en) Secure programming of secret data
CN103377350A (en) Method and device for protecting codes of embedded software by hardware encryption module
CN104715208A (en) Platform integrity checking method based on TPM chip
US20100042845A1 (en) Ic tag system
US20040255136A1 (en) Method and device for protecting information against unauthorised use
CN114785503A (en) Cipher card, root key protection method thereof and computer readable storage medium
US7203958B2 (en) Program use authorization method
CN112241633B (en) Bidirectional authentication implementation method and system for non-contact smart card
JP4502898B2 (en) External hard disk storage device, external hard disk storage device control method, and external hard disk storage device control program
US20080104396A1 (en) Authentication Method
CN116432195A (en) Encryption method and device, encryption lock, electronic equipment and storage medium
KR100310445B1 (en) Method for controlling Universal Serial Bus security module using crypto-chip
CN111523127B (en) Authority authentication method and system for password equipment
CN104866761A (en) High-security Android intelligent terminal
WO1987005175A1 (en) Method and apparatus for distributing and protecting encryption key codes
CN111737722B (en) Method and device for safely ferrying data between intranet terminals
KR101042294B1 (en) The software lock method which uses USB memory stick

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination