CN203289456U - Encryption device - Google Patents

Encryption device Download PDF

Info

Publication number
CN203289456U
CN203289456U CN2013203676943U CN201320367694U CN203289456U CN 203289456 U CN203289456 U CN 203289456U CN 2013203676943 U CN2013203676943 U CN 2013203676943U CN 201320367694 U CN201320367694 U CN 201320367694U CN 203289456 U CN203289456 U CN 203289456U
Authority
CN
China
Prior art keywords
data
unit
maker
mentioned
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2013203676943U
Other languages
Chinese (zh)
Inventor
袁继友
谢庆旭
姚恩东
蒋卫东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Original Assignee
ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD filed Critical ZHONGKE YINGHUA HUZHOU ENGINEERING RESEARCH CENTER CO LTD
Priority to CN2013203676943U priority Critical patent/CN203289456U/en
Application granted granted Critical
Publication of CN203289456U publication Critical patent/CN203289456U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model discloses an encryption device. The encryption device comprises a first generator which generates basic data according to first change law and an encryption module, and the encryption module is electrically connected with the first generator and encrypts data to be encrypted through the abovementioned basic data and thus obtaining encrypted data. The abovementioned encryption device encrypts the data to be encrypted through a set of constantly changing data, and enables important information in the encrypted data to be relatively concealed, so that even if being intercepted time after time, the encrypted data is not easy to crack, thereby ensuring security in a transmission process of encrypted data.

Description

Encryption device
Technical field
The utility model relates to the data encryption device field, particularly relates to a kind of encryption device.
Background technology
Encrypting, is to change original information data with certain special algorithm, even make undelegated user obtain the information of having encrypted, but, because not knowing the method for deciphering, still can't understand the content of information., for the safety of transfer of data, the information of need transmission is spread out of again after encrypting, so, even important information is intercepted and captured, so because of it, know how to decipher, needn't not worry that also important information is revealed in the process of transfer of data.
General information encryption is divided into two steps, and the one, mapping operations, the 2nd, add a large amount of redundant informations.Actual application is the combination of above-mentioned two steps, and important information is hidden into going to form enciphered data in the redundant information of magnanimity and transmitted.
If during the information after intercepting and capturing above-mentioned encryption, the redundant information that each information of intercepting and capturing is removed important information data is all invariable, as long as intercept and capture two group encryption data, after comparing is rejected constant " extremely " data, how encrypt by advanced mapping operations no matter adopt for remaining important information data, all is easy to be cracked.
The utility model content
Based on this, the problem that easily is cracked while being necessary to be intercepted and captured for enciphered data, provide a kind of more hidden encryption device of important information that makes.
A kind of encryption device, comprise: encrypting module and with the first maker of the first Changing Pattern formation base data, described encrypting module is electrically connected to described the first maker and by described basic data with first Changing Pattern, be-encrypted data is encrypted and obtains enciphered data.
In embodiment, described the first maker comprises the high-speed counter unit of at least one cascade therein, the count value that the high-speed counter element count that described basic data with first Changing Pattern is described cascade produces.
In embodiment, described high-speed counter unit is MC74HC4020AD high-speed counter chip therein.
Therein in embodiment, described the first maker also comprises the packing device unit that the count value of the high-speed counter element count of described cascade generation is packed, and described packing device unit is electrically connected to respectively each described high-speed counter unit and described encrypting module.
Therein in embodiment, also comprise the second maker that generates auxiliary data with the second Changing Pattern, described the second maker is electrically connected to described encrypting module and described auxiliary data with second Changing Pattern is sent to described encrypting module, and described encrypting module is encrypted and obtains described enciphered data be-encrypted data by described basic data and described auxiliary data with second Changing Pattern with first Changing Pattern.
In embodiment, described the second maker comprises that at least one generates the calendar maker unit of calendar data therein, and each described calendar maker unit is electrically connected to respectively described encrypting module.
In embodiment, described calendar maker unit is the SD2403API-G calendar chip therein.
In embodiment, described encrypting module comprises therein: generate the 3rd maker unit and ciphering unit of redundant data, described the first maker, described the 3rd maker unit and described ciphering unit are electrically connected to successively;
Described the 3rd maker unit generates redundant data and described redundant data is sent to described ciphering unit according to described basic data with first Changing Pattern, and described ciphering unit is encrypted and obtains described enciphered data described be-encrypted data according to described redundant data.
In embodiment, described encrypting module is the ATmega16-16AI chip therein.
In embodiment, also comprise interface module therein, described interface module comprises the interface unit of the enciphered data of the different encryption levels of some outputs, and each described interface unit is electrically connected to respectively described encrypting module.
Above-mentioned encryption device, comprise the first maker and encrypting module with the first Changing Pattern formation base data, and encrypting module is electrically connected to the first maker and by above-mentioned basic data, be-encrypted data is encrypted and obtains enciphered data.Above-mentioned encryption device is encrypted be-encrypted data by one group of data that constantly change, and, even make more hidden repeatedly intercepting and capturing of important information in enciphered data also be difficult for being cracked, has guaranteed the safety in the encrypted data transmission process.
Description of drawings
Fig. 1 is the encryption device module map of the utility model one embodiment;
Fig. 2 is the encryption device module map of another embodiment of the utility model;
Fig. 3 is the chip connection layout of the utility model one embodiment encryption device.
Embodiment
A kind of encryption device, have the binary data of Changing Pattern separately by at least two groups and generate redundant data when be-encrypted data is encrypted, by described redundant data, be-encrypted data is encrypted, and by mapping operations, further obtains enciphered data.Above-mentioned encryption device has the data of Changing Pattern separately by at least two groups and generates redundant data, make the enciphered data complexity that obtains higher,, even above-mentioned enciphered data can not decoded easily by being intercepted and captured also in transmitting procedure, prevent that the leakage of important information, fail safe are stronger.
Below in conjunction with drawings and Examples, a kind of encryption device of the utility model is described in more detail.
Figure 1 shows that the encryption device module map of the utility model one embodiment.
With reference to figure 1, a kind of encryption device, comprise the first maker 110 and the encrypting module 130 with the first Changing Pattern formation base data of electrical connection.The first maker 110 generates has the basic data of the first Changing Pattern, and encrypting module 130 generates redundant data and by above-mentioned redundant data, be-encrypted data is encrypted and obtains enciphered data as basis take above-mentioned basic data.
Above-mentioned encryption device generates redundant data by one group of data that constantly change, and, even make important information more hidden and make enciphered data repeatedly be intercepted and captured and also be difficult for being cracked in transmitting procedure, has guaranteed the fail safe in the encrypted data transmission process.
Shown in Figure 2, be the encryption device module map of another embodiment of the utility model.
With reference to figure 2, above-mentioned the first maker 110 comprises the high-speed counter unit 112 of at least one cascade, the count value that the above-mentioned basic data that generates take the first Changing Pattern produces by counting as the high-speed counter unit 112 of cascade, above-mentioned the first Changing Pattern is the rule of above-mentioned count value variation.
In other embodiments, above-mentioned the first Changing Pattern also can refer to other existing binary data with certain Changing Pattern, is not limited to the Changing Pattern of the count value that above-mentioned high-speed counter unit 112 produces.Accordingly, in other embodiment, above-mentioned the first counter 110 also can generate other and have the data of certain Changing Pattern, is not limited to the count value that above-mentioned high-speed counter produces.
Concrete, above-mentioned high-speed counter unit 112 is MC74HC4020AD high-speed counter chip, can produce the binary counting of 14 during each chip counter.When above-mentioned high-speed counter unit 112 numbers are 6, produce the count results of 84 as basic data.
Above-mentioned high-speed counter refers to calculate than plain scan frequency pulse signal faster, and its operation principle and general counter are similar, just the response time of counting channel shorter, generally with the frequency of KHZ, count.Concrete, the precision of above-mentioned high-speed counter can be 30MHZ, and expression can be counted 300,000,000 times in 1 second.Relative, if the figure place of above-mentioned basic data is higher, the complexity of the enciphered data that generates later is higher, thus the fail safe in above-mentioned encrypted data transmission process is also just relatively higher.
Along with the continuity of time, the count results that above-mentioned high-speed counter unit 112 produces constantly increase until while reaching default count results automatic clear then restart counting.In order to reduce when enciphered data is intercepted and captured in the process of transmission the probability that is cracked, the count results that above-mentioned expectation is set is prime number.
When above-mentioned basic data be the high-speed counter chip produce count value the time, the Changing Pattern of above-mentioned basic data automatic clear and restart to count when counting down to a predetermined count value when high-speed counter., if basic data is a count value that continues counting always,, if enciphered data is is repeatedly intercepted and captured in the encrypted data transmission process, also there is the possibility that is cracked.So,, by above-mentioned count value automatic clear and restart counting when counting down to a predetermined count value is set, make enciphered data more complicated, reduced the possibility that is cracked when above-mentioned enciphered data is is repeatedly intercepted and captured in transmitting procedure.
Above-mentioned predetermined count value is a relatively large prime number of numerical value in the maximum magnitude of above-mentioned basic data.Above-mentioned prime number is a set point, can be a prime number maximum in basic data figure place scope.Prime number claims again prime number, refer to one greater than 1 natural number in, except 1 and this integer self, the number that can not be divided exactly by other natural numbers.Number is closed in be called relative with prime number, close number refer in natural number except can by 1 and itself divide exactly, the number that can also be divided exactly by other number.When enciphered data is deciphered, if being one, redundant data closes number, be conducive to the deciphering of enciphered data, and basic data is unfavorable for the deciphering of above-mentioned enciphered data while being set to prime number, even when above-mentioned enciphered data is intercepted and captured or is is repeatedly intercepted and captured, also be difficult to crack, further improved the fail safe of enciphered data.
If above-mentioned basic data be one group along with then the continuous regular increase of time lengthening, zero clearing continue to increase,, if in the enciphered data that generates thereafter, repeatedly intercepted and captured, also have the possibility that is cracked.So also can generate by above-mentioned the first maker 110 combination of the continuous change count value that is produced by several groups of high-speed counter chips, wherein every batch total numerical value can start with different counting initial values to count and automatic clear and restart counting respectively while reaching the pre-set count values of setting separately, increase the complexity of basic data, improved the fail safe in the encrypted data transmission process.
With reference to figure 2, above-mentioned the first counter 110 also comprises packing device unit 114, packing device unit 114 is electrically connected to respectively above-mentioned high-speed counter unit 112 and encrypting module 130, and above-mentioned packing device unit 114 sends the basic data packing that high-speed counter unit 112 produces to encrypting module 130.Concrete, above-mentioned packing device unit 114 is the MCP23017 chip, and sets the quantity of packing device unit 114 for the quantity of high-speed counter unit 112.When high-speed counter unit 112 is 6 for MC74HC4020AD high-speed counter chip and quantity, corresponding MCP23017 number of chips is 4, and the count results packing that the MC74HC4020AD high-speed counter chip of 6 cascades is produced is transferred to main control module 130.
With reference to figure 2, above-mentioned encryption device also comprises the second maker 150 that generates auxiliary data with the second Changing Pattern, above-mentioned the second maker 150 is electrically connected to above-mentioned encrypting module 130, the second maker 150 generate auxiliary data with the second Changing Pattern and with above-mentioned auxiliary data transmission to encrypting module 130, encrypting module 130 is take above-mentioned basic data as basis and generate redundant data by above-mentioned auxiliary data above-mentioned be-encrypted data is encrypted and further obtains enciphered data.
If the regular growth of above-mentioned basic data, zero clearing also continue regular growth, if can repeatedly intercept and capture the enciphered data of transmission, the possibility that also exists enciphered data to be cracked, so need to upset the regular variation of above-mentioned basic data.
Concrete, can generate auxiliary data by above-mentioned the second maker 150 Changing Pattern of above-mentioned basic data is upset to obtain redundant data.Above-mentioned the second maker 150 can generate one group of invariable fixedly binary data as auxiliary data.Concrete, when above-mentioned auxiliary data is that while having the binary data of the second Changing Pattern, above-mentioned auxiliary data can be calendar data.One group of calendar data is to comprise year, month, day, hour, min, binary time data of second.Wherein, but initial time free setting and by binary data, representing.Above-mentioned calendar data is distributed in above-mentioned basic data, then the plug-in unit that the above-mentioned basic data of insertion that can one one also can form less than its number of bits is distributed in above-mentioned basic data, the rule of upsetting above-mentioned basic data changes, further strengthen the complexity of enciphered data, improve the fail safe in above-mentioned encrypted data transmission process.
Above-mentioned being distributed in basic data after the calendar data segmentation, can will be after the calendar data segmentation order be inserted into above-mentioned basic data or with the calendar data segmentation and after upsetting original order, be distributed to again in above-mentioned basic data, make redundant data more complicated and enciphered data more hidden being difficult for of further generation is cracked.
With reference to figure 2, above-mentioned the second maker 150 comprises that at least one generates the calendar maker unit 152 of calendar data, and above-mentioned calendar maker unit 152 is electrically connected to respectively encrypting module 130.Concrete, above-mentioned calendar data generation unit 152 is the SD2403API-G calendar chip.
Can generate one group of calendar data or at least two group calendar datas by above-mentioned the second maker 150, and by above-mentioned encrypting module 130, the above-mentioned Hitachi's data of organizing are distributed to respectively in above-mentioned basic data more, further strengthen complexity and the further disguise that improves enciphered data of redundant data, improve the fail safe in above-mentioned encrypted data transmission process.
In other embodiments, also can generate other by above-mentioned the second maker 150 and have the data of certain variation regulation, be not limited to calendar data.
With reference to figure 2, above-mentioned encrypting module 130 comprises the 3rd maker unit 132 and the ciphering unit 134 of the generation redundant data that is electrically connected to successively.The 3rd maker unit 132 is electrically connected to above-mentioned packing device unit 114 and calendar maker unit 152, by receiving above-mentioned basic data and auxiliary data, generates redundant data, and above-mentioned ciphering unit 134 is encrypted be-encrypted data by above-mentioned redundant data.
Above-mentioned be-encrypted data can produce by encrypting module 130, and encrypting module 130 can pass through linkage function request module 200(with reference to figure 2) and according to the request of function request module 200, produce corresponding be-encrypted data.Above-mentioned ciphering unit 134 is by making above-mentioned be-encrypted data in the above-mentioned redundant data of as a whole insertion and respectively above-mentioned redundant data and above-mentioned be-encrypted data being carried out the first mapping operations and the second mapping operations to obtain enciphered data.Above-mentioned encrypting module 130 can be by being electrically connected to or communication connection above-mentioned functions request module 200.
The difference request of sending according to above-mentioned functions request module 200 or for different function request module 200, above-mentioned be-encrypted data can be a string effective license address, crucial encrypted message or from higher level's key instruction etc.
Above-mentioned redundant data is carried out the first mapping operations, wherein the step of the first mapping is for the direct negate of data of the default figure place to redundant data or the data of the default figure place of above-mentioned redundant data are carried out negate according to the data of the corresponding figure place in the residue figure place of above-mentioned redundant data.For example the eight-digit number 10010110 in above-mentioned redundant data, carry out negate with front four according to rear four and obtain 11110110.In other embodiment, also can shine upon above-mentioned redundant data according to other mapping algorithm.
Be-encrypted data is carried out the second mapping operations, and wherein the step of the second mapping is for the direct negate of data of the default figure place to be-encrypted data or the data of the default figure place of above-mentioned be-encrypted data are carried out negate according to the data of the corresponding figure place in the residue figure place of above-mentioned be-encrypted data.In other embodiment, also can carry out mapping operations to above-mentioned be-encrypted data according to other mapping algorithm.
Concrete, above-mentioned encrypting module 130 can be the ATmega16-16AI chip.
further, above-mentioned encryption device also comprises interface module 170, above-mentioned interface module 170 comprises the interface unit (not shown) of the enciphered data of the different encryption levels of some outputs, above-mentioned interface unit is electrically connected to respectively above-mentioned ciphering unit 134 and function request module 200, the request that is used for transmission above-mentioned functions request module 200 to above-mentioned encrypting module 130 and with the encrypted data transmission of the different encryption levels of above-mentioned encrypting module 130 outputs to function request module 200, or according to the dissimilar of be-encrypted data, with dissimilar encrypted data transmission, give corresponding function request module 200.
Concrete, above-mentioned interface module 170 can comprise the interface unit (not shown) of three kinds of different stages, can be respectively for provincial, local level, three ad hoc interfaces at county level, each interface difference is set, and also can be different for other be-encrypted data of each grade.Such as, when above-mentioned be-encrypted data is a series of authorization sequence, above-mentioned other interface unit of provincial level once can transmit 10,000 grant number, once can only transmit 100 grant number for the interface unit of local level, and for interface unit at county level, once can only transmit a grant number.
In other embodiment, also can dissimilar interface unit be set for be-encrypted data different classes of.
Shown in Figure 3, be the chip connection layout of the encryption device of the utility model one embodiment.
Concrete, when above-mentioned high-speed counter unit 112 is 6, above-mentioned packing device unit 114 for MCP23017 chip and quantity are 4, above-mentioned the second maker 150 for SD2403API-G calendar chip and quantity are 4, above-mentioned encrypting module 130 during for the ATmega16-16AI chip for MC74HC4020AD high-speed counter chip and above-mentioned MC74HC4020AD high-speed counter chip, corresponding chip connection layout as shown in Figure 3.
Above-mentioned encryption device is completed encryption to be-encrypted data by above-mentioned cryptographic algorithm, realizes improving the fail safe in the encrypted data transmission process.
The above embodiment has only expressed several execution mode of the present utility model, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the utility model the scope of the claims.Should be pointed out that for the person of ordinary skill of the art, without departing from the concept of the premise utility, can also make some distortion and improvement, these all belong to protection range of the present utility model.Therefore, the protection range of the utility model patent should be as the criterion with claims.

Claims (10)

1. encryption device, it is characterized in that, comprise: encrypting module and with the first maker of the first Changing Pattern formation base data, described encrypting module is electrically connected to described the first maker and by described basic data with first Changing Pattern, be-encrypted data is encrypted and obtains enciphered data.
2. encryption device according to claim 1, it is characterized in that, described the first maker comprises the high-speed counter unit of at least one cascade, the count value that the high-speed counter element count that described basic data with first Changing Pattern is described cascade produces.
3. encryption device according to claim 2, is characterized in that, described high-speed counter unit is MC74HC4020AD high-speed counter chip.
4. encryption device according to claim 2, it is characterized in that, described the first maker also comprises the packing device unit that the count value of the high-speed counter element count of described cascade generation is packed, and described packing device unit is electrically connected to respectively each described high-speed counter unit and described encrypting module.
5. encryption device according to claim 1, it is characterized in that, also comprise the second maker that generates auxiliary data with the second Changing Pattern, described the second maker is electrically connected to described encrypting module and described auxiliary data with second Changing Pattern is sent to described encrypting module, and described encrypting module is encrypted and obtains described enciphered data be-encrypted data by described basic data and described auxiliary data with second Changing Pattern with first Changing Pattern.
6. encryption device according to claim 5, is characterized in that, described the second maker comprises that at least one generates the calendar maker unit of calendar data, and each described calendar maker unit is electrically connected to respectively described encrypting module.
7. encryption device according to claim 6, is characterized in that, described calendar maker unit is the SD2403API-G calendar chip.
8. encryption device according to claim 1, is characterized in that, described encrypting module comprises: generate the 3rd maker unit and ciphering unit of redundant data, described the first maker, described the 3rd maker unit and described ciphering unit are electrically connected to successively;
Described the 3rd maker unit generates redundant data and described redundant data is sent to described ciphering unit according to described basic data with first Changing Pattern, and described ciphering unit is encrypted and obtains described enciphered data described be-encrypted data according to described redundant data.
9. encryption device according to claim 1, is characterized in that, described encrypting module is the ATmega16-16AI chip.
10. encryption device according to claim 1, is characterized in that, also comprises interface module, and described interface module comprises the interface unit of the enciphered data of the different encryption levels of some outputs, and each described interface unit is electrically connected to respectively described encrypting module.
CN2013203676943U 2013-06-24 2013-06-24 Encryption device Expired - Fee Related CN203289456U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013203676943U CN203289456U (en) 2013-06-24 2013-06-24 Encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013203676943U CN203289456U (en) 2013-06-24 2013-06-24 Encryption device

Publications (1)

Publication Number Publication Date
CN203289456U true CN203289456U (en) 2013-11-13

Family

ID=49545797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013203676943U Expired - Fee Related CN203289456U (en) 2013-06-24 2013-06-24 Encryption device

Country Status (1)

Country Link
CN (1) CN203289456U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281903A (en) * 2014-11-27 2016-01-27 成都万象天龙科技有限公司 High-end equipment provided with encryption device
CN105281891A (en) * 2014-11-27 2016-01-27 成都万象天龙科技有限公司 High-end equipment whose lock body is provided with encryption device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281903A (en) * 2014-11-27 2016-01-27 成都万象天龙科技有限公司 High-end equipment provided with encryption device
CN105281891A (en) * 2014-11-27 2016-01-27 成都万象天龙科技有限公司 High-end equipment whose lock body is provided with encryption device

Similar Documents

Publication Publication Date Title
CN106603496B (en) A kind of guard method, smart card, server and the communication system of data transmission
CN107070660A (en) A kind of design Storage method of block chain encrypted radio-frequency chip
CN103378971B (en) A kind of data encryption system and method
CN106452732B (en) A kind of information ciphering method and its device
CN109951453A (en) A kind of safe encryption method based on block chain
CN109361507A (en) A kind of data ciphering method and encryption equipment
CN107257350B (en) Offline authentication or payment method of wearable equipment
CN102012993A (en) Methods and devices for selectively encrypting and decrypting data
CN103441856A (en) Dynamic password authentication method and device
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
CN101923654B (en) Ultrahigh frequency reader-writer suitable for remote security control by different users
CN107483192A (en) A kind of data transmission method and device based on quantum communication
CN103731270A (en) Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
CN106302514A (en) The dynamic encrypting method of memory card and decryption method and device thereof
CN109934001A (en) A kind of data ciphering method based on normal cloud model
CN203289456U (en) Encryption device
CN103532709B (en) A kind of IBE encryption apparatus and data encryption/decryption method
CN105825135A (en) Encryption chip, encryption system, encryption method and decryption method
CN103118351A (en) Generation method and device of rechargeable card data
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN104660398A (en) Generation method of encryption keys
CN105227312A (en) Intelligent code key password authentification extracting method
CN104243148A (en) Encryption method and encryption device
CN101364868A (en) Pseudo-noise code generator based on broad sense information field and generating method thereof

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131113

Termination date: 20180624

CF01 Termination of patent right due to non-payment of annual fee