CN203423701U - Cipher machine - Google Patents

Cipher machine Download PDF

Info

Publication number
CN203423701U
CN203423701U CN201320557825.4U CN201320557825U CN203423701U CN 203423701 U CN203423701 U CN 203423701U CN 201320557825 U CN201320557825 U CN 201320557825U CN 203423701 U CN203423701 U CN 203423701U
Authority
CN
China
Prior art keywords
cipher machine
module
ciphertext
interface
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201320557825.4U
Other languages
Chinese (zh)
Inventor
徐光宇
徐光梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201320557825.4U priority Critical patent/CN203423701U/en
Application granted granted Critical
Publication of CN203423701U publication Critical patent/CN203423701U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The utility model provides a cipher machine, comprising the components as follows: an encrypting-decrypting module, which is used for parsing plaintext to generate ciphertext or parsing ciphertext to generate plaintext; a plaintext interface, which is used for inputting or outputting plaintext; a ciphertext interface, which is used for inputting or outputting ciphertext, wherein the ciphertext interface employs a serial port mode; and a power supply module for supplying power. The plaintext plaintext interface, the ciphertext interface and the power supply module are connected with the encrypting-decrypting module. According to the cipher machine, the ciphertext interface employs a serial port mode, the ciphertext generated after encryption processing by the cipher machine can only be decrypted by the cipher machine, under the precondition of a file encrypting-decrypting function, the operation process is recorded, man-machine interaction, remote monitor and remote operation functions are achieved, a servo file is automatically encrypted and decrypted, and the practical functions of the cipher machine are substantially expanded.

Description

A kind of cipher machine
Technical field
The utility model relates to a kind of encryption system, especially a kind of cipher machine.
Background technology
Existing secrecy system, is all that the user of file is authorized, such as the authority classification of website, password, U shield etc.Once hacker pretends to be validated user success, or legal secret key loses, or hacker directly crosses shielding harness and enter file system inside, and all files all can be read, be revised and copy.
Present secrecy system, basic ideas are all that check critical point is set on network path, in modes such as passwords, guarantee that incomer is legal.This protection is not the protection to file itself.Therefore,, once hacker enters file storage area, classified papers do not have own protective own.
Present secrecy system, its document storage mode, is all the document storage system under operating system.Identical storage mode, the success rate that makes illegal person attempt breaking through existing secrecy system greatly improves.
Present secrecy system, be all with computer interconnection under, the computing capability of computer, the work such as is encrypted.Computer also just must be subject to the monitoring of computer, and its ciphering process and password etc., do not have shielding to computer itself.Once computer is thoroughly monitored by hacker, by the system of computer information security, all do not have secret.
Present secrecy system, its trace mode or daily record of work etc. need the sufficiently high full-time staff of professional skill to be responsible for, or are exactly there is no trace mode, such as general U shield or secret USB flash disk, do not use record.
Utility model content
The purpose of this utility model is to provide a kind of cipher machine, realizing on the basis of file is encrypted/decipher function, also possessed the operating process of record, man-machine interaction, remote monitoring and remote operation, automatically the function to the be encrypted/decryption oprerations of servo file, has expanded the utility function of cipher machine greatly.
In order to achieve the above object, the utility model provides following technical scheme:
, comprising:
Encrypting-decrypting module forms ciphertext after expressly resolving, or forms expressly after ciphertext is resolved;
Plaintext interface, for input or output expressly;
Ciphertext interface, for input or the output of ciphertext, described ciphertext interface adopts serial ports pattern;
Power module, for providing power supply;
Described plaintext interface, ciphertext interface and power module are connected with encrypting-decrypting module respectively.
Further, described cipher machine also comprises logging modle, and described logging modle is connected with encrypting-decrypting module, for recording operating process, preserves operator's identity, operating time and the mode of operation to file.
Further, described cipher machine also comprises authorization module, for operator is confirmed.
Particularly, described authorization module can be one of mandate U shield, fingerprint recognition or identity card identification, or other can be owing to carrying out the mode of identification.
Further, described cipher machine also comprises human-computer interaction module, realizes operator with the man-machine interaction of cipher machine.
Particularly, described human-computer interaction module can be the modes such as indicator light and/or liquid crystal display screen.
Further, described cipher machine also comprises remote monitoring module, and described remote monitoring module is connected with encrypting-decrypting module, realizes real-time monitoring and remote operation to the mode of operation of encryption equipment.
Further, described cipher machine also comprises servo programe module, and described servo programe module is connected with encrypting-decrypting module, realizes automatically to the be encrypted/decryption oprerations of servo file, and operating process is carried out to record.
Further, described cipher machine can portable small-sized equipment, the form of hardware board exists.
The ciphertext interface of cipher machine of the present utility model adopts serial ports pattern, by the ciphertext after cipher machine encryption of the present utility model, must be decrypted by this cipher machine, realizing on the basis of file is encrypted/decipher function, possessed the operating process of record, man-machine interaction, remote monitoring and remote operation simultaneously, automatically the function to the be encrypted/decryption oprerations of servo file, has expanded the utility function of cipher machine greatly.
Cipher machine of the present utility model, the hardware encipher equipment that computer has independent current source and independent operation outward, the computing capability of computer not, also so be not subject to the monitoring of computer, its ciphering process and generating cipher etc., have strict shielding to computer itself, even if computer is thoroughly monitored by hacker, the file of encrypting by this cipher machine is still safe.
Accompanying drawing explanation
In order to be illustrated more clearly in the utility model embodiment or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only embodiment more of the present utility model, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the structural representation of cipher machine of the present utility model.
Embodiment
Below in conjunction with accompanying drawing of the present utility model, the technical solution of the utility model is clearly and completely described, obviously, described embodiment is only the utility model part embodiment, rather than whole embodiment.Embodiment based in the utility model, those of ordinary skills are not making the every other embodiment obtaining under creative work prerequisite, all belong to the scope of the utility model protection.
Shown in Fig. 1, a kind of cipher machine of the utility model, comprising:
Encrypting-decrypting module forms ciphertext after expressly resolving, or forms expressly after ciphertext is resolved;
Plaintext interface, for input or output expressly;
Ciphertext interface, for input or the output of ciphertext, described ciphertext interface adopts serial ports pattern;
Power module, for providing power supply;
Described plaintext interface, ciphertext interface and power module are connected with encrypting-decrypting module respectively.
The ciphertext interface of cipher machine of the present utility model adopts serial ports pattern, by the ciphertext after cipher machine encryption of the present utility model, must be decrypted by this cipher machine, realized file is encrypted/is deciphered, and expressly, by after the input of plaintext interface, directly after encrypting-decrypting module is processed, by ciphertext interface, exported, in cipher machine, ciphertext is not stored, avoid plaintext and corresponding ciphertext to be stored in cipher machine simultaneously, thereby with chance, carried out cracking of ciphertext to malice effractor.

Claims (9)

1. a cipher machine, is characterized in that: comprising: encrypting-decrypting module forms ciphertext, or forms expressly after ciphertext is resolved after expressly resolving;
Plaintext interface, for input or output expressly;
Ciphertext interface, for input or the output of ciphertext, described ciphertext interface adopts serial ports pattern;
Power module, for providing power supply;
Described plaintext interface, ciphertext interface and power module are connected with encrypting-decrypting module respectively.
2. a kind of cipher machine according to claim 1, is characterized in that: described cipher machine also comprises logging modle, and described logging modle is connected with encrypting-decrypting module.
3. a kind of cipher machine according to claim 1 and 2, is characterized in that: described cipher machine also comprises authorization module.
4. a kind of cipher machine according to claim 3, is characterized in that: described authorization module is for authorizing one of U shield, fingerprint recognition or identity card identification.
5. according to a kind of cipher machine described in claim 1,2 or 4, it is characterized in that: described cipher machine also comprises human-computer interaction module.
6. a kind of cipher machine according to claim 5, is characterized in that: described human-computer interaction module is indicator light and/or liquid crystal display screen mode.
7. according to a kind of cipher machine described in claim 1,2,4 or 6, it is characterized in that: described cipher machine also comprises remote monitoring module, described remote monitoring module is connected with encrypting-decrypting module.
8. a kind of cipher machine according to claim 7, is characterized in that: described cipher machine also comprises servo programe module, and described servo programe module is connected with encrypting-decrypting module.
9. according to a kind of cipher machine described in claim 1,2,4,6 or 8, it is characterized in that: described cipher machine exists with the form of portable mini-plant or hardware board.
CN201320557825.4U 2013-09-10 2013-09-10 Cipher machine Expired - Fee Related CN203423701U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201320557825.4U CN203423701U (en) 2013-09-10 2013-09-10 Cipher machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201320557825.4U CN203423701U (en) 2013-09-10 2013-09-10 Cipher machine

Publications (1)

Publication Number Publication Date
CN203423701U true CN203423701U (en) 2014-02-05

Family

ID=50022790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201320557825.4U Expired - Fee Related CN203423701U (en) 2013-09-10 2013-09-10 Cipher machine

Country Status (1)

Country Link
CN (1) CN203423701U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022169A (en) * 2016-06-30 2016-10-12 北京三未信安科技发展有限公司 Encryption protection method based on ZYNQ small-size cipher machine and device for realizing method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022169A (en) * 2016-06-30 2016-10-12 北京三未信安科技发展有限公司 Encryption protection method based on ZYNQ small-size cipher machine and device for realizing method

Similar Documents

Publication Publication Date Title
CN201181472Y (en) Hardware key device and movable memory system
CN104751036B (en) A kind of computer information safe system
CN101043326B (en) Dynamic information encrypting system and method
CN103606047A (en) Password management system
CN101483654A (en) Method and system for implementing authentication and data safe transmission
CN104021332A (en) Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey
TW201608408A (en) Wireless authentication system and method for USB storage device
CN105095719A (en) Fingerprint unlocking method and system and electronic device provided with system
CN105184181A (en) File encryption method, file decryption method and file encryption device
CN201518127U (en) Encrypted mobile memory based on password authentication
CN103457723B (en) A kind of encryption method and the encryption device based on it
CN104915583A (en) Interface decryption processing method and mobile terminal
CN203423701U (en) Cipher machine
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN203260066U (en) Electronic payment device based on fingerprint identification and audio interface
CN103258269A (en) Electronic payment device for mobile equipment
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
CN103136489B (en) Portable and secure automatic password input unit
CN215068239U (en) Password card device based on quantum random number
CN202711243U (en) Encryption type movable storage device based on fingerprint authentication
CN106330877B (en) It is a kind of to authorize the method and system converted to the SOT state of termination
CN103853947A (en) Pressure key and computer safety protection method
CN106952659B (en) CD multistage imprinting encryption method based on XTS encryption mode
CN105306220A (en) Smart secret key based file record control system and realization method thereof

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140205

Termination date: 20150910

EXPY Termination of patent right or utility model