CN205912066U - Based on inductance type touch -control hardware data encryption device - Google Patents

Based on inductance type touch -control hardware data encryption device Download PDF

Info

Publication number
CN205912066U
CN205912066U CN201620924388.9U CN201620924388U CN205912066U CN 205912066 U CN205912066 U CN 205912066U CN 201620924388 U CN201620924388 U CN 201620924388U CN 205912066 U CN205912066 U CN 205912066U
Authority
CN
China
Prior art keywords
module
data
ciphertext
deciphering
conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201620924388.9U
Other languages
Chinese (zh)
Inventor
胡林
林桓
林琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Hechun Automation Technology Co., Ltd.
Original Assignee
Guangzhou Wei Wei Electronic Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wei Wei Electronic Polytron Technologies Inc filed Critical Guangzhou Wei Wei Electronic Polytron Technologies Inc
Priority to CN201620924388.9U priority Critical patent/CN205912066U/en
Application granted granted Critical
Publication of CN205912066U publication Critical patent/CN205912066U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The utility model discloses a based on inductance type touch -control hardware data encryption device relates to data encryption technical field. Its inductance type touch module's perception layer is used for gathering the handwritten person's handwriting signal of active electromagnetism pen, touch -control data acquisition module will gather the touch -control data that real -time inductance type touch module produced, and carry out data conversion with the touch -control data transfer that gathers to a data conversion module, data transfer after the conversion is to the key generation module and generate the ciphertext, it encrypts the ciphertext operation and saves at data storage module to encrypt operation module, deciphering operation module can decrypt the operation with black ciphertext data, and convey the data of deciphering to the host computer through the 2nd data conversion module conversion title touch -control command signal and write by hand person's handwriting signal display. Security, integrality, usability and the non -repudiation of this encryption device through encrypting the handwritten electronic information of luck tendency module assurance.

Description

One kind is based on inductive touch control hardware data encryption device
Technical field
This utility model is related to data encryption technology field, and more particularly, to a kind of inductive touch control hardware data that is based on is encrypted Device.
Background technology
Currently, domestic many information network application system safety problem ratio more prominent, exist very big risk and Dangerous.The safety equipment that some important network application systems use are all directly to introduce it is difficult to ensure safety from abroad Using and effective monitoring;Meanwhile, there is also the competition of technology and commercial interest between enterprise;There is individual between men Privacy, if being not intended to, with clear-text way transmission, the sensitive information that third party's (or adverse party) knows by network, either leads to Cross wireless or wire transmission, the sensitive information being transmitted is easy to be eavesdropped by third party, if transmitting on the common channels Information is transmitted in the way of ciphertext, makes listener-in be difficult to obtain useful information, then can reach the purpose of secure communication.
Information security mainly uses safety, integrity, availability and the non-repudiation that cryptographic technique carrys out guarantee information, Its technology mainly includes several aspects such as monitoring, scanning, detection, encryption, certification, attack protection, anti-virus and audit, wherein plus Secret skill art, also referred to as cryptographic technique, are a kind of the most practical and most reliable methods that computerized information is protected, and are information peaces Full core technology, has penetrated among most of safety product.At present in time writer touch-control field, also it is not encrypted Process, substitute traditionally on paper write mode as increasing electronic writing pattern can become, but the information of electronic writing There is potential safety hazard in safety, be easily stolen, and safety is not high.
Utility model content
Technical problem to be solved in the utility model is to provide one kind to be based on inductive touch control hardware data encryption device, This device can effectively ensure the safety of electronic writing information by cryptographic calculation module.
For solving above-mentioned technical problem, technical solution adopted in the utility model is: a kind of hard based on inductive touch control Part data encryption, deciphering device, including inductive touch control module, touch data acquisition module, the first data conversion module, key Generation module, cryptographic calculation module, data memory module, deciphering computing module, the second data conversion module, described inductance type touches The sensing layer of control module is used for gathering the handwriting signal of active electromagnetic pen, and described touch data acquisition module will gather real When the touch data that produces of inductive touch control module, and the touch data of collection be sent to the first data conversion module enter line number According to conversion, the data after conversion is sent to key production module and generates ciphertext, and ciphertext is encrypted fortune by cryptographic calculation module Calculate and be stored in data memory module, the ciphertext data of encryption can be decrypted computing by described deciphering computing module, and will solve Close data by second data conversion module conversion claim touch command signal be sent to host computer carry out handwriting signal show Show.
The technical scheme optimizing further is that the sensing layer of described inductive touch control module adopts array induction coil electricity Road, and it is marked with x-axis and y-axis coordinate system.
The technical scheme optimizing further is that described ciphertext comprises ciphertext based on key production module and in order to being based on The ciphertext of key production module is decrypted and ciphertext to be decrypted.
The technical scheme optimizing further is described cryptographic calculation module and deciphering computing module is based in des algorithm Ecb pattern encrypts and decrypts to data.
Have the beneficial effects that using produced by technique scheme: cryptographic calculation module of the present utility model passes through des Ecb pattern in algorithm is encrypted to hand-written data, carries out the combination of data and key through des computing module, completes to count According to encryption and decryption computing;Thus realizing the safeguard protection to hand-written data, simultaneously also can be by deciphering computing module to encryption Data be decrypted process, the data of decryption processing carries out showing electronic handwritten data by host computer;This utility model is adopted It is hardware cipher mode, be to be realized by the hardware encryption device outside independent of host computer system, all critical datas Storage, computing are all internally realized by hardware, do not account for host resource, and soon, safety is higher for speed, stability and compatibility Relatively good.
Brief description
Fig. 1 is this utility model theory diagram.
Specific embodiment
Below in conjunction with the accompanying drawing in this utility model embodiment, the technical scheme in this utility model embodiment is carried out Clearly and completely description is it is clear that described embodiment is only a part of embodiment of this utility model rather than whole Embodiment.Based on the embodiment in this utility model, those of ordinary skill in the art are not under the premise of making creative work The every other embodiment being obtained, broadly falls into the scope of this utility model protection.
As shown in figure 1, the utility model discloses a kind of encrypted based on inductive touch control hardware data, decipher device, bag Include inductive touch control module, touch data acquisition module, the first data conversion module, key production module, cryptographic calculation module, Data memory module, deciphering computing module, the second data conversion module, the sensing layer of described inductive touch control module is used for gathering The handwriting signal of active electromagnetic pen, described touch data acquisition module will gather what real-time inductive touch control module produced Touch data, and the touch data of collection is sent to the first data conversion module carries out data conversion, the data after conversion passes Deliver to key production module and generate ciphertext, ciphertext is encrypted computing and is stored in data storage mould by cryptographic calculation module Block, the ciphertext data of encryption can be decrypted computing by described deciphering computing module, and the data of deciphering is passed through the second data Modular converter conversion claims touch command signal to be sent to host computer and carry out handwriting signal to show.
The embodiment optimizing further is that the sensing layer of described inductive touch control module adopts array induction coil circuit, And it is marked with x-axis and y-axis coordinate system.
The embodiment optimizing further is that described ciphertext comprises ciphertext based on key production module and in order to based on close The ciphertext of key generation module is decrypted and ciphertext to be decrypted.
The embodiment optimizing further is described cryptographic calculation module and deciphering computing module is based in des algorithm Ecb pattern encrypts and decrypts to data.
This utility model principle: the sensing layer of inductance touch-control module is positioned x/y axle in array fashion, with active electric The mode of magnetic pen z-axis sensing learns depth, and when writing, electromagnetic signal is synchronized to be sent to touch data acquisition module, inductance Formula touch-control processing module passes to hardware cryptographic calculation module by spi signal of communication, and encrypting module is with hexadecimal code computing Data is passed to pc by mode, and cryptographic calculation module is encrypted to hand-written data by des ecb mode encryption, by des plus Close hand-written data passes through usb interface and upper machine communication, and ciphertext data can be retained in local side, backstage by host computer application app This number can be preserved by application according to passing to server, and in addition a road encryption data can be deciphered reduction truthful data by app and be uploaded to Display, application end, by the encrypted encoded data receiving, is converted into touch command collection by decipherment algorithm and is handed over pc bottom data Mutually, form encryption function.This utility model uses hardware cipher mode, is to be added by the hardware outside independent of host computer system Close equipment is realized, and the storage of all critical datas, computing are all internally realized by hardware, do not account for host resource, and speed is fast, Safety is higher, and stability and compatibility are also relatively good.

Claims (4)

1. a kind of based on inductive touch control hardware data encryption device it is characterised in that: include inductive touch control module, touch-control number According to acquisition module, the first data conversion module, key production module, cryptographic calculation module, data memory module, deciphering computing mould Block, the second data conversion module, the sensing layer of described inductive touch control module is used for gathering the handwriting of active electromagnetic pen Signal, described touch data acquisition module will gather the touch data that real-time inductive touch control module produces, and touching collection Control data is sent to the first data conversion module and carries out data conversion, and the data after conversion is sent to key production module and generates Ciphertext, ciphertext is encrypted computing and is stored in data memory module by cryptographic calculation module, and described deciphering computing module can be by The ciphertext data of encryption is decrypted computing, and the data of deciphering is passed through the second data conversion module conversion title touch command letter Number it is sent to host computer and carries out handwriting signal and show.
2. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that: The sensing layer of described inductive touch control module adopts array induction coil circuit, and is marked with x-axis and y-axis coordinate system.
3. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that: Described ciphertext comprises ciphertext based on key production module and in order to treat to being decrypted based on the ciphertext of key production module The ciphertext of deciphering.
4. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that: Described cryptographic calculation module and deciphering computing module are based on the ecb pattern in des algorithm, data to be encrypted and decrypted.
CN201620924388.9U 2016-08-24 2016-08-24 Based on inductance type touch -control hardware data encryption device Active CN205912066U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620924388.9U CN205912066U (en) 2016-08-24 2016-08-24 Based on inductance type touch -control hardware data encryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620924388.9U CN205912066U (en) 2016-08-24 2016-08-24 Based on inductance type touch -control hardware data encryption device

Publications (1)

Publication Number Publication Date
CN205912066U true CN205912066U (en) 2017-01-25

Family

ID=57801059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620924388.9U Active CN205912066U (en) 2016-08-24 2016-08-24 Based on inductance type touch -control hardware data encryption device

Country Status (1)

Country Link
CN (1) CN205912066U (en)

Similar Documents

Publication Publication Date Title
CN101599188B (en) IPA security certification-based access control system
CN104978512A (en) Password input and confirmation method and system thereof
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN103401678A (en) Method for ensuring data transmission safety of Internet of things
CN103455744B (en) A kind of data security protection method based on vein identification technology and system
CN107683582A (en) Certification instruction pen equipment
CN104917607A (en) PIN encryption equipment of touch screen key-press input and encryption method
CN103870073A (en) Information processing method and electronic equipment
CN105095719A (en) Fingerprint unlocking method and system and electronic device provided with system
CN103780391A (en) Hand-written electronic signature data protection method based on signature content
CN105808998A (en) Fingerprint identification device
CN102945339A (en) Data protection system for computer
CN104053151A (en) Point-to-point data secret communication terminal device
CN205912066U (en) Based on inductance type touch -control hardware data encryption device
CN103853340A (en) Touch keyword using national cipher SM1 encryption chip and encryption method thereof
CN204347841U (en) A kind of fingerprint identification device
CN204808325U (en) Carry out black equipment to data
CN207475576U (en) A kind of safety mobile terminal system based on safety chip
CN201199439Y (en) Mobile storage apparatus
CN206178834U (en) Computer network information safety coefficient
CN204442397U (en) A kind of encrypted electronic signature device
CN201838004U (en) Hardware encryption card for computer interface
CN106778188A (en) A kind of ciphering type hard-disk cartridge
CN204759393U (en) Gesture password input device and system
CN204103935U (en) A kind of protective device being applied to banking hardware password

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190304

Address after: 510145 3rd floor, 19 Hailong Road, Nannanjie, Liwan District, Guangzhou City, Guangdong Province

Patentee after: Guangzhou Hechun Automation Technology Co., Ltd.

Address before: 510030 Guangzhou Liwan District, Guangdong Province, 228-238 Qiaozhong Road, self-compiled M1 Building 3 Building, self-compiled No. 1

Patentee before: Guangzhou Wei Wei electronic Polytron Technologies Inc