CN205912066U - Based on inductance type touch -control hardware data encryption device - Google Patents
Based on inductance type touch -control hardware data encryption device Download PDFInfo
- Publication number
- CN205912066U CN205912066U CN201620924388.9U CN201620924388U CN205912066U CN 205912066 U CN205912066 U CN 205912066U CN 201620924388 U CN201620924388 U CN 201620924388U CN 205912066 U CN205912066 U CN 205912066U
- Authority
- CN
- China
- Prior art keywords
- module
- data
- ciphertext
- deciphering
- conversion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
The utility model discloses a based on inductance type touch -control hardware data encryption device relates to data encryption technical field. Its inductance type touch module's perception layer is used for gathering the handwritten person's handwriting signal of active electromagnetism pen, touch -control data acquisition module will gather the touch -control data that real -time inductance type touch module produced, and carry out data conversion with the touch -control data transfer that gathers to a data conversion module, data transfer after the conversion is to the key generation module and generate the ciphertext, it encrypts the ciphertext operation and saves at data storage module to encrypt operation module, deciphering operation module can decrypt the operation with black ciphertext data, and convey the data of deciphering to the host computer through the 2nd data conversion module conversion title touch -control command signal and write by hand person's handwriting signal display. Security, integrality, usability and the non -repudiation of this encryption device through encrypting the handwritten electronic information of luck tendency module assurance.
Description
Technical field
This utility model is related to data encryption technology field, and more particularly, to a kind of inductive touch control hardware data that is based on is encrypted
Device.
Background technology
Currently, domestic many information network application system safety problem ratio more prominent, exist very big risk and
Dangerous.The safety equipment that some important network application systems use are all directly to introduce it is difficult to ensure safety from abroad
Using and effective monitoring;Meanwhile, there is also the competition of technology and commercial interest between enterprise;There is individual between men
Privacy, if being not intended to, with clear-text way transmission, the sensitive information that third party's (or adverse party) knows by network, either leads to
Cross wireless or wire transmission, the sensitive information being transmitted is easy to be eavesdropped by third party, if transmitting on the common channels
Information is transmitted in the way of ciphertext, makes listener-in be difficult to obtain useful information, then can reach the purpose of secure communication.
Information security mainly uses safety, integrity, availability and the non-repudiation that cryptographic technique carrys out guarantee information,
Its technology mainly includes several aspects such as monitoring, scanning, detection, encryption, certification, attack protection, anti-virus and audit, wherein plus
Secret skill art, also referred to as cryptographic technique, are a kind of the most practical and most reliable methods that computerized information is protected, and are information peaces
Full core technology, has penetrated among most of safety product.At present in time writer touch-control field, also it is not encrypted
Process, substitute traditionally on paper write mode as increasing electronic writing pattern can become, but the information of electronic writing
There is potential safety hazard in safety, be easily stolen, and safety is not high.
Utility model content
Technical problem to be solved in the utility model is to provide one kind to be based on inductive touch control hardware data encryption device,
This device can effectively ensure the safety of electronic writing information by cryptographic calculation module.
For solving above-mentioned technical problem, technical solution adopted in the utility model is: a kind of hard based on inductive touch control
Part data encryption, deciphering device, including inductive touch control module, touch data acquisition module, the first data conversion module, key
Generation module, cryptographic calculation module, data memory module, deciphering computing module, the second data conversion module, described inductance type touches
The sensing layer of control module is used for gathering the handwriting signal of active electromagnetic pen, and described touch data acquisition module will gather real
When the touch data that produces of inductive touch control module, and the touch data of collection be sent to the first data conversion module enter line number
According to conversion, the data after conversion is sent to key production module and generates ciphertext, and ciphertext is encrypted fortune by cryptographic calculation module
Calculate and be stored in data memory module, the ciphertext data of encryption can be decrypted computing by described deciphering computing module, and will solve
Close data by second data conversion module conversion claim touch command signal be sent to host computer carry out handwriting signal show
Show.
The technical scheme optimizing further is that the sensing layer of described inductive touch control module adopts array induction coil electricity
Road, and it is marked with x-axis and y-axis coordinate system.
The technical scheme optimizing further is that described ciphertext comprises ciphertext based on key production module and in order to being based on
The ciphertext of key production module is decrypted and ciphertext to be decrypted.
The technical scheme optimizing further is described cryptographic calculation module and deciphering computing module is based in des algorithm
Ecb pattern encrypts and decrypts to data.
Have the beneficial effects that using produced by technique scheme: cryptographic calculation module of the present utility model passes through des
Ecb pattern in algorithm is encrypted to hand-written data, carries out the combination of data and key through des computing module, completes to count
According to encryption and decryption computing;Thus realizing the safeguard protection to hand-written data, simultaneously also can be by deciphering computing module to encryption
Data be decrypted process, the data of decryption processing carries out showing electronic handwritten data by host computer;This utility model is adopted
It is hardware cipher mode, be to be realized by the hardware encryption device outside independent of host computer system, all critical datas
Storage, computing are all internally realized by hardware, do not account for host resource, and soon, safety is higher for speed, stability and compatibility
Relatively good.
Brief description
Fig. 1 is this utility model theory diagram.
Specific embodiment
Below in conjunction with the accompanying drawing in this utility model embodiment, the technical scheme in this utility model embodiment is carried out
Clearly and completely description is it is clear that described embodiment is only a part of embodiment of this utility model rather than whole
Embodiment.Based on the embodiment in this utility model, those of ordinary skill in the art are not under the premise of making creative work
The every other embodiment being obtained, broadly falls into the scope of this utility model protection.
As shown in figure 1, the utility model discloses a kind of encrypted based on inductive touch control hardware data, decipher device, bag
Include inductive touch control module, touch data acquisition module, the first data conversion module, key production module, cryptographic calculation module,
Data memory module, deciphering computing module, the second data conversion module, the sensing layer of described inductive touch control module is used for gathering
The handwriting signal of active electromagnetic pen, described touch data acquisition module will gather what real-time inductive touch control module produced
Touch data, and the touch data of collection is sent to the first data conversion module carries out data conversion, the data after conversion passes
Deliver to key production module and generate ciphertext, ciphertext is encrypted computing and is stored in data storage mould by cryptographic calculation module
Block, the ciphertext data of encryption can be decrypted computing by described deciphering computing module, and the data of deciphering is passed through the second data
Modular converter conversion claims touch command signal to be sent to host computer and carry out handwriting signal to show.
The embodiment optimizing further is that the sensing layer of described inductive touch control module adopts array induction coil circuit,
And it is marked with x-axis and y-axis coordinate system.
The embodiment optimizing further is that described ciphertext comprises ciphertext based on key production module and in order to based on close
The ciphertext of key generation module is decrypted and ciphertext to be decrypted.
The embodiment optimizing further is described cryptographic calculation module and deciphering computing module is based in des algorithm
Ecb pattern encrypts and decrypts to data.
This utility model principle: the sensing layer of inductance touch-control module is positioned x/y axle in array fashion, with active electric
The mode of magnetic pen z-axis sensing learns depth, and when writing, electromagnetic signal is synchronized to be sent to touch data acquisition module, inductance
Formula touch-control processing module passes to hardware cryptographic calculation module by spi signal of communication, and encrypting module is with hexadecimal code computing
Data is passed to pc by mode, and cryptographic calculation module is encrypted to hand-written data by des ecb mode encryption, by des plus
Close hand-written data passes through usb interface and upper machine communication, and ciphertext data can be retained in local side, backstage by host computer application app
This number can be preserved by application according to passing to server, and in addition a road encryption data can be deciphered reduction truthful data by app and be uploaded to
Display, application end, by the encrypted encoded data receiving, is converted into touch command collection by decipherment algorithm and is handed over pc bottom data
Mutually, form encryption function.This utility model uses hardware cipher mode, is to be added by the hardware outside independent of host computer system
Close equipment is realized, and the storage of all critical datas, computing are all internally realized by hardware, do not account for host resource, and speed is fast,
Safety is higher, and stability and compatibility are also relatively good.
Claims (4)
1. a kind of based on inductive touch control hardware data encryption device it is characterised in that: include inductive touch control module, touch-control number
According to acquisition module, the first data conversion module, key production module, cryptographic calculation module, data memory module, deciphering computing mould
Block, the second data conversion module, the sensing layer of described inductive touch control module is used for gathering the handwriting of active electromagnetic pen
Signal, described touch data acquisition module will gather the touch data that real-time inductive touch control module produces, and touching collection
Control data is sent to the first data conversion module and carries out data conversion, and the data after conversion is sent to key production module and generates
Ciphertext, ciphertext is encrypted computing and is stored in data memory module by cryptographic calculation module, and described deciphering computing module can be by
The ciphertext data of encryption is decrypted computing, and the data of deciphering is passed through the second data conversion module conversion title touch command letter
Number it is sent to host computer and carries out handwriting signal and show.
2. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that:
The sensing layer of described inductive touch control module adopts array induction coil circuit, and is marked with x-axis and y-axis coordinate system.
3. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that:
Described ciphertext comprises ciphertext based on key production module and in order to treat to being decrypted based on the ciphertext of key production module
The ciphertext of deciphering.
4. according to claim 1 a kind of based on the encryption of inductive touch control hardware data, deciphering device it is characterised in that:
Described cryptographic calculation module and deciphering computing module are based on the ecb pattern in des algorithm, data to be encrypted and decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620924388.9U CN205912066U (en) | 2016-08-24 | 2016-08-24 | Based on inductance type touch -control hardware data encryption device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620924388.9U CN205912066U (en) | 2016-08-24 | 2016-08-24 | Based on inductance type touch -control hardware data encryption device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205912066U true CN205912066U (en) | 2017-01-25 |
Family
ID=57801059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620924388.9U Active CN205912066U (en) | 2016-08-24 | 2016-08-24 | Based on inductance type touch -control hardware data encryption device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205912066U (en) |
-
2016
- 2016-08-24 CN CN201620924388.9U patent/CN205912066U/en active Active
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101599188B (en) | IPA security certification-based access control system | |
CN104978512A (en) | Password input and confirmation method and system thereof | |
CN105117658B (en) | A kind of cryptosecurity management method and equipment based on finger print identifying | |
CN103401678A (en) | Method for ensuring data transmission safety of Internet of things | |
CN103455744B (en) | A kind of data security protection method based on vein identification technology and system | |
CN107683582A (en) | Certification instruction pen equipment | |
CN104917607A (en) | PIN encryption equipment of touch screen key-press input and encryption method | |
CN103870073A (en) | Information processing method and electronic equipment | |
CN105095719A (en) | Fingerprint unlocking method and system and electronic device provided with system | |
CN103780391A (en) | Hand-written electronic signature data protection method based on signature content | |
CN105808998A (en) | Fingerprint identification device | |
CN102945339A (en) | Data protection system for computer | |
CN104053151A (en) | Point-to-point data secret communication terminal device | |
CN205912066U (en) | Based on inductance type touch -control hardware data encryption device | |
CN103853340A (en) | Touch keyword using national cipher SM1 encryption chip and encryption method thereof | |
CN204347841U (en) | A kind of fingerprint identification device | |
CN204808325U (en) | Carry out black equipment to data | |
CN207475576U (en) | A kind of safety mobile terminal system based on safety chip | |
CN201199439Y (en) | Mobile storage apparatus | |
CN206178834U (en) | Computer network information safety coefficient | |
CN204442397U (en) | A kind of encrypted electronic signature device | |
CN201838004U (en) | Hardware encryption card for computer interface | |
CN106778188A (en) | A kind of ciphering type hard-disk cartridge | |
CN204759393U (en) | Gesture password input device and system | |
CN204103935U (en) | A kind of protective device being applied to banking hardware password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190304 Address after: 510145 3rd floor, 19 Hailong Road, Nannanjie, Liwan District, Guangzhou City, Guangdong Province Patentee after: Guangzhou Hechun Automation Technology Co., Ltd. Address before: 510030 Guangzhou Liwan District, Guangdong Province, 228-238 Qiaozhong Road, self-compiled M1 Building 3 Building, self-compiled No. 1 Patentee before: Guangzhou Wei Wei electronic Polytron Technologies Inc |