TW451573B - An information paging system with encryption function and its method - Google Patents

An information paging system with encryption function and its method Download PDF

Info

Publication number
TW451573B
TW451573B TW87119436A TW87119436A TW451573B TW 451573 B TW451573 B TW 451573B TW 87119436 A TW87119436 A TW 87119436A TW 87119436 A TW87119436 A TW 87119436A TW 451573 B TW451573 B TW 451573B
Authority
TW
Taiwan
Prior art keywords
code
identification code
data
information
scope
Prior art date
Application number
TW87119436A
Other languages
Chinese (zh)
Inventor
Wen-Jr Fu
Original Assignee
Eten Information Systems Co Lt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eten Information Systems Co Lt filed Critical Eten Information Systems Co Lt
Priority to TW87119436A priority Critical patent/TW451573B/en
Application granted granted Critical
Publication of TW451573B publication Critical patent/TW451573B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This invention introduces an information encryption method implemented in broadcast paging systems to prevent broadcasted data from improper interception. The method can be described as follows. First of all, the information to be transmitted is encoded. Then, authentication code and key code are set and combined with the original encoded data for encryption to generate encrypted data and complete verification code for broadcasting. By using paging receivers, users receive the broadcasted data. The complete verification code is examined and the encrypted data are decrypted based on the key code to generate the original encoded data. The encoded data are then decoded to restore to the original information for display.

Description

6 . 如申請專利範圍楚q Τ5 驟㈠人 項之方法,《中上述解鳴的涉 驟’更包含該第二識別碼的運算。 ,的步 7. 如申請專利範圍第6項之古,土甘士 士 、 驟,更包合一核對辞楚、 在上述解碼的步 驟,在兮楚Χ .〜第二識別碼與該第一識別碼的步 ^帛―_碼與^—制碼符合時 :下步驟;在該第二識別碼與該第-我別碼不符3仃 終正該方法的實施。 寻 8. 如申請專利範圍第1項之太、、木甘士+ 牛脾s .. 方法,其中上述加密運算的 V驟,更包含一第一識別碼的運算。 9. 如申請專利範圍第8項之方法’其中更包含設定— 一識別'碼於該資訊接收裝置中的步驟。 10. 如申請專利範圍第9項之方法,其中上述第一及 識別碼包含資訊分類碼。 一 Π.如申請專利範圍第9項之方法,其中上” n 識別碼包含產品序碼。 12. 如申請專利範圍第9項之方法,苴 乃戍兵甲上述解密運算的 步驟’更包合該第二識別碼的運算。 13. 如申請專利範圍第12項之方法,其中在上述解密運算 的步驟,更包含-核對該第二識別碼與該第—識別碼: 步驟,在該第二識別碼與該第一識別碼符合時,繼續進 行以下步驟;在該第二識別碼與該第—識別碼不符八 時’終止該方法的實施。 〇 14·如申請專利範圍第!項之方法,其中更包含—運算步 驟’以產生總和檢查碼。 12 15.如申請專利範圍第14項之方法, 查碼檢查步驟,去兮她4仏左 、更03該總和檢 田該、和k查碼檢杳杳仿 止執行資料處理程序。 檢-查核不正確時,終 種在資訊廣播傳呼奉络Φ 值Ή β H统中以保密的方式進行資訊 器法」其中該資訊廣播傳呼系統係為呼叫 少包含下列步驟:或^之早向通訊系統,該方法至 設定關鍵碼於_資訊接收裝置之中; 將:原始資料予以編碼’形成原始編碼資料; 算 將該原始編媽資料及該關鍵 形成加密編碼資料; 、'且。進仃加密運 產生一總和檢查碼,加於該加密編碼資料之中; 廣播傳送該加密編碼資料; 以该資訊接收裝置接收該加密編碼資料; 核對該總和檢查碼,當該總和檢杳 俅宜碼核對不正確時,6. If the method of applying for a patent in the scope of QT5 is to perform a human item, "The above-mentioned step of deciphering" further includes the operation of the second identification code. Step 7. For example, the 6th in the scope of the patent application, Tuganshi, Jian, more inclusive of a check word, in the above decoding step, in the Chu X. ~ the second identification code and the first identification code When the ^ 帛 __ code and the ^ -code match: the next step; when the second identification code does not match the -I code, the method is finally implemented. Find 8. For example, the method of the first patent application scope, Muganshi + beef spleen s .. method, wherein the V step of the encryption operation further includes a first identification code operation. 9. The method of item 8 of the scope of patent application, which further includes the step of setting-an identification 'code in the information receiving device. 10. For the method according to item 9 of the patent application scope, wherein the first and identification codes mentioned above include information classification codes. I. The method of item 9 in the scope of patent application, wherein the "n" identification code includes the product sequence number. 12. The method of item 9 in the scope of patent application, the above-mentioned decryption operation step of Nai Bingjia is more inclusive 13. The operation of the second identification code. 13. The method according to item 12 of the scope of patent application, wherein the step of decryption operation further includes-checking the second identification code and the first identification code: step, in the second When the identification code is consistent with the first identification code, the following steps are continued; the implementation of the method is terminated when the second identification code does not coincide with the first identification code. 〇14. The method of the scope of patent application! , Which also includes-operation steps' to generate the sum check code. 12 15. For the method of applying for the scope of patent application No. 14, check the code check step, go to her left, more 03 the sum check field, and k check The code check will not execute the data processing procedure. When the check-check is incorrect, the information method will be used in the information broadcasting paging network Φ value Ή β H system in a confidential manner. The information broadcasting paging system is Call contains List the steps: or early to the communication system, the method to set the key code in the _ information receiving device; encode: the original data to form the original coded data; calculate the original coded data and the key to form an encrypted code Information;, and The encryption operation generates a sum check code and adds it to the encrypted code data; broadcasts the encrypted code data; receives the encrypted code data with the information receiving device; checks the sum check code, and when the sum check is appropriate When the code check is incorrect,

終止執仃以下之資料處理程序; T 根據該關鍵碼對該加密編碼資料進行解密 ,〜 該原始編碼資料; # 得出 將該原始編碼資辯于以解碼,得出該原始資料 择員不該原始資抖。 1 7.如申請專利範圍第丨6項之方法., ,、Τ上述編碼的步 驟,更包合一第一識別碼的運算。 18.如申請專利範圍第17項之方法,其中更包含設定 一識別碼於該資訊接收裝置中的步驟。 13 本紙張尺麵神麵家標準(CNS) Α4規格(210x297公釐) 451573 A8 B8 C8 D8 六、申請專利範圍 19.如申請專利範圍第18項之 乃去,其中上述第— 識別碼包合資訊分類碼。 汉弟一 20·如申請專利範圍第18項之 、万去,其中上述第一及第二 識別碼包含產品序碼。 2 1.如申請專利範圍第! 8項之 法’其中上述解碼的步 驟’更包合該第二識別碼的運算。 J少 22·如中請專利範圍第21項之方法,其中在上述解碼的步 驟,更包合一核對該第二識別石馬與接第-識別碼的步 驟,在該第二識別碼與該第—識別碼符合時,繼進行以 下步驟’在該第二識別碼與該第—識別碼不符合時,終 止該方法的實施。 23. 如申請專利範圍第16項之方法,其中上述加密運算的 步驟,更包含一第一識別碼的運算。 24. 如中請專利範圍第23項之方法.其中更包含設定—第 二識別碼於該資訊接收裝置中的步驟。 25. 如申請專利範圍第24項之方法,其中上述第一及第二 識別碼包含資訊分類碼。 26. 如申請專利範圍第24項之方法,其中上述第一及第二 識別碼包含產品序碼。 27. 如申凊專利範圍第24項之方法,其中上述解密運算的 步驟,更包含該第二識別碼的運算。 28. 如申請專利範圍第27項之方法,其中在上述解密運算 的步驟,更包含一核對該第二識別碼與該第一識別碼的 步驟,在該第二識別碼與該第一識別碼符合時,繼續進 14 本紙張尺度適用中國國家標準(CNS) A4規格(210x297公釐) 請先馨面之注意事項再填寫本頁各欄 裝---------訂----- 線! 451573Terminate the execution of the following data processing procedures; T decrypt the encrypted coded data according to the key code, ~ the original coded data; # deduce the original coded data to decode, and conclude that the original data should not be selected Original resources shake. 1 7. According to the method of item No. 6 of the scope of patent application, the above-mentioned coding steps further include the operation of a first identification code. 18. The method according to item 17 of the patent application scope, further comprising the step of setting an identification code in the information receiving device. 13 This paper ruler ’s standard (CNS) A4 size (210x297 mm) 451573 A8 B8 C8 D8 VI. Application scope of patent 19. If item 18 of the scope of patent application is gone, where the above-identification code is included Information classification code. Handi 20: For example, if you apply for the 18th item in the scope of patent application, the first and second identification codes mentioned above include the product serial number. 2 1. As for the scope of patent application! The 8-item method 'wherein the above-mentioned decoding step' further includes the operation of the second identification code. J 少 22. The method according to item 21 of the patent application, wherein in the above decoding step, a step of verifying the second identification stone horse and receiving the first-identification code is further included, and the second identification code and the When the first identification code is consistent, the following steps are performed. When the second identification code does not match the first identification code, the implementation of the method is terminated. 23. The method according to item 16 of the scope of patent application, wherein the above-mentioned encryption operation step further includes a first identification code operation. 24. The method in item 23 of the patent is requested, which further includes the step of setting a second identification code in the information receiving device. 25. The method of claim 24, wherein the first and second identification codes include an information classification code. 26. The method of claim 24, wherein the first and second identification codes include a product serial number. 27. The method of claim 24, wherein the steps of the decryption operation described above further include the operation of the second identification code. 28. The method according to item 27 of the scope of patent application, wherein the step of decryption operation further includes a step of checking the second identification code and the first identification code, and between the second identification code and the first identification code If it meets, continue to 14 paper size applicable to China National Standards (CNS) A4 specifications (210x297 mm) Please note the notes before filling in the columns on this page --------- Order --- -Line! 451573

8 8 8 8 A Be D8 8 8 8 A Be D

請先讀背面之注意事項再填寫本頁各欄 本紙張尺度適用中國國家標準(CNS) A4規格(210x297公釐) 六、申請專利範圍 '行以下步驟;在該第二識別碼與該第一識別碼不符合 時,終止該方法的實施。 装 IT------ 線.Please read the notes on the back before filling in the columns on this page. The paper size applies to the Chinese National Standard (CNS) A4 (210x297 mm). 6. The scope of patent application is as follows; the second identification code and the first When the identification code does not match, the implementation of this method is terminated. Install IT ------ line.

TW87119436A 1998-11-24 1998-11-24 An information paging system with encryption function and its method TW451573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW87119436A TW451573B (en) 1998-11-24 1998-11-24 An information paging system with encryption function and its method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW87119436A TW451573B (en) 1998-11-24 1998-11-24 An information paging system with encryption function and its method

Publications (1)

Publication Number Publication Date
TW451573B true TW451573B (en) 2001-08-21

Family

ID=21632068

Family Applications (1)

Application Number Title Priority Date Filing Date
TW87119436A TW451573B (en) 1998-11-24 1998-11-24 An information paging system with encryption function and its method

Country Status (1)

Country Link
TW (1) TW451573B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI512532B (en) * 2013-11-25 2015-12-11 Yahoo Inc Mobile device for information encryption and transferring and method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI512532B (en) * 2013-11-25 2015-12-11 Yahoo Inc Mobile device for information encryption and transferring and method thereof

Similar Documents

Publication Publication Date Title
US6769061B1 (en) Invisible encoding of meta-information
CN107659632B (en) File encryption and decryption method and device and computer readable storage medium
TW379308B (en) Coding apparatus and method, decoding apparatus and method and data processing device and method
US8223968B2 (en) Image data verification program recorded on a recording medium, image data verification method, and image data verification system
EP0715242B1 (en) Method and system for digital information protection
KR101509377B1 (en) Device and method for a backup of rights objects
JP2002330126A5 (en)
US20130247218A1 (en) System And Method For Verifying Authenticity Of Documents
CN110391914B (en) File acquisition method and equipment based on two-dimensional code and two-dimensional code generation method
KR970009355A (en) Apparatus and method for sending application authentication in an interactive information system
JP5154830B2 (en) Content distribution system
RU2009105072A (en) VARIABLE DIGITAL VIDEO CODING AND DECODING METHODS
CN1985252A (en) Apparatus and method for processing digital rights object
CN1825850A (en) Secure distribution system for digital contents
PT848872E (en) A PROCESS AND DEVICE FOR TURNING DATA FROM INVIOLABLE COMPUTERS
US7111167B1 (en) Digital watermarks with values derived from remote platforms
KR20030004300A (en) Active data hiding for secure electronic media distribution
CN102760221A (en) IPTV (Internet Protocol Television) digital rights management (DRM) method and device based on digital watermarking and encryption
CN103237010B (en) The server end of digital content is cryptographically provided
EP1146411B2 (en) System and method for protection of digital works
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
EP2410456A1 (en) Methods and apparatuses for binding content to a separate memory device
EP1528506A2 (en) Post decode watermarking of media
CN103136459A (en) Copyright identification method and system for encrypted digital contents
CN103093137A (en) File safe distribution method based on universal series bus (USB) flash disk