CN103427988A - Data encryption and decryption method - Google Patents

Data encryption and decryption method Download PDF

Info

Publication number
CN103427988A
CN103427988A CN2013103979014A CN201310397901A CN103427988A CN 103427988 A CN103427988 A CN 103427988A CN 2013103979014 A CN2013103979014 A CN 2013103979014A CN 201310397901 A CN201310397901 A CN 201310397901A CN 103427988 A CN103427988 A CN 103427988A
Authority
CN
China
Prior art keywords
password
address
password input
character
input address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103979014A
Other languages
Chinese (zh)
Inventor
李刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Broadband Multimedia Technology Co Ltd
Original Assignee
Hisense Broadband Multimedia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Broadband Multimedia Technology Co Ltd filed Critical Hisense Broadband Multimedia Technology Co Ltd
Priority to CN2013103979014A priority Critical patent/CN103427988A/en
Publication of CN103427988A publication Critical patent/CN103427988A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a data encryption and decryption method. The decryption method comprises the following steps of sequentially receiving password input addresses and decryption password characters corresponding to the password input addresses one to one, judging if the sequence of the password input addresses meet the set sequence in the encryption process, if the sequence of the password input addresses meets the set sequence, comparing decryption password characters corresponding to the password input addresses with encryption password characters in a corresponding address in the encryption process, and opening access permission of decryption data when all decryption password characters are completely matched with encryption password characters. According to the method, the input sequence of the password character input addresses is considered in the encryption and decryption process, so that position relevance of the address space is achieved, and the password decryption difficulty is improved, and security of data is improved.

Description

Data encryption and decryption method
Technical field
The present invention relates to the Technology On Data Encryption field, specifically, relate to data encryption and decryption method.
Background technology
In the optical module product scope, optical module is standardized product, need to meet corresponding consensus standard, it is corresponding with it that different product categories has different agreements, each agreement has the internal agreement product information district of corresponding agreement regulation and optical module to manufacture the producer information area, deposits respectively product information and manufacturing firm's information.As the optical module manufacturer; in actual use; do not wish that the user of optical module is such as equipment vendor gets optical module product parameters and some interiors of products identification informations; more do not wish the situation that occurs that optical module inner parameter and information are modified; so; general optical module producer all can take cipher mechanism, optical module inner parameter and information is protected, to prevent from appearing in actual use procedure owing to occurring that behavior that parameter is modified causes product deteriorated and lost efficacy.
At present, cryptoguard mechanism commonly used is on the market: as the user, after Password Input district input code characters, the character of the character of input and pre-save is mated.If code characters is consistent with the character of pre-save, with regard to open interior parameter testing zone and the internal product information area, make optical module enter the production debugging mode.Matching process is indifferent to the input sequence of a plurality of code characters, only pays close attention to final input results.If the data that password is four bytes, but, after the data excursion of each byte is 0 to 255, four combination of bytes, occur that the probability of password is 1/ (256*256*256*256) by chance.Because password matching algorithm structure is relatively simple, password is easier to be decrypted, and Information Security is lower.
In addition, in order to increase the confidentiality of data, common way is the figure place that increases the Password Input address, with this, increases the password figure place, reduces the probability that password is decrypted.But the way that increases the Password Input address size can increase the taking of memory headroom, while especially using in limited products such as optical module at memory headroom, can be subject to the restriction that systematic function requires.
Summary of the invention
The present invention is directed to the problem that in prior art, cipher safety is lower and a kind of data ciphering method and decryption method are provided, realize the position correlation of address space by the input sequence of considering the code characters Input Address in encryption, decrypting process, improved the confidentiality of password to decipher difficulty and data.
For achieving the above object, data ciphering method provided by the invention adopts following technical proposals to be achieved:
A kind of data ciphering method, described method comprises the steps:
A1, set a plurality of Password Inputs address, determine the order of Password Input address, using this order as specified order;
A2, the Crypted password character of inputting in each described Password Input address according to described specified order reception user;
A3, preserve the described Crypted password character in described Password Input address, described specified order and each described Password Input address.
Data ciphering method as above, for realizing the reusing of password address, to save memory headroom, the quantity of described Crypted password character is greater than the quantity of described Password Input address, described Crypted password character is circulated according to described specified order and the corresponding and preservation one by one of described Password Input address.
Data ciphering method as above, described encryption method also comprises the step of the device address of input storing encrypt data place equipment.
For realizing aforementioned goal of the invention, data decryption method provided by the invention adopts following technical proposals to realize:
A kind of data decryption method, described method comprises the steps:
The Password Input address that b1, order receive user's input reaches clear crytpographic key character one to one;
Whether b2, the order that judges the Password Input address meet specified order definite while encrypting, when the order in the Password Input address meets described specified order, the Crypted password character when clear crytpographic key character that the password comparison Input Address is corresponding and encryption in corresponding address;
B3, when all described clear crytpographic key characters and described Crypted password character mate fully, open the access rights of data decryption.
Data decryption method as above, described step b2 comprises following sub-step:
B21, judge whether first Password Input address of user input meets first address in specified order definite while encrypting, if, carry out b22, otherwise, close the access rights of data decryption;
B22, by described first Password Input address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons, if coupling is carried out b23, otherwise, close the access rights of data decryption;
B23, judge whether the Next Password Input Address of user input meets the address in specified order definite while encrypting, if, carry out b24, otherwise, close the access rights of data decryption;
B24, by this Next Password Input Address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons, if coupling is carried out b25, otherwise, close the access rights of data decryption;
B25, circulation execution step b23 and b24, until completeer all clear crytpographic key characters.
Data decryption method as above, for ease of relatively judgement, after Crypted password character when judging that certain Password Input address meets clear crytpographic key character corresponding to described specified order and this Password Input address and encrypts in corresponding address is complementary, first change the value of the tick lables position set in advance, then carry out the judgement of Next Password Input Address.
Preferably, before the judgement of carrying out the Next Password Input Address, first judge that whether the value of described tick lables position is correct, if correct, continue judgement, otherwise, close the access rights of data decryption.
Data decryption method as above, for realizing reusing of password address, the quantity of described clear crytpographic key character is greater than the quantity of described Password Input address, first according to the specified order circulation of described Password Input address, described clear crytpographic key character is divided into groups, then, repeat described step b2 according to order of packets, more every group of described clear crytpographic key character be the described Crypted password character in corresponding address when encrypting; At the described clear crytpographic key character of every completeer a group and this group, when corresponding described Crypted password character is complementary, the password address that first change sets in advance is reused the value of flag bit, then carries out the comparison of next group clear crytpographic key character.
Data decryption method as above also comprised the steps b0, receives the device address of the data decryption place equipment of user's input before described step b1, when described device address and pre-stored device address are complementary, then carried out described step b1.
Preferably, described equipment is optical module.
Compared with prior art, advantage of the present invention and good effect are:
1, the present invention determines the specified order of Password Input address when data encryption, and stores corresponding Crypted password character according to specified order; When data deciphering, the order that judges the Password Input address whether when encrypting definite specified order be consistent, only when sequence of addresses is consistent, just be decrypted the matching judgment of code characters and Crypted password character, increased the complexity of password matching algorithm structure, improve the deciphering difficulty, and then increased the fail safe of enciphered data.
2, by arranging and utilizing password address to reuse flag bit, make limited password address to reuse, realize the expansion of password figure place on the basis do not increased the internal memory space hold, further increased the fail safe of intensity and the enciphered data of password.
After reading the specific embodiment of the present invention by reference to the accompanying drawings, it is clearer that the other features and advantages of the invention will become.
The accompanying drawing explanation
Fig. 1 is the flow chart of first embodiment of data ciphering method of the present invention;
Fig. 2 is the flow chart of first embodiment of data decryption method of the present invention;
Fig. 3 is the flow chart of second embodiment of data ciphering method of the present invention;
Fig. 4 is the flow chart of second embodiment of data decryption method of the present invention;
Fig. 5 is the specific implementation flow chart of part steps in Fig. 4 flow chart.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with the accompanying drawing in the present invention, the technical scheme in the embodiment of the present invention is carried out to clear, complete description.
At first, concise and to the point elaboration technical conceive of the present invention: prior art is when carrying out data deciphering, as long as decryption key data is input in the Password Input address of appointment, and the corresponding decryption key data in each address is correct, think that whole decryption key data is correct, will open the access rights of data decryption.In the decryption key data deterministic process, only be concerned about the clear crytpographic key character whether in the Password Input address of appointment the clear crytpographic key character in input, each Password Input address whether correct, and no matter the order of a plurality of Password Inputs address.For instance, if the data that data to be decrypted is optical module inside, the Password Input address is offset address 0x7B, 0x7C, 0x7D, 0x7E four bytes pointed, and each byte is to there being the data as the clear crytpographic key character.In the deciphering deterministic process, be indifferent to the user is first past which address, the rear decryption key data write toward which address when input clear crytpographic key character, as long as the clear crytpographic key character is input to above-mentioned four offset addresss, and the clear crytpographic key character in each address is complementary with the Crypted password character set in advance, and judges that the clear crytpographic key character is correct.Existing this password matching algorithm structure is relatively simple, and password easily is decrypted, and Information Security is lower.
Given this, the present invention has designed a kind of data encryption relevant with sequence of addresses and decryption method, and technological core is: determine the specified order of Password Input address in data encryption process, for example, specified order is 0x7E, 0x7C, 0x7D, 0x7B.The factor using the order of address as the deciphering judgement during deciphering, be also, not only be concerned about during deciphering whether whether the clear crytpographic key character in correct, each Password Input address is correct in the Password Input address, also will consider whether according to specified order, input successively the clear crytpographic key character.By considering the order of Password Input address, for the decrypting process with four addresses, the probability that password is decrypted is the 1/(P of probability while not considering sequence of addresses 4 4)=1/24, the probability that is decrypted reduces greatly.
Please refer to Fig. 1, this figure is depicted as the flow chart of first embodiment of data ciphering method of the present invention.In this embodiment, the quantity of Password Input address equates with the quantity of Crypted password character.As shown in Figure 1, the flow process that this embodiment is encrypted data is as follows:
Step 101: encryption flow starts.
Step 102: set a plurality of Password Inputs address, determine the specified order of Password Input address.
The optical module that meets the SFF-8472 agreement of take is example, and when internal data is encrypted, using offset address 0x7B, 0x7C, these four bytes of 0x7D, 0x7E as the Password Input address, and the specified order of definite Password Input address is 0x7E, 0x7C, 0x7D, 0x7B.
Step 103: according to specified order, receive the Crypted password character that the user inputs in each Password Input address.
When the user inputs the Crypted password character, according to step 102, definite specified order is inputted each corresponding character in Password Input address successively.
Step 104: preserve the Crypted password character in Password Input address, specified order and each Password Input address.
A plurality of Password Inputs address of setting, Crypted password character in each Password Input address and the specified order of Password Input address are preserved one by one, so that carry out matching judgment during deciphering.
Step 105: encryption flow finishes.
For the data encryption process of Fig. 1 embodiment, realize that the flow chart of the method for data deciphering please refer to shown in Fig. 2.
As shown in Figure 2, decrypting process is specific as follows:
Step 201: the deciphering flow process starts.
Step 202: the Password Input address that order receives user's input reaches clear crytpographic key character one to one.
For the encryption and decryption process with a plurality of Password Inputs address and specified order, during deciphering, the user not only will input the clear crytpographic key character, also needs to input the Password Input address, and the corresponding input one by one of the clear crytpographic key character in Yu Gai address, Password Input address.
Step 203: whether the order that judges the Password Input address meets specified order.If perform step 204; Otherwise, go to step 207.
This deterministic process comprises the judgement of two levels: at first, it is correct that want the Password Input address, is Password Input address specified while encrypting, as an address in determined 0x7B, 0x7C, 0x7D, 0x7E in above-mentioned steps 102 in the encryption method flow process; Secondly, the order of Password Input address meets specified order definite while encrypting.That is to say, if the specified order while encrypting is 0x7E, 0x7C, 0x7D, 0x7B, while deciphering, first Password Input address must be 0x7E, second Password Input address must be 0x7C, the 3rd Password Input address must be 0x7D, and the 4th Password Input address must be 0x7B.If first Password Input address is not 0x7E, judge that the Password Input mail returned on ground of incorrect address closes specified order.The judgement of other sequence of addresses the like.
Step 204: when the order in the Password Input address meets specified order, then compare the Crypted password character in clear crytpographic key character and corresponding address.
Step 205: judge whether fully coupling of clear crytpographic key character and Crypted password character.If perform step 206; Otherwise, go to step 207.
Step 203 can adopt to step 205 processing method that judges one by one and compare, and above-mentioned four bytes of still take are example as the Password Input address, and concrete deterministic process is as follows:
B21, judge whether first Password Input address of user input meets first address in specified order definite while encrypting.If, execution step b22; Otherwise, judge that the order of Password Input address does not meet specified order, perform step 207.
B22, by first Password Input address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons.If coupling, carry out b23; Otherwise, judge that clear crytpographic key character and Crypted password character do not mate, and perform step 207.
B23, judge whether the Next Password Input Address of user input meets the address in specified order definite while encrypting.If carry out b24; Otherwise, judge that the order of Password Input address does not meet specified order, perform step 207.
B24, by this Next Password Input Address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons.If coupling, carry out b25; Otherwise, judge that clear crytpographic key character and Crypted password character do not mate, and perform step 207.
B25, circulation execution step b23 and b24, until completeer four Password Input addresses and corresponding clear crytpographic key character thereof successively.
Step 206: the order in the Password Input address meets specified order and clear crytpographic key character and Crypted password character while mating fully, opens the access rights of data decryption.Then, perform step 208.
Step 207: when the order in the Password Input address does not meet specified order (comprising the incorrect situation in Password Input address) or clear crytpographic key character and Crypted password character and is not complementary, close the access rights of data decryption.
Step 208: the deciphering flow process finishes.
In this embodiment, due to the factor of the input sequence using the Password Input address as the deciphering judgement, even the Password Input address is 0x7B, 0x7C, these four addresses of 0x7D, 0x7E of appointment, and Crypted password character when the corresponding clear crytpographic key character in each address and encryption in corresponding address is complementary, if Password Input address and decryption code character thereof are not to input according to the specified order of 0x7E, 0x7C, 0x7D, 0x7B, also judge that clear crytpographic key is incorrect, close the data decryption access rights.So, if while not considering the Password Input address, the code breaking probability is not 1/ (256*256*256*256), consider that the decoding probability of Password Input address is: [1/ (256*256*256*256)] * (P 4 4)=1/24*[1/ (256*256*256*256)], decode probability and reduced by 1/24.If the Password Input number of addresses increases, decode probability lower, improved the fail safe of data.
In this embodiment, while performing step 203 to 205 deterministic process, for convenience of the judgement, the system of also being convenient to is known the wrong place that can not decipher, sets in advance a tick lables position, the judgement before by the tick lables position in init state.Then, in decrypting process, judge when certain Password Input address meets clear crytpographic key character corresponding to specified order and this Password Input address and encrypts that the Crypted password character in corresponding address is complementary after, first change the value of the tick lables position set in advance, then carry out the judgement of Next Password Input Address.And, before the judgement of carrying out the Next Password Input Address, first judge that whether the value of tick lables position is correct, if correct, continue judgement, otherwise, directly close the access rights of data decryption.For example, the initialization value of tick lables position W is 0, and when the clear crytpographic key character in first Ji Gai address, Password Input address is all correct, the W assignment is 1.Before the judgement of carrying out second Password Input address, first judge whether the value of W is 1.If W equals 1, judge that whether second Password Input address be correct, whether its order meets specified order; If W is not equal to 1, directly close the access rights of data decryption, further to improve the complexity of data deciphering, improve Information Security.
The present invention considers that the way that increases the Password Input address size by taking amount of physical memory can take the deficiency in limited memory space, consideration can be reused sign by the Password Input address is set, and utilizes this to be identified at the expansion that realizes the password figure place on the basis that does not increase memory headroom.The specific implementation process of this technical scheme can be with reference to the encryption flow of figure 3 and the deciphering flow process of Fig. 4.
Please refer to Fig. 3, the figure shows the flow chart of second embodiment of data ciphering method of the present invention.In this embodiment, the quantity of Password Input address is less than the quantity of Crypted password character.As shown in Figure 3, the flow process in the case data are encrypted is as follows:
Step 301: encryption flow starts.
Step 302: set a plurality of Password Inputs address, determine the specified order of Password Input address.
The optical module that meets the SFF-8472 agreement of still take is example, when internal data is encrypted, using offset address 0x7B, 0x7C, these four bytes of 0x7D, 0x7E as physics Password Input address.For realizing the expansion of eight password figure places, can be by these four physical address recirculation in a certain order once, thereby forming is the Password Input address of eight bytes in logic, and the order of eight Password Input addresses in logic forms an address specified order, for example, specified order is 0x7B, 0x7C, 0x7D, 0x7E, 0x7B, 0x7C, 0x7D, 0x7E.
Step 303: receive the Crypted password character of user's input, the Crypted password character is corresponding one by one with the Password Input address according to the specified order circulation.
Step 304: preserve the Crypted password character in Password Input address, specified order and each Password Input address.
Step 305: the device address of input storing encrypt data place equipment.
Step 306: encryption flow finishes.
For the data encryption process of Fig. 3 embodiment, realize that the flow chart of the method for data deciphering please refer to shown in Fig. 4.
Decrypting process when as shown in Figure 4, code characters quantity is greater than the Password Input address is specific as follows:
Step 401: the deciphering flow process starts.
Step 402: the device address that receives the data decryption place equipment of user's input.
General, the equipment at data decryption place mostly has device address.For guaranteeing that the user enjoys access rights to the data in equipment, at first require the user to input the device address of data decryption place equipment.
Step 403: whether the judgment device address is effective.If effectively, perform step 404; Otherwise, go to step 413.
Step 404: order receives Password Input address and the clear crytpographic key character of user's input.
Step 405: the clear crytpographic key character is divided into groups according to the specified order circulation of Password Input address.
Because the Password Input number of addresses is reusable, be accurate judgement, the clear crytpographic key character is divided into groups in the specified order circulation of Password Input address that need to be definite when encrypting.If the Password Input address is four, every four of clear crytpographic key character is divided into to one group.Certainly, if code characters quantity is not 4 integral multiple, last group figure place shared according to reality determined, while needing only with encryption, preserves consistent.
Step 406: take group as unit, be decrypted the judgement of code characters according to order of packets.
Order of packets has determined actual Password Input sequence of addresses, therefore, need to be decrypted successively according to order of packets the judgement of code characters.
Step 407: whether the order that judges current group of Password Input address meets specified order.If perform step 408; Otherwise, go to step 413.
Step 408: judge whether current group of clear crytpographic key character and Crypted password character mate.If coupling, perform step 409; Otherwise, go to step 413.
Step 409: when current group of clear crytpographic key character and Crypted password character are complementary, the change password address is reused the value of flag bit.
Because the Password Input address size need to be reused, so, set in advance a password address and reuse flag bit, with this different value as to Same Physical Password Input address, the different differentiation of using logical addresses.
The concrete deterministic process of above-mentioned steps 407 and step 408 please refer to shown in Fig. 5 flow process.
Step 410: judge whether that all groups all relatively complete.If perform step 411; If NO, go to step 406, proceed the judgement of next group.
Step 411: judge whether fully coupling of clear crytpographic key character and Crypted password character.If perform step 412; Otherwise, go to step 413.
Step 412: the order the Password Input addresses of all groups all meets specified order and clear crytpographic key character and Crypted password character while mating fully, opens the access rights of data decryption.Then, perform step 414.
Step 413: when the order that one group of Password Input address is arranged does not meet specified order (comprising the incorrect situation in Password Input address) or clear crytpographic key character and Crypted password character and is not complementary, close the access rights of data decryption.
Step 414: the deciphering flow process finishes.
The process that pair of every group clear crytpographic key character of above-mentioned steps 407 and step 408 judged please refer to shown in Fig. 5 flow process.Flow chart as shown in Figure 5, concrete implementation is as follows:
Step 501: judge whether first Password Input address meets specified order.If perform step 502; Otherwise, go to step 509.
Step 502: while in first Password Input address, meeting specified order, judge whether the clear crytpographic key character of first Password Input address is complementary with corresponding Crypted password character.If coupling, perform step 503; If do not mate, go to step 509.
Step 503: the value of change position flag bit.
The effect of tick lables position and use, can be with reference to the corresponding descriptions of figure 2 embodiment with identical in Fig. 2 embodiment.
Step 504: judge whether all characters in this group relatively complete.If go to step 508; If not, perform step 505.
Step 505: whether the value that judges the tick lables position is correct.If perform step 506; Otherwise, go to step 509.
Step 506: judge whether the Next Password Input Address meets specified order.If perform step 507; Otherwise, go to step 509.
Step 507: whether the clear crytpographic key character that judges this Next Password Input Address is complementary with corresponding Crypted password character.If coupling, go to step 503; Otherwise, perform step 508.
Step 508: go to step 409, the change password address is reused the value of flag bit, and, when also having the clear crytpographic key character group of not judgement, continues to carry out cycle criterion.
Step 509: perform step 413, close the access rights of data decryption.
And, when above-mentioned steps 413 is closed the access rights of data decryption, tick lables position and password address are reused to flag bit and all revert to initial value.
This embodiment reuses flag by password address is set, Password Input address physically can be reused, increased the password figure place on the basis that does not additionally take physical address, for example, for four physical addresss, reuse respectively once, can realize the effect of eight byte passwords, thereby improved Cipher Strength and data confidentiality performance.
Above embodiment is only in order to technical scheme of the present invention to be described, but not is limited; Although with reference to previous embodiment, the present invention is had been described in detail, for the person of ordinary skill of the art, the technical scheme that still can put down in writing previous embodiment is modified, or part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of the present invention's technical scheme required for protection.

Claims (10)

1. a data ciphering method, is characterized in that, described method comprises the steps:
A1, set a plurality of Password Inputs address, determine the order of Password Input address, using this order as specified order;
A2, the Crypted password character of inputting in each described Password Input address according to described specified order reception user;
A3, preserve the described Crypted password character in described Password Input address, described specified order and each described Password Input address.
2. data ciphering method according to claim 1, it is characterized in that, the quantity of described Crypted password character is greater than the quantity of described Password Input address, described Crypted password character is circulated according to described specified order and the corresponding and preservation one by one of described Password Input address.
3. data ciphering method according to claim 1 and 2, is characterized in that, described encryption method also comprises the step of the device address of input storing encrypt data place equipment.
4. a data decryption method, is characterized in that, described method comprises the steps:
The Password Input address that b1, order receive user's input reaches clear crytpographic key character one to one;
Whether b2, the order that judges the Password Input address meet specified order definite while encrypting, when the order in the Password Input address meets described specified order, the Crypted password character when clear crytpographic key character that the password comparison Input Address is corresponding and encryption in corresponding address;
B3, when all described clear crytpographic key characters and described Crypted password character mate fully, open the access rights of data decryption.
5. data decryption method according to claim 4, is characterized in that, described step b2 comprises following sub-step:
B21, judge whether first Password Input address of user input meets first address in specified order definite while encrypting, if, carry out b22, otherwise, close the access rights of data decryption;
B22, by described first Password Input address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons, if coupling is carried out b23, otherwise, close the access rights of data decryption;
B23, judge whether the Next Password Input Address of user input meets the address in specified order definite while encrypting, if, carry out b24, otherwise, close the access rights of data decryption;
B24, by this Next Password Input Address, the corresponding clear crytpographic key character Crypted password character in corresponding address when encrypting is made comparisons, if coupling is carried out b25, otherwise, close the access rights of data decryption;
B25, circulation execution step b23 and b24, until completeer all clear crytpographic key characters.
6. data decryption method according to claim 5, it is characterized in that, after Crypted password character when judging that certain Password Input address meets clear crytpographic key character corresponding to described specified order and this Password Input address and encrypts in corresponding address is complementary, first change the value of the tick lables position set in advance, then carry out the judgement of Next Password Input Address.
7. data decryption method according to claim 6, is characterized in that, before the judgement of carrying out the Next Password Input Address, first judges that whether the value of described tick lables position is correct, if correct, continues judgement, otherwise, close the access rights of data decryption.
8. according to the described data decryption method of any one in claim 4 to 7, it is characterized in that, the quantity of described clear crytpographic key character is greater than the quantity of described Password Input address, first according to the specified order circulation of described Password Input address, described clear crytpographic key character is divided into groups, then, repeat described step b2 according to order of packets, more every group of described clear crytpographic key character be the described Crypted password character in corresponding address when encrypting; At the described clear crytpographic key character of every completeer a group and this group, when corresponding described Crypted password character is complementary, the password address that first change sets in advance is reused the value of flag bit, then carries out the comparison of next group clear crytpographic key character.
9. data decryption method according to claim 4, it is characterized in that, also comprised the steps the device address of the data decryption place equipment of b0, reception user input before described step b1, when described device address and pre-stored device address are complementary, then carry out described step b1.
10. data decryption method according to claim 9, is characterized in that, described equipment is optical module.
CN2013103979014A 2013-07-26 2013-09-05 Data encryption and decryption method Pending CN103427988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103979014A CN103427988A (en) 2013-07-26 2013-09-05 Data encryption and decryption method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201310318426.7 2013-07-26
CN201310318426 2013-07-26
CN2013103979014A CN103427988A (en) 2013-07-26 2013-09-05 Data encryption and decryption method

Publications (1)

Publication Number Publication Date
CN103427988A true CN103427988A (en) 2013-12-04

Family

ID=49652199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103979014A Pending CN103427988A (en) 2013-07-26 2013-09-05 Data encryption and decryption method

Country Status (1)

Country Link
CN (1) CN103427988A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303131A (en) * 2015-11-17 2016-02-03 青岛海信宽带多媒体技术有限公司 Write-in method and device for password data in optical module
CN109683960A (en) * 2018-12-21 2019-04-26 深圳市源拓光电技术有限公司 A kind of register configuration method and its electrical port module of electrical port module

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1316721A (en) * 2000-04-03 2001-10-10 上海贝岭股份有限公司 IC card chip using 8-bit data transmittion and its verification method
US20050071686A1 (en) * 2003-09-29 2005-03-31 Amit Bagga Method and apparatus for generating and reinforcing user passwords
CN101553856A (en) * 2006-09-01 2009-10-07 索尼株式会社 Encryption device, encryption method, and computer program
CN101901312A (en) * 2009-05-27 2010-12-01 鸿富锦精密工业(深圳)有限公司 Password protection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1316721A (en) * 2000-04-03 2001-10-10 上海贝岭股份有限公司 IC card chip using 8-bit data transmittion and its verification method
US20050071686A1 (en) * 2003-09-29 2005-03-31 Amit Bagga Method and apparatus for generating and reinforcing user passwords
CN101553856A (en) * 2006-09-01 2009-10-07 索尼株式会社 Encryption device, encryption method, and computer program
CN101901312A (en) * 2009-05-27 2010-12-01 鸿富锦精密工业(深圳)有限公司 Password protection method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303131A (en) * 2015-11-17 2016-02-03 青岛海信宽带多媒体技术有限公司 Write-in method and device for password data in optical module
CN105303131B (en) * 2015-11-17 2018-10-26 青岛海信宽带多媒体技术有限公司 The wiring method and device of code data in a kind of optical module
CN109683960A (en) * 2018-12-21 2019-04-26 深圳市源拓光电技术有限公司 A kind of register configuration method and its electrical port module of electrical port module
CN109683960B (en) * 2018-12-21 2021-03-30 深圳市源拓光电技术有限公司 Register configuration method of electric port module and electric port module thereof

Similar Documents

Publication Publication Date Title
US9325496B2 (en) Encryption key providing method, semiconductor integrated circuit, and encryption key management device
CN109429222B (en) Method for encrypting wireless network equipment upgrading program and communication data
US11615411B2 (en) POS system with white box encryption key sharing
EP2506488B1 (en) Secure dynamic on-chip key programming
CN108599930A (en) Firmware encrypting and deciphering system and method
US9158939B2 (en) Security chip, program, information processing apparatus, and information processing system
CN105450620A (en) Information processing method and device
CN101448127B (en) Secure information storage system and method
CN109104724B (en) A kind of data ciphering method and device for device upgrade
CN106101150B (en) The method and system of Encryption Algorithm
CN100447772C (en) Programmable logic controller peripheral device
CN103378971A (en) Data encryption system and method
CN104506504A (en) Security mechanism and security device for confidential information of card-free terminal
US11128455B2 (en) Data encryption method and system using device authentication key
CN102662874A (en) Double-interface encryption memory card and management method and system of data in double-interface encryption memory card
CN106254304A (en) For promoting the method and system of secure communication
CN103427988A (en) Data encryption and decryption method
CN109194467A (en) A kind of safe transmission method and system of encryption data
CN103324971A (en) Smart card system and dynamic key update authentication method of smart card system
US8413906B2 (en) Countermeasures to secure smart cards
CN101901629A (en) Nonvolatile memory protecting system and method
CN106341384A (en) Methods for facilitating secure communication
US20130089205A1 (en) Token Provisioning Method
CN113918392B (en) Debug protection system and debug processing module
CN104392153B (en) A kind of method for protecting software and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20131204

RJ01 Rejection of invention patent application after publication