Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-encryption system and decryption method of plug-in encryption terminal

A multiple encryption, plug-in technology, applied in transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve problems such as computer encryption, and achieve the effect of strong encryption reliability and difficult cracking

Pending Publication Date: 2022-03-15
中科计算技术西部研究院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention intends to provide a multiple encryption system and decryption method of a plug-in encryption terminal to solve the problem of computer encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-encryption system and decryption method of plug-in encryption terminal
  • Multi-encryption system and decryption method of plug-in encryption terminal
  • Multi-encryption system and decryption method of plug-in encryption terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] This embodiment is basically as figure 1 , figure 2 Shown: a multiple encryption system of a plug-in encryption terminal, including an encryption terminal microprocessor, the encryption terminal microprocessor is provided with a side-end connector, and it is characterized in that: the encryption terminal microprocessor has a clock module inside , the encrypted terminal microprocessor is also connected with an encrypted memory, and a private key is stored in the encrypted memory.

[0029] In this embodiment, an encrypted file is also provided in the encrypted memory, and the encrypted file key is a preset software package in the edge-end device to be encrypted connected to the edge-end connection head.

[0030] In this embodiment, the encrypted file is an AES encrypted file.

[0031] In this embodiment, an encryption start time and an encryption end time are set in the encryption memory or the encryption terminal microprocessor.

[0032] In this embodiment, license a...

Embodiment 2

[0039] The difference between this embodiment and Embodiment 1 is that: the private key includes one plain code private key and one hidden code private key;

[0040] The public key corresponding to the plaintext private key is obtained by popping up a pop-up window to the edge-end device to be encrypted connected to the edge-end connector;

[0041] The public key corresponding to the private key of the hidden code is obtained by accessing a preset software package in the edge-end device connected to the edge-end connection head to be encrypted.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer encryption, and particularly relates to a multi-encryption system and decryption method of a plug-in encryption terminal, which comprises an encryption terminal microprocessor provided with a side end connector, and is characterized in that the encryption terminal microprocessor is internally provided with a clock module; the encryption terminal microprocessor is also connected with an encryption memory, and a private key is stored in the encryption memory. Through the design, the independent encryption memory is designed in the terminal and used for storing the private key, the storage mode in the prior art is broken, and the decryption difficulty is increased. And the reliability of the existing encryption terminal is improved.

Description

technical field [0001] The invention belongs to the technical field of computer encryption, and in particular relates to a multiple encryption system and a decryption method of a plug-in encryption terminal. Background technique [0002] The encryption lock is an intelligent tool with software protection function provided for software developers. It includes a hardware installed on the parallel port or USB port of the computer, and a set of interface software and tool software suitable for various languages. [0003] In the prior art, the dongle implements encryption by exchanging data with the dongle during the software execution process. The dongle has a built-in single-chip microcomputer circuit (also called CPU), which makes the dongle have the processing ability of judgment and analysis to enhance active anti-corruption. decryption ability. At present, the built-in single-chip microcomputer of the encryption lock generally contains algorithm software dedicated to encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30
CPCH04L9/0631H04L9/30H04L9/0863
Inventor 幸禹可宋进李浩澜段勃杨东鑫朱于吴余维
Owner 中科计算技术西部研究院