Unlock instant, AI-driven research and patent intelligence for your innovation.

Built-in file encryption and decryption method for desktop pet robot

A technology of file encryption and encryption method, which is applied in the field of robots, can solve the problems of harming the interests of original personnel, being easily read by others, and taking a long time to decrypt, and achieves the effects of good real-time performance, difficulty in cracking, and small amount of calculation

Pending Publication Date: 2022-07-26
灵起科技(深圳)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, these built-in media files are stored in the SD card. If the file is not encrypted, it is easy for others to read the content in the SD card, and then copy it and use it in other fields after secondary processing, which damages the interests of the original creators.
[0003] At present, most file encryption methods have a large amount of calculations, and are mostly used to encrypt the entire file, which results in a long time-consuming decryption, and the entire file must be decrypted before it can be played, which is not conducive to embedded systems with limited computing power. in execution
Although some encryption algorithms have a small amount of calculation, they only encrypt the file header, and the file content can be easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Built-in file encryption and decryption method for desktop pet robot
  • Built-in file encryption and decryption method for desktop pet robot
  • Built-in file encryption and decryption method for desktop pet robot

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0023] like figure 1 As shown, a built-in file encryption method for a desktop pet robot includes the following steps:

[0024] Step S1, setting a password sequence; the password sequence includes two sequences, which are respectively the sequence K and sequence P , the length of each sequence is N , the value range of each element in the sequence is 0~255; the sequence K The element is k 1 , k 2 , …, k N ;sequence P The element is p 1 , p 2 , …, p N ; In order to ensure the strength of the password sequence, take N=1024; use random numbers to generate two random series as the password sequence;

[0025] Step S2, setting the encryption starting point of the cipher sequence; the method for calculating the encryption starting point of the cipher sequence includes: obtaining a file name, performing a hash operation (such as SHA-1) on the character string of the file name, and obtaining a corresponding integer m ;use m divide by N Take the remainder to get the ...

specific Embodiment approach 2

[0033] A method for decrypting a built-in file of a desktop pet robot, comprising: setting the same password sequence and encryption starting point as in the encryption method; reading an encrypted file; decrypting the content of the encrypted file byte by byte from beginning to end, and the decryption algorithm is as follows:

[0034]

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of robots, in particular to a desktop pet robot built-in file encryption and decryption method. Comprising the steps of setting a password sequence, setting a password sequence encryption starting point, reading an original file, executing an encryption algorithm and storing the encrypted file. According to the method, byte-by-byte encryption and decryption of the file can be realized, the calculation amount is small, the decryption difficulty is high, decryption and playing can be performed at the same time, the real-time performance is good, and execution in an embedded system is facilitated.

Description

technical field [0001] The present invention relates to the technical field of robots, and more particularly relates to a method for encrypting and decrypting built-in files of a desktop pet robot. Background technique [0002] Desktop pet robots are a branch of the field of intelligent robots, focusing on emotional interaction and companion entertainment. In order to express emotions and interact with people, desktop pet robots usually have a series of built-in media files such as video and audio. By calling these files, they can play expressions and sounds, and then cooperate with them to perform related actions, so as to realize the expression and function of emotions. 's display. Usually, these built-in media files are stored in the SD card. If the files are not encrypted, the content in the SD card can easily be read by others, and then copied and processed for other fields, which damages the interests of the original personnel. [0003] At present, most file encrypti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L9/08
CPCG06F21/602G06F21/6218H04L9/0861
Inventor 张宇轩丁正正张洪涛
Owner 灵起科技(深圳)有限公司