[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN101887713A - Encryption method and device for font library - Google Patents

Encryption method and device for font library Download PDF

Info

Publication number
CN101887713A
CN101887713A CN2009103022800A CN200910302280A CN101887713A CN 101887713 A CN101887713 A CN 101887713A CN 2009103022800 A CN2009103022800 A CN 2009103022800A CN 200910302280 A CN200910302280 A CN 200910302280A CN 101887713 A CN101887713 A CN 101887713A
Authority
CN
China
Prior art keywords
information
key
code
identifying code
character library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009103022800A
Other languages
Chinese (zh)
Other versions
CN101887713B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN2009103022800A priority Critical patent/CN101887713B/en
Publication of CN101887713A publication Critical patent/CN101887713A/en
Application granted granted Critical
Publication of CN101887713B publication Critical patent/CN101887713B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an encryption method and an encryption device for a font library in the field of character information processing. The font library comprises internal code information and dot matrix information. The encryption method comprises the following steps of: performing distributed computing on the internal code information with a first key to generate a secondary key; encrypting the dot matrix information with the secondary key to generate dot matrix data cipher text information; and encrypting the dot matrix data cipher text information or the combination of the internal code information and the dot matrix data cipher text information with the secondary key to generate a verification code. The encryption method and the encryption device for the font library provided by the embodiment of the invention have the advantages of preventing illegal users from replacing the font library and thus effectively improving the confidentiality of the font library.

Description

The encryption method of character library and device
Technical field
The present invention relates to field of character information processing, relate in particular to a kind of encryption method and device of character library.
Background technology
In the prior art, some equipment needs to preserve in advance the character library of required character display as the USB safety equipment, embedded system etc. of band Presentation Function in equipment.Described character library has write down the internal code information and the lattice information of the character display of all supports, and described internal code information has write down the pairing binary code of character; Described lattice information has then write down character in each corresponding point of display device shown color and brightness, and described internal code information and lattice information are corresponding one by one.When application apparatus will show certain character, application program was at first searched the internal code information of this character, obtained the pairing lattice information of this character according to the internal code information that finds then, and then showed this character.
And at present in these are used, character library all is to deposit with clear-text way, there is not any secrecy provision, illegal person can be easily by distorting internal code information or lattice information, or the mode of directly replacing character library is changed character library, the shown content of change application apparatus, thereby misleading user, very easily cause user's private information to be revealed, cause potential safety hazard.Therefore, how to promote the confidentiality of character library, become letter problem to be solved.
Summary of the invention
Encryption method and the device of one of purpose of the present invention for a kind of character library is provided is in order to have promoted the confidentiality of character library.
The present invention proposes a kind of encryption method of character library, and described character library comprises internal code information and lattice information, and the encryption method of described character library comprises step:
Disperse computing to generate secondary key with first key to internal code information;
With described secondary key lattice information is encrypted generation dot array data cipher-text information;
With the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information.
Preferably, said method also comprises the step of storing described identifying code.
Preferably, above-mentioned second key comprises the described secondary key that disperses computing to generate to internal code information.
Preferably, said method also comprises the step that described identifying code is tested.
Preferably, the above-mentioned step that described identifying code is tested specifically comprises step:
With the combined ciphering computing generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information;
More described check code and identifying code;
Described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
The present invention proposes a kind of encryption device of character library, and described character library comprises internal code information and lattice information, and the encryption device of described character library comprises:
The secondary key generation module is used for disperseing computing to generate secondary key to internal code information first key;
The lattice information encrypting module is used for described secondary key is encrypted generation dot array data cipher-text information to lattice information;
The identifying code generation module is used for the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information.
Preferably, said apparatus also comprises the identifying code memory module, is used to store described identifying code.
Preferably, above-mentioned second key comprises the described secondary key that disperses computing to generate to internal code information.
Preferably, said apparatus also comprises the identifying code inspection module, is used for described identifying code is tested.
Preferably, above-mentioned identifying code inspection module specifically comprises:
Check code cryptographic calculation unit is used for the combined ciphering computing generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information;
Comparing unit is used for more described check code and identifying code;
The assay processing unit is used for handling subsequent operation according to the comparative result of described check code and identifying code, and described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
From the above, the embodiment of the invention disperses computing to generate secondary key by providing with first key to internal code information; With described secondary key lattice information is encrypted generation dot array data cipher-text information; With second key combined ciphering of described dot array data cipher-text information or described internal code information and described dot array data cipher-text information is generated the character library encryption method and the device of identifying code, thereby further promote the confidentiality of character library, reach anti-tamper purpose.
Description of drawings
Fig. 1 is the schematic flow sheet of the encryption method of one embodiment of the invention character library;
Fig. 2 is the schematic flow sheet of the encryption method of another embodiment of the present invention character library;
Fig. 3 is the schematic flow sheet of the encryption method of another embodiment of the present invention character library;
Fig. 4 is the schematic flow sheet of the step of in another embodiment of the present invention identifying code being tested;
Fig. 5 is the structural representation of the encryption device of the described character library of another embodiment of the present invention;
Fig. 6 is the structural representation of the encryption device of the described character library of another embodiment of the present invention;
Fig. 7 is the structural representation of the encryption device of the described character library of another embodiment of the present invention;
Fig. 8 is the structural representation of identifying code inspection module in another embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will be in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
With reference to Fig. 1, the present invention proposes the encryption method of the character library of an embodiment, and described character library comprises internal code information and lattice information, and the encryption method of described character library comprises step:
S11 disperses computing to generate secondary key with first key to internal code information;
S12 encrypts generation dot array data cipher-text information with described secondary key to lattice information;
S13 is with the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information.
As described in step S11, available first key disperses computing to generate secondary key to each internal code information one by one, and described secondary key can be a kind of MAC sign indicating number (Message Authentication Code, a message authentication code).Above-mentioned first key can be kept in the memory block of device interior, can be the random key that generates in process of production, also can be the key that solidifies in process of production.Above-mentioned internal code information has write down the pairing binary code of character.Above-mentioned dispersion computing realizes by decentralized algorithm.Described decentralized algorithm can be a cryptographic algorithm, can not be cryptographic algorithm also, as the hmac algorithm based on cryptographic Hash algorithm construction message authentication code.Above-mentioned decentralized algorithm can be DeriveKey=AlgDerive (Key; Info), be example with this algorithm, the Key in the above-mentioned algorithm can be first key, Info can be an internal code information, generates secondary key through after the above-mentioned algorithm computing.
As described in step S12, can be one by one corresponding lattice information be with it encrypted and generated the dot array data cipher-text information with described secondary key.Described information recording lattice character in each corresponding point of display device shown color and brightness, the lattice information of each character and internal code information are corresponding one by one.Described dot array data cipher-text information is that lattice information is encrypted a kind of ciphertext that the back generates.All be inequality owing to the pairing secondary key of each internal code information as mentioned above, thereby each internal code information lattice data corresponding cipher-text information is also all inequality, and the dot array data cipher-text information is associated with ISN.Above-mentioned encryption realizes that by cryptographic algorithm described cryptographic algorithm can be a symmetry algorithm, and above-mentioned cryptographic algorithm can be EncData=AlgEnc (Key; Data).Wherein, the Key in the above-mentioned cryptographic algorithm can be second key, and Data can be a lattice information, through generating the dot array data cipher-text information after the above-mentioned algorithm computing.
As described in step S13, available second key is encrypted described dot array data cipher-text information and is generated identifying code, and also available second key generates identifying code to the combined ciphering of described internal code information and described dot array data cipher-text information.Described identifying code also can be a kind of MAC sign indicating number.Described second key can be same key with described first key, also can be different.Described second key can also be the described secondary key that disperses computing to generate to internal code information.With the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, encryption herein realizes that by the identifying code generating algorithm described identifying code generating algorithm can generate the raw data of random length the authorization information of regular length; And any bit (Byte) of raw data is modified, and authorization information will be different.The identifying code generating algorithm can be MACData=AlgMAC (Key; Data), wherein the Key in this identifying code generating algorithm can be second key, and Data can be the dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm; Key in the above-mentioned identifying code generating algorithm can also be second key, and Data can be the combination of described internal code information and described dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm.
The embodiment of the invention generates secondary key by with first key internal code information being carried out cryptographic calculation, with described secondary key lattice information is encrypted generation dot array data cipher-text information, the combined ciphering of described dot array data cipher-text information or described internal code information and described dot array data cipher-text information is generated the method for identifying code with second key, can prevent the illegal users from replacing character library, thereby effectively promote the confidentiality of character library.
With reference to Fig. 2, one embodiment of the invention is based on the encryption method of the character library of the foregoing description, and than said method, this method further comprises step:
S14 stores described identifying code.
As described in step S14, whether the identifying code that storage generates is used to check the internal code information of character library and lattice information to be distorted in the storer of device interior.
Be that the secondary key that described internal code information was generated is an example with second key below, details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Use the secondary key that generated pair to encrypt successively and generate the dot array data cipher-text information with the pairing lattice information of described internal code information; Carry out cryptographic calculation with described secondary key pair and described secondary key lattice data corresponding cipher-text information respectively and generate identifying code; Store described identifying code successively.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Pair encrypt with secondary key that internal code information generated successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; With first key cryptographic calculation is carried out in the combination of all described internal code informations and described dot array data cipher-text information and generate identifying code; Store described identifying code.
With reference to Fig. 3, one embodiment of the invention is based on the encryption method of the character library of the foregoing description, and than said method, this method further comprises step:
S15 tests to described identifying code.
With reference to Fig. 4, as one embodiment of the present of invention, step S15 can further comprise step:
S151 carries out cryptographic calculation with second key to the combination of described dot array data cipher-text information or described internal code information and described dot array data cipher-text information and generates check code;
S152, more described check code and identifying code;
S153, described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
As described in step S15, with the combined ciphering generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, described check code also can be a kind of MAC sign indicating number.Encryption herein realizes by above-mentioned identifying code generating algorithm.Generate check code after the above-mentioned identifying code generating algorithm of the combination process computing of described second key and described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, more described check code and above-mentioned identifying code, continue to carry out subsequent operation if the result is identical, otherwise return mistake.
The embodiment of the invention is by disperseing computing to generate secondary key with first key to internal code information, with described secondary key lattice information is encrypted generation dot array data cipher-text information, with the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information; To the character library encryption method that described identifying code is tested, can after the illegal users from replacing character library, remind the user, thereby further promote the confidentiality of character library, reach anti-tamper purpose.
Following is that the secondary key that described internal code information was generated is an example with second key still, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Use the secondary key that generated pair to encrypt successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; Carry out cryptographic calculation with described secondary key pair and the pairing data cipher-text information of described secondary key respectively and generate identifying code; Store described identifying code successively.Enable character library, carry out cryptographic calculation with described secondary key pair and the pairing data cipher-text information of described secondary key respectively and generate check code; The identifying code that more described successively check code is corresponding with described check code; Described check code is that identical then the continuation carried out subsequent operation with the comparative result of its corresponding identifying code, otherwise returns mistake.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Disperse computing to generate secondary key with first key to each internal code information in the character library; Pair encrypt with secondary key that internal code information generated successively and generate the dot array data cipher-text information with the pairing lattice information of internal code information; With first key cryptographic calculation is carried out in the combination of all described internal code informations and all described dot array data cipher-text information and generate identifying code; Store described identifying code.Enable character library, with first key cryptographic calculation is carried out in the combination of all described internal code informations and all described dot array data cipher-text information and generate check code; More described check code and described identifying code; Described check code is that identical then the continuation carried out subsequent operation with the comparative result of described identifying code, otherwise returns mistake.
With reference to Fig. 5, the present invention proposes the encryption device 10 of the character library of another embodiment, and described character library comprises internal code information and lattice information, and described character library encryption device comprises:
Secondary key generation module 11 is used for disperseing computing to generate secondary key to internal code information first key;
Lattice information encrypting module 12 is used for described secondary key is encrypted generation dot array data cipher-text information to lattice information;
Identifying code generation module 13 is used for the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described dot array data cipher-text information and described internal code information.
Described secondary key generation module 11 can be used for disperseing computing to generate secondary key to each internal code information one by one first key, and described secondary key can be a kind of MAC sign indicating number (Message Authentication Code, a message authentication code).Above-mentioned first key can be kept in the memory block of device interior, can be the random key that generates in process of production, also can be the key that solidifies in process of production.Above-mentioned internal code information has write down the pairing binary code of character.Above-mentioned dispersion computing realizes by decentralized algorithm.Described decentralized algorithm can be a cryptographic algorithm, can not be cryptographic algorithm also, as the hmac algorithm based on cryptographic Hash algorithm construction message authentication code.Above-mentioned decentralized algorithm can be DeriveKey=AlgDerive (Key; Info), be example with this algorithm, the Key in the above-mentioned algorithm can be first key, Info can be an internal code information, generates secondary key through after the above-mentioned algorithm computing.
Described lattice information encrypting module 12 can be seriatim encrypted described secondary key and is generated the dot array data cipher-text information to corresponding lattice information with it.Described information recording lattice character in each corresponding point of display device shown color and brightness, the lattice information of each character and internal code information are corresponding one by one.Described dot array data cipher-text information is that lattice information is encrypted a kind of ciphertext that the back generates.All be inequality owing to the pairing secondary key of each internal code information as mentioned above, thereby each internal code information lattice data corresponding cipher-text information is also all inequality, and the dot array data cipher-text information is associated with ISN.Above-mentioned encryption realizes that by cryptographic algorithm described cryptographic algorithm can be a symmetry algorithm.Above-mentioned cryptographic algorithm can be EncData=AlgEnc (Key; Data).With this algorithm is example, and the Key in the above-mentioned algorithm can be second key, and Data can be a lattice information, through generating the dot array data cipher-text information after the above-mentioned algorithm computing.
Described identifying code generation module 13 can be encrypted second key and generate identifying code to described dot array data cipher-text information, also can be with the combined ciphering generation identifying code of second key to described internal code information and described dot array data cipher-text information.Described identifying code also can be a kind of MAC sign indicating number.Described second key can be same key with described first key, also can be different.Described second key can also be the described secondary key that disperses computing to generate to internal code information.With the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, encryption herein realizes that by the identifying code generating algorithm described identifying code generating algorithm can generate the raw data of random length the authorization information of regular length; And any bit of raw data is modified, and authorization information will be different.The identifying code generating algorithm can be MACData=AlgMAC (Key; Data), be example with this algorithm, the Key in the above-mentioned identifying code generating algorithm can be second key, Data can be the dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm; Key in the above-mentioned identifying code generating algorithm can also be second key, and Data can be the combination of described internal code information and described dot array data cipher-text information, through generating check code after the computing of above-mentioned identifying code generating algorithm.
From the above, the embodiment of the invention effectively improves the confidentiality of character library by a kind of encryption device of character library is provided.
With reference to Fig. 6, another embodiment of the present invention, the encryption device 10 based on the foregoing description character library further comprises:
Identifying code memory module 14 is stored described identifying code;
Whether the identifying code that described identifying code memory module 14 storages generate is used to check the internal code information of character library and lattice information to be distorted in the storer of device interior.
With second key is that the secondary key that described internal code information was generated is an example, and details are as follows to present embodiment:
Secondary key generation module 11 is used for that first key is carried out cryptographic calculation to each internal code information of character library and generates secondary key; Lattice information encrypting module 12 is used for successively the secondary key that will be generated and pair encrypts with the pairing lattice information of internal code information and to generate the dot array data cipher-text information; Identifying code generation module 13 carries out cryptographic calculation with described secondary key pair and the pairing data cipher-text information of described secondary key respectively and generates identifying code; Identifying code memory module 14 is stored described identifying code successively.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Secondary key generation module 11 disperses computing to generate secondary key to each internal code information in the character library first key; Lattice information encrypting module 12 is used the secondary key that generated pair to encrypt with the pairing lattice information of internal code information successively and is generated the dot array data cipher-text information; Identifying code generation module 13 carries out cryptographic calculation generation identifying code with first key to all described internal code informations and dot array data cipher-text information; Identifying code memory module 14 is stored described identifying code.
With reference to Fig. 7, another embodiment of the present invention also comprises identifying code inspection module 15 based on the foregoing description on the basis of the foregoing description, be used for described identifying code is tested.
With reference to Fig. 8, as one embodiment of the present of invention, described identifying code inspection module 15 comprises:
Check code cryptographic calculation unit 151 is used for the combined ciphering generation cryptographic calculation generation check code of described second key to described dot array data cipher-text information or described dot array data cipher-text information and described internal code information;
Comparing unit 152 is used for more described check code and identifying code;
Assay processing unit 153 is used for handling subsequent operation according to the comparative result of described check code and identifying code, and described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
Described inspection module 15 is used for the combined ciphering generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, and described check code also can be a kind of MAC sign indicating number.Encryption herein realizes by above-mentioned identifying code generating algorithm.As one embodiment of the present of invention, after generating check code after the above-mentioned identifying code generating algorithm of the combination process computing of check code cryptographic calculation unit 151 with described second key and described dot array data cipher-text information or described internal code information and described dot array data cipher-text information, comparing unit 152 more described check codes and above-mentioned identifying code, continue to carry out subsequent operation if the result is identical assay processing unit 153, otherwise return mistake.
Following is that the secondary key that described internal code information was generated is an example with second key still, and details are as follows to present embodiment:
Secondary key generation module 11 is used for disperseing computing to generate secondary key to each internal code information of character library first key; Lattice information encrypting module 12 pair is encrypted the secondary key that generated successively and is generated the dot array data cipher-text information with the pairing lattice information of internal code information; Identifying code generation module 13 is used for that respectively described secondary key pair is carried out cryptographic calculation with the pairing data cipher-text information of described secondary key and generates identifying code; Identifying code memory module 14 is stored described identifying code successively.Enable character library, check code cryptographic calculation unit 151 is used for that respectively described secondary key pair is carried out cryptographic calculation with the pairing data cipher-text information of described secondary key and generates check code; Comparing unit 152 is used for the more described successively check code identifying code corresponding with described check code; Assay processing unit 153 is used for handling subsequent operation according to the comparative result of described check code and identifying code, and described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
Following is that same key is an example with second key and first key then, and details are as follows to present embodiment:
Secondary key generation module 11 is used for that first key is carried out cryptographic calculation to each internal code information of character library and disperses computing to generate secondary key; Lattice information encrypting module 12 pair is encrypted the secondary key that generated successively and is generated the dot array data cipher-text information with the pairing lattice information of internal code information; Identifying code generation module 13 is used for first key is carried out cryptographic calculation generation identifying code to all described internal code informations and all described dot array data cipher-text information; Identifying code storage unit 14 is stored described identifying code.Enable character library, check code cryptographic calculation unit 151 is used for first key is carried out cryptographic calculation generation check code to all described internal code informations and all described dot array data cipher-text information; Comparing unit 152 is used for more described check code and described identifying code; Assay processing unit 153 is used for handling subsequent operation according to the comparative result of described check code and identifying code, and described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
By above-mentioned passable, the embodiment of the invention by a kind of encryption verification device of character library is provided, can be reminded the user, thereby further promote the confidentiality of character library after the illegal users from replacing character library, reach anti-tamper purpose.
The above only is the preferred embodiments of the present invention; be not so limit claim of the present invention; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to be done; or directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (10)

1. the encryption method of a character library, described character library comprises internal code information and lattice information, it is characterized in that, and the encryption method of described character library comprises step:
Disperse computing to generate secondary key with first key to internal code information;
With described secondary key lattice information is encrypted generation dot array data cipher-text information;
With the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information.
2. the encryption method of character library as claimed in claim 1 is characterized in that, described method also comprises step:
Store described identifying code.
3. the encryption method of character library as claimed in claim 1 or 2 is characterized in that, described second key comprises the described secondary key that disperses computing to generate to internal code information.
4. the encryption method of character library as claimed in claim 3 is characterized in that, described method also comprises step:
Described identifying code is tested.
5. the encryption method of character library as claimed in claim 4 is characterized in that, the step that described identifying code is tested comprises step:
With the combined ciphering computing generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information;
More described check code and identifying code;
Described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
6. the encryption device of a character library, described character library comprises internal code information and lattice information, it is characterized in that, and the encryption device of described character library comprises:
The secondary key generation module is used for disperseing computing to generate secondary key to internal code information first key;
The lattice information encrypting module is used for described secondary key is encrypted generation dot array data cipher-text information to lattice information;
The identifying code generation module is used for the combined ciphering generation identifying code of second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information.
7. the encryption device of character library as claimed in claim 6 is characterized in that, described device also comprises:
The identifying code memory module is used to store described identifying code.
8. as the encryption method of claim 6 or 7 described character libraries, it is characterized in that described second key comprises the described secondary key that disperses computing to generate to internal code information.
9. the encryption device of character library as claimed in claim 8 is characterized in that, described device also comprises:
The identifying code inspection module is used for described identifying code is tested.
10. the encryption device of character library as claimed in claim 9 is characterized in that, described identifying code inspection module comprises:
Check code cryptographic calculation unit is used for the combined ciphering computing generation check code of described second key to described dot array data cipher-text information or described internal code information and described dot array data cipher-text information;
Comparing unit is used for more described check code and identifying code;
The assay processing unit is used for handling subsequent operation according to the comparative result of described check code and identifying code, and described check code is that identical then the continuation carried out subsequent operation with the comparative result of identifying code, otherwise returns mistake.
CN2009103022800A 2009-05-13 2009-05-13 Encryption method and device for font library Expired - Fee Related CN101887713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009103022800A CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009103022800A CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Publications (2)

Publication Number Publication Date
CN101887713A true CN101887713A (en) 2010-11-17
CN101887713B CN101887713B (en) 2012-01-25

Family

ID=43073603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009103022800A Expired - Fee Related CN101887713B (en) 2009-05-13 2009-05-13 Encryption method and device for font library

Country Status (1)

Country Link
CN (1) CN101887713B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102609648A (en) * 2012-02-02 2012-07-25 深圳市文鼎创数据科技有限公司 Method and device for using word stock safely
CN102637422A (en) * 2012-02-17 2012-08-15 天地融科技股份有限公司 Matrix obtaining method, character display device and system and electronic signature tool
CN102663297A (en) * 2012-04-06 2012-09-12 天地融科技股份有限公司 Font acquiring method, character displaying device, character displaying system and electronic signature tool
CN103268459A (en) * 2012-08-01 2013-08-28 天地融科技股份有限公司 Electronic device with secure character library, and electronic equipment with electronic device
CN103810580A (en) * 2012-11-13 2014-05-21 中兴通讯股份有限公司 Method and device for signing for goods and wireless signing-for terminal
CN104217012A (en) * 2014-09-22 2014-12-17 朱信 Font library issuing method and font library protection system
CN105843782A (en) * 2016-03-21 2016-08-10 上海林果实业股份有限公司 Font library storage apparatus and method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60024941T8 (en) * 1999-08-31 2006-08-10 Matsushita Electric Industrial Co., Ltd., Kadoma Encryption method and apparatus, decryption method and apparatus
US7237116B1 (en) * 2000-01-19 2007-06-26 International Business Machines Corporation Digital signature system and method based on hard lattice problem
JP2001274786A (en) * 2000-01-21 2001-10-05 Victor Co Of Japan Ltd Contents information transmission method, contents information recording method, contents information transmitter, contents information recorder, transmission medium and recording medium
CN100359494C (en) * 2003-05-04 2008-01-02 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN100583190C (en) * 2005-06-17 2010-01-20 鸿富锦精密工业(深圳)有限公司 Text encryption system and method
CN100501724C (en) * 2007-01-16 2009-06-17 北京方正国际软件系统有限公司 Literal encipher method and system based on logical character

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102486821A (en) * 2010-12-02 2012-06-06 北大方正集团有限公司 Word stock copyright control method and device
CN102609648A (en) * 2012-02-02 2012-07-25 深圳市文鼎创数据科技有限公司 Method and device for using word stock safely
CN102609648B (en) * 2012-02-02 2015-02-25 深圳市文鼎创数据科技有限公司 Method and device for using word stock safely
CN102637422A (en) * 2012-02-17 2012-08-15 天地融科技股份有限公司 Matrix obtaining method, character display device and system and electronic signature tool
CN102637422B (en) * 2012-02-17 2014-06-04 天地融科技股份有限公司 Matrix obtaining method, character display device and system and electronic signature tool
CN102663297A (en) * 2012-04-06 2012-09-12 天地融科技股份有限公司 Font acquiring method, character displaying device, character displaying system and electronic signature tool
CN103268459A (en) * 2012-08-01 2013-08-28 天地融科技股份有限公司 Electronic device with secure character library, and electronic equipment with electronic device
CN103810580A (en) * 2012-11-13 2014-05-21 中兴通讯股份有限公司 Method and device for signing for goods and wireless signing-for terminal
CN104217012A (en) * 2014-09-22 2014-12-17 朱信 Font library issuing method and font library protection system
CN105843782A (en) * 2016-03-21 2016-08-10 上海林果实业股份有限公司 Font library storage apparatus and method

Also Published As

Publication number Publication date
CN101887713B (en) 2012-01-25

Similar Documents

Publication Publication Date Title
CN101887713B (en) Encryption method and device for font library
CN101149768B (en) Special processor software encryption and decryption method
US9397830B2 (en) Method and apparatus for encrypting and decrypting data
CN103235906A (en) Method and device for encrypting and decrypting application program
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN110704858A (en) Data security storage method and system under distributed environment
CN107800716B (en) Data processing method and device
CN110889121A (en) Method, server and storage medium for preventing data leakage
US20200044838A1 (en) Data encryption method and system using device authentication key
CN104579680A (en) Method for safe distribution of seed
US20110107109A1 (en) Storage system and method for managing data security thereof
CN106408069B (en) User data write-in and read method and the system of EPC card
CN102332978B (en) Lottery ticket off-line verification system
US8280061B2 (en) Methods and systems for storing and retrieving encrypted data
CN102609648B (en) Method and device for using word stock safely
CN103177224A (en) Data protection method and device used for terminal external storage card
CN113642020A (en) Dynamic encryption method and device for configuration file, electronic equipment and storage medium
CN110008724B (en) Solid state hard disk controller safe loading method and device and storage medium
CN105809494A (en) method and system for invoice generation and invoice verification
CN107889102B (en) Method and device for encrypting and decrypting information in short message
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN112464265B (en) Storage access method and system for private data
CN108376212A (en) Execute code security guard method, device and electronic device
CN114462088A (en) Method and device for de-identifying shared data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Encryption method and device for font library

Effective date of registration: 20121121

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co.,Ltd.

Pledgor: SHENZHEN EXCELSECU DATA TECHNOLOGY Co.,Ltd.

Registration number: 2012990000710

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20131125

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co.,Ltd.

Pledgor: SHENZHEN EXCELSECU DATA TECHNOLOGY Co.,Ltd.

Registration number: 2012990000710

PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Encryption method and device for font library

Effective date of registration: 20131125

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co.,Ltd.

Pledgor: SHENZHEN EXCELSECU DATA TECHNOLOGY Co.,Ltd.

Registration number: 2013990000896

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20160411

Granted publication date: 20120125

Pledgee: Shenzhen SME credit financing guarantee Group Co.,Ltd.

Pledgor: SHENZHEN EXCELSECU DATA TECHNOLOGY Co.,Ltd.

Registration number: 2013990000896

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120125

CF01 Termination of patent right due to non-payment of annual fee