[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110532788A - A kind of encryption method of rotational display LED screen - Google Patents

A kind of encryption method of rotational display LED screen Download PDF

Info

Publication number
CN110532788A
CN110532788A CN201910733954.6A CN201910733954A CN110532788A CN 110532788 A CN110532788 A CN 110532788A CN 201910733954 A CN201910733954 A CN 201910733954A CN 110532788 A CN110532788 A CN 110532788A
Authority
CN
China
Prior art keywords
mcua
mcub
encryption
display led
led screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910733954.6A
Other languages
Chinese (zh)
Other versions
CN110532788B (en
Inventor
莫锦波
林耀华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Coyce Digital Technology Co Ltd
Original Assignee
Guangzhou Coyce Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Coyce Digital Technology Co Ltd filed Critical Guangzhou Coyce Digital Technology Co Ltd
Priority to CN201910733954.6A priority Critical patent/CN110532788B/en
Publication of CN110532788A publication Critical patent/CN110532788A/en
Application granted granted Critical
Publication of CN110532788B publication Critical patent/CN110532788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the encryption technology fields of embedded product, disclose a kind of encryption method of rotational display LED screen, encryption is divided into two parts, respectively McuA and McuB factory signature authentication and McuA and MucB working condition authenticate, the whole flow process needs of McuA and McuB factory signature authentication are completed within the time of agreement, if accumulative obtain of McuB requests to be considered as Brute Force more than 3 times, self-destruction processing is carried out.The encryption method of rotational display LED screen of the present invention, sufficiently using the communication between two main control chips of McuA and McuB, mutual authentication is carried out the safety of software had not only been effectively guaranteed but also has saved PCB space, secondly, all processes and algorithm of the invention are designed by our department personnel, the cost for saving encryption chip also effectively prevents third-party back door, simultaneously, the present invention only needs machine internal authentication, does not need networking activation, it can be ensured that without the safety under network condition.

Description

A kind of encryption method of rotational display LED screen
Technical field
The present invention relates to the encryption technology field of embedded product, in particular to a kind of encryption side of rotational display LED screen Method.
Background technique
The field is mainly to use encryption chip to realize the protection of embedded hardware and software or utilize network at present Certification reaches software protection to the mode of software realization software activation, realizes embedded hardware and software using encryption chip Protection has the disadvantage that 1, needs to occupy certain pcb board space using embedded encryption chip, not flexible, for layout Very compact scene is a greatly challenge, in some instances it may even be possible to it is completely not applicable, increase expense, is difficult to guarantee Brute Force.2, make With encryption chip other than the expense of encryption chip itself, it is also necessary to which third party's encryption chip company provides support, this process It is difficult to ensure that third party can accomplish not stay back door.Reach software guarantor in such a way that network authentication is to software realization software activation Shield has the disadvantage that the mode activated using network authentication needs equipment to increase network savvy, and many embedded products are not Network savvy is needed, it is relatively high individually to develop network savvy cost to authenticate.
Summary of the invention
The purpose of the present invention is to provide a kind of encryption method of rotational display LED screen, using software realization to hardware and The protection of software reduces cost and the limited plank space of equipment is made full use of to achieve the effect that encryption, and do not need to network Activation, it can be ensured that without the safety under network condition, to solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme:
A kind of encryption method of rotational display LED screen, encryption are divided into two parts, and respectively McuA and McuB factory signature is recognized Card is authenticated with McuA and MucB working condition, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair, is sent content and is hidden using random algorithm, also Be same scene request instruction difference prevent monitor crack;
A2:McuB receives request data command analysis order, correctly then sends secret and sends encrypted ID, if wrong Mistake then carries out powering off and self-destruction processing;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive It requests again, self-destruction is handled if 3 times is receive;
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two Whether group sequence number is consistent, unanimously then continues, inconsistent, is considered as and has replaced interlock circuit;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
Further, the whole flow process of first part McuA and McuB factory signature authentication needs complete within the time of agreement At, self-destruction processing is otherwise carried out, if accumulative obtain of McuB requests to be considered as more than 3 times Brute Force, progress self-destruction processing.
Further, random algorithm is hidden and needs corresponding decipherment algorithm decryption in A1.
Compared with prior art, the beneficial effects of the present invention are: the encryption method of rotational display LED screen of the present invention, this hair The bright abundant communication using between two main control chips of McuA and McuB carries out the peace that software had both been effectively guaranteed in mutual authentication It is complete to save PCB space again, secondly, all processes and algorithm of the invention are designed by our department personnel, it can be flexible and changeable, The cost for not only saving encryption chip also effectively prevents third-party back door, meanwhile, the present invention only needs machine internal authentication, Networking activation is not needed, it can be ensured that without the safety under network condition.
Detailed description of the invention
Fig. 1 is the business process map of the encryption method of rotational display LED screen of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
A kind of encryption method of rotational display LED screen, encryption are divided into two parts, respectively McuA (control chip A) with McuB (control chip B) factory signature authentication and McuA and MucB working condition authenticate, two-part process such as Fig. 1, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair sends content and (needs using random algorithm is hiding The decryption of corresponding decipherment algorithm), that is, the instruction difference of same scene request prevents from monitoring and cracks;
A2:McuB receives request data command analysis order, analytic message, and mistake is waited no more than 3 startings, correctly then It sends secret and sends encrypted ID, power off if mistake and self-destruction is handled, into protected mode;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive It requests again, self-destruction is handled if 3 times is receive.
Whole flow process needs are completed within the time of agreement, otherwise carry out self-destruction processing, are obtained if McuB is accumulative more than 3 Secondary request is considered as Brute Force, carries out self-destruction processing, is realized with a low cost the protection to software.
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two Group sequence number it is whether consistent, unanimously then continue, it is inconsistent, be considered as and replaced interlock circuit, be at random certain disablers very It hangs to direct;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
The advantage of the present invention compared with the existing technology is: the present invention sufficiently use McuA and two main control chips of McuB it Between communication, carry out mutual authentication effectively both ensure that software safety and also save PCB space, meanwhile, the present invention only needs Machine internal authentication is wanted, networking activation is not needed, it is ensured that without the safety under network condition.
In summary: the encryption method of rotational display LED screen of the present invention, the present invention sufficiently use McuA and two masters of McuB The communication between chip is controlled, mutual authentication is carried out and the safety of software had not only been effectively guaranteed but also has saved PCB space, secondly, this All processes and algorithm of invention are designed by our department personnel, can be flexible and changeable, not only save the cost of encryption chip also Third-party back door is effectively prevented, meanwhile, the present invention only needs machine internal authentication, does not need networking activation, it can be ensured that Without the safety under network condition.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art within the technical scope of the present disclosure, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (3)

1. a kind of encryption method of rotational display LED screen, which is characterized in that encryption is divided into two parts, respectively McuA and McuB The signature authentication that dispatches from the factory is authenticated with McuA and MucB working condition, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair, is sent content and is hidden using random algorithm, that is, together The instruction difference of sample scene request is prevented from monitoring and be cracked;
A2:McuB receives request data command analysis order, correctly then sends secret and sends encrypted ID, if mistake Power off and self-destruction is handled;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive again Request, self-destruction is handled if 3 times is receive;
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two groups of sequences Whether row number is consistent, unanimously then continues, inconsistent, is considered as and has replaced interlock circuit;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
2. a kind of encryption method of rotational display LED screen according to claim 1, which is characterized in that first part McuA It needs to complete within the time of agreement with the whole flow process of McuB factory signature authentication, self-destruction processing is otherwise carried out, if McuB Accumulative obtain requests to be considered as Brute Force more than 3 times, carries out self-destruction processing.
3. a kind of encryption method of rotational display LED screen according to claim 1, which is characterized in that random algorithm in A1 It hides and needs corresponding decipherment algorithm decryption.
CN201910733954.6A 2019-08-09 2019-08-09 Encryption method for rotary display LED screen Active CN110532788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910733954.6A CN110532788B (en) 2019-08-09 2019-08-09 Encryption method for rotary display LED screen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910733954.6A CN110532788B (en) 2019-08-09 2019-08-09 Encryption method for rotary display LED screen

Publications (2)

Publication Number Publication Date
CN110532788A true CN110532788A (en) 2019-12-03
CN110532788B CN110532788B (en) 2023-03-10

Family

ID=68662175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910733954.6A Active CN110532788B (en) 2019-08-09 2019-08-09 Encryption method for rotary display LED screen

Country Status (1)

Country Link
CN (1) CN110532788B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070179891A1 (en) * 2006-01-27 2007-08-02 Feitian Technologies Co., Ltd. Security control method for data transmission process of software protection apparatus and apparatus thereof
WO2008126183A1 (en) * 2007-03-15 2008-10-23 Fujitsu Microelectronics Limited Secure network system, secure apparatus and secure system
WO2011066704A1 (en) * 2009-12-01 2011-06-09 Sun Wei Bus uni-card service system and implementation method thereof
US20130031375A1 (en) * 2010-10-14 2013-01-31 Zte Corporation Method and apparatus for protecting software of mobile terminal
CN102915411A (en) * 2011-08-02 2013-02-06 张景彬 Dereplication encryption lock for software and hardware of embedded system
JP2016218770A (en) * 2015-05-21 2016-12-22 オリエントコンピュータ株式会社 Electronic file transfer system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070179891A1 (en) * 2006-01-27 2007-08-02 Feitian Technologies Co., Ltd. Security control method for data transmission process of software protection apparatus and apparatus thereof
WO2008126183A1 (en) * 2007-03-15 2008-10-23 Fujitsu Microelectronics Limited Secure network system, secure apparatus and secure system
WO2011066704A1 (en) * 2009-12-01 2011-06-09 Sun Wei Bus uni-card service system and implementation method thereof
US20130031375A1 (en) * 2010-10-14 2013-01-31 Zte Corporation Method and apparatus for protecting software of mobile terminal
CN102915411A (en) * 2011-08-02 2013-02-06 张景彬 Dereplication encryption lock for software and hardware of embedded system
JP2016218770A (en) * 2015-05-21 2016-12-22 オリエントコンピュータ株式会社 Electronic file transfer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张玉浩等: "基于AES加密电路的防复制电路及系统设计", 《电子器件》 *

Also Published As

Publication number Publication date
CN110532788B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
EP3092769B1 (en) Authentication system and method
US11960589B2 (en) System for and method of authenticating a component of an electronic device
US8701174B1 (en) Controlling access to a protected resource using a virtual desktop and ongoing authentication
CN109361508B (en) Data transmission method, electronic device and computer readable storage medium
CN101163044A (en) Remote updating method and system for information safety equipment
KR20160032665A (en) Network authentication method for secure electronic transactions
US7636441B2 (en) Method for secure key exchange
CN105162808A (en) Safety login method based on domestic cryptographic algorithm
CN112270020B (en) Terminal equipment safety encryption device based on safety chip
US20140304510A1 (en) Secure authentication system with automatic cancellation of fraudulent operations
CN105099705A (en) Safety communication method and system based on USB protocol
CN111901117A (en) Safety authentication method and system based on JTAG interface
CN117081736A (en) Key distribution method, key distribution device, communication method, and communication device
CN107155184B (en) WIFI module with secure encryption chip and communication method thereof
CN107835170B (en) Intelligent Pos equipment safety authorization dismantling system and method
US20140032908A1 (en) Method for managing remote upgrading keys in an information security apparatus
CN110532788A (en) A kind of encryption method of rotational display LED screen
CN202978979U (en) Password security keypad device and password security pad system
KR101318668B1 (en) Portable memory card having information security function
Reinsmidt et al. Securing a connected mobile system for healthcare
EP3236631B1 (en) Data checking device and data checking method using the same
CN114859810A (en) System and method for safely downloading configuration engineering
CN101453335B (en) User information secured inputting method, and customer terminal
CN114978784B (en) Data protection equipment and system
CN114339741B (en) Mobile encryption communication method and system based on quantum memory card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An encryption method for rotating display LED screens

Granted publication date: 20230310

Pledgee: Industrial and Commercial Bank of China Limited Guangzhou Huacheng Branch

Pledgor: Guangzhou Coyce Digital Technology Co.,Ltd.

Registration number: Y2024980032442

PE01 Entry into force of the registration of the contract for pledge of patent right