CN110532788A - A kind of encryption method of rotational display LED screen - Google Patents
A kind of encryption method of rotational display LED screen Download PDFInfo
- Publication number
- CN110532788A CN110532788A CN201910733954.6A CN201910733954A CN110532788A CN 110532788 A CN110532788 A CN 110532788A CN 201910733954 A CN201910733954 A CN 201910733954A CN 110532788 A CN110532788 A CN 110532788A
- Authority
- CN
- China
- Prior art keywords
- mcua
- mcub
- encryption
- display led
- led screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 101100290462 Mus musculus Mcub gene Proteins 0.000 claims abstract description 36
- 230000008569 process Effects 0.000 claims abstract description 10
- 238000012545 processing Methods 0.000 claims abstract description 8
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 230000002427 irreversible effect Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 claims description 2
- 230000004913 activation Effects 0.000 abstract description 7
- 238000004891 communication Methods 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000006855 networking Effects 0.000 abstract description 4
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to the encryption technology fields of embedded product, disclose a kind of encryption method of rotational display LED screen, encryption is divided into two parts, respectively McuA and McuB factory signature authentication and McuA and MucB working condition authenticate, the whole flow process needs of McuA and McuB factory signature authentication are completed within the time of agreement, if accumulative obtain of McuB requests to be considered as Brute Force more than 3 times, self-destruction processing is carried out.The encryption method of rotational display LED screen of the present invention, sufficiently using the communication between two main control chips of McuA and McuB, mutual authentication is carried out the safety of software had not only been effectively guaranteed but also has saved PCB space, secondly, all processes and algorithm of the invention are designed by our department personnel, the cost for saving encryption chip also effectively prevents third-party back door, simultaneously, the present invention only needs machine internal authentication, does not need networking activation, it can be ensured that without the safety under network condition.
Description
Technical field
The present invention relates to the encryption technology field of embedded product, in particular to a kind of encryption side of rotational display LED screen
Method.
Background technique
The field is mainly to use encryption chip to realize the protection of embedded hardware and software or utilize network at present
Certification reaches software protection to the mode of software realization software activation, realizes embedded hardware and software using encryption chip
Protection has the disadvantage that 1, needs to occupy certain pcb board space using embedded encryption chip, not flexible, for layout
Very compact scene is a greatly challenge, in some instances it may even be possible to it is completely not applicable, increase expense, is difficult to guarantee Brute Force.2, make
With encryption chip other than the expense of encryption chip itself, it is also necessary to which third party's encryption chip company provides support, this process
It is difficult to ensure that third party can accomplish not stay back door.Reach software guarantor in such a way that network authentication is to software realization software activation
Shield has the disadvantage that the mode activated using network authentication needs equipment to increase network savvy, and many embedded products are not
Network savvy is needed, it is relatively high individually to develop network savvy cost to authenticate.
Summary of the invention
The purpose of the present invention is to provide a kind of encryption method of rotational display LED screen, using software realization to hardware and
The protection of software reduces cost and the limited plank space of equipment is made full use of to achieve the effect that encryption, and do not need to network
Activation, it can be ensured that without the safety under network condition, to solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme:
A kind of encryption method of rotational display LED screen, encryption are divided into two parts, and respectively McuA and McuB factory signature is recognized
Card is authenticated with McuA and MucB working condition, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair, is sent content and is hidden using random algorithm, also
Be same scene request instruction difference prevent monitor crack;
A2:McuB receives request data command analysis order, correctly then sends secret and sends encrypted ID, if wrong
Mistake then carries out powering off and self-destruction processing;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive
It requests again, self-destruction is handled if 3 times is receive;
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to
McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two
Whether group sequence number is consistent, unanimously then continues, inconsistent, is considered as and has replaced interlock circuit;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
Further, the whole flow process of first part McuA and McuB factory signature authentication needs complete within the time of agreement
At, self-destruction processing is otherwise carried out, if accumulative obtain of McuB requests to be considered as more than 3 times Brute Force, progress self-destruction processing.
Further, random algorithm is hidden and needs corresponding decipherment algorithm decryption in A1.
Compared with prior art, the beneficial effects of the present invention are: the encryption method of rotational display LED screen of the present invention, this hair
The bright abundant communication using between two main control chips of McuA and McuB carries out the peace that software had both been effectively guaranteed in mutual authentication
It is complete to save PCB space again, secondly, all processes and algorithm of the invention are designed by our department personnel, it can be flexible and changeable,
The cost for not only saving encryption chip also effectively prevents third-party back door, meanwhile, the present invention only needs machine internal authentication,
Networking activation is not needed, it can be ensured that without the safety under network condition.
Detailed description of the invention
Fig. 1 is the business process map of the encryption method of rotational display LED screen of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
A kind of encryption method of rotational display LED screen, encryption are divided into two parts, respectively McuA (control chip A) with
McuB (control chip B) factory signature authentication and McuA and MucB working condition authenticate, two-part process such as Fig. 1, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair sends content and (needs using random algorithm is hiding
The decryption of corresponding decipherment algorithm), that is, the instruction difference of same scene request prevents from monitoring and cracks;
A2:McuB receives request data command analysis order, analytic message, and mistake is waited no more than 3 startings, correctly then
It sends secret and sends encrypted ID, power off if mistake and self-destruction is handled, into protected mode;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive
It requests again, self-destruction is handled if 3 times is receive.
Whole flow process needs are completed within the time of agreement, otherwise carry out self-destruction processing, are obtained if McuB is accumulative more than 3
Secondary request is considered as Brute Force, carries out self-destruction processing, is realized with a low cost the protection to software.
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to
McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two
Group sequence number it is whether consistent, unanimously then continue, it is inconsistent, be considered as and replaced interlock circuit, be at random certain disablers very
It hangs to direct;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
The advantage of the present invention compared with the existing technology is: the present invention sufficiently use McuA and two main control chips of McuB it
Between communication, carry out mutual authentication effectively both ensure that software safety and also save PCB space, meanwhile, the present invention only needs
Machine internal authentication is wanted, networking activation is not needed, it is ensured that without the safety under network condition.
In summary: the encryption method of rotational display LED screen of the present invention, the present invention sufficiently use McuA and two masters of McuB
The communication between chip is controlled, mutual authentication is carried out and the safety of software had not only been effectively guaranteed but also has saved PCB space, secondly, this
All processes and algorithm of invention are designed by our department personnel, can be flexible and changeable, not only save the cost of encryption chip also
Third-party back door is effectively prevented, meanwhile, the present invention only needs machine internal authentication, does not need networking activation, it can be ensured that
Without the safety under network condition.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art within the technical scope of the present disclosure, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (3)
1. a kind of encryption method of rotational display LED screen, which is characterized in that encryption is divided into two parts, respectively McuA and McuB
The signature authentication that dispatches from the factory is authenticated with McuA and MucB working condition, wherein
First part McuA and McuB factory signature authentication includes the following steps:
Instruction of the A1:McuA using program A to request ID at McuB hair, is sent content and is hidden using random algorithm, that is, together
The instruction difference of sample scene request is prevented from monitoring and be cracked;
A2:McuB receives request data command analysis order, correctly then sends secret and sends encrypted ID, if mistake
Power off and self-destruction is handled;
A3:McuA is decrypted after receiving the data of McuB using corresponding algorithm, and encrypting storing, if time-out does not receive again
Request, self-destruction is handled if 3 times is receive;
The certification of second part McuA and MucB working condition includes the following steps:
B1:McuA whether there is using program checkout program A, existing deletion;
B2:McuA issues random key, and McuB calculates ID using random key and obtains irreversible sequence number and be sent to McuA;
B3:McuA decrypts the ID locally saved, is calculated using identical random key and obtains sequence number and compare two groups of sequences
Whether row number is consistent, unanimously then continues, inconsistent, is considered as and has replaced interlock circuit;
It is altered that B4:McuB is considered as McuB if time-out does not receive McuA request, carries out self-destruction.
2. a kind of encryption method of rotational display LED screen according to claim 1, which is characterized in that first part McuA
It needs to complete within the time of agreement with the whole flow process of McuB factory signature authentication, self-destruction processing is otherwise carried out, if McuB
Accumulative obtain requests to be considered as Brute Force more than 3 times, carries out self-destruction processing.
3. a kind of encryption method of rotational display LED screen according to claim 1, which is characterized in that random algorithm in A1
It hides and needs corresponding decipherment algorithm decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910733954.6A CN110532788B (en) | 2019-08-09 | 2019-08-09 | Encryption method for rotary display LED screen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910733954.6A CN110532788B (en) | 2019-08-09 | 2019-08-09 | Encryption method for rotary display LED screen |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110532788A true CN110532788A (en) | 2019-12-03 |
CN110532788B CN110532788B (en) | 2023-03-10 |
Family
ID=68662175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910733954.6A Active CN110532788B (en) | 2019-08-09 | 2019-08-09 | Encryption method for rotary display LED screen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110532788B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070179891A1 (en) * | 2006-01-27 | 2007-08-02 | Feitian Technologies Co., Ltd. | Security control method for data transmission process of software protection apparatus and apparatus thereof |
WO2008126183A1 (en) * | 2007-03-15 | 2008-10-23 | Fujitsu Microelectronics Limited | Secure network system, secure apparatus and secure system |
WO2011066704A1 (en) * | 2009-12-01 | 2011-06-09 | Sun Wei | Bus uni-card service system and implementation method thereof |
US20130031375A1 (en) * | 2010-10-14 | 2013-01-31 | Zte Corporation | Method and apparatus for protecting software of mobile terminal |
CN102915411A (en) * | 2011-08-02 | 2013-02-06 | 张景彬 | Dereplication encryption lock for software and hardware of embedded system |
JP2016218770A (en) * | 2015-05-21 | 2016-12-22 | オリエントコンピュータ株式会社 | Electronic file transfer system |
-
2019
- 2019-08-09 CN CN201910733954.6A patent/CN110532788B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070179891A1 (en) * | 2006-01-27 | 2007-08-02 | Feitian Technologies Co., Ltd. | Security control method for data transmission process of software protection apparatus and apparatus thereof |
WO2008126183A1 (en) * | 2007-03-15 | 2008-10-23 | Fujitsu Microelectronics Limited | Secure network system, secure apparatus and secure system |
WO2011066704A1 (en) * | 2009-12-01 | 2011-06-09 | Sun Wei | Bus uni-card service system and implementation method thereof |
US20130031375A1 (en) * | 2010-10-14 | 2013-01-31 | Zte Corporation | Method and apparatus for protecting software of mobile terminal |
CN102915411A (en) * | 2011-08-02 | 2013-02-06 | 张景彬 | Dereplication encryption lock for software and hardware of embedded system |
JP2016218770A (en) * | 2015-05-21 | 2016-12-22 | オリエントコンピュータ株式会社 | Electronic file transfer system |
Non-Patent Citations (1)
Title |
---|
张玉浩等: "基于AES加密电路的防复制电路及系统设计", 《电子器件》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110532788B (en) | 2023-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3092769B1 (en) | Authentication system and method | |
US11960589B2 (en) | System for and method of authenticating a component of an electronic device | |
US8701174B1 (en) | Controlling access to a protected resource using a virtual desktop and ongoing authentication | |
CN109361508B (en) | Data transmission method, electronic device and computer readable storage medium | |
CN101163044A (en) | Remote updating method and system for information safety equipment | |
KR20160032665A (en) | Network authentication method for secure electronic transactions | |
US7636441B2 (en) | Method for secure key exchange | |
CN105162808A (en) | Safety login method based on domestic cryptographic algorithm | |
CN112270020B (en) | Terminal equipment safety encryption device based on safety chip | |
US20140304510A1 (en) | Secure authentication system with automatic cancellation of fraudulent operations | |
CN105099705A (en) | Safety communication method and system based on USB protocol | |
CN111901117A (en) | Safety authentication method and system based on JTAG interface | |
CN117081736A (en) | Key distribution method, key distribution device, communication method, and communication device | |
CN107155184B (en) | WIFI module with secure encryption chip and communication method thereof | |
CN107835170B (en) | Intelligent Pos equipment safety authorization dismantling system and method | |
US20140032908A1 (en) | Method for managing remote upgrading keys in an information security apparatus | |
CN110532788A (en) | A kind of encryption method of rotational display LED screen | |
CN202978979U (en) | Password security keypad device and password security pad system | |
KR101318668B1 (en) | Portable memory card having information security function | |
Reinsmidt et al. | Securing a connected mobile system for healthcare | |
EP3236631B1 (en) | Data checking device and data checking method using the same | |
CN114859810A (en) | System and method for safely downloading configuration engineering | |
CN101453335B (en) | User information secured inputting method, and customer terminal | |
CN114978784B (en) | Data protection equipment and system | |
CN114339741B (en) | Mobile encryption communication method and system based on quantum memory card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: An encryption method for rotating display LED screens Granted publication date: 20230310 Pledgee: Industrial and Commercial Bank of China Limited Guangzhou Huacheng Branch Pledgor: Guangzhou Coyce Digital Technology Co.,Ltd. Registration number: Y2024980032442 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |