CN101795195A - Method for restricting encrypted certificated electronic map with variable information - Google Patents
Method for restricting encrypted certificated electronic map with variable information Download PDFInfo
- Publication number
- CN101795195A CN101795195A CN201010104458A CN201010104458A CN101795195A CN 101795195 A CN101795195 A CN 101795195A CN 201010104458 A CN201010104458 A CN 201010104458A CN 201010104458 A CN201010104458 A CN 201010104458A CN 101795195 A CN101795195 A CN 101795195A
- Authority
- CN
- China
- Prior art keywords
- digital signature
- signature file
- data
- electronic chart
- constraint information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 13
- 241001269238 Data Species 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
- Navigation (AREA)
Abstract
The invention discloses a method for restricting an encrypted certificated electronic map with variable information. Restriction information is set in a digital signature file by using a plurality of kinds of encryption algorithms. A user can use the electronic map only after the user passes the certification of the digital signature file. The publisher of the electronic map can randomly set a plurality of kinds of restriction information. When a novel electronic map is published, the user can upgrade the electronic map. The upgraded electronic map can only be used for restricting using time, specific user, specific software version or specific device specified in the information, thereby obtaining the goals of protecting the copyright of the electronic map and differently treating different users.
Description
Technical field
The present invention relates to a kind of encryption and authentication method of electronic chart, relate in particular to the method for the variable encrypting and authenticating electronic chart of a kind of constraint information.
Background technology
Along with China's rapid economy development, the improvement of expressway construction and urban transportation is maked rapid progress, and it is very necessary that electronic map updating also becomes.When new electronic chart comes out, just need upgrade to the electronic chart that the frequent customer uses.When not having copyright protection, some frequent customers upgrade behind the electronic chart, and arbitrarily the electronic chart after the release upgrade uses for other users, the interests of infringement electronic chart businessman.Subsequently, needing to occur data such as active coding to activate and just can carry out electronic map updating, but this coding is easy to be cracked by the people, the effect of copyright protection is also bad.
In addition, license to the electronic chart that different user uses and generally all have identical rights of using.Such as, the use term of validity of the electronic chart of same version, use the zone all identical, can't be according to the difference of user class, or the difference of user's request, the scope of application and the occasion of electronic chart are distinguished.
Summary of the invention
The technical problem to be solved in the present invention is: at the deficiencies in the prior art, the method of the variable encrypting and authenticating electronic chart of a kind of constraint information is provided, electronic chart is carried out encrypting and authenticating, cipher round results is more reliable, the decoding difficulty is big, need the constraint information of authentication arbitrarily to add as required, comprise the device number, time limit service time of version number, the navigator of user profile, navigation software etc.
Technical scheme of the present invention is: the method for the encrypting and authenticating electronic chart that a kind of constraint information is variable, constraint information is incorporated into the digital signature file of generation, and digital signature file is authenticated; The step that generates described digital signature file comprises:
Step S1: determine constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the first and the first random character sign indicating number of navigation software version number, navigator device number, electronic chart version number, digital signature file are together carried out the SHA encryption, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The described step that digital signature file is authenticated comprises:
Step K 1: read digital signature file, read first, second portion, third part respectively;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5: the second portion with PKI decrypted digital signature file obtains second data;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and enters navigation software.
The more detailed technical scheme of the present invention is:
Described constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.Further, described use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
In the described step K 2, if it is identical that first, second portion and the second random character sign indicating number of digital signature file carry out the third part of the data that obtain after the md5 encryption and digital signature file together, then verify by MD5, otherwise MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
In the described step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
Advantage of the present invention is: the present invention can prevent that electronic chart from being illegally copied, when new electronic chart upgrades, the user asks for digital signature file to publisher, by this digital signature file is authenticated, could upgrade electronic chart, and the electronic chart after upgrading can only be used for specific user, specific software version and specific equipment.Also can add simultaneously other any multiple restricted informations such as service time, use zone, reach protection electronic chart copyright and treat the purpose of different user with a certain discrimination.This constraint information can add arbitrarily, can carry out multiple restriction to the electronic chart of issue, also can carry out the difference restriction at different user, has increased the diversity of authentication.
In addition, authentication mode of the present invention is more hidden, has adopted public-key cryptographic keys, SHA, MD5 multiple encryption algorithms, and has added the random character sign indicating number by the inner definition of publisher that upgrades synchronously along with the renewal of navigation software, thereby has increased the difficulty of decoding.
Description of drawings
Below in conjunction with drawings and Examples the present invention is further described:
Fig. 1 is the flow chart of generation cryptographic digital signature file of the present invention;
Fig. 2 is the flow chart that digital signature file is authenticated of the present invention.
Embodiment
Embodiment: when new electronic chart upgraded, the user asked for digital signature file to publisher, and publisher carries out encrypting and authenticating to electronic chart with digital signature file, has only the electronic chart by encrypting and authenticating to be read use by navigation software.
The step that publisher generates digital signature file comprises:
Step S1: determine constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file.Constraint information can be set arbitrarily as required, such as, constraint information can be the electronic chart of agreement useful life, use the zone and/or use user profile etc., user profile comprises information such as navigation software version number, electronic chart version number to be installed and navigator device number.Like this,, strengthened the control initiative of publisher, protected publisher and user's interests the use restriction of electronic chart even the electronic chart of same version concerning different other users of level, may employed authority be different, specific.For example: constraint information is the navigator device number, represents that then this edition electronic chart only can use for specific navigator, when the device number that has only navigator is the device number of publisher setting, could use this electronic chart.Again for example, constraint information is for the use regional extent of the electronic chart of agreement, and as Shanghai, by the GPS location, when judging the regional extent that the user leaves Shanghai, then navigation software will be closed automatically.
Step S2: from navigator and navigation software, read navigation software version number, navigator device number and electronic chart version number to be installed, add the cleartext information of the first of digital signature file, add one first random character sign indicating number, together carry out SHA (Secure Hash Algorithm, SHA) encrypts, obtain first data.The first random character sign indicating number is by the inner definition of publisher, and is outwards not open.
Step S3: first data are used as plaintext carry out secret key encryption, obtain the second portion of digital signature file.Plaintext first data of the second portion of digital signature file are the ciphertext after SHA encrypts just, even and the irreversibility that SHA encrypts is cracked the second portion of digital signature file, obtain first data, also can't obtain final clear data.
Step S4: the first and the second portion of digital signature file are treated as a binary stream, and add one second random character sign indicating number, together carry out MD5 (Message Digest AlgorithmMD5, Message Digest Algorithm 5) and encrypt, obtain the third part of digital signature file.The second random character sign indicating number is also defined by publisher inside, and is not outwards open, and different with the value of the first random character sign indicating number.
Step S5: write file header information, and write first, second portion and third part in proper order, promptly obtain comprising the digital signature file of 3 partial datas.Describe the position section of byte that various piece comprised and storage in the file header information, conveniently read three partial contents, and the description content of digital signature file version number etc. some other.
After the electronic chart issue, the user relies on the user profile of oneself and the device number of navigator to ask for a digital signature file to publisher, and the digital signature file that the user obtains is corresponding one by one with navigator, is unique.When electronic chart is upgraded, need carry out the authentication of digital signature file, authenticate its legal rights of using, the step of authentication comprises:
Step K 1: start navigation software, read digital signature file,, read first, second portion, third part respectively according to the file header information of file.
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking, if the data that obtain after encrypting are identical with the third part of digital signature file,, confirm that file is not distorted then by the MD5 checking, carry out step K 3, otherwise the MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
After step K 3:MD5 checking is passed through,, obtain the content of constraint information with the first of PKI decrypted digital signature file.
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data.
Step K 5: the second portion with PKI decrypted digital signature file obtains second data.
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and enters navigation software; If first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
For example, determine that constraint information is " data:2011-01-01, Iocation:ShangHai ", implication is 1, on the January of useful life to 2011 of electronic chart, and restriction territory of use is Shanghai.Secret key encryption is " data:2011-01-01, location:ShangHai " expressly, obtains the first of digital signature file.The information that provides by the user, obtain other expressly: " Software:v1.00.03; Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", the expression software version number is v1.00.03, device number is QEIF-H26W-2OQS-YQGB, electronic chart version number is v1.00.04, itself and constraint information are combined, add the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 " of the inner definition of publisher, it is as follows to obtain whole cleartext informations: " Software:v1.00.03, Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04; data:2011-01-01, location:ShangHai, 28BI-MAPS-BSH3-ZPV1 ", it is carried out the SHA encryption obtain the first data ciphertext, again the first data ciphertext is carried out the second portion that secret key encryption obtains digital signature file.Then the first of digital signature file and second portion are merged, go up another second random character sign indicating number " E89I-59I2-ETUM-Z3E7 " again, together carry out md5 encryption, obtain the third part of digital signature file.Make digital signature file at last: write file header information earlier, order writes first, second portion and third part then, and digital signature file completes.
During decrypted authentication, at first read digital signature file,, read first, second portion and third part respectively by file header information.Merge first and second portion, and add the second random character sign indicating number " E89I-59I2-ETUM-Z3E7 ", together carry out md5 encryption, if the result who obtains equates that with third part then digital signature file is effective, otherwise, illustrate that the user is illegal, withdraw from navigation software.After md5 authentication, the first of decrypted digital signature file obtains " data:2011-01-01, location:ShangHai ", analytical information, and record 1, on January of useful life to 2011 and territory of use are Shanghai.Reading software version number then, information such as device number " Software:v1.00.03; Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04 ", and the data after first's deciphering of digital signature file, add the first random character sign indicating number " 28BI-MAPS-BSH3-ZPV1 ", obtain data " Software:v1.00.03; Hardware:QEIF-H26W-2OQS-YQGB; Map:v1.00.04; data:2011-01-01, location:ShangHai, 28BI-MAPS-BSH3-ZPV1 ".This segment data is carried out SHA encrypt, obtain the first data ciphertext.And the second portion of digital signature file carried out the PKI deciphering, obtain second data.Relatively if first data and second data identical, then authenticate and pass through, and enter navigation software; If inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
The above only is the preferred embodiments of the present invention, can not limit scope of the invention process with this, and all simple conversion of doing according to claim of the present invention and description all should still belong to the protection range that the present invention covers.
Claims (5)
1. the method for the variable encrypting and authenticating electronic chart of a constraint information is characterized in that: constraint information is incorporated into the digital signature file of generation, digital signature file is authenticated; The step that generates described digital signature file comprises:
Step S1: determine constraint information, and constraint information is carried out secret key encryption, obtain the first of digital signature file;
Step S2: the first and the first random character sign indicating number of navigation software version number, navigator device number, electronic chart version number, digital signature file are together carried out the SHA encryption, obtain first data;
Step S3: first data are carried out secret key encryption, obtain the second portion of digital signature file;
Step S4: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption, obtain the third part of digital signature file;
Step S5: write the file header information of digital signature file, and write first, second portion and third part in proper order, obtain digital signature file;
The described step that digital signature file is authenticated comprises:
Step K 1: read digital signature file,, read first, second portion, third part respectively according to file header information;
Step K 2: first, second portion and the second random character sign indicating number of digital signature file are carried out md5 encryption together, and the third part of data that encryption is obtained and digital signature file relatively, carry out the MD5 checking;
After step K 3:MD5 checking was passed through, the first with PKI decrypted digital signature file obtained constraint information;
Step K 4: read navigation software version number, navigator device number, electronic chart version number, and carry out SHA together with constraint information, the first random character sign indicating number and encrypt, obtain first data;
Step K 5: the second portion with PKI decrypted digital signature file obtains second data;
Step K 6: compare first data and second data, if first data are identical with second data, then the electronic chart authentication is passed through, and enters navigation software.
2. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: described constraint information comprises following one or more: the useful life of the electronic chart of agreement, use the zone and use user profile.
3. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 2, it is characterized in that: described use user profile comprises following one or more: navigation software version number, electronic chart version number, navigator device number.
4. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: in the described step K 2, if it is identical that first, second portion and the second random character sign indicating number of digital signature file carry out the third part of the data that obtain after the md5 encryption and digital signature file together, then verify by MD5, otherwise MD5 authentication failed, the electronic chart authentication is not passed through, and withdraws from navigation software.
5. according to the method for the variable encrypting and authenticating electronic chart of the constraint information described in the claim 1, it is characterized in that: in the described step K 6, if first data and second data are inequality, then the electronic chart authentication is not passed through, and withdraws from navigation software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101044583A CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101044583A CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101795195A true CN101795195A (en) | 2010-08-04 |
CN101795195B CN101795195B (en) | 2012-04-18 |
Family
ID=42587631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101044583A Expired - Fee Related CN101795195B (en) | 2010-01-29 | 2010-01-29 | Method for restricting encrypted certificated electronic map with variable information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101795195B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102622251A (en) * | 2012-03-07 | 2012-08-01 | 深圳市凯立德欣软件技术有限公司 | Method and server for managing navigation software upgrading |
CN103117851A (en) * | 2011-11-17 | 2013-05-22 | 银视通信息科技有限公司 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
CN106933831A (en) * | 2015-12-29 | 2017-07-07 | 高德软件有限公司 | The update method and device of a kind of indoor map data |
CN108055325A (en) * | 2017-12-13 | 2018-05-18 | 广州市和声信息技术有限公司 | The labeling method and system of a kind of virtual region |
CN111462611A (en) * | 2019-01-21 | 2020-07-28 | 马杰 | Method for making, distributing and displaying vector map |
CN116167091A (en) * | 2023-04-24 | 2023-05-26 | 南京麦堤微林信息科技有限公司 | Mapping data encryption method and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101272252A (en) * | 2008-04-09 | 2008-09-24 | 西安西电捷通无线网络通信有限公司 | Certificate distribution and management method |
CN101489196A (en) * | 2009-01-23 | 2009-07-22 | 暨南大学 | Intelligent vehicle-mounted system |
CN101594226A (en) * | 2009-06-17 | 2009-12-02 | 中兴通讯股份有限公司 | The data guard method and the system that are used for file transfer |
-
2010
- 2010-01-29 CN CN2010101044583A patent/CN101795195B/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117851A (en) * | 2011-11-17 | 2013-05-22 | 银视通信息科技有限公司 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
CN102622251A (en) * | 2012-03-07 | 2012-08-01 | 深圳市凯立德欣软件技术有限公司 | Method and server for managing navigation software upgrading |
CN102622251B (en) * | 2012-03-07 | 2016-01-06 | 深圳市凯立德欣软件技术有限公司 | The method of navigation software updating and management and server |
CN106933831A (en) * | 2015-12-29 | 2017-07-07 | 高德软件有限公司 | The update method and device of a kind of indoor map data |
CN108055325A (en) * | 2017-12-13 | 2018-05-18 | 广州市和声信息技术有限公司 | The labeling method and system of a kind of virtual region |
CN108055325B (en) * | 2017-12-13 | 2021-01-08 | 广州市和声信息技术有限公司 | Virtual area marking method and system |
CN111462611A (en) * | 2019-01-21 | 2020-07-28 | 马杰 | Method for making, distributing and displaying vector map |
CN116167091A (en) * | 2023-04-24 | 2023-05-26 | 南京麦堤微林信息科技有限公司 | Mapping data encryption method and system |
Also Published As
Publication number | Publication date |
---|---|
CN101795195B (en) | 2012-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9208334B2 (en) | Content management using multiple abstraction layers | |
US7716487B2 (en) | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer | |
US6801999B1 (en) | Passive and active software objects containing bore resistant watermarking | |
CN1327357C (en) | System and method for verification | |
KR100958108B1 (en) | Method and apparatus for protecting illegal program copy of mobile communication terminals | |
US8347404B2 (en) | Method, system, and data server for checking revocation of content device and transmitting data | |
US8806661B2 (en) | Method and device for distributing electronic documents | |
WO2006135504A2 (en) | Method and apparatus for transferring protected content between digital rights management systems | |
CN101271501A (en) | Encryption and decryption method and device of digital media file | |
KR20070104628A (en) | Share controlled ownership of an individual | |
CN101795195B (en) | Method for restricting encrypted certificated electronic map with variable information | |
JP3580333B2 (en) | How to equip the encryption authentication function | |
US20130173923A1 (en) | Method and system for digital content security cooperation | |
CN109145617B (en) | Block chain-based digital copyright protection method and system | |
KR20020082422A (en) | Copyright protection system and method thereof | |
CN103237010B (en) | The server end of digital content is cryptographically provided | |
CN101694685A (en) | Safety product license management method based on XML encryption and digital certificate | |
JP2003158514A (en) | Digital work protection system, recording medium apparatus, transmission apparatus, and playback apparatus | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
US7634816B2 (en) | Revocation information management | |
JP2009080772A (en) | Software starting system, software starting method and software starting program | |
JP2003256060A (en) | Program use authentication method | |
KR20090024482A (en) | Key management system and method for using content | |
CN116599750A (en) | System and method for ensuring traceability of data change by utilizing encryption technology | |
CN110348177B (en) | Copyright protection method and system for media file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120418 Termination date: 20140129 |