CN110135176A - A kind of encryption method of print data transmission - Google Patents
A kind of encryption method of print data transmission Download PDFInfo
- Publication number
- CN110135176A CN110135176A CN201910345968.0A CN201910345968A CN110135176A CN 110135176 A CN110135176 A CN 110135176A CN 201910345968 A CN201910345968 A CN 201910345968A CN 110135176 A CN110135176 A CN 110135176A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- secret key
- random cipher
- print data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000005540 biological transmission Effects 0.000 title claims abstract description 28
- 238000007639 printing Methods 0.000 claims abstract description 46
- 238000006073 displacement reaction Methods 0.000 claims description 6
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000012546 transfer Methods 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims description 2
- 241000208340 Araliaceae Species 0.000 claims 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims 1
- 235000003140 Panax quinquefolius Nutrition 0.000 claims 1
- 235000008434 ginseng Nutrition 0.000 claims 1
- 230000007547 defect Effects 0.000 abstract description 6
- 230000010354 integration Effects 0.000 description 3
- 239000003153 chemical reaction reagent Substances 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000003384 imaging method Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000000151 deposition Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000010023 transfer printing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The present invention relates to print data transmission technique fields, are related to a kind of encryption method of print data transmission;Specifically: user selects mimeograph documents at platform end, triggers at platform end and generates and generate random cipher c and random number e, generates random cipher a in the triggering of printing end;It calls identifying code function M to generate identifying code b after input verifying random cipher a, and key function N is called to generate key K;The character array that this document stream character string is averagely divided into e group character length equal by platform end;It calls encryption function M that key K is placed at random and forms new key character array in each character array;And key character array is formed by the encryption logic ordered encryption of encryption function W, successively ordered encryption forms encryption file d;Encryption file d, random cipher c and identifying code b are sent to printing end.The present invention solves the defect that existing print data is easy to happen leakage, achievees the purpose that safely and fast transferring printing data.
Description
Technical field
The present invention relates to print data transmission technique fields, more specifically to a kind of encryption of print data transmission
Method.
Background technique
In recent years, the appearance of the network printer makes more computers can be realized shared printing, optimizes office demand.
But when passing through network plaintext transferring printing data between computer and printer, listener can be by intercepting and capturing network data
Packet, to be easy for knowing printing content.In this way, being likely to cause trade secret or leakage of personal information.
In order to solve this problem, there is a kind of secure printing system, by printer and the computer for printing and driving is installed
Composition, computer can be printed printer is transmitted further to after document data encryption to be printed.Specific safe imaging method
Process is shown in Fig. 1, and the printing driving on computer generates a random number c after user selects document to be printed, and uses algorithm
M generates secret key D.Then, printing driving encrypts document data to be printed using secret key D combination algorithm N, then by it is encrypted to
Printing document data and random number c are handed down to printer.Printer is generated close based on the random number c combination algorithm M received
Then spoon D decrypts printing document data using algorithm M using secret key D, completes printing.In above-mentioned secure printing system
Under, print data although be encryption after transmit again, but due to the information for generating secret key by computer generate and need to be through net
Network is transferred to printer, so listener, which passes through, intercepts and captures random number and encrypted print data, or can be by attempting to use
After many algorithms operation, print data is decrypted, knows printing content, still there is print data and be easy in transfer printing process
There is leakage phenomenon in the problem of being intercepted, the data for causing user to be printed, influence the print data safety of user.
Summary of the invention
In view of this, being held the present invention provides a kind of encryption method of print data transmission with solving existing print data
The defect easily leaked.
A kind of encryption method of print data transmission, specifically, user selects mimeograph documents at platform end, touches at platform end
Hair generates and generates random cipher c and random number e, generates random cipher a in the triggering of printing end;User inputs at platform end
Verify random cipher a;Identifying code function M is called to generate identifying code b according to random cipher a in platform end;Platform end is by random cipher
A, identifying code b and random cipher c calls key function N to generate key K;Mimeograph documents are translated to form file stream in platform end
Character string, according to random number e, the character array for being averagely divided into e group character length equal this document stream character string;Platform
End group calls encryption function M that key K is placed at random and forms new key character array in each character array in key K;
Key character array is input in encryption function W by platform end by the encryption logic sequence of encryption function W, encryption function W according to
Key character array is first carried out the 0th wheel secret key add operation, then again by online by the key forming method of feedback working mode
The 1-10 that mode successively sequentially generates takes turns secret key, and to the key character array formed after last round of cryptographic operation, successively sequence adds
Close formation respective encrypted file output, obtains encryption file d;Encryption file d, random cipher c and identifying code b are sent to and beaten
Print end.
As a preferred solution of the present invention, the ciphering process of encryption function W successively includes byte replacement, row displacement, column
Mixing and the operation that adds of secret key, and every wheel column mixing and secret key the step of adding merge to form a step, the column mixing with
The step of secret key adds, successively carries out completing every wheel secret key adding processing using three XOR gates;The ciphering process of 10th wheel includes byte
The operation that replacement, row displacement and secret key add.
As a preferred solution of the present invention, encryption function W is using the seed key and key schedule of input by patrolling
It collects sequence to sequentially generate online, the seed key participates in the 1st as input and takes turns InvAddRoundKey operation.
As a preferred solution of the present invention, encryption function W 1-10 wheel secret key each round secret key generation use with
Lower step: establishing a two-dimensional array for 4 rows 4 × 11 column, and each array location is a byte, each column conduct of two-dimensional array
One word is for saving seed secret key and ten wheel secret keys;The seed secret key is copied in the first four word of secret key dispatch list,
Then four words after the secret key of first round secret key extension generation occupies, layout according to this, after ten wheel extensions, secret key dispatch list
It can be filled, secret key expansion process terminates, wherein the generation of each round secret key is by word cyclic shift, byte replacement and wheel
The sequence operation of the step of constant exclusive or is formed, and, the word in the cryptographic operation of each round and the secret key extended operation of each round
Section replacement is realized by way of S box look-up table.
As a preferred solution of the present invention, the encryption method of print data transmission further includes having: the prompt input of printing end
Random cipher c and identifying code b verifies errorless rear receive and encrypts file d, and transfers random cipher a, random cipher c and test
Demonstrate,prove code b.
As a preferred solution of the present invention, the encryption method of print data transmission further includes having: printing end group is in random
Password a, identifying code b and random cipher c call key function N to generate key k, and compare and whether judge key k and key K
It is equal, end is printed if unequal and destroys encryption file d, if key k is equal with key K, calls decryption function M to encryption text
Part d is decrypted.
It can be seen from the above technical scheme that the invention has the benefit that the present invention using user printing end and
Platform end is triggered simultaneously generates random cipher a, random cipher c and random number e, is then tested again by random cipher a calling
It demonstrate,proves code function M and generates identifying code b, then call key function N raw by random cipher a, identifying code b and random cipher c again
At key K;Platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is put down
It is divided into the equal character array of e group character length;Platform end group calls encryption function M to divide key K at random in key K
It is placed in each character array and forms new key character array, key character array is encrypted into shape finally by encryption function M
At encryption file d;Obviously, the present invention is due to generating random cipher and this is not passed in a network simultaneously at printing end and platform end
The defeated random cipher using the connection randomness at printing end and platform end, and prints the initial random password of end peace end
Not with Internet communication, illegal user is difficult to intercept network or cracks the password generation algorithm for calculating equipment while obtaining this at random
Password avoids illegal user and cracks mimeograph documents, substantially increases the security performance of print data transmission;Also, the present invention
The character array for being averagely divided into e group character length equal this document stream character string using random number e, and it is based on key K,
It calls encryption function M that key K is placed at random and forms new key character array in each character array, then to key character
Array carries out encryption integration, strengthens the encryption preciseness of key character array, further avoids illegal user and cracks printing
File, the security performance for enhancing print data transmission reach to solve the defect that existing print data is easy to happen leakage
To the purpose of safely and fast transferring printing data.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention
It applies example and is used together to explain the present invention, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of safe imaging method in the prior art;
Fig. 2 is a kind of flow chart of the encryption method of print data transmission disclosed in this invention.
Specific embodiment
Following example is for present invention be described in more detail, but embodiment does not do any type of limit to the present invention
Fixed, except illustrating, reagent that the present invention uses, method and apparatus are the conventional reagent of the art, method and apparatus,
But the invention is not limited in any way.
Embodiment one: the invention discloses a kind of encryption methods of print data transmission, and specifically, user selects at platform end
Mimeograph documents are selected, is triggered at platform end and generates and generate random cipher c and random number e, are generated in the triggering of printing end random
Password a;User inputs verifying random cipher a at platform end;Identifying code function M generation is called to test according to random cipher a in platform end
Demonstrate,prove code b;Key function N is called to generate key K random cipher a, identifying code b and random cipher c in platform end;It platform end will
Mimeograph documents are translated to form file stream character string, and according to random number e, this document stream character string is averagely divided into e group character
The character array of equal length;Platform end group calls encryption function M that key K is placed in each character array at random in key K
It is interior to form new key character array;Key character array is input to by platform end by the encryption logic sequence of encryption function W to be added
In close function W, it is close first to be carried out the 0th wheel according to the key forming method of feedback working mode by encryption function W for key character array
Then spoon add operation takes turns secret key by the 1-10 that online mode successively sequentially generates again, to what is formed after last round of cryptographic operation
Key character array, successively ordered encryption forms the output of respective encrypted file, obtains encryption file d;By encryption file d, at random
Password c and identifying code b is sent to printing end.In embodiments of the present invention, the present invention is using user in printing end peace end
It triggers simultaneously and generates random cipher a, random cipher c and random number e, identifying code letter is then called by random cipher a again
Number M generates identifying code b, then calls key function N to generate key by random cipher a, identifying code b and random cipher c again
K;Platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is averagely divided
At the equal character array of e group character length;Platform end group calls encryption function M that key K is placed in often at random in key K
New key character array is formed in one character array, encrypts key character array to form encryption finally by encryption function M
File d;Obviously, the present invention due to printing end and platform end generate simultaneously random cipher and this transmission should be in a network
Secret code using the connection randomness at printing end and platform end, and prints the initial random password of end peace end not with net
Network is propagated, and illegal user is difficult to intercept network or cracks the password generation algorithm for calculating equipment while obtaining the random cipher,
It avoids illegal user and cracks mimeograph documents, substantially increase the security performance of print data transmission;Also, the present invention utilize with
The character array that this document stream character string is averagely divided into e group character length equal by machine numerical value e, and it is based on key K, it calls and adds
Key K is placed in by close function M at random forms new key character array in each character array, then to key character array into
Row encryption integration, strengthens the encryption preciseness of key character array, further avoids illegal user and crack mimeograph documents, increase
The security performance of strong print data transmission reaches safety to solve the defect that existing print data is easy to happen leakage
The purpose of quick transferring printing data.
More specifically, the embodiment of the present invention includes have printing end process flow peace end printing process;Wherein, platform end
Process flow are as follows: after selecting mimeograph documents, printing end can execute step S11 and step S12, be printing end first because user touches
Random cipher a occurs into, and random cipher a is stored and is shown to operator control panel;Platform end can execute step S21 and step
S22, i.e. platform end first generate random cipher c because user triggers, and random cipher c is stored and is shown to operator control panel;S23,
User selects mimeograph documents, and printing end, which can trigger, generates random cipher a, and also triggering generates random cipher c simultaneously at platform end;S24,
Input verifying random cipher a on the display screen at platform end again;S25, platform end call identifying code function M raw according to random cipher a
At identifying code b;In this step, identifying code function M is embodied asWherein, f (x) is identifying code
B, value are the first six bit digital;π is pi, value 3.1415926, KTTo print moment parameter, specific value is to work as
The summation that preceding date print time is added, a-T is verifying rate, when specific value is that random cipher subtracts the current print time
The summation divided;Specifically, 20 divide when the print time is 18 days 15 April in 2019, thenAlso
It is to say that identifying code b specific value isIdentifying code function M is specifically obtained in conjunction with the current print time
To specific identifying code, reduces illegal user and obtain the resorting to trickery to serve oneself property for generating the identifying code, further avoid illegal user and crack
Mimeograph documents enhance the security performance of print data transmission, so that solving existing print data is easy to happen lacking for leakage
It falls into, achievees the purpose that safely and fast transferring printing data;S26, platform end by random cipher a, identifying code b and random cipher c,
Key function N is called to generate key K;Key function N can select existing cryptographic Hash key function, this step according to actual needs
Suddenly specific identifying code, then the comprehensive higher cryptographic Hash key of current secret degree specifically further are obtained in conjunction with the current print time
Function generate key K, reduce illegal user obtain generate key K resorting to trickery to serve oneself property, further avoid illegal user crack beat
Printed text part enhances the security performance of print data transmission, further solves existing print data and is easy to happen lacking for leakage
It falls into, achievees the purpose that safely and fast transferring printing data.S27, it is based on key K, encryption function W is called to generate encryption file d, tool
Body are as follows: platform end translates mimeograph documents to form file stream character string, and according to random number e, this document stream character string is put down
It is divided into the equal character array of e group character length;Platform end group calls encryption function M to divide key K at random in key K
It is placed in each character array and forms new key character array;Platform end is by the encryption logic of encryption function W sequentially by key
Character array is input in encryption function W, and encryption function W is according to the key forming method of feedback working mode, first by key word
It accords with array and carries out the 0th wheel secret key add operation, secret key is then taken turns by the 1-10 that online mode successively sequentially generates again, to last round of
The key character array formed after cryptographic operation, successively ordered encryption forms the output of respective encrypted file, obtains encryption file d.
S28, encryption file d, random cipher c and identifying code b are sent to printing end.Process flow on printing end are as follows: S13,
Print end prompt input random cipher c and identifying code b, verify it is errorless after receive encryption file d, and transfer random cipher a, with
Secret code c and identifying code b;S14-S15, printing end group call key in random cipher a, identifying code b and random cipher c
Function N generates key k, and compares and judge whether key k is equal with key K, and end is printed if unequal and destroys encryption file d,
If key k is equal with key K, call decryption function M that encryption file d is decrypted;S16, calling and encryption function W phase are fitted
The decryption function M answered is decrypted to obtain original print file to encryption file d;S17, printing original print file, have printed
The original print file of electronics shelves auto-destruct is carried out after to divulge a secret to prevent depositing bottom.
Specifically, the ciphering process of encryption function W successively includes that byte replacement, row displacement, column mixing and secret key add
Operation, and the step of the step of column mixing of every wheel adds with secret key merges to form a step, and the column mixing and secret key add adopts
It successively carries out completing every wheel secret key with three XOR gates adding processing;10th wheel ciphering process include byte replacement, row displacement and
The operation that secret key adds.Encryption function W is successively given birth to using the seed key and key schedule of input by logical order online
At the seed key participates in the 1st wheel InvAddRoundKey operation as input.The each round of the 1-10 wheel secret key of encryption function W
The generation of secret key uses following steps: establishing a two-dimensional array for 4 rows 4 × 11 column, each array location is a byte, two dimension
Each column of array are as a word for saving seed secret key and ten wheel secret keys;The seed secret key is copied to secret key scheduling
In the first four word of table, then first round secret key extends four words after the secret key generated occupies, according to this layout, ten wheel extensions
Later, secret key dispatch list can be filled, and secret key expansion process terminates, wherein each round secret key generation be by word cyclic shift,
The sequence operation of the step of byte replacement and wheel constant exclusive or is formed, and, the cryptographic operation of each round and the secret key of each round
Byte replacement in extended operation is realized by way of S box look-up table.Obviously, in embodiments of the present invention, of the invention
By the way that the secret key character array that segmentation is formed in advance is carried out the 0th wheel secret key add operation first, adding for Encryption Algorithm is pressed again later
The last round of encryption of 1-10 secret key pair that close logical order input is successively sequentially generated by feedback working mode by online mode is grasped
Successively ordered encryption forms the output of corresponding ciphertext to the secret key character array formed after work, and the column mixing of every wheel and close in 1-9 wheel
The step of spoon adds, merges to form a step, and the generation moment of the secret key of the 1st wheel is synchronous with the 0th wheel secret key add operation, mentions significantly
The high performance of encryption.
Obviously, in embodiments of the present invention, on the one hand, when the present invention specifically combines current printing by identifying code function M
Between obtain specific identifying code, reduce illegal user and obtain the resorting to trickery to serve oneself property for generating the identifying code, then comprehensive current secret degree is more
High cryptographic Hash key function generates key K, reduces illegal user and obtains the resorting to trickery to serve oneself property for generating key K, avoids illegal use
Mimeograph documents are cracked at family, enhance the security performance of print data transmission, further solve existing print data and be easy to happen
The defect of leakage;In addition, this document stream character string is averagely divided into e group character length equal by the present invention using random number e
Character array, and be based on key K, call encryption function M key K is placed at random formed in each character array it is new close
Key character array, then encryption integration is carried out to key character array, the encryption preciseness of key character array is strengthened, further
It avoids illegal user and cracks mimeograph documents, enhance the security performance of print data transmission;And utilize printing end peace end
Initial random password not with Internet communication, illegal user, which is difficult to intercept network or crack and calculates the password generation algorithm of equipment, to come
The random cipher is obtained simultaneously, illegal user is avoided and cracks mimeograph documents, substantially increases the safety of print data transmission
Can, to solve the defect that existing print data is easy to happen leakage, achieve the purpose that safely and fast transferring printing data.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment cross-reference.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized the present invention.To these
A variety of modifications of embodiment will be readily apparent to those skilled in the art, general original as defined herein
Reason can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not
Be intended to be limited to the embodiments shown herein, and be to fit to it is consistent with the principles and novel features disclosed in this article most
Wide range.
Claims (6)
1. a kind of encryption method of print data transmission, it is characterised in that:
User selects mimeograph documents at platform end, triggers generation at platform end and generates random cipher c and random number e,
It prints end triggering and generates random cipher a;
User inputs verifying random cipher a at platform end;
Identifying code function M is called to generate identifying code b according to random cipher a in platform end;
Key function N is called to generate key K random cipher a, identifying code b and random cipher c in platform end;
Platform end translates mimeograph documents to form file stream character string, according to random number e, by this document stream character string average mark
It is cut into the equal character array of e group character length;
Platform end group calls encryption function M that key K is placed at random in each character array and forms new key in key K
Character array;
Key character array is input in encryption function W by platform end by the encryption logic sequence of encryption function W, encryption function W
According to the key forming method of feedback working mode, key character array is first subjected to the 0th wheel secret key add operation, is then passed through again
The 1-10 that online mode successively sequentially generates takes turns secret key, successively suitable to the key character array formed after last round of cryptographic operation
Sequence encrypts to form the output of respective encrypted file, obtains encryption file d;
Encryption file d, random cipher c and identifying code b are sent to printing end.
2. a kind of encryption method of print data transmission according to claim 1, which is characterized in that the encryption function W
Ciphering process successively include byte replacement, row displacement, column mixing and the operation that adds of secret key, and every wheel column mixing and secret key add
The step of merge to form a step, the step of column mixing and secret key add, successively carries out completing every wheel using three XOR gates
Secret key adds processing;The ciphering process of 10th wheel includes the operation that byte replacement, row displacement and secret key add.
3. a kind of encryption method of print data transmission according to claim 2, which is characterized in that the encryption function W
It is sequentially generated online using the seed key and key schedule of input by logical order, the seed key is as input ginseng
With the 1st wheel InvAddRoundKey operation.
4. a kind of encryption method of print data transmission according to claim 3, which is characterized in that the encryption function W
The generation of each round secret key of 1-10 wheel secret key use following steps: establish a two-dimensional array for 4 rows 4 × 11 column, every number
Group unit is a byte, and each column of two-dimensional array are as a word for saving seed secret key and ten wheel secret keys;Described kind
Sub- secret key is copied in the first four word of secret key dispatch list, four after then the secret key of first round secret key extension generation occupies
A word, layout according to this, after ten wheel extensions, secret key dispatch list can be filled, and secret key expansion process terminates, wherein each round is close
Spoon generation is sequence operation formation the step of replacing by word cyclic shift, byte and take turns constant exclusive or, and, each round adds
Byte replacement in close operation and the secret key extended operation of each round is realized by way of S box look-up table.
5. a kind of encryption method of print data transmission according to claim 4, which is characterized in that the print data passes
Defeated encryption method further includes having: prompt input random cipher c and identifying code b in printing end receives encryption text after verifying is errorless
Part d, and transfer random cipher a, random cipher c and identifying code b.
6. a kind of encryption method of print data transmission according to claim 5, which is characterized in that the print data passes
Defeated encryption method further includes having: printing end group calls key function N raw in random cipher a, identifying code b and random cipher c
It at key k, and compares and judges whether key k is equal with key K, end is printed if unequal and destroys encryption file d, if key k
It is equal with key K, then call decryption function M that encryption file d is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910345968.0A CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910345968.0A CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110135176A true CN110135176A (en) | 2019-08-16 |
CN110135176B CN110135176B (en) | 2023-04-18 |
Family
ID=67575193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910345968.0A Active CN110135176B (en) | 2019-04-26 | 2019-04-26 | Encryption method for printing data transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110135176B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110816089A (en) * | 2019-10-15 | 2020-02-21 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
CN111062456A (en) * | 2019-12-25 | 2020-04-24 | 李蕴光 | Two-dimensional code encryption algorithm |
CN111959139A (en) * | 2020-08-31 | 2020-11-20 | 湖南鼎一致远科技发展有限公司 | Encryption system of thermal transfer printer |
CN114826789A (en) * | 2022-06-29 | 2022-07-29 | 北京辰光融信技术有限公司 | Printing control method and system for ensuring data safe transmission |
CN114844728A (en) * | 2022-07-04 | 2022-08-02 | 道格特半导体科技(江苏)有限公司 | Serialized data secure communication method and big data platform |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7251632B1 (en) * | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
WO2010091565A1 (en) * | 2009-02-12 | 2010-08-19 | Liu Haiyun | Random encryption method in need of using exhaustive method decryption |
CN101872402A (en) * | 2010-05-26 | 2010-10-27 | 上海北大方正科技电脑系统有限公司 | Safe printing method |
CN103777912A (en) * | 2014-01-27 | 2014-05-07 | 珠海赛纳打印科技股份有限公司 | Imaging equipment as well as safe imaging method and imaging system thereof |
CN105162803A (en) * | 2015-09-30 | 2015-12-16 | 深圳市金城保密技术有限公司 | Safe information output method and safe information output system of secret-relating network |
CN105450408A (en) * | 2014-08-04 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password checking method and device |
CN105939190A (en) * | 2016-06-23 | 2016-09-14 | 天津中安华典数据安全科技有限公司 | AES data encryption method for offline key generation based on FPGA |
-
2019
- 2019-04-26 CN CN201910345968.0A patent/CN110135176B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7251632B1 (en) * | 1999-10-18 | 2007-07-31 | Stamps. Com | Machine dependent login for on-line value-bearing item system |
WO2010091565A1 (en) * | 2009-02-12 | 2010-08-19 | Liu Haiyun | Random encryption method in need of using exhaustive method decryption |
CN101872402A (en) * | 2010-05-26 | 2010-10-27 | 上海北大方正科技电脑系统有限公司 | Safe printing method |
CN103777912A (en) * | 2014-01-27 | 2014-05-07 | 珠海赛纳打印科技股份有限公司 | Imaging equipment as well as safe imaging method and imaging system thereof |
CN105450408A (en) * | 2014-08-04 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Password checking method and device |
CN105162803A (en) * | 2015-09-30 | 2015-12-16 | 深圳市金城保密技术有限公司 | Safe information output method and safe information output system of secret-relating network |
CN105939190A (en) * | 2016-06-23 | 2016-09-14 | 天津中安华典数据安全科技有限公司 | AES data encryption method for offline key generation based on FPGA |
Non-Patent Citations (2)
Title |
---|
DING XIAODONG 等: "Security System for Internal Network Printing" * |
李玲双: "加密文档破解系统的设计与实现" * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110816089A (en) * | 2019-10-15 | 2020-02-21 | 佛山普瑞威尔科技有限公司 | Safe burning method of printing program, chip and printing consumable |
CN111062456A (en) * | 2019-12-25 | 2020-04-24 | 李蕴光 | Two-dimensional code encryption algorithm |
CN111959139A (en) * | 2020-08-31 | 2020-11-20 | 湖南鼎一致远科技发展有限公司 | Encryption system of thermal transfer printer |
CN111959139B (en) * | 2020-08-31 | 2022-05-13 | 湖南鼎一致远科技发展有限公司 | Encryption system of thermal transfer printer |
CN114826789A (en) * | 2022-06-29 | 2022-07-29 | 北京辰光融信技术有限公司 | Printing control method and system for ensuring data safe transmission |
CN114844728A (en) * | 2022-07-04 | 2022-08-02 | 道格特半导体科技(江苏)有限公司 | Serialized data secure communication method and big data platform |
Also Published As
Publication number | Publication date |
---|---|
CN110135176B (en) | 2023-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110135176A (en) | A kind of encryption method of print data transmission | |
Kumar et al. | Development of modified AES algorithm for data security | |
JP4712017B2 (en) | Message authentication code generation method using stream cipher, authentication encryption method using stream cipher, and authentication decryption method using stream cipher | |
CN101064595B (en) | Computer network safe input authentication system and method | |
US6189095B1 (en) | Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks | |
US7254232B2 (en) | Method and system for selecting encryption keys from a plurality of encryption keys | |
TWI688250B (en) | Method and device for data encryption and decryption | |
CN108768617B (en) | Format-preserving encryption method based on traditional block cipher | |
CN108123794A (en) | The generation method and encryption method of whitepack key, apparatus and system | |
KR20150090438A (en) | White box encryption apparatus and encryption method | |
Agrawal et al. | Elliptic curve cryptography with hill cipher generation for secure text cryptosystem | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
US20020159588A1 (en) | Cryptography with unconditional security for the internet, commercial intranets, and data storage | |
CN114500006B (en) | Query request processing method and device | |
CN113591117A (en) | Social platform daily conversation encryption method and system, storage medium and computing device | |
JP6468567B2 (en) | Key exchange method, key exchange system | |
CN114443718A (en) | A data query method and system | |
Joshy et al. | Text to image encryption technique using RGB substitution and AES | |
CN106789053A (en) | Random ciphertext generation method and system, decryption method and system | |
CN112422278A (en) | Byte-oriented random multi-table replacement encryption and decryption method | |
JP2008035305A (en) | Encryption method and data concealing method | |
WO2020213114A1 (en) | Mac tag list generation device, mac tag list verification device, method, and program | |
Toorani et al. | A secure cryptosystem based on affine transformation | |
Fu et al. | A fast chaos-based colour image encryption algorithm using a hash function | |
JP2010186075A (en) | Integer encrypting and decoding method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |